Question about Microsoft Windows XP Home Edition

3 Answers

Anti-hacking code would it be at all possible to create code whic would instantly shutdown another persons computer who was accessing your own?

Posted by on

3 Answers

  • Level 2:

    An expert who has achieved level 2 by getting 100 points

    MVP:

    An expert that got 5 achievements.

    Governor:

    An expert whose answer got voted for 20 times.

    Teacher:

    An expert who has written 2 tips or uploaded 1 video tip.

  • Expert
  • 39 Answers

Hi noxiney,
Most hackers gain access to others computer through open ports, this way a hacker can't be detected by any antivirus or firewall software. While the hacker is undercover inside your computer theres almost nothing you can do, because you think theres no problem with your PC. Also consider that hackers are experts when covering their tracks, this would make difficult to know from where this intruder comes.
The anti-hacking code would have to track the hackers Ip address and then hack the hacker's PC and trigger the shutdown routine. Let's say that the anti-hacking code can track the hacker's real Ip (which is very difficult considering that the hacker is covering his tracks and showing fake Ip), when the code reaches the hacker's PC it has to get inside and order the operating system to shut down (in less words, hack the hacker).
This is a very difficult thing to make and demands high knowledge not only of the TCP and UDP protocol but knowledge of the other's computer.
Concluding, it is possible to program many softwares that one can use to gather information about the intruder's PC and manage a way to shut down the hacker's PC before he/she shuts down yours. It does not exists a code which automatically shuts down a hacker's PC.

Posted on Jul 10, 2008

  • John King
    John King May 18, 2016

    We are a team of Professional Hackers and private investigators
    we provide PROOF BEFORE PAYMENT
    EMAIL: hireaprohacker@gmail.com
    Website:http://hireaprohacker.wix.com/hireapro
    Phone Number: (973)4352708 (text ONLY)

×

  • Level 2:

    An expert who has achieved level 2 by getting 100 points

    MVP:

    An expert that got 5 achievements.

    Sergeant:

    An expert that has over 500 points.

    Habit-Forming:

    Visited the website for 3 consecutive days.

  • Expert
  • 141 Answers

LEO Privacy is so useful. If someone trys to hack into any of your on locked app. They will automatically take a pic of the person in front of the screen. Awesome!
LEO Privacy Applock Boost Hide Android Apps on Google Play

Posted on Oct 17, 2016

  • Level 1:

    An expert who has achieved level 1.

  • Contributor
  • 1 Answer

We are a team of Professional Hackers and private investigators we provide PROOF BEFORE PAYMENT EMAIL: hireaprohacker@gmail.com Website: http://hireaprohacker.wix.com/hireapro Phone Number: (973)4352708 (text ONLY)

Posted on May 18, 2016

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

2 Answers

I recently purchased a second-hand, Acer 2700 Travelmate laptop, after two weeks of going. online and signing up to various social networks, I'm convinced my computer has been hacked into and possibly by...


Sorry to hear about your woes. but as you say it yourself you may just be imaging it.
On the practical side:
  • The operation system can be reinstalled, and that will wipe out everything on the hard drive. Learn to use a different OS such as Linux. You may find free distributions on the Internet.
  • Without reinstalling afresh you can run anti-malware software found free on the internet (MalwareBytes, SpyBot Search and Destroy. etc.)
  • A router can be reconfigured to prevent unauthorized access by filtering MAC addresses of other machines. Know the MAC addresses of all the components and peripherals you own (printers, iPad, iPods, SmartPhones)
  • Prevent your wireless router from broadcasting its SSID and lower the power of the signal. Choose a new SSID for your network.
  • Physically secure your router so that nobody can reset it.
  • Choose a strong password for your router. And set passwords for ADMIN and deactivate any user account. Change the default gateway of your router. Read the log of your router to see if there has been any intrusion.
  • Physical access to your computer may be enforced by never letting anybody touch it, or log in under your user name. If you have to share your computer create a guest account for others.
  • Change the way you create passwords for your online accounts. Change passwords frequently and do not reuse old passwords. There are some free password generators on the Internet. If you write your passwords and login details on paper (a very bad habit) make sure nobody has access to these documents.
  • Learn to use an encrypting software on your computer.
  • Do not share password information to sweethearts or friends.
  • Get yourself a good book on Hacking and study it.
  • Read spy novels (Ha Ha)
I hope it helps.

Dec 07, 2013 | Computers & Internet

1 Answer

I cant get locked in to www.hotmail.com since updating my AVG anti virus protection


Windows Live Hotmail normally loads without issue, but several problems on your computer can restrict access to your account.
Firewalls with high security sensitivity, malicious spyware and disabled cookies are three of the main reasons for blocked Hotmail accounts.
Hotmail also does not load if Microsoft blocks your account for spamlike activity.
This can happen if your account was compromised, or hacked.
Cookies

If cookies are disabled on your Internet browser, Hotmail cannot load.
Cookies store specific data about you that you have provided to a website, such as your name or address.
To turn on cookies in Internet Explorer, click "Tools" and "Internet Options."
Click "Privacy." Move the slider from "Block All Cookies" to "Medium."
This security level blocks advertising cookies but enables the cookies that allow you to access your Hotmail.
To enable Firefox cookies, click "Tools," "Options" and "Privacy."
Click "Use Custom Settings for History."
Enable cookies to view your Hotmail messages.

