Page 1 of 2 12 LastLast
Results 1 to 20 of 43

Thread: Hackers

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1

    Default Hackers

    If i leave my pc on all night and download things from using utorrent, Will hackers able to control my pc? Iav got mcafee firewall,antivirus, search and destroy.


  2. #2

    Default Re: Hackers

    Doubt it. but i wouldn't rule out the possibility completely.

  3. #3

    Default Re: Hackers

    Even when iav got firewall on ect?


  4. #4

    Default Re: Hackers

    Quote Originally Posted by powerpuff boys View Post
    Even when iav got firewall on ect?
    Yes. According to Sim, who is rumored to be God.

  5. #5
    Simetrical's Avatar Former Chief Technician
    Patrician

    Join Date
    Nov 2004
    Location
    θ = π/0.6293, φ = π/1.293, ρ = 6,360 km
    Posts
    20,154

    Default Re: Hackers

    In principle, just using Bittorrent does not expose you to hackers. There are two scenarios in which it might.
    1. Every network-connected service you use will have some bugs. A small number of these bugs might be exploitable, to damage or take over your computer. If you use reputable software and make sure to keep up with updates, the chances of this being a problem will be fairly small, but it will occasionally happen. (My parents had to reinstall their OS once when a critical bug in Firefox allowed arbitrary remote code execution via the update mechanism, which someone exploited before a patch could be released or by posing as the real patch.)
    2. One is that using any network service that listens on ports, like Bittorrent, makes your computer visible to anyone snooping around. (Most software, like Firefox or MSN, does not open up a port to listen to the public, and is not affected by this additional vulnerability. The nature of real peer-to-peer file-sharing requires you to act as a genuine server and open ports to most of the Internet.) Many hackers use botnets to make a practice of checking all assigned IP addresses for running services. If any are running, they'll try some general tactics to break into your computer, hoping you're running common software and haven't kept it up-to-date. If you have a firewall and are running nothing like Bittorrent, you're invisible when they try this, and they won't bother with further attack attempts, they'll just give up and move on to the next target. If you're running Bittorrent, you advertise your computer's existence to anyone on the Internet.

    Firewall and antivirus software help with both of these (especially the second*― the first they're unlikely to stop if you keep the software itself patched), but won't totally prevent them. Basically, the only way for a computer to be totally secure against attackers is if you unplug the network cable. Always keep an offline backup of all critical information. Leaving a reputable and well-maintained Bittorrent client online should not increase your risk much more than it already is, it will just increase it slightly. Personally I wouldn't worry too much about it.
    MediaWiki developer, TWC Chief Technician
    NetHack player (nao info)


    Risen from Prey

  6. #6

    Default Re: Hackers

    Quote Originally Posted by Simetrical View Post
    In principle, just using Bittorrent does not expose you to hackers. There are two scenarios in which it might.
    1. Every network-connected service you use will have some bugs. A small number of these bugs might be exploitable, to damage or take over your computer. If you use reputable software and make sure to keep up with updates, the chances of this being a problem will be fairly small, but it will occasionally happen. (My parents had to reinstall their OS once when a critical bug in Firefox allowed arbitrary remote code execution via the update mechanism, which someone exploited before a patch could be released or by posing as the real patch.)
    2. One is that using any network service that listens on ports, like Bittorrent, makes your computer visible to anyone snooping around. (Most software, like Firefox or MSN, does not open up a port to listen to the public, and is not affected by this additional vulnerability. The nature of real peer-to-peer file-sharing requires you to act as a genuine server and open ports to most of the Internet.) Many hackers use botnets to make a practice of checking all assigned IP addresses for running services. If any are running, they'll try some general tactics to break into your computer, hoping you're running common software and haven't kept it up-to-date. If you have a firewall and are running nothing like Bittorrent, you're invisible when they try this, and they won't bother with further attack attempts, they'll just give up and move on to the next target. If you're running Bittorrent, you advertise your computer's existence to anyone on the Internet.
    Firewall and antivirus software help with both of these (especially the second ― the first they're unlikely to stop if you keep the software itself patched), but won't totally prevent them. Basically, the only way for a computer to be totally secure against attackers is if you unplug the network cable. Always keep an offline backup of all critical information. Leaving a reputable and well-maintained Bittorrent client online should not increase your risk much more than it already is, it will just increase it slightly. Personally I wouldn't worry too much about it.
    Thanks, So the chances are really low? because i used torrent for ages like 5-6 years now and i never been hacked. I am using vista 32bits btw


