Tip & How-To about Computers & Internet

Prevent Your PC from Getting Hacked

Here , we will see how to prevent PC's from getting hacked : Most people think that hackers are only a problem for servers. This is not true. If your Windows PC is not properly configured, everything on your computer can easily be stolen or destroyed by hackers. Our network architecture is inherently hacker-resistant. However, because your PCs are directly connected to the Internet, hackers can bypass our servers and attack your PCs directly. Our firewall will help to some extent, but you must follow basic precautions if you want your data to be safe. Viruses: It is impossible for the servers to get computer viruses, because they run Unix, which cannot be infected by viruses. A virus must be executed before it can infect a computer. On Windows, programs like Internet Explorer and Outlook often execute files without your knowledge, which is what causes most virus infections. However, these files (or any Windows program) cannot be executed on the server. Some Windows viruses put copies of themselves on the server's shared disks. To the server, these are just ordinary files. The server is set up to periodically delete them to save space. They are not a problem unless you click on them. Clicking is the root of all evil. Here are some basic precautions to protect against hackers.

  1. Goto windowsupdate.microsoft.com at least once a week and install all critical patches.
  2. Run an antivirus program at least once a week. Update your virus signature files every time you use it.
  3. Use a firewall such as Zone Alarm. (Some firewalls have had major security problems. Be sure you have the latest update)
  4. Check your computer for trojans by clicking on: http://security.symantec.com http://www.trojanscan.com
  5. Don't click on email attachments.
  6. Don't install Napster, Kazaa, ChainCast, or any software from an unknown source. The former will turn your computer into a server and the latter may contain trojans and viruses.
  7. Turn off sharing, especially on your C:\ and D:\ drive. This is very dangerous! If you must share a disk, make sure it requires a password. Otherwise, anyone in the Internet can use your computer to back up their files without your knowledge. Never share any folder without a password.
  8. Put a good password on your PC. If you have a password on your PC that is easy to guess, your computer can be easily taken over by hackers.
    A bad password would be things like 'password', '12345', your name, license plate number, or any word that could be found in an English dictionary or a dictionary in your native language.
  9. Report any network slowness or strange computer behavior so it can be checked by me (if it's a network problem) or Brad (if it's a Windows or Mac problem).
  10. Windows PCs with static IP numbers are especially easy targets. You should always set "Obtain an IP address automatically" in Windows unless you are running a server and you are knowledgeable in computer security.

Here are some more tips:
  1. Please give your computer a sensible name. If we can't find your computer when it causes a problem, the only way to fix it is by unplugging it from the network.
  2. Don't store files in the /tmp directory on the servers (engram or protein). They are not safe there! If someone else gets a virus, their computer can put copies of the virus on the shared disk, mixed in with your files. The server cannot be infected by these viruses, but your PC could. Keep your backups in your home directory where they are safe and private.
  3. If you use Windows 2000 or NT, activate auditing of all system events, especially failures. This will you help discover how the hacker obtained access. Without this knowledge, it will be difficult to know what to change when you reinstall your operating system. Be sure to scan through the logs occasionally for unusual activity.
  4. Avoid executable content in web pages and email. Disable ActiveX. You can check your Internet Explorer installation for Active X security problems at this web site: http://www.tiac.net/users/smiths/acctroj/axcheck.htm
  5. Disable automatic execution of Macros in Office programs (Word, Excel, etc).
  6. Use SSH in preference to telnet. You can replace it with the freeware TeraTerm client with the SSH plugin.
  7. Unbind the unneeded network settings in Windows. This is easy to do, and will greatly increase your security. Follow the instructions at http://grc.com/su-rebinding9x.htm
  8. If a hacker gets on your computer, or you discover a trojan on your computer and suspect it is being actively exploited, unplug it from the network immediately and ask for assistance. Don't delete any files. We may need to check them to find out how the attacker got into your system.
  9. If your computer has been compromised by a trojan or an intruder, it cannot be repaired by removing the foreign software. There are dozens of different ways for a hacker to regain access, despite our firewall, that are impossible for any scanning software to find. The only way to repair your computer is to reformat your disk and reinstall the operating system. Until you do this, your computer is a threat to every one else's computer.
If you don't follow these guidelines, we won't nag you to change, but sooner or later your computer will be trashed by a hacker, trojan, or virus. Some people have already discovered this the hard way.

Posted by on

Computers & Internet Logo

Related Topics:

Related Questions:

2 Answers

How do I hack a atm


Hire a higher hacker for general ethical, specialized and advanced hacking. Hack into any data base,pay pal account , blogs, credit cards (clear your debts and drop money into your credit cards) , smartphone hacks ,SERVER CRASHED hacks ,professional hacking into institutional servers-keylogging -University grades changing / Admin(staff) account hack -Access/Password (facebook, instagram, bbm,Skype, snapchat, twitter, badoo, Word Press,zoosk, various blogs, icloud, apple accounts etc.)-clearing of criminal records-email accounts hack ( gmail,yahoomail,hotmail )-breach of web host servers ,Databases hack- Untraceable IP, we also restore lost files and documents, does not matter how long they have been gone for.
SPECIALIZED AND ADVNCED.
* UPGRADE UNIVERSITY GRADES
* BANK WEBSITE
* COMPANY WEBSITE WHATSAPP, EMAILS ,AND TEXT MESSAGES
* GOVERNMENT AGENCY WEBSITE
* SECURITY AGENCY WEBSITE
You can also learn some basic skills you wouldnt think you’d need on your everyday basis but find out how important and helpful they really are. use random credit cards to shop online, hack iphones, tap into your friends call and monitor conversations, email and text message.
You can contact at owlhack@cyberservices.com
Text: +1 (985) 313 2085

Sep 17, 2017 | Toys

3 Answers

I want retrieve my emails


log into your email provider and your emails should be there.

Feb 28, 2017 | Computers & Internet

1 Answer

hack


Hacking is only illegal if you don't have the person's permission to hack into their system. There are professional hackers who get paid to break into companies servers in order to test out the security.

Here are the laws on the subject:
http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/ComputerHackingandUnauthorizedAccessLaws/tabid/13494/Default.aspx

Feb 17, 2011 | Computers & Internet

3 Answers

anti-hacking code


Hi noxiney,
Most hackers gain access to others computer through open ports, this way a hacker can't be detected by any antivirus or firewall software. While the hacker is undercover inside your computer theres almost nothing you can do, because you think theres no problem with your PC. Also consider that hackers are experts when covering their tracks, this would make difficult to know from where this intruder comes.
The anti-hacking code would have to track the hackers Ip address and then hack the hacker's PC and trigger the shutdown routine. Let's say that the anti-hacking code can track the hacker's real Ip (which is very difficult considering that the hacker is covering his tracks and showing fake Ip), when the code reaches the hacker's PC it has to get inside and order the operating system to shut down (in less words, hack the hacker).
This is a very difficult thing to make and demands high knowledge not only of the TCP and UDP protocol but knowledge of the other's computer.
Concluding, it is possible to program many softwares that one can use to gather information about the intruder's PC and manage a way to shut down the hacker's PC before he/she shuts down yours. It does not exists a code which automatically shuts down a hacker's PC.

Jul 10, 2008 | Microsoft Windows XP Home Edition

Not finding what you are looking for?

157 people viewed this tip

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Loading...