How do I prevent my pc from getting hacked?
-
I want to learn how can I prevent my pc from getting hacked in order to prevent myself from cyberbullying. There is an intruder who has hacked my system from last 4 years.I request you to read each sentence carefully and make a map in your mind about my situation. He has hacked my all emails,Websites I log on to and whatever when it is related to me being online. I want to do anything regarding this matter as I don't like my privacy breach,and that guy enjoys doing it. He has even hacked my bank details(bank has verisign mark at bottom,that means he is a cool hacker).He has a team of friends and has professional links all over the world. I am really sick of him.Its very serious.We chat on meebo through fake account from last 3 years and I know he knows every bit of information held in my system,the moment I sit on my system I start feeling about him.I chat with him from last many years to know who exactly he is,as he is one from my school or college friend. When I make another email from another computer,I don't know how he comes to know about it,he knows my minute credentials of my account information. When I go on certain websites of my interest to get information my internet suddenly disconnects.I have to connect and reconnect my modem at least 200 times a day.That is how I have become a very good enemy of him. Even if I choose to take legal action on him,he would be locked up for some 6 months in a prison. I havn't used any of my emails (except reading) from last 3 years,he knows every website I visit on and that is how he uses me-can you imagine my situation.And I know all this,because he has accepted all these things over our chat. Well to add I don't understand and want to get in the details of hacking websites or emails because I don't like to,that is not my passion.Someone has advised me that I will have to become hacker to prevent myself. Is there anyway I can consult a good security expert or an institution,where would I find it. I was about to die 2 months back because of overdose of drugs thinking this.I live in India. Please get me quick answers.
-
Answer:
In reality you can't. If hackers want to own you they will. You can... You must be signed in to read this answer.Connected to GoogleConnected to FacebookBy continuing you indicate that you have read and agree to the . Loading account...Complete Your ProfileFull NameChecking...EmailChecking...PasswordChecking...By creating an account you indicate that you have read and agree to the .
Quora User at Quora Visit the source
Other answers
In the military, they use what's called an "air gap." This means that machines with sensitive data are not connected at all to the public Internet. You could do this, too. Get a cheap netbook for your Internet use, and keep nothing on it. If it gets hosed, all you've lost is the time to reinstall the base OS. Your real data resides on another machine that is disconnected.
Ansel Halliburton
Don't connect your machine to the internet.
Matt Robuck
For starters, disconnect your computer from the internet. This will make it impossible for the hacker to access your computer at all (unless he has added a second physical networking device like a USB WiFi dongle to your system). From there, you can either attempt to salvage your current computer, or set up a new one. Completely cleaning your current computer will certainly entail completely re-installing the OS (after nuking the hard drive) and flashing the BIOS, which may not be for the faint of heart (or tech-savvy). Now, I'm not a software expert, so I'll let more knowledgeable folks take over here. Whichever direction you go, make sure you install antivirus software, and do NOT open files/attachments/programs you aren't sure are 'clean'.
Jason Sands
I'd suggest formatting your hard drive, and installing a new operating system. Also I'd not bring in any of the programs / files from your old drive, and I'd be very careful opening any of your old files - always ensure you are not accidently opening an executable file (.exe etc.) As far as the operating system goes, you may want to try out Ubuntu Linux or Apple. It sounds to me like with such a long track record of being hacked, you might also want to try secure all of your passwords. There is a lot of information on the Internet on how you can create a strong password (Using numbers, letters, special chars). Also, I'd cancel all of your current email accounts and register for new ones, same goes for things like Facebook, etc. Have a different password for each account. You may want to use a password manager such as LastPass, which can save you lots of time and effort in remembering difficult passwords. One of the most important things is to consider the source of files, before downloading / opening them. If you receive something from a person who you do not know you should never open the attachments. For your Internet browser, I'd stay away from IE and switch to Chrome or Firefox. Good luck.
Konrad Szpirak
Agree 100% with Kim. Great stuff. A couple of extra things. 1. Run Ad Block Plus on Firefox or Chrome. 2. Use 18+ character passwords. 2 upper. 2 lower. 2 numbers. 2 special. This is te government standard. 3. Secure your Wifi incase theyre getting in that way. Run Wpa2. SSID should not be broadcast. Wpa2 password should follow #2. 4. Change all your password recovery questions. So if it asks what high school did you go to, put in something totally unrelated like icecreamsandwich. 5. If there really is crime goin on, call te police. They may refer you to the FBI if they're stealing money.