  7. #7
    Simetrical's Avatar Former Chief Technician
    Patrician

    Join Date
    Nov 2004
    Location
    θ = π/0.6293, φ = π/1.293, ρ = 6,360 km
    Posts
    20,154

    Default Re: Hackers

    To check the vulnerability of your computer, this is a good link:

    https://www.grc.com/x/ne.dll?bh0bkyd2

    Click "Proceed" and then go through the tests: first try Common Ports, then Service Ports. Look at the descriptions for any of the ports you fail. If your computer is properly configured, you should get a pass on these tests, unless you're running network services (like at least some file-sharing programs) that deliberately open themselves up to the network.

    Some useful services do need to do this to work, so don't get alarmed. I fail the test because my PC has an SSH daemon running (which hackers continually try to use to log into my computer). But if you want a bit of extra security, it's good to pass that test, since it means it's very unlikely that anyone will be able to even figure out your computer exists. The only possible danger should then come from people you open connections with, like websites you choose to visit, which greatly limits the number of possible attackers.

    You might also want to check out some of their other tests, like File Sharing and Messenger Spam.

    Edit: Yes, the chances are low. The biggest risk to the typical Internet user is from downloading and attempting to use untrustworthy programs, which may be given to you by an trusted person whose computer has been compromised. Don't download files from untrustworthy sources, and if someone you know asks you to download a file/type in commands/etc. out of nowhere (via e-mail, IM, etc.), be sure to ask them for clarification on the details if you're at all suspicious. Generally, worms are too stupid to even begin to hold a conversation, so they'll ask you once and then say nothing more. But you still may be vulnerable and should keep in mind the possibility that at some point your computer will be compromised. Avoid leaving highly sensitive information on your computer (e.g., letting your browser remember logins to your bank or e-mail account) and make sure anything you really want to save is backed up now and then.
    Last edited by Simetrical; February 19, 2008 at 08:39 PM.
    MediaWiki developer, TWC Chief Technician
    NetHack player (nao info)


    Risen from Prey

  8. #8

    Default Re: Hackers

    Thanks just tested it it seems most are sucess but not ping reply?


  9. #9

    Default Re: Hackers

    ping ? pong !

    ole mIRC stuff

  10. #10
    Dayman's Avatar Romesick
    Join Date
    Jul 2007
    Location
    Philadephia, PA
    Posts
    12,431

    Default Re: Hackers

    ttps://www.grc.com/x/ne.dll?bh0bkyd2
    Wow, apparently my computer is a veritable fortress.

    Must be the campus firewall/me manually disabling all of those remote access dealys.

  11. #11
    mrmouth's Avatar flaxen haired argonaut
    Join Date
    Apr 2007
    Location
    Chicago
    Posts
    10,741

    Default Re: Hackers

    As long as you have an active firewall running, hardware or software, and its configured correctly, which it should be by default, your not going to come up red in any of those tests. *unless you are networked and file share.
    The fascists of the future will be called anti-fascists
    The best lack all conviction, while the worst are full of passionate intensity

  12. #12
    Cyrus the Virus's Avatar Vicarius Provinciae
    Join Date
    Mar 2006
    Location
    Crackfordshire
    Posts
    10,884

    Default Re: Hackers

    Use Peerguardian mate, 2.0 that is.

    "And the Heavens Shall Tremble"
    Resistance is futile™


    "ehn sewr traih-sluyrds-lairareh"

  13. #13
    Simetrical's Avatar Former Chief Technician
    Patrician

    Join Date
    Nov 2004
    Location
    θ = π/0.6293, φ = π/1.293, ρ = 6,360 km
    Posts
    20,154

    Default Re: Hackers

    Quote Originally Posted by Cyrus the Virus View Post
    Use Peerguardian mate, 2.0 that is.
    PeerGuardian is blacklist-based and will not block most malicious users on the Internet.
    MediaWiki developer, TWC Chief Technician
    NetHack player (nao info)


    Risen from Prey

  14. #14
    Cyrus the Virus's Avatar Vicarius Provinciae
    Join Date
    Mar 2006
    Location
    Crackfordshire
    Posts
    10,884

    Default Re: Hackers

    Quote Originally Posted by Simetrical View Post
    PeerGuardian is blacklist-based and will not block most malicious users on the Internet.
    Better than nothing, if you don't advise of something else.
    Will do that test when I get home.

