Question about Dell Inspiron 530s Desktop Computer (ddcwfa2_5) IntelPentium dual-core processor E2160 (1MB L2,1.80G

1 Answer

I have a 2003 exchange server that was hit by a hacker. Now email will not work

Posted by on

  • DMAC3 May 11, 2010

    How do you know it was hit by a hacker? Have you tightened the security?


1 Answer

  • Level 1:

    An expert who has achieved level 1.

  • Contributor
  • 2 Answers

My suggestion is to just format the disk (Backup your data!) and reinstall Windows Server 2003.
Or (I don't have much experience with Windown Server 2k3) Maybe you can restore it with system restore?

Posted on Nov 26, 2008

Add Your Answer

Uploading: 0%


Complete. Click "Add" to insert your video. Add



Related Questions:

1 Answer

Smtp port

Networks assign port numbers to different types of incoming and outgoing traffic.
One example of this is the port assigned to SMTP (Simple Mail Transfer Protocol), which is used to package and transfer electronic mail, or email.
In most cases, SMTP is assigned to port 25 in the network's Exchange server.
If you want to find out which port your network uses to route SMTP traffic, you can check it by logging in to the Exchange server

Log in to the Exchange System Manager in your mail server.
Click "Servername."
Click "Protocols."
Click "SMTP."
Find the icon labeled "Default SMTP Virtual Server" and right-click on the icon.
Select "Properties."
Select the "General" tab and click the button marked "Advanced."
Read the value listed in the entry for Transmission Control Protocol (TCP).
This value is the SMTP port used by your network.

How to change SMTP port 25 to another port in Microsoft Exchange Server

Apr 23, 2013 | PC Desktops


How to Setup Microsoft Exchange Server

<p>Microsoft Exchange Server 2003 released on September 28, 2003. One of the new features in Exchange Server 2003 is enhanced disaster recovery which allows administrators to bring the server online more quickly. This is done by allowing the server to send and receive mail while the message stores are being recovered from backup. Now newly released version of Exchange server is Exchange 2010 after 2007 version. Exchange server 2010 officially released on 9th November 2009. But here I will discuss about Microsoft Exchange server 2003. In a workstation most of users are use Microsoft Exchange server as mail server.<br /> <p><span><span><b>Requirement of Exchange Server 2003:</b></span></span> <span> </span>Required OS for Exchange Server2003 is Microsoft Server 2oo3. There this Server should be a domain controller. For Exchange 2003 need some protocol like <br /> <p> <br /> <p><span><span><b><span> </span><span> </span></b></span></span>1&gt;<br /> <p><span> </span><span> </span>2&gt; SMTP<br /> <p><span> </span>3&gt;NMTP<br /> <p><span> </span><span> </span>4&gt;W.W.W<br /> <p> <br> <p>IIS should be install in server . In hardware system should have minimum 256MB of memory<br> <p><span><span><b>Installation of Exchange Server 2003: </b></SPAN></SPAN>There have three steps to install Microsoft Exchange Server 2003.<br> <p><span><span>1&gt;<span> </SPAN></SPAN></SPAN>Preparation of forest<br> <p><span><span>2&gt;<span> </SPAN></SPAN></SPAN>Preparation<span> </SPAN>of domain<br> <p><span><span>3&gt;<span> </SPAN></SPAN></SPAN>Installation<span> </SPAN>of Exchange Server<br> <p>To install Exchange Server you have to install the required protocol first. I have install the windows component such as IIS, ASP.NET, NNTP, W.W.W. from control panel with OS CD. Then I insert the Exchange Server Disk in CD rom drive and start the preparation of forest. I open the disk and run the forest prep from Exchange 2003 deployment tools. It will take several times to complete. After completing the forest prep I have run the Domain prep with the same procedure. The Domain prep will take also lots of time to complete. Then I have installed the exchange server by creating a new exchange organization. The total process also possible to complete from Run with command. The total job takes a huge time almost one hour or more. After installing Exchange Server I have configured it as per direction of the company. I have add users, groups, I create new administrative group. Following this process there I have done the whole job successfully. <br> <p><span></SPAN>

on Mar 21, 2011 | PC Desktops




I have heard a lot of reports lately about people camera's being hacked, but the information being reported is incorrect!!!! no hacker can just magically turn on your camera ,, it doesnt work like that. This letter serves to inform you on how its done, the methods involved , what can be done to stop it, how to detect it and how to catch that person.

