Question about Intel CELERON D 315 XP HOME 256MB 64MB VIDEO MB CDRW 17IN. KB MOUSE (COMUTERSPECIAL) PC Notebook

2 Answers

Hacker and tracking virus invasion..it is not the computer the above describes.

We have a computer problem that we believe is caused
by a hacker accessing our computer through somekind
of tracking virus. We have reformatted many times
and used a product called Wipedrive but the problem returns. Have had the problem for about three weeks.
It seems as though the tracking virus has allowed the
hacker to access passwords which has allowed him to
close my account on youtube, erase my video and music
files on myspace and cause havoc in my computer itself.
The hacker has been in my email and deleted some messages.
I have the windows firewall on but this has not helped.
Usually when the virus attacks, it deletes files and registry entries, and everything else for that matter. would replacing harddrive solve the problem
seems as though they would just invade the new one.....
The hacker didn't show up until recently. Is there
any way I can block the hacker from acccessing my computer
and internet in the future, as well as get rid of this
virus?

Posted by on

2 Answers

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    Vice President:

    An expert whose answer got voted for 100 times.

  • Master
  • 470 Answers

Get the great anti virus and scan it 3 times,, download first this link and install first the anti-virus
http://www.softpedia.com/get/Antivirus/Avast-Home-Edition.shtml

Posted on Nov 16, 2008

  • Level 1:

    An expert who has achieved level 1.

    Problem Solver:

    An expert who has answered 5 questions.

  • Contributor
  • 1 Answer

I was able to pick up valuable info from your tech....I believe we have solved it although i am not
totally sure yet...thanks

Posted on Nov 16, 2008

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

16F-XXXX-XXXX-XXXX


Suggestion: get the legal key from Sony and eliminate the chance of getting spyware, malware an a virus in exchange for free stuff. People fail to realize some of these codes have imbedded language that allows tracking by malicious individuals when you are on the internet. Invasion is attached to the computer address and when on line you risk others watching your moves and sapping data from your computer. The risk is not woth it.

Jan 02, 2014 | Sony Computers & Internet

Tip

PC Tools- Ten Tips to Keep your Computer Running Smoothly


<span style="font-weight: bold;">Computer Maintenance Tips</span><br style="font-weight: bold;" /><br />1. Never, never, turn your computer off with the power switch until Windows has shut down.<br /><br />The one exception to this rule is when your computer locks up and your hard drive is not running (hard drive light is not blinking). In this situation, you can turn the power off without harmful effects to the hard drive. As cutting the power can also result in lost data or Windows files, you should only do this when you have to.<br /><br />Following this rule will prevent permanent hard drive defects caused by the hard drive heads contacting the surface of the drive disc, and it will prevent a host of Windows problems.<br />Whenever possible, recover from crashes by pressing the Ctrl + Alt + Delete keys at the same time. Press them again to reboot your computer.<br /><br />2. I highly recommend that you purchase an UPS (uninteruptable power supply) for your computer. This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences.<br />An UPS is far superior to a surge protector and will save your computer from almost any type of power disaster. (See #1 above for what happens when your computer crashes.)<br /><br />3. Backup, backup, backup, any data you cannot afford to lose to at least two separate physical drives. So backup data to external hard drives, Zip disks, CD-RWs etc.<br />The time to backup is when you create something you can't afford to lose. Don't wait until tomorrow.<br /><br />4. Run Scandisk and Defragment at least once a month. This will keep your hard drive healthy and prevent crashes. Alternatively, purchase Norton Utilities and use it to keep your hard drive healthy.<br /><br />5. Never unplug peripherals from the computer when it is powered up. Unplugging with the power on can short out the connector socket or the motherboard.<br /><br />The only exception to this rule is if you know a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this exception.<br /><br />6. Do keep at least 300 MBs of your C: drive free for Windows to use. If you use Windows XP or Vista then you should have 400-600 MBs of free space on your C: drive.<br />If you do not have enough free space you will choke Windows and it will start dumping data to your hard drive, or it will just get really, really, slow.<br />Use the ADD/Delete tool in the Windows Control Panel to delete unneeded programs from your drive.<br />You can also use Cleansweep included in Norton Utilities to clean up your drive. If you do use Cleansweep or another hard drive cleaner, do not delete shared files unless you back them up. The cleaners do a rotten job of knowing if another program uses shared files.<br /><br />7. Do not let a lot of programs load up when you start your computer. They use valuable memory and Windows Resources (Windows internal workspace).<br />All programs in your Windows System Tray (in the lower left of your screen) are running on your computer. Close them if you don't need them or run them and configure them not to load when you boot up.<br />Other programs running in the background can be found by pressing Ctrl + Alt + Delete at the same time.<br /><br />8. Do use a virus checker regularly. Everyone should use a virus checker. The best type of protection is continuous monitoring from a dedicated anti-virus program like Norton Antivirus.<br />The second best thing is to use is the free online virus checkers such as Housecall provided by Trend Micro.<br /><br />9. If you have a high speed Internet connection you need a firewall program. A firewall program keeps those who want to hijack your computer from gaining access to your system. You really do not want someone else running your computer.<br />I suggest you purchase and run Norton's Personal Firewall program. Your firewall should boot up with your computer to protect it from invasion.<br /><br />Case in point: When I am online 10 hours or more with my DSL connection, my computer is usually attacked by a hacker at least once.<br />Do not think you are safe from hackers!! Hackers use search programs to seek out computers at random. Get a firewall program and use it.<br /><br />10. Keep track of the software disks you receive with your computer and new peripherals. These disks contain valuable software drivers and programs for Windows and are needed when Windows must be reloaded. Keep these disks and your Windows software disks in a safe, dry, place -- you never know when you will need them.