    "And the Heavens Shall Tremble"
    Resistance is futile™


    "ehn sewr traih-sluyrds-lairareh"

  15. #15
    Eat Meat Whale Meat
    Technical Staff Citizen Moderator Emeritus

    Join Date
    Jun 2006
    Posts
    15,812

    Default Re: Hackers

    Quote Originally Posted by Cyrus the Virus View Post
    Better than nothing, if you don't advise of something else.
    Will do that test when I get home.
    Blacklist-based apps have allow as the default condition, which you may modify to block specified users or applications. I currently use a collection of whitelist-based apps, set up to start with Windows, which block as the default condition until I tell them something is allowed. This includes my browser, Firefox, which has a number of such apps over and above the stuff I have as a standard safeguard.

  16. #16
    Cyrus the Virus's Avatar Vicarius Provinciae
    Join Date
    Mar 2006
    Location
    Crackfordshire
    Posts
    10,884

    Default Re: Hackers

    Quote Originally Posted by pannonian View Post
    Blacklist-based apps have allow as the default condition, which you may modify to block specified users or applications.
    I'm pretty sure I've modifed those

    I currently use a collection of whitelist-based apps, set up to start with Windows, which block as the default condition until I tell them something is allowed. This includes my browser, Firefox, which has a number of such apps over and above the stuff I have as a standard safeguard.
    You could give example of the whitlelist things.
    But does it only block applications?

    "And the Heavens Shall Tremble"
    Resistance is futile™


    "ehn sewr traih-sluyrds-lairareh"

  17. #17
    Freddie's Avatar The Voice of Reason
    Patrician

    Join Date
    Oct 2004
    Location
    UK
    Posts
    9,534

    Default Re: Hackers

    Meh, I'm using a router with a built in firewall and the crappy windows firewall as an extra layer of protection, and that site couldn't a way in despite which when I scan for adware and spyware I'm always finding junk that somehow found its way on to my computer.

    Personally I think it should be law for everyone who is using broadband should connect through a router and hardware firewall, it would cut down a lot of the crap on the world wide web.

  18. #18
    Custom User Title
    Citizen

    Join Date
    Sep 2006
    Posts
    3,009

    Default Re: Hackers

    2 hardware firewalls, 1 software firewall, I failed part of the test!
    Hooray for me and a total lack of network knowledge!

  19. #19

    Default Re: Hackers

    Quote Originally Posted by Ummagumma View Post
    2 hardware firewalls, 1 software firewall, I failed part of the test!
    Hooray for me and a total lack of network knowledge!
    I'm a total novice with networks as well, but it not good to have multiple firewalls running as they often conflict with each other?


    I passed all tests running just the default Vista firewall and Wireless G router.
    |
    {Desktop} CPU: E4300 @ 3.3 | MB: EVGA 680i A1 | RAM: 4GB Kinston HyperX 800 @ 733 {3-3-3-10-2T} | Case: Antec P180B | VC: EVGA 8800 GTX | PS: Coolmax Cug 700B | HS: Thermaltake V1 | NB: Thermaltake Spirit II | SB: Evercool EC-VC-RE | HD: 150GB Raptor : 500GB Seagate Barracuda
    | Monitor: 24" Dell LCD | Mouse: MX Revolution | VDroop Mod |
    -
    {Lanbox/HTPC] CPU: E6600 @ 3.0 | MB: GA-G33-DS2R | RAM: 2GB OCZ Gold 800 @ 1066| Case: Thermaltake VF6000BWS | VC: EVGA 8800 GTS 640MB | PS:
    Thermaltake W0128RU 650W | HS: Thermaltake Blue Orb II | HD: 2 x 750GB WD7500AAKS | Monitor: 30" Dell LCD |
    |

  20. #20
    Simetrical's Avatar Former Chief Technician
    Patrician

    Join Date
    Nov 2004
    Location
    θ = π/0.6293, φ = π/1.293, ρ = 6,360 km
    Posts
    20,154

    Default

    If you're on a NAT*― which many if not most people are these days, if you have multiple computers that connect to the Internet through a single modem*― you'll probably pass everything automatically. It makes no sense for NATs to respond to anything that isn't solicited, unless you've explicitly set up port forwarding: which computer do they send it to, after all?
    Last edited by Simetrical; February 21, 2008 at 10:49 AM.
    MediaWiki developer, TWC Chief Technician
    NetHack player (nao info)


    Risen from Prey

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •