You must Sign In to post a response.
  • Hacking Your Windows OS | Complicated or Easy

    Are you looking for the best ways to protect your Laptop or PC from the hackers? Ask our technical experts to help you find the easiest ways.

    Nowadays hackers are increasing worldwide and it is very hard to protect your laptop or personal computer from these high-level hackers.

    Which are the processes or services that are responsible for hacking a laptop or personal computer? How can we identify these hackers with cmd prompt or services?
  • Answers

    3 Answers found.
  • Well, you can use Command Prompt to check if your computer has been hacked. Follow the steps here below -

    1. Type CMD and then right click on the result.
    2. Click on Run As Administrator.
    3. Type in netstat -an and ENTER.
    4. Check the results for any kind of unusual entries.
    5. If you find any suspicious IP addresses, you can be sure that you have been hacked.
    6. Pay special attention to the port numbers. They can provide an indication of whether your connection is compromised. Port numbers more than 49152 can be suspicious. Port numbers between 0 to 1023 are completely safe while those between 1024 and 49151 can be safe in a relative manner.

    A few normal methods being used by Hackers to hack your computer include -

    Through Malware
    Hackers get into your registry values. These can target your passwords - be it on your social profiles, emails, or even bank accounts. Regular Anti virus may fail to detect them as they can only be detected through anti malware tools.

    Boot Record Hacks
    These can be a little tougher to track down. Such hacks have a worm that resides beside your BIOS. This worm sends your internet information to specific servers. The worm cannot be removed unless you format your disk.

    Bitcoin Hacks
    The hackers will install bitcoin maker on your machine. This will use the idle memory of your device to generate coins and then pass them on to the hackers. Hackers attack business or NGO computers for this kind of attack. Personal computers are normally touched.

    Browser Hacks
    Browser hacking is one of the easiest ways to achieve. You just need to lure users with addons and toolbars and that does the work. Once your browser is hacked, it can be used for several other hacking options like logging your passwords, forced affiliate links and other such hacking tasks.

    Live....and Let Live!

  • The basic and simple steps that must be done to protect your PC or Laptop from hackers are to Install or use the required software. The basic type of software must be used are:-
    1. You must Install Antivirus Software
    2. You must have Anti-Spyware Software.
    3. You should use Firewall to protect your PC from hackers.
    4. Tough passwords can also help to secure your PC from hackers.
    5. You must keep strict eyes on the settings of the browser installed.
    6. Don't use apps that are available free of cost on internet.

    You can also use the command prompt to view all open the ports of your system and hence be able to protect them.
    1. Type netstat-an
    2. Using this command you can view all the connection status and identify the port you don't recognize.

  • It is lot harder than we can imagine. Some of the simple things may be out on the internet but usually those exploits gets patched. Most of the other exploits are harder to do on user machine. The type of security hacks depends on how they penetrate and what they wish to do with your computer. Each different type of exploit can do specific tasks. Here are some of the common exploits.

    Here are some of the processes that are likely to get affected first in the hacking and virus infection.

    1. Windows explorer (explorer.exe)'
    2. Network connection (various processes in the process explorer associated)
    3. Hard disk read write process.

    Following exploits don't appear on command prompt.

    Hence not even antivirus can't find it in many cases.

    1. Keylogger Exploit

    These type of hacks store your key press and then send to the server. Usually some malware and virus catch such key-press in some files and then send this data. Credit cards and the net-banking logins are transferred through it.

    2. Browser Exploit

    Your browser stores a lot of information about you. And such exploits are going to read your browser data and then send it to hacker server. You can see that most of such exploit are not operating system dependent. And that's one reason browsers have incognito mode and sandbox mode for those who want more security. Usually add ons and extensions are hacked to manipulate user data.

    3. Shell script exploits

    When you download some unwanted programs on your machine. Despite having the anti virus, such shell script can use powershell admin rights and run some code in the background. So these exploits are more serious in nature.

    4. Desktop sharing exploit

    Most of the gamers and the business owners are exploited due to this security flaw. Here hacker literally gains control of the user system. They can view what user is doing and at the same time they run parallel on the user desktop. You can find that such exploits are known to keep eye on user data and the sensitive information.

    5. Boot sector exploit

    This exploit gets loaded into users boot sector and able to run some of the services in the background. These are usually not detected by anti virus. And for that reason they are being handled by anti rootkit software. It can be harder to get rid of them and requires lot of effort during the format to get rid of their traces.

    How to protect yourself in such cases ?

    1. Change your password every 6 months or so. Change regularly if your usage is frequent.
    2. Use antivirus and anti malware to protect from common hacking.
    3. Avoid using simple passwords. Make sure to use passwords with longer strength 12 if possible.
    4. Make sure your C : drive has UAC enabled. And you don't offer the progams to get saved on that drive. Use D: drive for program files storage.

    These steps can protect you against most common hacks and the virus infections.

  • Sign In to post your comments