You don't have to have anything saved.
When a hacker has control of your computer, depending on what kind of control he/she has, they can do anything from very little to very severe.
Yes. They can get access to your banking info. ESPECIALLY if you type it in while you know they have control of your computer.
There is a hacking program (trojan) called a keylogger that can record every keystroke that you make and send it to the hacker. If the keystrokes you make look like credit card info, guess what, they've got you.
There are tons of different types of programs a hacker can use. They can take print screens of what you are doing, they can get into your personal information whether you have it saved or not...they can even take all control of your computer.
I've heard of situations where the hacker (at will) can open and control your programs...your hard drives...your disk drives...anything... I've even heard of them being able to make your hard drive spin so fast that it burns itself out. I'm sure if they can do that...they can probably overclock your CPU to the point of where it explodes.
Hackers can do just about anything they want if they have control of your computer.
My suggestion if you know you are being hacked:
First- disconnect your computer from the internet.
Second- either format your hard drive and start over from scratch...or attempt to remove all trojans and viruses.
Third- Ask your Internet service provider what you can do about changing your IP address or if they can protect the one you have in any way.
The hacker cannot do anything if you are not connected to the internet or a network where he can communicate with your computer.
2007-08-25 06:25:25
·
answer #1
·
answered by Neil C 2
·
1⤊
0⤋
Neil C. is correct. I want to add that when somebody else has control of your computer they also can and do turn it into a Zombie, or Bot. They then use your system to infect other systems such as everybody in your email contact list, mailing out viruses and trojans, etc.
Hackers use Zombies to run attacts which are called DOS, (Denial of Service), DDOS, (Distributed Denial of Service) and DRDOS, (Distributed Reflected Denial of Service) and take down others websites.
Denying service means that they flood a server with requrests to connect. These requests are then answered but the return IP address is fake, and hide the idenity of the attacker. Using infected controlled computers such as individuals like us empowers these hackers to do devious and malicious harm to innocent people. If they think they have been insulted, or don't like what other people are saying, or even just because they "can", they will deny servie to others.
Denying service like this stops legitimate requests for connection by people like you and I who are attempting to connect to a particular website. The attack knocks out the servers ability to take legitimate connection requests.
In addition to this is all the things Neil C. explained in his response and even more than that.
Yes, key loggers can take your password right out of the browser while you type. They can and do know every single keystroke you make. They know every single webpage you visit and every program and how you use them, on your system, and they can and do control and use those programs too. They can and do open up your contacts list and mail off other malicious malware to your friends, family, coworkers, and aquantances. This is why we are to be very careful when opening email and any attachments contained within it, as it can be comprimised by somebody who hacked an aquantances, friend, or family members computer.
This is very dangerous and hard to fix. There are websites out there which can help you rid your system of malware, but if it really has been taken over then you need to disconnect right now and take your system to a reputable repair shop. They can get inside your system and remove any such malware which is enabling another to use your system.
This is serious and very damaging to those infected. Sometimes it is left just as a Zombie, but many times people lose vast amounts of money and their identity.
I hope you are not affected in this manner, but if you even suspect you are then disconnect and take to your nearest reputable technician. Now.
Good luck and I hope you are not in this boat. Many people have been take over and don't suspect a thing. If you have reason to believe this has occurred to your system and you take action you are one of the lucky ones.
2007-08-25 13:50:19
·
answer #2
·
answered by Serenity 7
·
0⤊
0⤋