Hackers

  • Thread starter Thread starter Megan Fox_
  • Start date Start date
M

Megan Fox_

Guest
I am new to this but i saw a lot of people dealing with hackers. Here's how to deal with it, but first ask these questions to yourself:

1. What did they hack? (Email, Social Media, Etc.)

2. Did they try to steal money off of you? (If so this is a much more serious problem then tech support and if you have PROOF than i would suggest contacting the FBI.)

Here are some tips:


1. A Nigeran prince just helped you smuggle millions out of his country. You'll get half of it, what could be easier? Other scams can say you won a job offer or a contest which you never entered in the first place. The catch is you'll have to give them your bank info or pay a fee. BE SMART AND USE COMMON SENSE! Think of this saying: "If it looks too good to be true..."


2. I'm sure you have a Wi-Fi network at home. Is it encrypted? If you don't know the answer, then it's probably, "no." That means hackers, and neighbors, can connect to your network from outside. They can see and record everything you do. They can surf to bad websites and download illegal files on your connection. You might be getting a visit from the police. You need to take a few minutes and secure your network. Trust me; it's worth it. The instructions will be in your Wi-Fi router's manual. (This happened to my EX one time and a hacker was trying to use his credit card and pay for drugs. He was getting new network so he had to have a temporary open one. And people were logging in and using it and hacking to find his credit card number. He was able to get the FBI and they found out who did it and I never saw that hacker again.) That's why I use my best friend's old email that she doesn't use for websites cause people would bother me too much and ask for a photo with me and stuff.


3. Security software is good, but it isn't always enough. Programs on your computer might have weaknesses that hackers can use to bypass security software.

To take advantage of these weaknesses, hackers set up websites embedded with viruses. You might get there by clicking a malicious link in a phishing e-mail or on social media. You can even find these sites in a search for popular programs or topics.
It isn't just malicious sites, though. Hackers can sneak malicious code on to legitimate websites. The code scans your computers for security holes. If it finds one, a virus can download and install without you doing anything.
To stay safe, you have to keep your programs up-to-date. Every month, Microsoft releases updates for Windows and Internet Explorer. These updates close critical security holes that hackers exploit.
Other critical programs to patch are Adobe's Flash and Reader, and Oracle's Java. Using old versions of these programs is like sending hackers an engraved invitation.

You should also be using the latest version of your programs. Anyone using Internet Explorer 6, 7 or 8 needs to update or switch browsers immediately.


4. In Hollywood movies, hackers are masters of guessing account passwords. In the real world, however, very few hackers bother. Instead, they go around passwords. They might get your password from a data breach at a company or website you use.
It's important that you use a different password for every account. That way, if a hacker discovers one, they can't get in to every account.
Perhaps the hacker slipped a virus on to your system. It records your passwords and sends them to the hacker; no guessing needed. As I mentioned above, you can stop viruses with up-to-date security software and programs.
A hacker might tackle your account's security question. Most security questions can be answered with information people post publicly.
You should change how you answer security questions. Give a random answer that has nothing to do with the question. That way, no one can guess it.
5. Many hackers want to slip a virus on your computer. Once installed, a virus can record everything you type and send it back to the hacker. It can send out spam e-mail or attack other computers.
To do this, the hackers disguise the virus as something harmless. This is called a Trojan horse, or just Trojan. One of the most popular ways to deliver a Trojan is a variation of the phishing e-mail scams. For example, the e-mail might say it's from a shipping service, bank or other reputable company. There's been a problem with a transaction! To learn more, you have to open an e-mail attachment.
The attachment might look like a normal file, but it really contains a Trojan. Clicking on the file installs it before you can do anything.
Similar scams appear on Facebook and Twitter. You think you're going to watch a funny video your friend posted. Instead, a popup tells you to update your video player. The "update" file it provides is really a Trojan.
The key to defeat this tactic, as with phishing e-mails, is common sense. However, up-to-date security software is essential as well. It should detect and stop most Trojans before they can install.
































Continue reading...
 
Back
Top