99.99% of the time, YOU are the one who lets them in. Downloading illegal files, such as cracks to games/software are a perfect example. They may work, but you'll never know if in the background a trojan or virus just planted itself.
Even if you're not downloading that crap, the same can happen in just about anything you interact with - email, web surfing, downloading free software at unknown sites, etc.
You should look into using a firewall such as Zonealarm Pro, which shows you outgoing activity. That's how you spot the trojans that are requesting internet access to call home (to the hacker). Also, you should use a good backup utility such as Acronis TrueImage to make complete backups of your system. So when that bad infection finally gets in, you can format your drive and restore to your last backup!
If you insist on taking risks at unknown sites or dowloading from unknown sources, do it on a PC you don't care about. Unpackage it there and run the programs as a test. If after a couple days you don't notice any drastic problems, then port it over to the PC where you want to use it.
2007-02-05 17:29:27
·
answer #1
·
answered by SirCharles 6
·
0⤊
0⤋
if your file and print sharing is on then your computer is an easy pray for hacking, turn it off to avoid the risk.
Moreover do not accept files from untrusted sources because these could be programs that can give hackers access to your computer. Install a good firewall to imporve the security of your system.
2007-02-05 17:28:00
·
answer #2
·
answered by ammar_shahjee 2
·
0⤊
0⤋
the hackers use a program that lets you make folders and stuff that lets them into another persons computer. every time someone gets on your computer you are allowing some sort of contact betwen your computer and thairs.
visiting a website, downloading, opaning pictures, chats.
I hope this explains things alittle bit.
~Scott~
2007-02-05 20:41:51
·
answer #3
·
answered by me! 1
·
0⤊
0⤋
By installing to your computer special programs like Trojans or dialers normally by email or when you visit "suspicious" pages. Then these programs take somehow the control of your computer and use it to send spam mails or to steal sensitive infos like your email addresses from Outlook or the numbers of your credit cards / bank accounts or even personal infos.
2007-02-05 17:23:22
·
answer #4
·
answered by Xalkida 2
·
0⤊
0⤋
the use a software that can be installed inside your cpu, if you try to install this software then your cpu will be in their hands already
2007-02-05 17:21:07
·
answer #5
·
answered by ahleks 2
·
1⤊
0⤋