One Is Created,
The Other Is
The Creator..

NOT ALL PAGES ARE CONVERTED TO CELL PHONE FORMAT!

Home     Sitemap

www.diy-computer-repair.net logo

Viruses and hackers, which is worse?

Viruses are created by "hackers" or just plain thieves...

Feb, 2012 - I had a call over the week end from a friend. His computer not only was trashed it seems that someone had got a hold of his credit card information.

"To late to close the barn door, the horse has ran away."

Other than recovering some data from the corrupt drive the only thing left to do is reload the Operating System, get a router, then lock down the computer.

How did my friend get hit by a thief?

Considering the way the hard drive was wiped (it was a sloppy job) I would say he downloaded a virus.

After sending his credit card data and some other personal data off the hard drive, it then went to work deleting files named *.dll and *.doc.

How could this been prevented?

Yes! By using some tired and true techniques I have on the this web site.

Buy reputable programs for AV, anti  trojan, malware, and spyware. Do not use the freebies that come with a new computer and need to be activated. Panda and Symantec are easily hacked or forgotten when the 30 day trial runs out.

Keep your AV programs up to date.

Next put a router between you and your ISP (Cable/DSL/ADSL modem) and setup the firewall.

If you are a Windows user enable the Windows Firewall if you don't have a server with a software firewall between your computer(s) and the router. (If you are using a server for the firewall software you will also need a proxy server for the computers behind the firewall to gain access to the internet).

How does this help?

  • When you have the hardware firewall (built in the software of the router) it can not be hacked by someone physically out side of the building it is in, to change settings on the router you have to have direct contact from inside the firewall.
  • Where as a software firewall (such as the built in firewall of an OS) can changed by gaining access to the computer through the internet either by guessing a user ID and password or by a virus.
  • With the hardware firewall the hacker can not gain access to the computers behind the firewall of the hardware. If the hacker is using one to gain access to the computer behind a server software firewall with a proxy it will be stopped from calling home and delivering all the data it has stolen.

Why does the proxy server stop it from calling home?

  • Most viruses are not written to recognize that the computer browser and other programs on the computer are using a proxy address to get to the internet. The reason is it take to much time and makes the program lager, this makes it easier to detect. So the people (thieves) that write them to only go after computers that don't use a proxy server.
  • Not everyone can/will setup a server and then install the proxy/firewall software because it can get expensive not only in the software but the hardware for the server, and it does get complicated the more protection you setup to defend your computer network.

You need this in your IT Tool Box! Get yours today...

Troubleshoot, repair, maintain, upgrade & secure...

    With this!


My advice:

The same I gave my friend that found out the hard way:

  1. Install a reputable AV programs.
  2. Use the built in firewall of the Operating System.
  3. Put a router between your computer(s) and the internet.
  4. Setup the firewall on the router.

Remember: It is your data and if you want to keep it yours, you have to protect it!

Fifty dollars and a half hour of his time would have saved my friend a lot of money and the time it will take to get his ID cleaned up. This is a Big Fail for my friend.

Too bad...  :(

P.S.

All this information and the steps to implement a secure network for your data are in the Self Computer Repair Unleashed! 2nd Edition Manual

Viruses and hackers are bad news when it comes to your data and ID!



Emergency Repair
D
isk (ERD) - Will Yours Work?

Emergency
Repair Disk


Custom made for you...



You keyboard isn't thirsty, and it doesn't need calcium. Milk and other liquids will ruin a keyaboard!


This Web
Site is a
labor of Love
!
But Love
doesn't pay
the bills!

Please chip in $5 to keep it live...

Need A Checklist?

Need A Repair Manual?


    Page copy protected against web site content infringement by Copyscape
 

You can:


Return to
previous page:



 

 

 

 


Thank you for visiting my web site, and please come back again.

This website is not intended for children under the age of 18

Author of this web site: Monte Russell


FTC Endorsement Rules
All testimonials on the DIY Computer Repair web site are from customers who were not paid to comment on any products!


The Flag of The United States of America!   Proudly Made in The U. S. A.

Copyright and Registered to www.diy-computer-repair.net, all thieves will be prosecuted to the fullest extent of international law!www.diy-computer-repair.net

From the Desert South West ~ Arizona, U. S. A.
Copyright DIY-Computer-Repair.Com 2006-2016

 

"You found this web site through:"

Active Search Results


Return to top of Viruses

Viruses and hackers = ID Theft





Home    About    Sitemap
Fix It Blog!

From the Desert South West ~ Arizona, USA
Copyright www.diy-computer-repair.net 2006-2015