|
old hand
|
OP
old hand
Joined: Feb 2005
|
Formal welcome back, Gal. <img src="/ubbthreads/images/graemlins/winkwink.gif" alt="" /> <img src="/ubbthreads/images/graemlins/wave.gif" alt="" />
At least, you can boast that you have put action in this forum and made a few get out of their hole... <img src="/ubbthreads/images/graemlins/biggrin.gif" alt="" />
LaFille,
Toujours un peu sauvage.
|
|
|
|
veteran
|
veteran
Joined: Mar 2003
|
Don't let such creep get you down, a good firewall would take care of it.
And welcome back
It's one of these days...
|
|
|
|
old hand
|
old hand
Joined: Jul 2005
|
I wonder: if you have a new IP-adress, would the hacker still be able to identify your computer as the one he hacked?
|
|
|
|
veteran
|
veteran
Joined: Jun 2003
|
This story is unbelievable. <img src="/ubbthreads/images/graemlins/confused.gif" alt="" />
|
|
|
|
veteran
|
veteran
Joined: Mar 2003
|
I wonder: if you have a new IP-adress, would the hacker still be able to identify your computer as the one he hacked? I beleve it needs a bit more than that. I mean, a PC doiesn't only consist of one IP number ... By the way, getting online means you get - usually - an IP number from a huge pool of IP number from an ISP. So, Gal would be - in her case - just one of many numbers out of a pool of numbers - every time she dials in.
When you find a big kettle of crazy, it's best not to stir it. --Dilbert cartoon
"Interplay.some zombiefied unlife thing going on there" - skavenhorde at RPGWatch
|
|
|
|
veteran
|
veteran
Joined: Aug 2003
|
yes that is true but here your ip stays the same unless teh ips router loses power. But prolly there is a trojan installed that announces the ip address to the hacker.
Not in the mood for cheese? That excuse has more holes than a slice this fine Gorgombert!
|
|
|
|
veteran
|
veteran
Joined: Jun 2003
|
glad to have u back, Gal. <img src="/ubbthreads/images/graemlins/kissyou.gif" alt="" />
but please, get yourself protected first otherwise u will again fall victim to all this which keeps hurting not just u but also your family members.
1. get the authorities to do something 2. get techie friends to buff up the security of your PC 3. learn how to protect yourself better online 4. do all the above now
good to see u again, Gal. <img src="/ubbthreads/images/graemlins/hug.gif" alt="" />
![[Linked Image from i3.photobucket.com]](https://i3.photobucket.com/albums/y72/tingtongtiaw/jang_sig.png) ......a gift from LaFille......
|
|
|
|
old hand
|
old hand
Joined: Jul 2005
|
Well, the safest thing to do would be backup all important files, format the hard drive(s), reinstal windows or whatever you're using, and put a good firewall, antivirus and stuff like that on the hard drive.
(i got 4 protection systems runningn at the moment, you can never be safe enough!)
|
|
|
|
veteran
|
veteran
Joined: Aug 2003
|
Well, the safest thing to do would be backup all important files, format the hard drive(s), reinstal windows or whatever you're using, and put a good firewall, antivirus and stuff like that on the hard drive.
(i got 4 protection systems runningn at the moment, you can never be safe enough!) this could turn out ugly if it's a virus that set a backdoor open for the trojan. You could just be copying the virus back after the format.
Not in the mood for cheese? That excuse has more holes than a slice this fine Gorgombert!
|
|
|
|
veteran
|
veteran
Joined: Mar 2003
|
What do you think of the many firewalls that are curtrently available, especially Sygate ?
When you find a big kettle of crazy, it's best not to stir it. --Dilbert cartoon
"Interplay.some zombiefied unlife thing going on there" - skavenhorde at RPGWatch
|
|
|
|
old hand
|
old hand
Joined: Jul 2005
|
You could just be copying the virus back after the format. If you format, and copy everything from a CD or download it from the internet, how can you copy it then? I'm using sygate and i didn't encounter any problems, i have been criticly hacked one time, but sygate could retrace the hacker and every request from that IP/computer was denied.
|
|
|
|
veteran
|
veteran
Joined: Aug 2003
|
from your line
Well, the safest thing to do would be backup all important files
you copy infected files to a cd, and after he format you would place the infected files back et voila virus revisited part 2.
Not in the mood for cheese? That excuse has more holes than a slice this fine Gorgombert!
|
|
|
|
veteran
|
veteran
Joined: Mar 2003
|
If you format, and copy everything from a CD or download it from the internet, how can you copy it then?
Hackers can alter existing files, mostly they alter system files, those you won't delete that fast and are used very often. They can also just alter any file they want with virus that than would copy a tojan back into you system files. Safest thing to do is not to install any bakups back untill you know you've secured your pc as much possible.
