HEWLETT-PACKARD HP All-in-One MS235 Desktop PC - Black Logo

Related Topics:

Ellen Collins Posted on Dec 02, 2011
Answered by a Fixya Expert

Trustworthy Expert Solutions

At Fixya.com, our trusted experts are meticulously vetted and possess extensive experience in their respective fields. Backed by a community of knowledgeable professionals, our platform ensures that the solutions provided are thoroughly researched and validated.

View Our Top Experts

How do you get a hacker off your computer and network

Someone has taken over super administrator rights on my computer remotely and now every computer i try and get online with at my house gets hacked too!!! please tell me how i can get this hacker out and keep him out for good

1 Answer

Anonymous

Level 3:

An expert who has achieved level 3 by getting 1000 points

Superstar:

An expert that got 20 achievements.

All-Star:

An expert that got 10 achievements.

MVP:

An expert that got 5 achievements.

  • HEWLETT-PACKARD Master 32,281 Answers
  • Posted on Dec 02, 2011
Anonymous
HEWLETT-PACKARD Master
Level 3:

An expert who has achieved level 3 by getting 1000 points

Superstar:

An expert that got 20 achievements.

All-Star:

An expert that got 10 achievements.

MVP:

An expert that got 5 achievements.

Joined: Jun 29, 2007
Answers
32281
Questions
2
Helped
7912673
Points
102259

To secure your wireless network from unauthorized access,please click on this link and follow my instructions :-http://www.fixya.com/support/r3559128-wireless_router_security

Add Your Answer

×

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

0helpful
1answer
tip

Home Computer Networking Tips

<span> <p>&bull; Make sure you have changed the username and passwords for the administrator by default, especially if you use a wi-fi. Hackers can easily access the network from outside the building and has access to your system that all routers come with standard passwords.<br /> <p> <br /> <p>&bull; Make sure the firewall on all computers and routers are on. Revoke the privileges that may allow users to set firewall. Installing additional software on each personal computer to help you make your system more secure.<br /> <p> <br /> <p>&bull; Assign static IP addresses for each computer. Make sure you create a range of private IP addresses to prevent your computer from being directly accessible from the Internet.<br /> <p> <br /> <p>&bull; Set the "Auto connect to Wi-Fi option. Your computer may accidentally connect to a local network that may represent serious threats to security.<br /> <p> <br /> <p>&bull; If you have a wireless network installation, then change the default SSID immediately. Also, make sure to remove the SSID broadcast function of network routers.<br /> <p> <br /> <p>&bull; The network must be switched on when not in use. Turning often not a feasible solution, but when the network is not required for a period of time, you can disable.<br /> <p> <br /> <p>&bull; Enable and use Wired Equivalency Frequency (WEP) that will help encrypt all data transfers via your router.<br /> <p> <br /> <p>&bull; Enable MAC address filtering on the network. Also provide the MAC address of your computer to activate the filter. A MAC address is very difficult to counterfeit and increases security of a large network.<br /> <p> <br /> <p>&bull; Use a non-standard channel for the wireless network that make it difficult for hackers to access your network.<br /></span>
on Jan 20, 2011 • Computers & Internet
tip

