Oh no! A hacker is in my system and they seem to be playing with my mouse/wallpaper/files/etc. what do i do neo!?
Simple.
First, the easiest thing to do is to switch your connection from input to output.
Yes, all you do is unplug your telephone wire/cable and place it in the opposite slot. ever wonder why you have two slots? I do too, but i found a good way to use them.
This will trap them inside your connection, now you have the power!
Things to prevent hackers *As most are very novice*, follow these simple rules.
Never Direct Connect with ANYONE you dont know well enough to trust. If you are on a messenger and connect to you, your IP address is as known as a bar fly's phone number. Also, never accept any filetype from anyone you dont know, A trojan can be placed within multiple things untraceble.
If either of these things happen by accident, delete that file and renew your connection. either Road Runner Medic, or Reconnect.
Some simple rules to bide by in order to survive the internet.
--Neo
ID:192689
May 26 2002, 11:36 am
|
|
NeoHaxor wrote:
Oh no! A hacker is in my system and they seem to be playing with my mouse/wallpaper/files/etc. what do i do neo!? Oh, you went to the ACME School of Intrusion Countermeasures, too! Here's some more more: if they try to escape, tie a knot in your cable. If you have an old computer that you don't use anymore, hook the cable up to this and then drop it out the window. The shock of impact will travel through the line and cause their computer to "crash." If someone is siphoning files off your hard drive, put your foot down on the phone line. As the data stream backs up, you will be able to see the line bulging, bigger and bigger. Once it gets almost to the point where it'll burst, let up, and all that compressed data will come streaming through their connection, splattering all over their screen! If you're feeling particularly vindictive, hold the end of the cable upright and dribble some flammable liquid down the line. Make sure that you live a higher altitude than your enemy, or this one won't work! Once you've given the liquid time to trickle back to the signal's point of origin, light a match. FWOOSH! Hope they have a "firewall"! If you're not sure who's hacking you, drill a hole in the bottom of an empty tin can and run the end of your phone cord through this. You can hold the open end of the can up to your ear and listen in on them. Be careful, though... if they know you're listening, they may try one of the above tricks to spray you with compressed data or burn your face. |
In response to Lesbian Assassin
|
|
ROFL! I loved that one. If Warner Bros. had ever made a cartoon where Wile E. Coyote was trying to hack into the Road Runner's computer, that's the kind of stuff that would happen. (Well, maybe it's more a Sylvester and Tweety bit.)
Lummox JR kill the wabbit |
Are you actually serious? Because if you're not joking, then you're too stupid to live.
There is no way to "trap them inside your connection". Unplugging a phone line will simply cut off the connection entirely; likewise, unplugging a network cable will do the same for cable users. Disconnecting isn't a bad idea.
This depends on the messenger program and how it works. This advice is also a little too paranoid, as most people are never going to bother abusing an IP address.
The important thing to know is that going some places (like some or most IRC chats, MUDs, etc.) will expose your IP. Connecting to a game in BYOND, or hosting one, will expose it also. So will Web browsing--your IP is exposed to every server you visit. If you send an e-mail, your IP address usually is included in the headers. It's good to just be aware of this, but normally you don't have to take special precautions.
It's important to learn which files can contain trojans and which can't. If you're using Windows, and you're using a mail program like Outlook, make sure Windows isn't set up to hide the extensions of certain file types. The double-extension exploit (where a file is named something.txt.vbs, and the .vbs part is hidden by Windows) is an old one and easily avoided.
It is, however, never impossible to detect a trojan before installing it, and once installed they're still detectable (although more difficult to spot).
As a rule, it's good to be cautious about things that people you know send you, too. A lot of worms count on abusing someone's address book to work, knowing that a lot of people will open anything they see from a familiar address.
Lummox JR