Amazines Free Article Archive
www.amazines.com - Thursday, April 18, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133573)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73855)
 Automotive (145712)
 Blogs (75614)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330636)
 Business News (426446)
 Business Opportunities (366518)
 Camping (10973)
 Career (72795)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241951)
 Construction (38962)
 Consumer (49953)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20319)
 Dating (45908)
 EBooks (19703)
 E-Commerce (48258)
 Education (185520)
 Electronics (83524)
 Email (6438)
 Entertainment (159854)
 Environment (28970)
 Ezine (3040)
 Ezine Publishing (5453)
 Ezine Sites (1551)
 Family & Parenting (111007)
 Fashion & Cosmetics (196605)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310615)
 Fitness (106469)
 Food & Beverages (63045)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630137)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91657)
 Home Improvement (251210)
 Home Repair (46243)
 Humor (4723)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191029)
 Internet Marketing (146687)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80506)
 Link Popularity (4596)
 Manufacturing (20914)
 Marketing (99316)
 MLM (14140)
 Motivation (18233)
 Music (27000)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12689)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126700)
 Recreation & Leisure (95495)
 Relationships (87674)
 Research (16182)
 Sales (80350)
 Science & Technology (110290)
 Search Engines (23514)
 Self Improvement (153300)
 Seniors (6220)
 Sexuality (36010)
 Small Business (49311)
 Software (83033)
 Spiritual (23516)
 Sports (116155)
 Tax (7663)
 Telecommuting (34070)
 Travel & Tourism (308304)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11790)
 Website Design (56919)
 Website Promotion (36663)
 World News (1000+)
 Writing (35844)
Author Spotlight
TAL BARNEA

Tal is an electrical engineer with over 25 years of expertise with hardware, software, mechanical an...more
MANMOHAN SINGH

Digital marketing professional with 8 years of experience. A good listner, Stratgist and fun loving ...more
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more
TUSHAR BHATIA

Tushar Bhatia is the Founder President of EmpXtrack Inc with over 19 years of experience in the soft...more
BRENDA PANIN

Passionate blogger and a great animal lover. ...more


I've Been Hacked! What Do I Do Now? by Steve Burgess





I've Been Hacked! What Do I Do Now? by
Article Posted: 09/10/2013
Article Views: 366
Articles Written: 43
Word Count: 1301
Article Votes: 0
AddThis Social Bookmark Button

I've Been Hacked! What Do I Do Now?


 
Computers,Law
We get this question several times a week, so it’s not just you. And no, it doesn't mean you're crazy – even if your friends think so, and even if law enforcement won't take your case. People’s computers and phones get hacked, every day.

Why won't the police do anything about it – isn't it a crime?

In general law enforcement will take on a case that involves endangerment of children, loss of more than about $500 in property (this changes from jurisdiction to jurisdiction and can include intellectual property), a believable threat to Homeland Security, or a clear threat to the safety of your person - like a death threat, for instance.

They may take on cyberstalking if it is part of violation of parole or a court order. Otherwise, they’ll be needing you to furnish more evidence, such as that provided by a private investigator or computer forensic expert, before they’ll take on a case. The police are just too busy with a limited budget.

Before you decide what you need to do about it though, you need to decide what you want to do about it: Do you just want it to stop, or do you want to catch the person who’s doing it? Or both?

It’s not really possible to be online and be 100% protected from hacking, but there are numerous measures you can take to make it not worth most anyone’s time. They include:

DO use effective passwords. A good guide is at the Perfect Passwords page at Gibson Research Corporation’s website.

DO secure your router – especially your wireless router. The manufacturer or your Internet Service Provider can help you with the best settings for your particular equipment.

DO keep your operating system and antivirus patches updated.

DON'T give out your Social Security number or use it as an ID. You usually only have to give it to your employer, your financial institution and government agencies.

DO disable your Guest account on your computer.

DON'T make your personal info public on social networks or elsewhere.

DON'T open email from people you don’t know.

DON'T click on links embedded in emails. DON'T make online purchases from sites you don’t know well.

DO use a firewall (hardware and/or software).

DO make sure that your Android is NOT rooted and that your iPhone is NOT jailbroken.

DON'T give any of your passwords to others.