Prevent Your PC from Getting Hacked

Here , we will see how to prevent PC's from getting hacked : Most people think that hackers are only a problem for servers. This is not true. If your Windows PC is not properly configured, everything on your computer can easily be stolen or destroyed by hackers. Our network architecture is inherently hacker-resistant. However, because your PCs are directly connected to the Internet, hackers can bypass our servers and attack your PCs directly. Our firewall will help to some extent, but you must follow basic precautions if you want your data to be safe. Viruses: It is impossible for the servers to get computer viruses, because they run Unix, which cannot be infected by viruses. A virus must be executed before it can infect a computer. On Windows, programs like Internet Explorer and Outlook often execute files without your knowledge, which is what causes most virus infections. However, these files (or any Windows program) cannot be executed on the server. Some Windows viruses put copies of themselves on the server's shared disks. To the server, these are just ordinary files. The server is set up to periodically delete them to save space. They are not a problem unless you click on them. Clicking is the root of all evil. Here are some basic precautions to protect against hackers.
  1. Goto windowsupdate.microsoft.com at least once a week and install all critical patches.
  2. Run an antivirus program at least once a week. Update your virus signature files every time you use it.
  3. Use a firewall such as Zone Alarm. (Some firewalls have had major security problems. Be sure you have the latest update)
  4. Check your computer for trojans by clicking on: http://security.symantec.com http://www.trojanscan.com
  5. Don't click on email attachments.
  6. Don't install Napster, Kazaa, ChainCast, or any software from an unknown source. The former will turn your computer into a server and the latter may contain trojans and viruses.
  7. Turn off sharing, especially on your C:\ and D:\ drive. This is very dangerous! If you must share a disk, make sure it requires a password. Otherwise, anyone in the Internet can use your computer to back up their files without your knowledge. Never share any folder without a password.
  8. Put a good password on your PC. If you have a password on your PC that is easy to guess, your computer can be easily taken over by hackers.
    A bad password would be things like 'password', '12345', your name, license plate number, or any word that could be found in an English dictionary or a dictionary in your native language.
  9. Report any network slowness or strange computer behavior so it can be checked by me (if it's a network problem) or Brad (if it's a Windows or Mac problem).
  10. Windows PCs with static IP numbers are especially easy targets. You should always set "Obtain an IP address automatically" in Windows unless you are running a server and you are knowledgeable in computer security.

Here are some more tips:
  1. Please give your computer a sensible name. If we can't find your computer when it causes a problem, the only way to fix it is by unplugging it from the network.
  2. Don't store files in the /tmp directory on the servers (engram or protein). They are not safe there! If someone else gets a virus, their computer can put copies of the virus on the shared disk, mixed in with your files. The server cannot be infected by these viruses, but your PC could. Keep your backups in your home directory where they are safe and private.
  3. If you use Windows 2000 or NT, activate auditing of all system events, especially failures. This will you help discover how the hacker obtained access. Without this knowledge, it will be difficult to know what to change when you reinstall your operating system. Be sure to scan through the logs occasionally for unusual activity.
  4. Avoid executable content in web pages and email. Disable ActiveX. You can check your Internet Explorer installation for Active X security problems at this web site: http://www.tiac.net/users/smiths/acctroj/axcheck.htm
  5. Disable automatic execution of Macros in Office programs (Word, Excel, etc).
  6. Use SSH in preference to telnet. You can replace it with the freeware TeraTerm client with the SSH plugin.
  7. Unbind the unneeded network settings in Windows. This is easy to do, and will greatly increase your security. Follow the instructions at http://grc.com/su-rebinding9x.htm
  8. If a hacker gets on your computer, or you discover a trojan on your computer and suspect it is being actively exploited, unplug it from the network immediately and ask for assistance. Don't delete any files. We may need to check them to find out how the attacker got into your system.
  9. If your computer has been compromised by a trojan or an intruder, it cannot be repaired by removing the foreign software. There are dozens of different ways for a hacker to regain access, despite our firewall, that are impossible for any scanning software to find. The only way to repair your computer is to reformat your disk and reinstall the operating system. Until you do this, your computer is a threat to every one else's computer.
If you don't follow these guidelines, we won't nag you to change, but sooner or later your computer will be trashed by a hacker, trojan, or virus. Some people have already discovered this the hard way.
on Jun 27, 2010 • Computers & Internet
0helpful
1answer

What's different between hacker and cracker. ?

    A Hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

    A Cracker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties.

    The general view is that, while hackers build things, crackers break things.
0helpful
1answer

Am looked out of all dur to trying to log onto my dds computer in another town

1. Your Dad's computer must have remote login enabled for you to get into it's file system. Generally, you must also have an administrator-level account (user name and password) on that computer.

