hacker

Thu
11
Dec
Dennis Faas's picture

Surveillance Software: record chat logs and more?, Part 2

Infopackets Reader Kevin C. writes: " Dear Dennis, I just read your article on Guardian Monitor 8.0 . I checked the Washington Post article that you included in your review and read the comparison of Guardian Monitor versus the other surveillance ... programs ... but none mentioned the possibility that an outsider (hacker) could access your PC and obtain the data captured by the surveillance software -- and possibly obtaining passwords, account numbers, etc. Should this be a concern? " My response: Excellent question. As I previously discussed, Guardian Monitor records key strokes ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Wed
09
Oct
Dennis Faas's picture

Can I track down a hacker?, Part 2

Yesterday's Visitor Feedback asked, " Can I track down a hacker ?" My answer to that question was a passive one -- mainly based on the fact it would take an inconceivable amount of time to prosecute each and every hacker who tries to wallow his way ... into your computer system. An algorithm for a typical Hacker might look something like this: Randomly select a computer to hack; Attempt to gain access to randomly selected computer; If access is granted, deliver a payload (send virus/trojan, delete files); If access is not granted, disconnect from this computer; Repeat process. With the ... (view more)

Tue
08
Oct
Dennis Faas's picture

Can I track down a hacker?

Infopackets Reader Merle A. writes: " Dear Dennis, I want to know if there is a way to find out who is trying to hack into your computer. I have the "remote address, local address, and remote computer address." Someone tried twice, but my Norton ... Antivirus stopped them (this time). " My Response: Trying to hunt down a hacker may prove to be fruitless, especially if: There is more than one 'hacker' attack The hacker spoofs his IP address Chances are that most hackers will do everything possible to cover his/her tracks in an effort to thwart "being caught". Even *if ... (view more)

Pages

Subscribe to RSS - hacker