DON'T use the same password for everything.

DO make sure that Administrator access on your computer is protected and accessible only to you (use a password).

DO disable Guest access on your computer.

DO disable remote logins.

DO require a password to log onto your computer, phone or email.

DO check to see what ports on your computer are wide open do ne'er-do-wells at Gibson Reserach's ShieldsUp! site

If you’ve already been compromised, you can sometimes roll back your system via System Restore to a time before the compromise – if you know when that was. You may just want to back up your important documents, format your hard disk, reinstall your operating system and get a clean start.

On an iPhone or a BlackBerry, a factory restore will wipe out any old virus, keylogger, or other malware you might have picked up – along with everything else that you put there on purpose. Doing the same for an Android should wipe out any malware as well. Although some Android data may be recoverable by an expert after a factory reset, there should be no active malware.

But, have I been hacked?

Frankly, it’s not always easy to tell.

Most apparent phone, email or computer hacking is really the result of nontechnical “human hacking.” We make so much information public, it can become possible for a perpetrator to guess logins and passwords, or fool an email service into sending a password reset link for an account that is not theirs. One well-publicized recent example is Matt Honan of Wired Magazine, who famously wrote, “In the space of one hour, my entire digital life was destroyed.” But nobody used any special technical skills. They just looked up information, made some clever guesses, and had a lot of chutzpah. Fortunately, most of us are not such attractive targets as a Wired journalist.

The book, “Social Engineering: the Art of Human Hacking,” by Christopher Hadnagy, talks a lot about such methods, and how to protect oneself against them.

What are some signs that could indicate that you have been hacked?

New programs have been installed on your computer – ones you didn’t install (although some software – especially free software – sneaks various programs and “helpful” browser toolbars past you).

New documents (that you have not written or downloaded) appear on your computer.

Documents disappear from your computer (although it’s not hard to accidentally delete or move files around without noticing).

Programs pop open that you didn’t click on (although there are other, innocent reasons this could happen).

You get odd pop-up messages that don’t seem to come from a program you are using.

Your passwords have changed (and not because you just forgot them, as I sometimes do).

Your security program(s) has been uninstalled or deactivated.

The computer is doing things by itself – the mouse moves and clicks on things without any action by you, for instance.

You find information about yourself on the Web that should only be known to you.

There’s a note displayed on your desktop – your screen – that you didn’t put there.

What should I do if I see some of these?

Document everything you see, with dates and times, and take screen shots right away. For screen shots, it’s easiest to use your cell phone camera if it’s handy, but it can be done right on the computer. In Windows, push the PrtScrn key (to put an image of the whole screen into your clipboard), then open a new document (such as in Paint) and press Ctrl-V (to paste the image into the document), then save it with a meaningful name, like “Screenshot at 1:27PM on Jan 1, 2012.” On a Mac, simultaneously press the Command (cloverleaf) key, the Shift key, and the number 3. The screen is saved to your desktop with a date and time as the name.

You can report it to the Internet Crime Complaint Center, aka IC3, and if it is what the government would consider a dramatic incident, some action may be taken.

If it involves child abuse, including abusive photographs of children, you can report it to the National Center for Missing and Exploited Children (NCMEC).

What are some of the things that forensics people do for clues to try to catch the perp, or generate enough evidence so that the police will take it and run with it?

Freeze the evidence in time with a forensic image.

Search the device for keyloggers, rootkits, Trojans, remote control access, bash history.

Search out meaningful IP addresses tucked away on the hard disk.

Search out meaningful email addresses.

Check Administrative and Guest User accounts for vulnerabilities.

Find (and recover) deleted files that may be relevant.

Inspect Volume Shadow Copies and System Restore Points for relevant evidence.

Search the entire device (used and deleted/unallocated space) for text that may have been noticed or may be relevant.

Help to identify found IP addresses.

Hacks can happen to anyone, but it’s usually not personal. Still, if you’ve been hacked, forensics experts can help you identify intrusions, but unless you need to catch the person, it’s easier and cheaper to wipe your device and start over.

Related Articles - Hacking, cyberstalking, cyberethics, coputer forensics,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
SHALINI MITTAL

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
JAMES KENNY

James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license