To Stop A Hacker

NOT ALL PAGES ARE CONVERTED TO CELL PHONE FORMAT!

Home     Sitemap

www.diy-computer-repair.net logo

Proxy service or How Would You Stop a Virus From Sending Your Data to a Hacker?

Is a proxy service hard to use? Is it hard to setup? It will not work with online games that is for sure!

Although not commonly used it is also known as an "alternative" service...

Here is the concept:

The service accepts a request to forward a network connection. Depending on the 'rule' that the service has in it's data base it will either allow or deny the connection.

Note: Do not confuse this with the service NAT (Network Address Translation) that changes the receiving and sending address when using a cable or DSL router or modem.

The service is software, it has to be to write the rules.

It also works in conjunction with a firewall ( I will tell you that a software firewall is hackable, if the firewall gets hacked then this software will be attacked also - use a hardware solution for your firewall!) because you can set your firewall to reject WAN requests (see this article).

This article: Proxy Service goes deeper in to how the service works.

What would a rule look like? That depends on the program.

Here is a diagram of what the communication would be like by steps:

  • You need to check your email so you click on the Send/Receive button on your email program.
  • Email program sends a request query to the network card in your computer:
  • The network card  sends the request to the your Proxy Server, then your Server accepts the request and decides if the request goes, is searches it's data base and comes up with the allow/deny rule for your email, if the email request has the email host and port and is set for allow the request is sent on to your cable / DSL modem then to the host. At the same time the your server knows that you sent out a request so holds that port open for the return communication, you have new email or no new email and forwards it to your computer and then to your email program.

Scenario:

  • Suppose you were surfing the internet when you connect to a web site that is propagating a virus. The virus is downloaded to your computer and your trusty AV program doesn't catch it because it is a new virus that the program doesn't know about.
  • So while you are working away or playing a game your word processor or spread sheet program is quietly working in the back ground gathering all the data it can from your files. Then it sends it to your router to the originating computer of the virus.

Scary thought isn't it?

You need this in your IT Tool Box! Get yours today...

Troubleshoot, repair, maintain, upgrade & secure...

    With this!


But with this service / server the virus would attempt to send the data to the router but would fail.

Why?

Because a virus is not aware (yet) of Gateways and Proxy Servers. By having a separate computer between your computer or network with two dissimilar NIC's, one to the router and one to you internal network with the Proxy Server or service any unauthorized communication will not go out through your router.

But you say you have both services and have been hacked! How did that happen?

Easy: You invited the hacker in to your network/computer!

How did you do that?

When you were surfing the net you went to a web site that was a trojan or hacked web site, you asked for the web site to give you some information, it gave it to you and either a virus or a connection directly to a hacker who in turn used your request to get in to your network/computer.

The services did their job but you failed to do you due diligence in where you were surfing to, this is not a common occurrence but it does happen and there are people out there looking for the unwary.

Believe me it works, I have been using a one since 1992. (It annoyed the heck out of my kids too!)

Actually it is two words in the IT world: Proxy service or Server .



Emergency Repair
D
isk (ERD) - Will Yours Work?

Emergency
Repair Disk


Custom made for you...



You keyboard isn't thirsty, and it doesn't need calcium. Milk and other liquids will ruin a keyaboard!


This Web
Site is a
labor of Love
!
But Love
doesn't pay
the bills!

Please chip in $5 to keep it live...

Need A Checklist?

Need A Repair Manual?


    Page copy protected against web site content infringement by Copyscape
 

You can:


Return to
previous page:



 

 

 

 


Thank you for visiting my web site, and please come back again.

This website is not intended for children under the age of 18

Author of this web site: Monte Russell


FTC Endorsement Rules
All testimonials on the DIY Computer Repair web site are from customers who were not paid to comment on any products!


The Flag of The United States of America!   Proudly Made in The U. S. A.

Copyright and Registered to www.diy-computer-repair.net, all thieves will be prosecuted to the fullest extent of international law!www.diy-computer-repair.net

From the Desert South West ~ Arizona, U. S. A.
Copyright DIY-Computer-Repair.Com 2006-2016

 

"You found this web site through:"

Active Search Results


Return to top of Proxy service

For the Proxy service and how to set it up see the "How To..." section of the Self Computer Repair Unleashed 2nd Edition Manual





Home    About    Sitemap
Fix It Blog!

From the Desert South West ~ Arizona, USA
Copyright www.diy-computer-repair.net 2006-2015