It's one of these days...
|
|
|
|
veteran
|
veteran
Joined: Aug 2003
|
what Draghermosran said. <img src="/ubbthreads/images/graemlins/smile.gif" alt="" />
Not in the mood for cheese? That excuse has more holes than a slice this fine Gorgombert!
|
|
|
|
old hand
|
old hand
Joined: Jul 2005
|
ah, ok get it.
But would scanning those files with an antivirus/pestsystem work?
|
|
|
|
veteran
|
veteran
Joined: Mar 2003
|
Yes, as long as the anti-malware program recognizes it. <img src="/ubbthreads/images/graemlins/smile.gif" alt="" />
And that's the weakest point : A thing that cannot be recognized cannot be detected.
But - there's astill a chance : Heuristics. Programs tend to incorporate a certain behaviour. Silently hooking into the keyboard and listening and then sending the results via e-mail or chat-bots "home" isn't a behaviour a normal office program would incorporate. <img src="/ubbthreads/images/graemlins/smile.gif" alt="" /> (But on the other hand ...) The only difficulty woiuld lie in the hooks - in this example. *Every* program that relies on the keyboard needs some kind of input from the keyboard. So it listens to the keyboard (or, to be more exact, the OS does). The only difference is in the handling : Would it be secretly or open ? Would the program do its very best to hide itself and not to be detected ? I don't think that an office program would do that. <img src="/ubbthreads/images/graemlins/winkwink.gif" alt="" />
That's Heuristics, in a nutshell. Nowadays, things get more & more evolved. The current development for future Heuristics is basically this : Even now, behaviour patterns are analysed and used in neuronal networks (if i understood this correctly) to analyse malware. But the systenms that doi that are extremely slow, due to the complexity of possible behaviour schemes. This might improve, though, so that these intelligent behaviour-detecting systems might be small enough one day to become incorporated into a small scanner. <img src="/ubbthreads/images/graemlins/smile.gif" alt="" />
When you find a big kettle of crazy, it's best not to stir it. --Dilbert cartoon
"Interplay.some zombiefied unlife thing going on there" - skavenhorde at RPGWatch
|
|
|
|
veteran
|
veteran
Joined: Dec 2004
|
Hey guys, thanks for the warm welcome back, <img src="/ubbthreads/images/graemlins/hug.gif" alt="" /> I'm soo glad I didn't have to give all this up just for one pathetic creep. I got some help from a few friends, I got a new firewall installed, downloaded Spybot and I'm gonna formatt my computer soon, when I have some more time (my hubby needs to do that for me <img src="/ubbthreads/images/graemlins/winkwink.gif" alt="" /> )
I have been talking to the police, at least to a friend who works there, he told me that emails can't be used as proof for stalking, cause they could be arranged the same way as the ones the creep used from me. So no luck there, and he also asked me if I used any 'illegal' programs, like windows and things like that, if I did, the cops would prolly give me a fine for using those instead of the 'legal' copies. so no use to call them on me right? <img src="/ubbthreads/images/graemlins/biggrin.gif" alt="" />
But anyway, for now I have deleted my Yahoo account, it was from that account that creep took all my mails, so no treat there anymore. I don't think he really hacked my computer, he just got in through my Yahoo account. I changed my msn account, will get a new email adress soon and soon that creep will be just another page in my memory of bad internet people.
So thanks to you all for your kind words, it's feels good to be back! <img src="/ubbthreads/images/graemlins/bday_jump.gif" alt="" />
@ Barta Nice to see you back again <img src="/ubbthreads/images/graemlins/winkwink.gif" alt="" />
|
|
|
|
veteran
|
veteran
Joined: Mar 2003
|
/bow <img src="/ubbthreads/images/graemlins/cry.gif" alt="" /> <img src="/ubbthreads/images/graemlins/hug.gif" alt="" />
|
|
|
|
veteran
|
veteran
Joined: Jun 2003
|
Gal, i believe that i speak for everyone here; all in all, we're just glad that u are alright. <img src="/ubbthreads/images/graemlins/hug.gif" alt="" />
![[Linked Image from i3.photobucket.com]](https://i3.photobucket.com/albums/y72/tingtongtiaw/jang_sig.png) ......a gift from LaFille......
|
|
|
|
veteran
|
veteran
Joined: Nov 2003
|
LOL Jangg that's a good believe <img src="/ubbthreads/images/graemlins/biggrin.gif" alt="" /> <img src="/ubbthreads/images/graemlins/bday_jump.gif" alt="" />
Mea Culpa's Demesne
Note; artwork for Avatar courtesy of NWN and CEP
Old Elven Saying:
"Never say Never if you're gonna live forever!!!"
"I didn't do it, it wasn't my fault"
|
|
|
|
|