Question:
Can people hack into my computer if my IP address is on Warez?
Desarae A
2008-09-26 11:25:17 UTC
This guy on myspace is crazy and my friend is trying to calm him down but he said he put my name on Warez? What the hell is that... What are my chances of getting hacked into.... I have Avast virus protection and Zonealarm firwall.... below i'll have what he wrote me....
Six answers:
teepeetop
2008-09-26 11:39:31 UTC
haha, I love his statement - "I'd hack it myself if i had the time/ But there are thousands of eager hackers out there just wating to **** with people/ I gotta let them have their fun too". Obviously meaning he doesn't know how to hack.



The others were correct in stating that this is just a lot of BS from someone trying to sound like he is more than just a dumbass. I would not worry about it.



It is possible to get to your computer if your internet IP address is actually on your PC, meaning you are not connected to a DSL/Cable modem (that isn't bridged) or a router. If you are connected to a modem or router, then they will not be able to get past that device without you installing software on your PC.
jcurrieii
2008-09-26 12:09:40 UTC
Simple...contact you local Law Enforcement and ask if they have anyone who can help (and describe the problem).



Incidentally...YES he CAN be busted...what he did (if placed in a location he *knows* is frequented by hackers, and he apparently is fully aware of that), is called something like aiding and abeting or some such. It can net him almost as much time as the person committing the crime.



As for obtaining your IP address, no that is not illegal, since your computer appends it to every single out-going transmission.



Oh, additionally, in that one "letter", he committed multiple threats, any one of which could see him charged criminally, and the charges could range from Uttering Threats to Uttering Terroristic Threats (and you, only if the prosecutor was exceptionally talented).



In any case, if he's telling the truth, simply being *charged* with a criminal act would be the end of his job. The sort of company he's talking about can not afford to have employees with records, or even pending charges.



To prevent this sort of thing...honestly, a firewall is essentially useless it just slows a real hacker down by a few seconds...make sure that you are not logged in with an Administrator Level account. Create an account specifically for surfing and other on-line activities (if you need to install something, you can log-out, log into the admin account, and do your download, then log-out and log into the non-admin account). Further, when not using it, turn your computer AND internet connection down.



One bright spot...if you're on a dial-up account, your IP address will likely be dynamically re-issued next time you log-on, so it will be just that much harder for you to be hacked.



On a final note...if this is something that genuinely is going to worry you, pick-up a toss-away computer with a locked BIOS and use it to surf.



Any way...Good Luck!



EDIT: Dump the Avast it's second rate if paid for, and useless if free.
Steve K
2008-09-26 11:50:22 UTC
Well, 2 Noob like answers...



First: Hacker ethics isn't going to side with him because he's a retard...



Second: Why use Avast Virus Protection with Zone Alarm... ZoneAlarm has antivurs... ditch that bullshit.



Third: The description he is giving is of a Denial Of Service Application called CPU Hog. Here's a crazy list of Denial Of Service applications out there.



See Second "Cite"

Ping of Death is an attack that can cause a system to lock up by sending multiple IP packets, which will be too large for the receiving system when reassembled. Ping of Death can cause a DoS to clients trying to access the server that has been a victim of the attack.



SSPing is a program that sends several large fragmented, Internet Control Message Protocol (ICMP) data packets to a target system. This will cause the computer receiving the data packets to freeze when it tries to reassemble the fragments.



A LAND attack sends a packet to a system where the source IP is set to match the target system’s IP address. As a result, the system attempts to reply to itself, causing the system to create a loop which will tie up system resources and eventually may crash the OS.



CPU Hog is a DoS attack tool that uses up the CPU resources on a target system, making it unavailable to the user.



WinNuke is a program that looks for a target system with port 139 open, and sends junk IP traffic to the system on that port. This attack is also known as an Out of Bounds (OOB) attack and causes the IP stack to become overloaded, and eventually the system crashes.



Jolt2 is DoS tool that sends a large number of fragmented IP packets to a Windows target. This ties up system resources and eventually will lock up the system; Jolt2 isn’t Windows specific as many Cisco routers and other gateways may be vulnerable to the Jolt2 attack.



Bubonic is a DoS tool which works by sending TCP packets with random settings, in order to increase the load of the target machine so it eventually crashes.



Targa is a program that can be used to run eight different DoS attacks. The attacker has the option to either launch individual attacks or try all of the attacks until one is successful.



RPC Locator is a service that, if unpatched, has a vulnerability to bugger overflows. The RPC Locator service in Windows allows distributed applications to run on the network. It is susceptible to DoS attacks, and many of the tools that perform DoS attacks exploit this vulnerability.



DOS Detection Tools

DoS Scanning Tools

Find_ddos is a tool that scans a local system that likely contains a DDoS program. It can detect several known DoS attack tools.



SARA gathers information about remote hosts and networks by examining network services. This includes information about the network information services as well as potential security flaws such as incorrectly set up or configured network services, well-known bugs in the system or network utilities system software vulnerabilities listed in the Common Vulnerabilities and Exposures (CVE) database, and weak policy decisions.



RID is a free scanning tool that detects the presence of Trinoo, TFN, or Stacheldraht clients.



Zombie Zapper instructs zombie routines to go to sleep, thus stopping their attack. You can use the same commands an attacker would use to stop the attack.







FOURTH: He's a f***ing tool, no Government worker would be wasting time on Myspace like a loser... He's a moron.



If your PC has an Intel Processor you would survive a CPU Hog attack. It does get kind of hot but Intel Processors detect thermal events and shutdown before over-heating. Press Windows Key and Pause/Break at the top right of your keyboard together and it should tell you your processor type.
hammerhead300
2008-09-26 11:32:29 UTC
If your IP address is public, you could very easily be hacked. I wouldn't worry though, the guy on MySpace is an idiot, and he has no clue what he's talking about. He's just trying to scare you.



For the sake of proof, his claim about overclocking is extremely ridiculous. If the processor's overclocked to a point that it can't handle, it won't run. The fans won't run any differently, and they sure as hell won't melt. So you have nothing to worry about, because this guy's bluffing.
David K
2008-09-27 01:30:35 UTC
don't worry.. it's really hard to get hacked ( or to hack).



so just relax and IP adress is hard to get in.



http://hackhowto.blogspot.com



good luck =)
ChrisS
2008-09-26 11:30:54 UTC
hes full of poopy :D



im so confident hes full of doodoo, heres my ip address



70.66.30.40


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...