Hakars: access another comoputer via Internet
-
Hi I heard a lot about accessing any computer if it is connected via the Internet. So I’m worry about the secret information in my computer ! especially when every one say that WinXP have more problem in Security ! Could any one tell me please how this is possible even if I did not make any share folder on my computer ? Dose any one know a good articles about this subjects ? Thanks very much :rose::rose::rose:
-
Hi I heard a lot about accessing any computer if it is connected via the Internet. So I’m worry about the secret information in my computer ! especially when every one say that WinXP have more problem in Security ! Could any one tell me please how this is possible even if I did not make any share folder on my computer ? Dose any one know a good articles about this subjects ? Thanks very much :rose::rose::rose:
bfadi wrote: every one say that WinXP have more problem in Security I haven't heard that at all. WinXP is more security conscious than previous versions, though I have no doubt that a serious hacker can probably find a way into any PC. XP makes it harder (it's hard enough for a legitimate user to make it work), and you as an individual are not much of a target for hackers. If you are not sharing any files or devices on your PC it would be very difficult for anyone to get in, if it's possible at all. I don't personally know of any way to do so. One good bit of insurance is a firewall; a hardware device is better, but more expensive than a software firewall. ZoneAlarm Pro and Sygate Personal Firewall Pro are two I've used, and both are excellent. Search Google for download sites. If you're curious about how exposed you might be to the outside world while connected to the Internet, there's a quick and dirty scanner available at www.grc.com[^] which will scan your PC and report any ports or services found on it. Once you identify a vulnerability you can research methods for closing the gate to outsiders. If you're not on a network, just using the PC for personal pleasure, you should remove or disable any services you don't need. Using the Services applet in Control Panel you can temporarily disable various things to see how the computer behaves, and customize a configuration that allows only the operations you need and want. It's a bit risky, though, so it's advisable to save your system configuration before making each change, allowing you to restore your previous settings if something you change really messes things up. Keep in mind, though, that as an individual user your aren't likely to be targeted by hackers, and your secret information is of little value to anyone else. Unless you have enemies looking to do you harm, I wouldn't lose any sleep over this.:)
"Welcome to Arizona!
Drive Nice - We're Armed..."
- Proposed Sign at CA/AZ Border -
bfadi wrote: every one say that WinXP have more problem in Security I haven't heard that at all. WinXP is more security conscious than previous versions, though I have no doubt that a serious hacker can probably find a way into any PC. XP makes it harder (it's hard enough for a legitimate user to make it work), and you as an individual are not much of a target for hackers. If you are not sharing any files or devices on your PC it would be very difficult for anyone to get in, if it's possible at all. I don't personally know of any way to do so. One good bit of insurance is a firewall; a hardware device is better, but more expensive than a software firewall. ZoneAlarm Pro and Sygate Personal Firewall Pro are two I've used, and both are excellent. Search Google for download sites. If you're curious about how exposed you might be to the outside world while connected to the Internet, there's a quick and dirty scanner available at www.grc.com[^] which will scan your PC and report any ports or services found on it. Once you identify a vulnerability you can research methods for closing the gate to outsiders. If you're not on a network, just using the PC for personal pleasure, you should remove or disable any services you don't need. Using the Services applet in Control Panel you can temporarily disable various things to see how the computer behaves, and customize a configuration that allows only the operations you need and want. It's a bit risky, though, so it's advisable to save your system configuration before making each change, allowing you to restore your previous settings if something you change really messes things up. Keep in mind, though, that as an individual user your aren't likely to be targeted by hackers, and your secret information is of little value to anyone else. Unless you have enemies looking to do you harm, I wouldn't lose any sleep over this.:)
"Welcome to Arizona!
Drive Nice - We're Armed..."
- Proposed Sign at CA/AZ BorderIt is possible if they have administrative privileges using the hidden shares like C$ (for the entire C drive), etc. However, if they somehow got administrative privileges on your computer (which would requires a series of hacks anyway) they probably could do a lot better things than accessing your shares. It's true that most "hackers" (the media is stupid, the correct term is "crackers" and "phreaks") probably won't target an individual's files, but they will try to gain elevated priveleges if possible to launch additional attacks, such as DDoS attacks. XP is more secure, though, so long as you keep up-to-date with Windows Updates (use the automatic download if always connected, or use the Tools->Windows Update command from IE often). No OS (even linux, despite what those junkies always say) is secure all the time. Even security specialists in the field (like Bruce Schneier) will tell you that nothing's uncrackable - it's only a matter of time. Just make your computer as secure as you can, keep up-to-date on patches, and don't worry so much because it's not as large a problem as the stupid media (and linux junkies when attacking Microsoft because they're successful and linux isn't) makes it. PS: This isn't an attack again linux - it has it's uses and I enjoy it for certain purposes since no OS is perfect for every problem / solution. It's just the propaganda that its primary users spew-forth!
-----BEGIN GEEK CODE BLOCK----- Version: 3.21 GCS/G/MU d- s: a- C++++ UL@ P++(+++) L+(--) E--- W+++ N++ o+ K? w++++ O- M(+) V? PS-- PE Y++ PGP++ t++@ 5 X+++ R+@ tv+ b(-)>b++ DI++++ D+ G e++>+++ h---* r+++ y+++ -----END GEEK CODE BLOCK-----