English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

Someone is accessing my website using dos...they've pretty much let me know they're hacking my site, cause when you punch the isp he's using into a google search, it comes to a webpage that basically calls you a twit and brags of how many computers he's hacked. He's leaving UDP packets or something according to my logs...how can i stop this...how can i find out who owns the isp address.
Thanks

2006-10-05 12:02:23 · 5 answers · asked by Anonymous in Computers & Internet Security

5 answers

you can download spybot S&D that should take care of the booger

http://www.safer-networking.org/en/download/index.html

2006-10-05 12:13:40 · answer #1 · answered by Anonymous · 0 2

So he is making lots of request to your site right?
Yeah, well there isn't much you can do, apart from ban the IP address from accessing your website.

http://www.karakas-online.de/EN-Book/ban-ip-addresses.html

This is something that helps you ban IP addresses. It is in php. But if you are cleaver enough, you could right a script that he and only he (assume his IP address is static) gets, and this script could be a virus of some kind. I know I shouldn't say it here, but yeah that would be pretty cool, stops him from ever doing such activities in the the future (assuming he is a he).

But yeah, is he only just hitting your website then? Since if he did, he could write a script that hits it too quickly and kills the server (well not kill literately, just hamper it). Or is he deleting files of the website....

You cannot find out who owns the IP address I am afraid.

UDP packets are something like erm, yeah like connection packets, that goes to your webserver and see how best to route your web page to the user trying to access it. It then sends back items to the user on how to route data between the two computers. They are harmless, since he won't be able to write anything onto your server unless he knows your password. UDP packets are widely used for broadcasting messages and also for media content on the internet

2006-10-05 19:16:01 · answer #2 · answered by cktan86 2 · 0 1

Run a WHOIS on his IP adddress. Report the IP to your host and the Internet crimes assoc. As for the site, Download a backup by FTP and export any SQL databases

2006-10-05 19:14:35 · answer #3 · answered by Sean Brackeen 3 · 1 1

are you hosting your own website on one of your pcs? you could move it to a 3rd party host that is set up to prevent hacking for a couple months. the hacker will move on, then you can take it back. webhosting services are pretty cheap these days, and they deal with the headaches, like this!

2006-10-05 19:59:18 · answer #4 · answered by kbugiell 5 · 0 1

Antiviral. (free)

AVG free. Excellent protection available from: http://www.Grisoft.com

Don't use two antiviral products together as they may be incompatible. If your Antiviral trial has run out, then remove product from your computer and get the AVG installed.

Anti-spyware (all free)

O.K. Some quick links to get you out of trouble

Essential products are: Adaware SE from: http://www.lavasoft.com

Spybot SD http://www.safer-networking.org/en/spybotsd/index.html

Spywareblaster http://www.javacoolsoftware.com/spywareblaster.html

Windows Defender - http://www.microsoft.com/athome/security/spyware/software/default.mspx

Spycatcher
http://www.tenebril.com/consumer/spyware/spycatcher-express.php
Ewido http://www.ewido.com

PC starter kit at download.com 20 of the best recommended programes for people new or less advanced in computers. Check all three pages, at bottom see Security/Tools/Fun

http://www.download.com/PC-Starter-Kit/2001-12350_4-0.html?tag=dir
Now for some informed reading, courtsey of 2-spyware Research centre.
Anti-Spyware contains the list of all known legitimate anti-spyware programs that can effectively detect and remove spyware, adware threats and other kinds of computer parasites from the system. Listed programs have been carefully tested by the 2-spyware.com research center and successfully passed our strict tests. This means that all of them can quite precisely recognize a particular pest, completely disable it by terminating its processes, deleting its essential files, registry entries and other related objects and eventually clean the infected system ensuring that no unsolicited programs will stay and attempt to violate your privacy and harm your computer.

All the products in Anti-Spyware category really work, do not deceive the user by producing false positives and cannot damage a compromised computer while eliminating found malware. However, it is important to know that not all of them are recommended for daily use. Each spyware remover in the list comes with a review describing its positive sides, drawbacks and impression it left. Such review also includes program screenshots, information about its price, implemented features, performance and general effectiveness. We rate tested programs by giving marks from 1 to 100. The higher mark a spyware remover gets the more effective it is. Please carefully read each review, pay attention to the rating mark a program got and read comments published by other visitors. This will help you to make a wise choice and compare your current anti-spyware program with other modern solutions on the market.

If you cannot find a particular spyware remover in anti-spyware category, take a look on the category of corrupt tools. It contains the list of rogue, fake, illegal, even harmful applications that definitely cannot correctly detect and remove various security and privacy threats and therefore must be avoided.

Additionally we provide the list of recommended anti-spyware software that got the highest marks and therefore is the most effective. From the personal experience we can tell that one spyware remover is not enough, different programs find different parasites. You need to do a wise choice.
Anti-spyware tools:
Total Anti-Spyware products in our DB: 71
Recommended Anti-Spyware products:

Spyware Doctor

(91/100) - real time protection; deep file scan; optimal (low) system requirements; complete system scan; highly configurable
Spy Sweeper

(89/100) - real time protection; trial version available; deep file scan; complete system scan; highly configurable
Spybot Search and Destroy

(84/100) - quick performance; real time protection; free to use; highly configurable
Windows Defender Beta 2

(75/100) - real time protection; free to use; deep file scan; complete system scan



For more information from this site http://www.2-spyware.com/anti-spyware

2006-10-05 19:18:49 · answer #5 · answered by Mordak 5 · 0 1

fedest.com, questions and answers