![]() |
SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997 |
![]() |
#35 | |
Admiral
![]() Join Date: Jun 2010
Location: Canada
Posts: 2,272
Downloads: 58
Uploads: 0
|
![]() Quote:
it did when it first came out it made many old malware obsolete, because if someone clicked on it a popup would ask "do you want to give it administrator rights", and administrator rights shouldn't be required for a random piece of software but not much any more. Most virus writers know how to do their thing without needing administrator rights. link:http://nakedsecurity.sophos.com/2009...-8-10-viruses/ think about it this way the hacker would first penetrate your system using a remote buffer overflow http://en.wikipedia.org/wiki/Buffer_...w#Exploitation the hacker would then install a keylogger on your computer it would log every key you type, and send it to the hacker. both steps don't require UAC, and it would give the hacker your UAC password Anyways, my advice Are you behind a NAT? aka, go in command prompt, and type in: ipconfig find your IP address, if it is something like: 10.*.*.* or 172.*.*.* or 192.168.*.* you are safe from most remote exploits If not, get yourself a route Now you should check for viruses and malware Get your torrents and porn from reliable sources. Beware of browser attacks, only go to reliable sites. Get yourself a decent antivirus software if your still getting hacked, you will need more drastic measures. You might want to consider a network based firewall/ids its not cheap though, but if the hacker hacking you can tunnel through you NAT, its probably a reasonable choice Try a virtual machine or a separate computer for porn, torrents, and other internet uses. Encrypt your sensitive files, use a good encryption software(i recommend true crypt) The price of a network Firewall/IDS is quite expensive, so you might want ton consider a host based IDS like Snort |
|
![]() |
![]() |
|
|