Laptops and Web Camera's. (Wired and Inbuilt)

This is the safest type to have for personal use. A Hacker cant just turn it on ,, it doesnt work like that. In order for this to happen the hacker must have the victims computer "Zombiefied" , in other words hijacked. This simply means that there must be a program in the computer which allows the hacker backdoor access. This type of software is called a TROJAN. There are different ways for this to transmit this software to the victim, 1.) A Dropper in an infected email attachment e.g. "HARD ENCRYPTED IN A PHOTO (merging) , 2.) Hidden in a piece of software e.g, freeware or sharware 3.) As a TROJAN in Pirated Software, 4.) Via A flashdrive 5.) In an Active X Control or Plugin for Websites and Web Browsers, 6.) Email BOMB e.g auto redirect to an infected url containing the dropper.
Now the Virus (Trojan) isnt transmitted directly to the system, what happens is that firstly a dropper is installed, this dropper is small , can be installed at the blink of an eye, and deletes it self so quickly coders of antivirus identities will see hell to find it. Now the dropper then can take its precious time, disable your security measures (anti virus, firewall etc) and download and install the Trojan then delete itself. Now this means that once the hacker gets your IP address he can use that to access the Trojan on the specified port which he/she can then execute remote arbitrary code , like get access to the display drivers of the webcam, open your drives, shut down the system etc. basically anything he or she designed it to do.

How To Catch the hacker or tell if your infected.
Now if your computer is being hijacked there must be a connection to it! Basically data must flow from your pc to your hackers and the commands from your hackers pc to yours. So basically all you need to do is find out who your computer is connected to.

For Windows.
1.) click start
2.) In the run box type cmd and hit enter
3.) type netstat -n in the command prompt that appears and hit enter

now you will see 4 columns Proto , Local Address , Foreign Address , State

ok crash course,
Proto is the type of protocol
Local Address is your Ip address on the network, is a loop back, next to it is the open port of your system
Foreign Address is the Ip your connected to
State is bacically the state of the connection.

ok so you see a lot of foreign IP's with an established connection, start from the top.
1.) open a browser window and go to a whois webserver e.g
2.) do a whois search on the IP, e.g in the type the foreign ip in the box and hit enter .. e.g

this shows me this

OrgName: Yahoo!
Address: 701 First Ave
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US
ok so thats yahoo's Ip thats safe..

do this too all the Ips you have. once you find one that appears to be your hacker simply do a reverse DNS on thaty IP to get your hackers location or report it to the authorities (NO I AINT WALKING YOU THROUGH A REVERSE DNS).. So what if your hacker is using a proxy ?? chances are no, for one thing the connecting bandwidth needed will be to slow on a proxy server so he's using his own IP..

Wireless Web Cams, IP CAMERAS, AND Wireless Networks,

1.) All of these operate with an inbuilt server that allows the person access once he has the appropriate IP address. Hell a quick port scan on that Ip and i will have all your open ports, then simply log in to that Ip on that port , If prompted for a username and password try the default, if that dont work try sql, or js injection or other exploits and walla I have access. no need for a trojan.

2.) Wireless routers can be exploited by basically capturing wireless packets sent, from this i will have your ssid and and encryption type. Simply use Cain and Abel or other brtue enforcer or a jacker which will get me your encryption key, to make the process faster use the captured packets to limit the characters to generate the key. now I can connect to your router and if you have a home network I can join it or search all the computers to get to all your shared documents and files etc..

Ok what to do??
1.) firstly in your router settings use a really strong (character , number and sysmbol) password
2.) use a WPSK2 or stronger encryption system and use a really stron key (13 + characters, numbers and symbols) this will make cracking the key harder
3.) turn off transmist SSID ,, basically I cant crack what i dont know about
4.) limit your antenna transmit power so its only connectible within your house, I cant hack what I cant connect too can I ??