2. If your Dad's computer is set up as a webserver, and you want to change the website remotely, then it would have to have a link for a site administrator login. This should be a secure (https) page.

Those things have to be set up at the computer by someone with administrator level access. If nobody knows the password for an administrator level account on that computer, there probably is not much that can be done other than to go to the computer and copy or e-mail whatever files are accessible. Some people sell "password unlocking" software, but I cannot vouch for its effectiveness, nor its security - if it contains a Trojan Horse it would make the computer open to whatever hacker installed the Trojan Horse.

On the other hand, if your Dad had a webpage set up on a web hosting service, you do not need access to your Dad's computer to get to it. If you don't have the administrator username or password for the page, you may be able to get the hosting service to provide you with access once you show your legal authority to do so. This also holds for e-mail accounts.
tip

Make Frequent Backups

This is a very important tip that should be taken seriously. You never know exactly what will happen in the computer world. You might be downloading one file and the next second your staring at the "Blue Screen of Death" It's very serious and important that you make frequent backups of your computer.

There are many backup programs out on the market but the most used by regular computer users would have to be the integrated Windows Backup program. It's easy, fast, and simple to use but it might not serve your purpose. Here are two levels of computer users that I categorize for certain backup programs:

Regular Users - Windows Backup
Users that install programs often and mainly use the computer for entertainment, documenting, and other things like that in a single computer network.

Power Users - Norton Ghost
This group is for programmers, hackers, administrators, and other positions of that sort. Programmers and hackers tend to kill their machines with intense viruses and programs which feed themselves in Windows Backup files. It can't hurt using both of the programs, just be smart about how you use them.
on Dec 09, 2009 • Computers & Internet
0helpful
2answers

How do I get a hacker to stop using my facebook account? Call 1-8O5-465-751O Number To Fix

change the FB password immidetly
if that doesn't help contact FB but then you can loose your FB profile
0helpful
1answer

Hi, I am unable to generate a ping test with windows 7. I have followed the answer already posted

Network administration is a serious job. This is especially true for companies that rely on computers to input, process and share data. The more computers or nodes in the network, the harder it gets to manage them. Fortunately, there are several tools can greatly simplify your job. They are called network monitoring tools. Many of them are open-source programs, and they are ready for download and installation.

Don't mistake these programs as simple tools for just monitoring if a device is turned on or off. They are full-pledged remote access programs that allow an administrator to view all devices that are connected to the network (routers, modems, servers, printers etc.) and all the processes being run in each node. If you are a network administrator, you'll need specific programs for different jobs.

Network Monitoring Utilities

Network Ping and Softperfect Network Scanner are the tools for the job. Network Ping gives you a visual overview of all the computers connected to your network. It checks the network status by sending each device a ping. If the device is down an email alert can be sent to an administrator.

Softperfect Network Scanner or NetScan is popular lightweight software that detects all devices attached to your router or access point. It pings all possible IP addresses to determine which computers are currently being used. It is also integrated into the Windows Explorer, allowing you to view all shared files and folders through the NetScan interface.

Intrusion Prevention System (IPS)

The most popular IPS worldwide is Snort. In real time, it analyzes packet capturing and network traffic on IP networks. With its analysis of protocols, Snort can identify network attacks and attempts to perform unauthorized actions such as fingerprinting, buffer overflows and port scanning. With this software running, you are guaranteed that your office network is safe from intrusions. Snort can record packets and generate human-readable reports.

Remote PC and Server Management

Putty and the "Dude" are network monitoring programs for the Windows platform. They track all devices in your network and they can generate a network map or inventory depending on the nodes currently online. Putty, in particular, is very light at 450 kb because of its UNIX-based interface. It allows you to set administrator privileges in remotely controlling computers. Putty can also manage bandwidth allocation or block IPs from using DSL internet.

Having the right network monitoring tools for the job helps network administrators automate many of the day to day operations that take up time and resources to complete.

5helpful
2answers

How to hack a facebook password?