Check for Spyware
Spyware is a type of malicious software that steals your personal information or disables functions of your computer.
Spyware on your computer may block access to your Hotmail.
Run an anti-spyware or anti-virus program, such as Norton, AVG or Avira.
If you have a spyware or virus infection on your computer, these programs find and destroy it.
Some malware affects the "hosts" file on your computer.
Find and open the file "C:\Windows\System32\Drivers\etc\hosts" in Notepad.
Look for "passport.com" or "hotmail.com."

If you see either, malware has possibly infected the file.
Change the IP address affiliated with the file name to eliminate the problem.


Blocked Accounts Hotmail blocks accounts when it detects spamlike behavior from them.
For example, if hundreds of advertisements are sent from your account in just a few minutes, Hotmail views this as spam and blocks your account.
If you are not sending spamlike emails or instant messages, someone may have guessed your password and accessed your account.
If Hotmail blocks your account, you have the option to enter your cellphone number as verification that you are the true account owner.
When you enter your number, Microsoft sends a text message to that phone number.
Retrieve the verification code from the text message and enter it on the Sign-In page.
When you access your account, change the password immediately.

Other Options

Your firewall may block access to Hotmail or cause emails to not load.
To determine if the firewall is the problem, disable it temporarily and try to access your mail. Firewall settings are sometimes set too high.
Lower the security sensitivity before you attempt to log in to Hotmail.
If you notice other websites not loading, reset your router.
This solves many connection issues.
Check the clock on your computer.
An inaccurate clock may block you from loading Hotmail.
To ensure your clock's accuracy, click the clock in the bottom-right corner of the task bar.
Click "Date and Time" and "Internet Time."
Click "Change Settings."
Click the check box next to "Synchronize With an Internet Time Server."
Click "OK."

Oct 03, 2013 | hotmail.com

1 Answer

Moviestarplanet vip codes


this person hacked my 10y/o daughers account and stole everything do not help her in any way. discusting person makes me sick

Apr 26, 2013 | Computers & Internet

1 Answer

My email and all other services on yahoo do not open on my computer but do open on other computers. What could possibly be wrong with my computer?


Now more is known about computers, hacking into them can in some cases become a lot easier if someone does not have the correct firewalls and protection. There are now many ways that people can hack into other people's computers. This can either be by using your wireless internet service to then gain access to your 'C' drive, hacking into your password-protected systems and files, or simply sending you an email with a dangerous attachment for you to open, providing them with unauthorised access to your whole computer.

It is for these reasons why you should ensure that you invest in the correct firewalls, virus protection and security-enabled wireless Internet services. If someone is successful in hacking into someone else's computer, they will be able to access their bank accounts and all personal documents that could include both private and important information about their jobs or contact details.

The key is to outsmart the hacker. Include symbols and numbers in your password as opposed to just using words that can be guessed if the hacker is persistent enough. Making sure that you don't open any emails that look suspicious and give you false promises is going to ensure that your computer isn't going to get hacked into. They will have access to you e-mail and possibly computer if you do this.

Being aware of how people hack into other people's computers is going to ensure that you do not become a victim to whichever method the hacker tries to gain access to your home or work computer. Be ahead of the game with firewalls and extra protection with difficult passwords. Investing time into being vigilant could prevent your life savings and credit cards from being jeopardised unnecessarily.

Jul 26, 2012 | Dell Computers & Internet

1 Answer

I want to register yahoo messenger


You can use a Yahoo! ID to access all things Yahoo!--including email, games and the Yahoo! Messenger instant messenging service. If you already have a Yahoo! email account, you do not have to create a new ID to use Messenger. To create a new Yahoo! ID, you use the same process as creating a new email address, because your Yahoo! Messenger ID is your Yahoo! email account.

1.Open your web browser and navigate to the Yahoo! home page (see Resources).

2.Click "Sign Up" at the top of the site.

3.Fill out the sign-up form. You will need to supply your name and some other personal information, as well as create an ID, password and security questions. For security reasons, you also need to type in a code at the bottom of the form.

4.Click "Create Account" when ready.

5.Sign in to Yahoo! Messenger using the ID and password you just created.

Sep 17, 2011 | Yahoo Messenger

1 Answer

Some one hack into my email and changed all my passwords


Hi,


Good day. If you think that the email is hacked already i suggest for you create a new email right away and message your friends about the incident. There are no other way because its your email that was hacked. For your security you need to have a anti virus, anti spyware and anti malware install in your pc to make sure that no malicious programs are penetrating your system. Hope this information will be helpful to you. Have a great day.