Now some point of information..

1.) your IP address Dynamic. meaning it will change everytime your router resets, do this at least once every week

2.) All antivirus / spyware / malware programs can only remove what it knows about regular updates are necessary. In order for it to function.

3.) Virus, malware, trojans, spyware, worms etc, are all different things , most antivirus will remove viruses , some spyware etc. use multiple software.. e.g AVG Free Anti Virus, Super Anti Spyware , Malware bytes. dont use more than 1 dedicated antivirus.

4.) Be safe!

Depends on the response this gets I will write a few more letters like this or if anyone is interested I'll be happy to get into more details about how these things work. Please send this around to as much people as you can and be safe .. regards Dark_Lord_TnT Ps. If you need any help feel free to ask..

on Oct 13, 2010 | PC Desktops

2 Answers


if you can receive properly, then check that in account settings, server, you enable authentication on sending as well.

May 29, 2009 | PC Desktops

1 Answer

I have Microsoft Outlook Web Access, running with VISTA and IE 7. I can't type in the body of emails. There is an 'x' in the body space. Can someone help me change settings so as to write in the body?

Try this Solution on your desktop PC:
1. In Outlook Web Access [OWA] , click on the "options" in the left Task Pane.

2. Under “E-mail Security” and Click Install or Upgrade the S/MIME Control. This will download a new add-on.

3. Click “RUN” when asked about the Microsoft Outlook Web Access S/MIME install and security warning.

4. Close and RESTART IE7

If the above trick still doesn't work then it more sounds like the Exchange server needs a patch
[path to the patch]
If you by chance happen to maintain the exchange server then install the above patch and restart exchange service

or check this site for reference:

Good luck :)

May 06, 2009 | PC Desktops


Prevent Your PC from Getting Hacked

Here , we will see how to prevent PC's from getting hacked : Most people think that hackers are only a problem for servers. This is not true. If your Windows PC is not properly configured, everything on your computer can easily be stolen or destroyed by hackers. Our network architecture is inherently hacker-resistant. However, because your PCs are directly connected to the Internet, hackers can bypass our servers and attack your PCs directly. Our firewall will help to some extent, but you must follow basic precautions if you want your data to be safe. Viruses: It is impossible for the servers to get computer viruses, because they run Unix, which cannot be infected by viruses. A virus must be executed before it can infect a computer. On Windows, programs like Internet Explorer and Outlook often execute files without your knowledge, which is what causes most virus infections. However, these files (or any Windows program) cannot be executed on the server. Some Windows viruses put copies of themselves on the server's shared disks. To the server, these are just ordinary files. The server is set up to periodically delete them to save space. They are not a problem unless you click on them. Clicking is the root of all evil. Here are some basic precautions to protect against hackers.
  1. Goto at least once a week and install all critical patches.
  2. Run an antivirus program at least once a week. Update your virus signature files every time you use it.
  3. Use a firewall such as Zone Alarm. (Some firewalls have had major security problems. Be sure you have the latest update)
  4. Check your computer for trojans by clicking on:
  5. Don't click on email attachments.
  6. Don't install Napster, Kazaa, ChainCast, or any software from an unknown source. The former will turn your computer into a server and the latter may contain trojans and viruses.
  7. Turn off sharing, especially on your C:\ and D:\ drive. This is very dangerous! If you must share a disk, make sure it requires a password. Otherwise, anyone in the Internet can use your computer to back up their files without your knowledge. Never share any folder without a password.
  8. Put a good password on your PC. If you have a password on your PC that is easy to guess, your computer can be easily taken over by hackers.
    A bad password would be things like 'password', '12345', your name, license plate number, or any word that could be found in an English dictionary or a dictionary in your native language.
  9. Report any network slowness or strange computer behavior so it can be checked by me (if it's a network problem) or Brad (if it's a Windows or Mac problem).
  10. Windows PCs with static IP numbers are especially easy targets. You should always set "Obtain an IP address automatically" in Windows unless you are running a server and you are knowledgeable in computer security.

