English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

hi i would be gratefull for any help i would like to no if anyone no's if you can trace someone who has hacked into your computer. If so how do you find out on your computer about the person who has done this. I had some real good advice with my last question i asked. I am hoping one of you nice people could help me and give me some good advice like my last advice. I will thank you in advance for any sort of help and advice you can give me.

2007-03-21 22:55:35 · 4 answers · asked by clive30977 1 in Computers & Internet Internet

4 answers

Computer forensics after a break in is much harder to do than what you asked in your previous question. Stopping an intruder is a matter of installing and configuring the right software. To track a cracker (the correct term is crack, NOT hack) you have to be able to interpret system logs and know that most likely the intruder has cracked your system from another cracked system. Add to this that there are dozens of different ways to crack a computer (especially a home users computer), unless someone who knows what to look for has full access to your computer (and network) then there is really no way to tell you what to look for with any certainty.
Sorry.

2007-03-21 23:08:39 · answer #1 · answered by John K 4 · 0 0

Just install a keylogger on your system like XPCSPY protect it with a strong password.

So when someone logs in and users your system. You would know what exactly he has done and types.

Install a packet capture software like Iris Network Traffic analyser and keep it running so when ever someone connects to your PC his IP address would be recorded.

Cheers. If you still need some clarifications please get back to me.

2007-03-22 06:06:30 · answer #2 · answered by Sunil Saripalli 5 · 0 0

Trend Micro Pc Cillin 2007 will trace all attacks on your computer. It records the type of attack and their IP address.
Their IP address may not be really theirs because they step from one computer to another to cover their tracks.

http://www.trendmicro.com/en/products/desktop/tav/evaluate/overview.htm

2007-03-22 06:25:26 · answer #3 · answered by Christian Soldier 7 · 0 0

you should have a software that when it realises that system is being hacked it will note down the details of what is trying to hack in.

http://www.infohq.com/Computer/Spam/finding-hackers-isp.htm

have a read through should help...

2007-03-22 06:04:41 · answer #4 · answered by Vinz 3 · 0 1

fedest.com, questions and answers