IMPORTANT NOTES: THE FOLLOWING DETAILS ARE FOR TRAINING TO PROVIDE RESOURCEFUL COMPUTER NETWORKING EXPERINCES LEAST CONTRIBUTORY TO AN ALTERNATIVE FUTIVE INTENSION.

Hacking into face book requires to be an initiator of the site. First, create the website called face book to be made available for several persons. Least informing the members about the intent to requesting details either usually known as social networks. Usually websites that are recognized as popular would have structure hosts. Mentionable examples are network administrators that make details aware to members about the ongoing conditions. Network administrators that makes the website continues to exist as the resources require to host either expertise or design technicalities are concerned. Websites also require technical experts that restores the conditions that occurs as the networked structures are established to become popularly tasked by several entities either human or devices of computers and peripherals. Internetworking sites have several entities of experts depending on the type of resources provided either as commercial, educational, social or personal sites. The magnitude of resources provided to include the numbers of members makes the web site require several experts to keep operational. Hosting websites requires several resources to make possible. Mentionable examples are the computer structures that are either situation ally located at an address or mobile. Each entity of device computers has address numbers that recognize as operational entities with purpose descriptions of functionalities. Establishing a website requires having the computer devices to the barest minimum a computer, network devices of modems routers, as hardware requirements. The complement to computer devices is program making possible instable displays to achieve user, professional or education experiences. Once the computer structures of hardwires, software's, structures have achieved regular functionality makes available several possible experiences among which hacking is mentioned. Hacking is very technical to describe or explain. First, the entity that makes available advertised recognition as hacker from which request are made to resolve computer device conditions that occur elsewhere becomes thought as computer technician. In which instance, solving missing passwords, usernames or retrieving details on computer from establishments that contract the entities expertise is mentionable means to make expertise functional. The contract entity requesting hacker's expertise usually least requests hacking as resource, the request to always to resolve an issue in which instance allows for expert technician to display skills? Face book hackers are web designers would make the pages display least informing the subscriber about intentions. Regular functional websites requires ascertaining the detail intents, to be verified to resourceful provision either where the administrators that make the space available are contactable. For example, websites that have contact details may least disclose the intent to members however provides mission statements malign acquirable alternate persons should least be thought as hackers sites. Once the members to site recognize the provider entities either as providing resources within expectation also with details that makes tangible as an entity with responsible establishment entities means hacking situations are unanticipated.


Additional notes

Hacking is very technical to explain. Usually, the persons that acquire resources are the only recognizers to hacking incidences. For example, hacking into devices that least becomes recognized may not dispense such a message. Hacking situations are explainable. First the condition where the hackers have retrieved details that belong as personal details. Attempting to retrieve forget ton passwords to personal accounts may be possible with means known as hacking to another person since the default entry is not resorted. Second, the situation where the hackers have to acquire resources least reckonable by the owner. Resources would usually display on networks for example least known to persons until disappearance. Conditions of such nature least makes available recognition of hacking unless personal resources become disintegrable. Third the situation that hacking is suspected without any resources missing. Occasionally message goes around of hacking taking place making person's causation. In such situations, missing details appears hacked until proven unpacked. All three categories of hacking are technical to explain depending on whose side made the hacking. The network sites administrator has contact details either email, phone or chat to quest for recent conditions or concerns. Inform the network sites experts of the condition either in person since computer device surfing is technical.

0helpful
1answer

Hacker tried to get into my computer

192.168.X.X is an internal network address...your "hacker" is either in the same room, or at least on your network, the other is an IP in San Francisco, CA, and PPPoE is a very unlikely method for a "hacker" to use, it's actually a very secure method of connecting 2 computers over the internet.
Not finding what you are looking for?

116 views

Ask a Question

Usually answered in minutes!

Top HEWLETT-PACKARD Computers & Internet Experts

Brad Brown

Level 3 Expert

19187 Answers

Paul Bade

Level 3 Expert

1818 Answers

Grand Canyon Tech
Grand Canyon Tech

Level 3 Expert

3867 Answers

Are you a HEWLETT-PACKARD Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...