on Apr 25, 2011 | Computers & Internet

Tip

Prevent Your PC from Getting Hacked


Here , we will see how to prevent PC's from getting hacked : Most people think that hackers are only a problem for servers. This is not true. If your Windows PC is not properly configured, everything on your computer can easily be stolen or destroyed by hackers. Our network architecture is inherently hacker-resistant. However, because your PCs are directly connected to the Internet, hackers can bypass our servers and attack your PCs directly. Our firewall will help to some extent, but you must follow basic precautions if you want your data to be safe. Viruses: It is impossible for the servers to get computer viruses, because they run Unix, which cannot be infected by viruses. A virus must be executed before it can infect a computer. On Windows, programs like Internet Explorer and Outlook often execute files without your knowledge, which is what causes most virus infections. However, these files (or any Windows program) cannot be executed on the server. Some Windows viruses put copies of themselves on the server's shared disks. To the server, these are just ordinary files. The server is set up to periodically delete them to save space. They are not a problem unless you click on them. Clicking is the root of all evil. Here are some basic precautions to protect against hackers.
  1. Goto windowsupdate.microsoft.com at least once a week and install all critical patches.
  2. Run an antivirus program at least once a week. Update your virus signature files every time you use it.
  3. Use a firewall such as Zone Alarm. (Some firewalls have had major security problems. Be sure you have the latest update)
  4. Check your computer for trojans by clicking on: http://security.symantec.com http://www.trojanscan.com
  5. Don't click on email attachments.
  6. Don't install Napster, Kazaa, ChainCast, or any software from an unknown source. The former will turn your computer into a server and the latter may contain trojans and viruses.
  7. Turn off sharing, especially on your C:\ and D:\ drive. This is very dangerous! If you must share a disk, make sure it requires a password. Otherwise, anyone in the Internet can use your computer to back up their files without your knowledge. Never share any folder without a password.
  8. Put a good password on your PC. If you have a password on your PC that is easy to guess, your computer can be easily taken over by hackers.
    A bad password would be things like 'password', '12345', your name, license plate number, or any word that could be found in an English dictionary or a dictionary in your native language.
  9. Report any network slowness or strange computer behavior so it can be checked by me (if it's a network problem) or Brad (if it's a Windows or Mac problem).
  10. Windows PCs with static IP numbers are especially easy targets. You should always set "Obtain an IP address automatically" in Windows unless you are running a server and you are knowledgeable in computer security.

Here are some more tips:
  1. Please give your computer a sensible name. If we can't find your computer when it causes a problem, the only way to fix it is by unplugging it from the network.
  2. Don't store files in the /tmp directory on the servers (engram or protein). They are not safe there! If someone else gets a virus, their computer can put copies of the virus on the shared disk, mixed in with your files. The server cannot be infected by these viruses, but your PC could. Keep your backups in your home directory where they are safe and private.
  3. If you use Windows 2000 or NT, activate auditing of all system events, especially failures. This will you help discover how the hacker obtained access. Without this knowledge, it will be difficult to know what to change when you reinstall your operating system. Be sure to scan through the logs occasionally for unusual activity.
  4. Avoid executable content in web pages and email. Disable ActiveX. You can check your Internet Explorer installation for Active X security problems at this web site: http://www.tiac.net/users/smiths/acctroj/axcheck.htm
  5. Disable automatic execution of Macros in Office programs (Word, Excel, etc).
  6. Use SSH in preference to telnet. You can replace it with the freeware TeraTerm client with the SSH plugin.
  7. Unbind the unneeded network settings in Windows. This is easy to do, and will greatly increase your security. Follow the instructions at http://grc.com/su-rebinding9x.htm
  8. If a hacker gets on your computer, or you discover a trojan on your computer and suspect it is being actively exploited, unplug it from the network immediately and ask for assistance. Don't delete any files. We may need to check them to find out how the attacker got into your system.
  9. If your computer has been compromised by a trojan or an intruder, it cannot be repaired by removing the foreign software. There are dozens of different ways for a hacker to regain access, despite our firewall, that are impossible for any scanning software to find. The only way to repair your computer is to reformat your disk and reinstall the operating system. Until you do this, your computer is a threat to every one else's computer.
If you don't follow these guidelines, we won't nag you to change, but sooner or later your computer will be trashed by a hacker, trojan, or virus. Some people have already discovered this the hard way.

