Saturday, 30 April 2016

ARTICLE WRITTEN BY ONYIA EMEKA HARFORD TITLED: “WAR AGAINST HACKERS”


Hackers have done more harm than good in the society let’s join hand and fight against the terrible impostors. Prior to my previous article titled “The Threat of Hacker”, we started a discussion on how to detect these hackers in our system as well as report them to the appropriate authorities and their  ISP. I touched the area of System security Software against Malware, Spyware and Trojan as well as strong Anti-virus.


In this article we are going to look at the steps to end the operation of these Hackers in our computer system. Now, when hackers are after you, may be they have information that you are expecting money especially online transfer from outside the country. Their main focus is how to track that money and divert it. Now, what they do is to send you Spam mails that are promising and to include in the content are forms to fill: eliciting information like your username, password, Bank Account details etc.

This information they will later use against you and hack your computer. Sometime these information or Spam mails come with files that end with .exe as extension of the file.  When you encounter such mails in your system be careful to click it, because clicking on it alone gives the hackers access to your system with their plugs in, they can disorganize your system if you don’t have updated firewall, antivirus and System Security software. I recommended Black Ice Defender in my previous Article downloadable at http://www.networkice.com and antivirus like Norton and MacAfee. And I said earlier never shared your file without strong Password to protect it from Hackers.


Now having taken the above step and the stubborn Hackers persist penetrating your system. Now take this step:


(1)               Click on start menu
(2)               Move the mouse cursor to point at the command prompt and click
(3)              Entering the environment you will see something like this: C:\Users\user>
(4)              Then type in “NETSTAT –ANO” to appear as C:\Users\user>NETSTAT –ANO and hit Enter key
(5)             I t will display some Active connection to your  system
(6)            Then focus on PID which comprising 2,3 and 4 digits and state/status of the each IP Address
(7)       When the State of any IP Address is “Established”, especially when you are not online. Know that there is a potential hacker managing your with you. So before undergoing these steps make sure you are not connected online.
(8)               Now to eliminate the Hacker: Copy down the PID of the established IP addresses
(9)               Hold down “Ctrl +Shift+ Escape” keys at the same time
(10)          This will bring up the Window Task Master
(11)          Click on the processes
(12)          Then you will see the PID of those Hackers, but if the PID is not there, click on the view menu and select columns
(13)        Then select  the Process Identifier (PID)
(14)    Tally the numbers you copied with the PID, when you see any of the PID on the Window Task Master, Just right click on it with your mouse and click “End Process”. Then you have disengaged the potential hacker from your system.



ONYIA EMEKA HARFORD

No comments:

Post a Comment

POLITICAL TIPS

Castle

POLITICS