May 25, 2011 | Microsoft Computers & Internet

1 Answer

The playstation 3 is doing everything except I am unable to access netflix due to a code 80023121 coming up. It will not take my password. I would like to be able to watch movies instantly again.


you probably cant play online games either that is because Sony has been hacked and they stole alot of personal information so if i were you i would cancel all the cards and change passwords and be careful of fraud and you are going to have to wait until they get the servers back up

Apr 28, 2011 | Sony Playstation 3 (PS3) Console

2 Answers

How to hack a facebook password?


IMPORTANT NOTES: THE FOLLOWING DETAILS ARE FOR TRAINING TO PROVIDE RESOURCEFUL COMPUTER NETWORKING EXPERINCES LEAST CONTRIBUTORY TO AN ALTERNATIVE FUTIVE INTENSION.

Hacking into face book requires to be an initiator of the site. First, create the website called face book to be made available for several persons. Least informing the members about the intent to requesting details either usually known as social networks. Usually websites that are recognized as popular would have structure hosts. Mentionable examples are network administrators that make details aware to members about the ongoing conditions. Network administrators that makes the website continues to exist as the resources require to host either expertise or design technicalities are concerned. Websites also require technical experts that restores the conditions that occurs as the networked structures are established to become popularly tasked by several entities either human or devices of computers and peripherals. Internetworking sites have several entities of experts depending on the type of resources provided either as commercial, educational, social or personal sites. The magnitude of resources provided to include the numbers of members makes the web site require several experts to keep operational. Hosting websites requires several resources to make possible. Mentionable examples are the computer structures that are either situation ally located at an address or mobile. Each entity of device computers has address numbers that recognize as operational entities with purpose descriptions of functionalities. Establishing a website requires having the computer devices to the barest minimum a computer, network devices of modems routers, as hardware requirements. The complement to computer devices is program making possible instable displays to achieve user, professional or education experiences. Once the computer structures of hardwires, software's, structures have achieved regular functionality makes available several possible experiences among which hacking is mentioned. Hacking is very technical to describe or explain. First, the entity that makes available advertised recognition as hacker from which request are made to resolve computer device conditions that occur elsewhere becomes thought as computer technician. In which instance, solving missing passwords, usernames or retrieving details on computer from establishments that contract the entities expertise is mentionable means to make expertise functional. The contract entity requesting hacker's expertise usually least requests hacking as resource, the request to always to resolve an issue in which instance allows for expert technician to display skills? Face book hackers are web designers would make the pages display least informing the subscriber about intentions. Regular functional websites requires ascertaining the detail intents, to be verified to resourceful provision either where the administrators that make the space available are contactable. For example, websites that have contact details may least disclose the intent to members however provides mission statements malign acquirable alternate persons should least be thought as hackers sites. Once the members to site recognize the provider entities either as providing resources within expectation also with details that makes tangible as an entity with responsible establishment entities means hacking situations are unanticipated.


Additional notes

Hacking is very technical to explain. Usually, the persons that acquire resources are the only recognizers to hacking incidences. For example, hacking into devices that least becomes recognized may not dispense such a message. Hacking situations are explainable. First the condition where the hackers have retrieved details that belong as personal details. Attempting to retrieve forget ton passwords to personal accounts may be possible with means known as hacking to another person since the default entry is not resorted. Second, the situation where the hackers have to acquire resources least reckonable by the owner. Resources would usually display on networks for example least known to persons until disappearance. Conditions of such nature least makes available recognition of hacking unless personal resources become disintegrable. Third the situation that hacking is suspected without any resources missing. Occasionally message goes around of hacking taking place making person's causation. In such situations, missing details appears hacked until proven unpacked. All three categories of hacking are technical to explain depending on whose side made the hacking. The network sites administrator has contact details either email, phone or chat to quest for recent conditions or concerns. Inform the network sites experts of the condition either in person since computer device surfing is technical.

Feb 07, 2011 | Computers & Internet

1 Answer

Some one hack my account now i cant access, b coz hacker chained my messenger id and other things, how can i access & get current password?


Do you really feel someone can hack your account just like that now way, unless he has a hunch about your passwords? One hope is if That person has not changed the secret questions and their response.try to check that once..less we will try something else....I solved the same earlier that's why I am saying this. GL

Mar 23, 2010 | Yahoo Messenger

1 Answer

Personal


EASY!!!!

This will tell you how to hack into the admin's account on any PC. (most companies do not catch this)

Attempt 1
_______________________________________________________
  1. Shutdown the computer
  2. Start it in safe mode
  3. At the login screen, enter Administrator for the username and there is no password
  4. If that worked, you have full access to that computer
________________________________________________________
If that didn't work, try this!

go into Command Prompt

type net users administrator *


Then type the password, it will not show you what you are typing. I will appear as if you are not typing at all. Just type the password, hit enter, type it again, hit enter and there you go, you just reset the password for the admin account on that computer

Mar 27, 2008 | Microsoft Office Professional 2007 Full...

Not finding what you are looking for?
Microsoft Windows XP Home Edition Logo

Related Topics:

229 people viewed this question

Ask a Question

Usually answered in minutes!

Top Microsoft Computers & Internet Experts

micky dee

Level 3 Expert

2644 Answers

Piyal Perera
Piyal Perera

Level 3 Expert

528 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18386 Answers

Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...