Hackers have done more harm than good in the society let’s
join hand and fight against the terrible impostors. Prior to my previous
article titled “The Threat of Hacker”, we started a discussion on how to detect
these hackers in our system as well as report them to the appropriate
authorities and their ISP. I touched the
area of System security Software
against Malware, Spyware and Trojan as well as strong Anti-virus.
In this
article we are going to look at the steps to end the operation of these Hackers
in our computer system. Now, when hackers are after you, may be they have
information that you are expecting money especially online transfer from
outside the country. Their main focus is how to track that money and divert it.
Now, what they do is to send you Spam mails that are promising and to include
in the content are forms to fill: eliciting information like your username,
password, Bank Account details etc.
This
information they will later use against you and hack your computer. Sometime these
information or Spam mails come with files that end with .exe as extension of
the file. When you encounter such mails
in your system be careful to click it, because clicking on it alone gives the
hackers access to your system with their plugs in, they can disorganize your
system if you don’t have updated firewall, antivirus and System Security
software. I recommended Black Ice Defender in my previous Article downloadable
at http://www.networkice.com and
antivirus like Norton and MacAfee. And I said earlier never shared your file
without strong Password to protect it from Hackers.
Now having
taken the above step and the stubborn Hackers persist penetrating your system.
Now take this step:
(1)
Click
on start menu
(2)
Move
the mouse cursor to point at the command prompt and click
(3) Entering the environment you will see something
like this: C:\Users\user>
(4) Then
type in “NETSTAT –ANO” to appear as C:\Users\user>NETSTAT –ANO and hit Enter
key
(5) I
t will display some Active connection to your
system
(6) Then
focus on PID which comprising 2,3 and 4 digits and state/status of the each IP
Address
(7) When
the State of any IP Address is “Established”, especially when you are not
online. Know that there is a potential hacker managing your with you. So before
undergoing these steps make sure you are not connected online.
(8)
Now
to eliminate the Hacker: Copy down the PID of the established IP addresses
(9)
Hold
down “Ctrl +Shift+ Escape” keys at
the same time
(10)
This
will bring up the Window Task Master
(11)
Click
on the processes
(12)
Then
you will see the PID of those Hackers, but if the PID is not there, click on
the view menu and select columns
(13) Then
select the Process Identifier (PID)
(14) Tally the numbers you copied with the PID, when you see any of the PID on the Window Task
Master, Just right click on it with your mouse and click “End Process”. Then
you have disengaged the potential hacker from your system.
ONYIA EMEKA HARFORD