How Hackers Gain Control of Your Computer

Understand how hackers can control your computer and learn simple tips and strategies to reduce the risk.

By Richard Rogers

Your PC has many 'ports' which are vulnerable to a hacker's attack. Ports communicate internally with your monitor or printer and externally with the internet. 'Port 25,' for example receives incoming email and 'Port 80' connects to the internet.

Your computer also has a unique 'IP number' from your Internet Service Provider. You need this to use the internet and it's also your computer's 'address'. The IP number looks like this - '106.185.21.243.'

The IP address rarely changes with a broadband or DSL connection. This makes your computer more vulnerable. Broadband users are also likely to be on-line longer, giving hackers more opportunity to attack. A 'dial up' connection is typically assigned a new IP address every time it 'logs on' but is still vulnerable to attack. Hackers also use 'port scanning' software to hunt for open ports on vulnerable computers and then send malicious programmes to a known IP address.

Hackers also gain control of computers by sending a 'Trojan virus' in an email attachment. They send messages with enticing headlines to thousands of users with an attachment they hope you'll open. When the attachment opens the virus loads onto your computer and allows the hacker to control your computer.

Hackers bundle Trojan viruses into free downloads, like screensavers, commonly installed on home user's machines. Illegal P2P networks also circulate large numbers of infected files.

Here are some steps you can take:

  1. Make sure you receive the latest Window's updates.


  2. Install a good firewall.


  3. Install a 'spyware' removal tool and keep it up to date. Scan at least once a week and after being on line for a long time.


  4. Install an anti-virus program and keep it up to date. Carry out virus scans at least once a week.


  5. Use a Spam Filter to stop dangerous email.

Further actions you can take:

  • Don't open suspicious emails, especially if they have attachments


  • Be careful downloading free software. Only download from reputable sites like CNet's 'download.com.'


  • Switch off your broadband connection if you are away from your computer for a long period of time. Switch your computer and broadband connection off at night. This is especially relevant for wireless network users.

Richard Rogers is an owner of a number of computer related sites.

Share this page with your friends

 

Share this page with your friends.