Skip to main content

Find out how hackers steal information from your computer?

Usually malicious programs transfer sensitive data from your computer to the hackers through the open ports of your system (an open port always results in security loopholes). Using a port scan and with the help of Process Explorer tool you can easily discover who is sending information from your computer.

To find out an open port, you will need to carry out a port scan. Open the Command Prompt from ‘Start | Run | cmd.exe’ and enter the command netstat -ano and hit ‘Enter’ (e.g. C:\Documents and Settings\Administrator>netstat –ano).This will list all currently active network connections.

To know if any port is open for data transferring, look the note under ‘State’. For example, see under ‘Foreign address’ (Remote address) column. If the value of the field is ‘0.0.0.0:0’ then no one can send data through these ports. If you find an IP address instead, you need to verify the program with the help of the displayed process ID (numbers shown under PID).

The best tool for finding this is Process Explorer from Microsoft (latest version 11.32). Download and run this program (you can use Windows own process explorer by entering Ctrl+Alt+Dele or Ctrl+Shift+Esc). Now verify the program by looking under PID. For example, if you find an open connection with the 764 PID, you need to find the same number in the Process Explorer.

To block any data transfer through the open port you need to block that port using your firewall. For example, if the IP address in an open port is 127.0.0.1:1026, you must block the 1026 port.

Comments

Post a Comment

Please leave your valuable comment below

Popular posts from this blog

Surf the Web Anonymously With Firefox Add-on Phproxy

There are several web based proxy servers available to surf the internet anonymously or as from another country. The Firefox add-on (Firefox 3 – 4) Phzilla helps you view a webpage or surf the internet using the PHProxy (a type of web based proxy server) proxy servers. It is very easy and convenient to use.

Restore Lost Capacity Of Your USB Flash Drive (How to)

Some malware can hide full capacity of your USB flash drive. For example, a 4GB pen drive sometimes shows only 500kb or less. An interesting part of this situation is that, even after removing the malware or formatting the USB flash drive, you will not get back its original capacity. Therefore, the question here is how to restore a USB flash drive to its full capacity.

Which is the safest browser- IE, Firefox, Chrome, Safari or Opera?

The safest way to surf the web is to pick the best browser, but how? The most important parameter while judging a browser is its security . Because of the ever growing threats via web browsers, browser developers have trying to give best security features to their browser. All major browsers have added security technologies to combat web-based threats, but, not all of them have taken the same approach, nor claim to stop the same breadth of attacks. NSS Labs , the leading independent security product testing and certification organization, has examined six major browsers- A pple Safari, Google Chrome, Internet Explorer 7, Internet Explorer 8, Mozilla Firefox, and Opera against socially engineered Malware and published a report called ‘ Web Browser Security - Socially Engineered Malware Protection ’. The report reveals that Internet Explorer 8 (RC1) is the safest one with a 69% catch rate against Malware. It was 30% in Mozilla Firefox (3.07), 24% in Apple Safari, 16% in Google Chro