Skip to main content

How to catch a hacker

Once a hacker does gain access to your computer, he will purposefully leave a little file or two, that will give him easy access in the future. These files are usually referred to as "trojans." This is one of the facts about hackers that is not very comforting. Even after you take precautions to prevent further attacks, unless you thoroughly clean off the hacker's little access files - he can still easily access your system. Another not so nice fact is that, unless you really learn (or already know) about computer systems, you probably will not either be able to detect, or stop the hacker. You can, however, get help. This is when you need to say, "I need an IP specialist, to catch a hacker".

Tracing The Hacker's IP Address
A number of software programs are available now - through the Internet, that will enable you to trace a hacker's IP address to a geographical address. Remember, though, that hackers often borrow other computers (usually unknown to the owner), and do their computer crimes hacking from there. So, before you take any action against someone you think it might be, it is better to let the proper authorities handle it.One free program that you might use in order to learn of the hacker's IP address is Netstat.

This Windows program will enable you to see exactly what the hacker does - tracing everything. It also shows you the status of all of your ports, and other statistics.

Catching Them Red-Handed

Basically once there is a hacker attack, you have two options. The first is to shut your system down, and give your computer to a lab to be able to collect the necessary evidence. Apart from the aforementioned programs, if you do much to the computer yourself - you could be destroying the very evidence you need to track a hacker. Of course, if you have not already backed up your data elsewhere, this option may not be available to you. Remember that a hacker can only be prosecuted using the evidence on other people's computers. A second course of action would be to act as if nothing had taken place, and move your sensitive data to another computer. By leaving it alone, and letting the hacker continue, more evidence can be collected against him until there is a solid case. Knowing this fact about how to catch a hacker is very important.

Besides needing an IP address, you must also learn the ISP from which the attack comes. Port 43 will give you data about the IP and the ISP. Software is available that can tell you these things, and you can also learn about it by going to a whois directory. Then, with this information, you can contact the Webmaster of the ISP, and hopefully, get it stopped.

Each of us needs to take some serious precautions about preventing our own computers from being broken into (as much as possible). With the software and firewalls that are currently available, perhaps you will never need to be one who cries out, "I need a specialist, to catch a hacker". After you get the necessary programs to make your computer safer, be sure to keep it updated, and prevent computer crimes hacking.

Comments

Popular posts from this blog

3D ANALYZER SETTINGS

Settings for Prince of Persia Sands of Time Works with this game, u can try wid others also which are not in above list Performance section: -force zBuffer Hardware limits: -emulate HW TnL caps -emulate Pixel shader caps ANTI-DETECT MODE section: -shaders Z-buffer section: -24 bit zbuffer(with stencil) DirectX DeviceID’s section: NVIDIA GeForce Ti4600 Configuration: VendorID : 4318 Device ID :592 Works well in the following or higher configuration -Intel 865GSA motherboard, -512 MB RAM, -Pentium D dual core 2.66 GHz processor, -No graphics card required…….. have fun.

Choosing the Best Motherboard

We will look at the various factors you should take into account when choosing your gaming motherboard, to ensure that you choose the best motherboard for your needs.If you think of the processor as the brain of a computer, then the motherboard could be described as the central nervous system, responsible for relaying information between all the internal components. In other words, it’s the hub of the computer, where all other components connect to. Since the motherboard is so crucial to your system, buying the best motherboard you can afford is a good investment. Select Your CPU First Before choosing your motherboard, you should have already chosen your CPU. If you haven’t already doneA motherboard will generally only support one type of processor, such as a Pentium 4 or Athlon 64. Different CPUs have connectors that vary physically from one another. So you can’t accidentally plug in the wrong processor into the wrong motherboard. Also, take note that many motherboards

Choosing the Best CPU for Your Gaming Computer

Picking the latest, fastest or most expensive processor on the market won’t always result in the right CPU for your particular system. Some processors are designed to work with certain motherboards, so the CPU you choose will limit the type of motherboard you can get. The CPU (Central Processing Unit) is one of the most important components in any computer system. The CPU could be described as the brains of a computer. It contains the logic circuitry that performs the instructions of the software you run. The performance of your games and other applications will be directly related to this tiny little microprocessor. The Major Players: Intel and AMD Two companies dominate the CPU market, Intel and AMD (Advanced Micro Devices). Both companies make a range of different processor models.  For example, Intel have the Core i7 and Core i5 processor models, while AMD have the Athlon and Phenom series.  The Best CPU for Gaming If you’re a basic computer user and you don’t