on Jun 27, 2010 | Computers & Internet

1 Answer

Norton help


Don't....I mean don't use Norton or McAfee at all. They are too invasive and do not actually help you with all Virus protection. Get Malwarebytes free from Malwarebytes.org. This is a Far better program and it is fully functional at all times. It updates often and protects you computer from invasions and people attempting to get into your computer.

Dec 11, 2013 | Computers & Internet

1 Answer

Arlene.Lamparter


Arlene, I can describe a problem that is common, called spoofing. When someone receives an email thought to be from you, we immediately think that our email has been hacked. You may be the victim of a spoof, where a hacker uses your address book to send out viruses or just annoyances to everyone in your address book. Spammers use this technique to hide their identity (like putting someone else's return address on an envelope). Some are harmless, others harmful, all are invasive. You may be able to get rid of the problem by running a malware detection program (I use malwarebytes, which is free to private users, and I run it at least once per month.), but you should also change your password in your instant messenger/email/facebook account, etc. In fact, it is a good idea to change your passwords regularly to keep the unfriendly out. I hope this helps.

Dec 09, 2013 | Computers & Internet

1 Answer

I have a hacker on my computer, I believe I know who it is ,because they know me very well , she uses my name & email name to acess alll my files & data from a remote comp., she is so locked in I...


This is a very serious problem. You will need to disconnect this infected computer from the internet as a hacker is capable of doing loads of damage. Once this computer is disconnected from the internet a computer technician will be able to remove the virus and stop the hacker. It is important to get this computer repaired as soon as possible. Install a good Anti-Virus program on your computer in the furture and disable remote access once you get your account back.

Take your computer into a computer store for repair as soon as possible. DISCONNECT this computer from the internet now. Enter into your E-mail account and change your password.

Take care!
damnor01

Oct 08, 2011 | Dell Dimension 2400 PC Desktop

3 Answers

What is Adware or Backdoor?


Dear these two terms are breifly explained below:

Adware - A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware. There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.

Backdoor - A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.

Hope you have the answer to your question.

Best Regards.

May 26, 2009 | Computer Security Systems CSS-A760S...

2 Answers

I dont know what is the kaspersky activation code???????


kaspersky is a anti virus software program that protect your PC or cell phone form virus, hackers, and trojan etc...what else you wanted to knw?? describe

Feb 27, 2009 | HTC P3300 Smartphone

1 Answer

What is the function of anti virus? and difference between antivirus and firewall


Antivirus software is used to discover and remove computer viruses.
Firewall software is used to control network (internet) traffic to and from a computer which helps block invasion (hackers).

Feb 26, 2009 | Adesso PCK-308B (DHPCK308B) Keyboard,...

3 Answers

Anti-hacking code


Hi noxiney,
Most hackers gain access to others computer through open ports, this way a hacker can't be detected by any antivirus or firewall software. While the hacker is undercover inside your computer theres almost nothing you can do, because you think theres no problem with your PC. Also consider that hackers are experts when covering their tracks, this would make difficult to know from where this intruder comes.
The anti-hacking code would have to track the hackers Ip address and then hack the hacker's PC and trigger the shutdown routine. Let's say that the anti-hacking code can track the hacker's real Ip (which is very difficult considering that the hacker is covering his tracks and showing fake Ip), when the code reaches the hacker's PC it has to get inside and order the operating system to shut down (in less words, hack the hacker).
This is a very difficult thing to make and demands high knowledge not only of the TCP and UDP protocol but knowledge of the other's computer.
Concluding, it is possible to program many softwares that one can use to gather information about the intruder's PC and manage a way to shut down the hacker's PC before he/she shuts down yours. It does not exists a code which automatically shuts down a hacker's PC.

Jul 10, 2008 | Microsoft Windows XP Home Edition

Not finding what you are looking for?
Computers & Internet Logo

127 people viewed this question

Ask a Question

Usually answered in minutes!

Top Intel Computers & Internet Experts

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Tony

Level 3 Expert

2598 Answers

David
David

Level 3 Expert

778 Answers

Are you an Intel Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...