Tom Plummer
The Control Panel is arguably one of the most important components of http://timesofindia.indiatimes.com/tech/tech-news/Heres-why-US-is-urging-Windows-users-to-uninstall-Quicktime/articleshow/51854459.cms, having been present since the earliest versions of the operating system. All of the crucial system settings (e.g. configuration of user accounts, addition/removal of hardware and software) can be altered through the Control Panel. So it's paramount that it's only accessible to authorized users, especially in case of PCs with multiple users.As it turns out, it's indeed possible to restrict access to Control Panel in http://timesofindia.indiatimes.com/tech/tech-news/Heres-why-US-is-urging-Windows-users-to-uninstall-Quicktime/articleshow/51854459.cms. This can be done via the "Group Policy editor" module of the operating system. But before getting started, make sure to read the following important pointersNoteworthy points: The Group Policy editor is an advanced component of the operating system. If used incorrectly, it can render the system unusable. So make sure to proceed with caution. The Group Policy editor module is only available in certain versions of http://timesofindia.indiatimes.com/tech/tech-news/Microsoft-begins-to-rollout-Windows-10-update-on-selected-smartphones/articleshow/51458258.cms Windows. Restricting access to Control Panel in WindowsStep 1: Type gpedit.msc at the Run prompt, and hit OK to launch Group Policy editor. Generally, this requires http://timesofindia.indiatimes.com/tech/social/Egypt-orders-arrest-of-Facebook-administrator-after-unfaithful-wives-comments/articleshow/51024104.cms level account elevation.Step 2: Navigate to User Configuration > Administrative Templates > Control Panel and double click the Prohibit access to Control Panel (and PC settings) option.Step 3: In the configuration box that opens up, simply change the value of the setting from Not Configured to Enabled. Click OK and close Group Policy editor.That's all there's to it. This tweak not only disables access to the Control Panel, but also removes its entry from File Explorer, and all other http://timesofindia.indiatimes.com/tech/jobs/After-IBM-Infosys-HCL-Tech-goes-for-new-appraisal-system/articleshow/51184648.cms locations where it appears.
Rudresh Srinivas
Technically, everything that connects to the Internet can get hacked. But there are several things you can do to protect yourself and your data from an attack. Here are a few tips that will mitigate the risk of getting your per1. Be suspicious of emailsA great deal of cyberattacks are launched through simple malicious email campaigns. Email is a wonderful communication platform because you can sending anything to anyone2. Check link locationsUnknown messages contain links to unknown sites. Surfing to a mysterious website can bring about unintended consequences3. Never open attachments (unless you're really sure)A good rule to follow is never open attachments unless you are 120% sure of where it came from. One of the easiest ways for hackers to download malicious code onto victim computers is by sending emails with virus-laden files.4. Use two-factor authenticationAs bigger companies get hacked, the likelihood that your password is leaked increases. Once hackers obtain passwords, they try to figure out which personal accounts they can access with the data they stole.5. Intrusion Detection SystemAn intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities or through security policy violations.There exist multiple ways through which Detection is processes in IDS softwares. 1. https://www.clearos.com/products/clearos-editions/clearos-7-home/marketplace/cloud/IDS_Signatures Based detection- This type of detection work well with the th reads that are already determined or known.2. Anomaly-based detection-- This detection works on the basis of Comparison. It determines the traits of a normal action against characteristics that marks them as abnormal.
Nick Martin
You are in some dangerous but not a hopeless situation. Not only has your computer been hacked but you are also a victim of identify theft. Now before we go to the solution, let me first advice on how you could have prevented this in the first place even though that is water under the bridge now. Always have an updated anti virus software on your PC. Avoid installing software that you are not 100% sure about it. You needs to disconnect your computer from the internet. This would cut off the hacker. Maybe there is information you don't want to loose on the current machine. Copy it and store it in a machine with a different operating system such as Linux if you were using Windows for example. You will need to then format your machine by deleting everything and installing a fresh copy of the operating system. After the operating system has been installed, install an anti-virus software.In terms of hacking your banking details even though it has those SSL encryption, it is likely that he installed a key logger on your PC that he was able to steal your credentials to the bank. If he had hacked the bank, he would not be interested in harassing you but would be enjoying his new found wealth in the Caribbean. You will need to visit your bank and request that your online banking channel be closed or they supply you with fresh credentials. For the current emails that you use, you need to close them down or contact the email provider to change credentials for you.Since your case is quite complex, you will need to consult and infosec professional to help you. Call a http://goo.gl/GxH7GG who can help
Raymond Kip
I would get an iPad. The security on the iPad is pretty solid. Do all your banking etc from the iPad. Then you can use your PC only for things that require no password. One thing I would be wary of is your wifi connection. Only connect to sites with passwords via https not http. You can see this on your browser when you visit a website. There is almost no way to stop a determined hacker, but the iPad is something that most hackers would have difficulty hacking. However, you still have to be careful: choose passwords that aren't in a dictionary (google how to choose good passwords).
Jade Rubick
Related Q & A:
- How can I prevent memory warning in IOS?Best solution by cultofmac.com
- How do I tell if my IP is hacked?Best solution by answers.yahoo.com
- How can I prevent varicose veins?Best solution by Yahoo! Answers
- How can I prevent the flu?Best solution by Yahoo! Answers
- Why do I get nauseous so easily and how do I prevent it?Best solution by zocdoc.com
Just Added Q & A:
- How many active mobile subscribers are there in China?Best solution by Quora
- How to find the right vacation?Best solution by bookit.com
- How To Make Your Own Primer?Best solution by thekrazycouponlady.com
- How do you get the domain & range?Best solution by ChaCha
- How do you open pop up blockers?Best solution by Yahoo! Answers
For every problem there is a solution! Proved by Solucija.
-
Got an issue and looking for advice?
-
Ask Solucija to search every corner of the Web for help.
-
Get workable solutions and helpful tips in a moment.
Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.