Here are some more tips:
  1. Please give your computer a sensible name. If we can't find your computer when it causes a problem, the only way to fix it is by unplugging it from the network.
  2. Don't store files in the /tmp directory on the servers (engram or protein). They are not safe there! If someone else gets a virus, their computer can put copies of the virus on the shared disk, mixed in with your files. The server cannot be infected by these viruses, but your PC could. Keep your backups in your home directory where they are safe and private.
  3. If you use Windows 2000 or NT, activate auditing of all system events, especially failures. This will you help discover how the hacker obtained access. Without this knowledge, it will be difficult to know what to change when you reinstall your operating system. Be sure to scan through the logs occasionally for unusual activity.
  4. Avoid executable content in web pages and email. Disable ActiveX. You can check your Internet Explorer installation for Active X security problems at this web site:
  5. Disable automatic execution of Macros in Office programs (Word, Excel, etc).
  6. Use SSH in preference to telnet. You can replace it with the freeware TeraTerm client with the SSH plugin.
  7. Unbind the unneeded network settings in Windows. This is easy to do, and will greatly increase your security. Follow the instructions at
  8. If a hacker gets on your computer, or you discover a trojan on your computer and suspect it is being actively exploited, unplug it from the network immediately and ask for assistance. Don't delete any files. We may need to check them to find out how the attacker got into your system.
  9. If your computer has been compromised by a trojan or an intruder, it cannot be repaired by removing the foreign software. There are dozens of different ways for a hacker to regain access, despite our firewall, that are impossible for any scanning software to find. The only way to repair your computer is to reformat your disk and reinstall the operating system. Until you do this, your computer is a threat to every one else's computer.
If you don't follow these guidelines, we won't nag you to change, but sooner or later your computer will be trashed by a hacker, trojan, or virus. Some people have already discovered this the hard way.

on Jun 27, 2010 | PC Desktops

2 Answers

Hacker - computer issues

Snail mail? Well good! You have documentation, that will lead right back to this hacker! I'll bet it's a friend playing a joke.

BUT, have you heard of the FBI? Really! They may be interested in your letter. Your local law enforcement probably won't be. City police, county sheriff department, highway patrol, state trooper.

The reason the FBI may be interested, is that this may be a small lead for them. Help them to narrow down a search, for someone/s they're looking for.
How about letting them see if it's worth the time.
This may be part of a large scale cyber crime ring.

Probably better find out if it's a friend, or cyber buddy first. The FBI doesn't play!

Apr 28, 2009 | PC Desktops

2 Answers

Hi My outlook (2003) on my laptop was set up for an exchange server and a few other emails. I took myself off the exchange server a few weeks ago as i didnt need it. I deleted the profile for the exh...

When you use Exchange , your data is on the Exchange server. You will have to setup Exchange again. Then create a new profile and drag and drop your emails, folders etc. from the Exchange profile to the new profile. Afterwards you can delete the Exchange profile.

If I could be of further assistance, let me know. If this helps or solves the issue, please rate it.
Thanks, Joe

Mar 05, 2009 | PC Desktops

1 Answer

I am unable to get into my microsoft outlook express email. It says my password is not correct.

Go to OE/ Tools/ Options/ Send tab/ News sending format section: check
plaintext, not html

If its the password for the exchange server authentication, it has to be the same as your webmail account online!

Go to tool> email accounts > reenter the password under the server tab and the settings button against "my server requires authentication" on the same page.

Make sure the passwords you enter here is the same that you used to login to your webmail account with the same e-mail id!

save the settings and restarte outlook express..


Aug 19, 2008 | PC Desktops

Not finding what you are looking for?
Dell Inspiron 530s Desktop Computer (ddcwfa2_5) IntelPentium dual-core processor E2160 (1MB L2,1.80G Logo

Related Topics:

27 people viewed this question

Ask a Question

Usually answered in minutes!

Top Dell PC Desktops Experts


Level 3 Expert

5660 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18304 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Are you a Dell PC Desktop Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides