Topic: Hacked off! | |
---|---|
Edited by
AthenaRose2
on
Tue 04/29/14 09:58 AM
|
|
Not being particularly computer savvy, I needed help with some issues I was having with my system, so I gave my IP address to a trusted friend who accessed my computer with teamviewer opening my email accounts and just snooped around but didn't fix anything.
What was the point to this impromtu search, and what can this friend do now with the information he garnished from my machine? Any ideas? |
|
|
|
depends on his skill level with hacking.i've known some hackers that might only know how to hack into an email address and read emails and stuff and then i've known some that can pretty much use your computer as their own (turn your pc on/off,make the cd tray open/close,mess with the screen settings....etc).
he could get any kind of info about you that he wants if he knows how |
|
|
|
Edited by
AthenaRose2
on
Wed 04/30/14 12:52 AM
|
|
depends on his skill level with hacking.i've known some hackers that might only know how to hack into an email address and read emails and stuff and then i've known some that can pretty much use your computer as their own (turn your pc on/off,make the cd tray open/close,mess with the screen settings....etc). he could get any kind of info about you that he wants if he knows how That's what I figured. Is there any way to stop him? I'm pretty much an open book for political reasons, but I do prefer to protect my privacy from those who have ulterior motives. Any suggestions would be helpful. Does it help to keep the router disconnected from the tower when not in use? Oh yeah, one more thing... He accessed my desktop tower computer, but I have wireless and need to know if he can access my laptop too with this same information. |
|
|
|
depends on his skill level with hacking.i've known some hackers that might only know how to hack into an email address and read emails and stuff and then i've known some that can pretty much use your computer as their own (turn your pc on/off,make the cd tray open/close,mess with the screen settings....etc). he could get any kind of info about you that he wants if he knows how That's what I figured. Is there any way to stop him? I'm pretty much an open book for political reasons, but I do prefer to protect my privacy from those who have ulterior motives. Any suggestions would be helpful. Does it help to keep the router disconnected from the tower when not in use? Oh yeah, one more thing... He accessed my desktop tower computer, but I have wireless and need to know if he can access my laptop too with this same information. Not that savvy myself,but I think,first of all you would have to terminate the Application that has allowed him to access your Computer in the first place! |
|
|
|
Edited by
AthenaRose2
on
Wed 04/30/14 03:45 AM
|
|
depends on his skill level with hacking.i've known some hackers that might only know how to hack into an email address and read emails and stuff and then i've known some that can pretty much use your computer as their own (turn your pc on/off,make the cd tray open/close,mess with the screen settings....etc). he could get any kind of info about you that he wants if he knows how That's what I figured. Is there any way to stop him? I'm pretty much an open book for political reasons, but I do prefer to protect my privacy from those who have ulterior motives. Any suggestions would be helpful. Does it help to keep the router disconnected from the tower when not in use? Oh yeah, one more thing... He accessed my desktop tower computer, but I have wireless and need to know if he can access my laptop too with this same information. Not that savvy myself,but I think,first of all you would have to terminate the Application that has allowed him to access your Computer in the first place! If you are referring to teamviewer, we shut that down at the end of his snoopfest. I've noticed lots of strange things happening on that machine, my saved documents, emails, and the printer connected to it since then. He even lets me know that he sees me various places online like he's cyber stalking me. Not saying things are even related because I'm not tech savvy enough to make the eyes on connection. But I don't take much stock in coincidence either... I don't normally reveal sensitive information about my friends, but I'm tired of feeling uncomfortable and need to know if there's anything I can do to gain control back. |
|
|
|
Athena,
The person could do more that that. They could turn on/off ur video cam and take snapshots, specially if u have Java installed. Best thing, put a nice two way firewall. The two way firewall will tell u what programs r trying to access the internet, and u could stop them. I would also add a non-caching proxy and virtual network, to stop the snooping from outside a bit more. |
|
|
|
Ohh. you did not do that..ohhh.. I'm so sorry to hear..
. yes I know people.. well Associates.. that once there in.. they're in for good... they have literally hack games on the ps3.and. changed the game for everybody.. literally reconfigured the game for everybody!! across the entire board.. worldwide.. sorry I'm not helping you am I.. |
|
|
|
if he was in once he can most likely access it any time he chooses. if he is savvy enough to do so.
anything you have stored on it is at his disposal, anything! but it doesn't end there, he can now log on to sites as you and wreak havoc with complete anonymity. also, he now has full access to your email account, possibly your bank accounts, any hardware you have installed, all of your programs, any and all personal info,...the list goes on and on. you need to do as suggested and get the firewall, but do not install it while online. make sure you are NOT connected to the internet, just in case he he is fishing for passwords. |
|
|
|
Athena, The person could do more that that. They could turn on/off ur video cam and take snapshots, specially if u have Java installed. Best thing, put a nice two way firewall. The two way firewall will tell u what programs r trying to access the internet, and u could stop them. I would also add a non-caching proxy and virtual network, to stop the snooping from outside a bit more. Wow, all this sounds great! And went completely over my head... I'll have to study up on these things now and cross my fingers that I get it right... |
|
|
|
Ohh. you did not do that..ohhh.. I'm so sorry to hear.. . yes I know people.. well Associates.. that once there in.. they're in for good... they have literally hack games on the ps3.and. changed the game for everybody.. literally reconfigured the game for everybody!! across the entire board.. worldwide.. sorry I'm not helping you am I.. Something tells me that was the point... |
|
|
|
Edited by
AthenaRose2
on
Wed 04/30/14 10:51 PM
|
|
if he was in once he can most likely access it any time he chooses. if he is savvy enough to do so. anything you have stored on it is at his disposal, anything! but it doesn't end there, he can now log on to sites as you and wreak havoc with complete anonymity. also, he now has full access to your email account, possibly your bank accounts, any hardware you have installed, all of your programs, any and all personal info,...the list goes on and on. you need to do as suggested and get the firewall, but do not install it while online. make sure you are NOT connected to the internet, just in case he he is fishing for passwords. This doesn't sound good at all... do you mean that even if I protect my own machine he can still use my IP to wreck havoc elsewhere? I wonder if contacting my service provider and letting them know what's going on might help too? |
|
|
|
. he could be posing as you right now.. how do I know this is really you..hmm.. I'm going to go unplug my modem right now.. .. I'm sorry I know this isn't funny. well maybe just a little bit funny.. oh no I wasn't quick enough. I didn't unplug my modem. before you gained access to my.. wait a minute why are you changing my screensaver to that. and stop going into my files.. why are you dumping all the paint out of my paint program.. now you're deleting all my files.. quick I need a zip drive.. what are you doing on the LCD screen on my samsung fridge.. now you're turning my furnace on and off.. and all my lights... and you just started my car.. now you're opening and closing my garage door..omg. isn't technology wonderful.. . sorry I know its not funny..
|
|
|
|
. he could be posing as you right now.. how do I know this is really you..hmm.. I'm going to go unplug my modem right now.. .. I'm sorry I know this isn't funny. well maybe just a little bit funny.. oh no I wasn't quick enough. I didn't unplug my modem. before you gained access to my.. wait a minute why are you changing my screensaver to that. and stop going into my files.. why are you dumping all the paint out of my paint program.. now you're deleting all my files.. quick I need a zip drive.. what are you doing on the LCD screen on my samsung fridge.. now you're turning my furnace on and off.. and all my lights... and you just started my car.. now you're opening and closing my garage door..omg. isn't technology wonderful.. . sorry I know its not funny.. actually you're quite hilarious. thanks for the giggles... it does tend to make things less stressful. |
|
|
|
Athena, The person could do more that that. They could turn on/off ur video cam and take snapshots, specially if u have Java installed. Best thing, put a nice two way firewall. The two way firewall will tell u what programs r trying to access the internet, and u could stop them. I would also add a non-caching proxy and virtual network, to stop the snooping from outside a bit more. Wow, all this sounds great! And went completely over my head... I'll have to study up on these things now and cross my fingers that I get it right... Athena, Specifically, low solution for the webcam: place a piece of adhesive tape on the webcam when not in use. I know it sounds funny, but it does the job! Java: go to Start/Control Panel/Programs and Features and find JAVA, and hit uninstall. Unless u know u need Java 4 something, like maybe banking or a university website. Firewall: download and install ZoneAlarm free firewall. U will then give permission to the programs u know need access to the internet. E.g. browser, email program, etc. There are other firewalls out there, and u may want to check others. Proxy: Install Privoxy and reconfigure ur computer Check info here <http://www.privoxy.org/user-manual/quickstart.html> The virtual network info is here http://technet.microsoft.com/en-us/library/cc720355%28v=ws.10%29.aspx. U could also use a non-microsoft program. |
|
|
|
Athena, The person could do more that that. They could turn on/off ur video cam and take snapshots, specially if u have Java installed. Best thing, put a nice two way firewall. The two way firewall will tell u what programs r trying to access the internet, and u could stop them. I would also add a non-caching proxy and virtual network, to stop the snooping from outside a bit more. Wow, all this sounds great! And went completely over my head... I'll have to study up on these things now and cross my fingers that I get it right... Athena, Specifically, low solution for the webcam: place a piece of adhesive tape on the webcam when not in use. I know it sounds funny, but it does the job! Java: go to Start/Control Panel/Programs and Features and find JAVA, and hit uninstall. Unless u know u need Java 4 something, like maybe banking or a university website. Firewall: download and install ZoneAlarm free firewall. U will then give permission to the programs u know need access to the internet. E.g. browser, email program, etc. There are other firewalls out there, and u may want to check others. Proxy: Install Privoxy and reconfigure ur computer Check info here <http://www.privoxy.org/user-manual/quickstart.html> The virtual network info is here http://technet.microsoft.com/en-us/library/cc720355%28v=ws.10%29.aspx. U could also use a non-microsoft program. Again, WOW! Thanks for the info. I don't have a cam on my desk top, and I've had my laptop cam taped over since I started using it. So unless there's some other sneaky way anybody could be peeking at me I feel pretty secure about staying in the dark. All this other stuff you've listed I'll definitely investigate to see how I can apply them. |
|
|
|
UR welcome Athena. Good luck!
|
|
|
|
Edited by
Whozurdaddy
on
Fri 05/02/14 09:13 AM
|
|
Athena, you've been 'Socially engineered'. That is the common term used to identify the largest portion of hacker tools.
Hackers often 'fishnet' information rapidly and will sort that information in time in order to obtain something of value;eventually that information can be used to obtain credit info other passwords to other critical information and such. You'd be wise to immediately change any and all passwords using at least 8 characters and utilizing Caps, numbers, insignias and letters. Anything associated with that e mail account can be rifled through and work with by a true hack. A 'Lurker' may wish to drain information from any other accounts over a period of time in order to find something critical. Intel's not that good w/o a social #, a phone number, a physical addy, and of course an account number. If you're running a Net-Bios start up password it will be hard for the individual to access your account unless that initial password is weak. There is every possibility that the punk-*** installed spy-ware onto your system as well. You'll want to download monitor your 'Task Manager' for a bit and see if you've got extraordinary memory usage being used while the machine is idle. Often these things can be identified this way. If it get's bigger, go to this site. State your issue and they can help eradicate the perps work. http://spywarehammer.com/simplemachinesforum/index.php Re-invent yourself electronically and you'll be fine. Good luck. |
|
|
|
Athena, you've been 'Socially engineered'. That is the common term used to identify the largest portion of hacker tools. Hackers often 'fishnet' information rapidly and will sort that information in time in order to obtain something of value;eventually that information can be used to obtain credit info other passwords to other critical information and such. You'd be wise to immediately change any and all passwords using at least 8 characters and utilizing Caps, numbers, insignias and letters. Anything associated with that e mail account can be rifled through and work with by a true hack. A 'Lurker' may wish to drain information from any other accounts over a period of time in order to find something critical. Intel's not that good w/o a social #, a phone number, a physical addy, and of course an account number. If you're running a Net-Bios start up password it will be hard for the individual to access your account unless that initial password is weak. There is every possibility that the punk-*** installed spy-ware onto your system as well. You'll want to download monitor your 'Task Manager' for a bit and see if you've got extraordinary memory usage being used while the machine is idle. Often these things can be identified this way. If it get's bigger, go to this site. State your issue and they can help eradicate the perps work. http://spywarehammer.com/simplemachinesforum/index.php Re-invent yourself electronically and you'll be fine. Good luck. Thanks for the extra detailed information... Whozurdaddy... :-) |
|
|
|
Athena,
Here a link to more info on the firewall. http://www.pcmag.com/article2/0,2817,2422144,00.asp Hope is not an over kill of information. lol |
|
|
|
Whozurdaddy gave the best advice for your problem, just to add a few notes though-
1. If he is gaining access through teamviewer I doubt it was your ip address in which he is using, teamviewer generates a its own access code and password for people to gain access. (this is not to say he didn't obtain an ip address while he was accessing it) but to stop teamviewer access just change (or create) a user-defined passcode. Also check the box that automatically records all incoming connections and monitor its save folder. 2. If he is gaining access with an ip address, log-in to your router and change your ip renewal policy to 1 day which should be the default. Ensure that your router config setting is set to a DHCP standard, which will allow for your router to change your ip every day, once again this should be your routers default. 3. Next open your task manager, select the services tag, click the services button in the bottom right hand corner, in the window that pops up filter the srvices by name and scroll down to the ones that say Remote there should be like 7 or 8 disable all of them. This will stop him if he has basic knowledge, if he is comp savvy and a possiblke background in "hacking" lol you will need a much more in-depth approach |
|
|