Have I Been Hacked?

Discussion in 'Windows Vista Security' started by TeeFran, Aug 29, 2008.

  1. TeeFran

    TeeFran Guest

    Hello all.
    A couple months ago I was having problems with Vista and software no
    operating correctly, so I restored Vista to it’s original factor
    settings and things have been fine. I re-activated my purchase
    softwares and what-not. About a month ago though, I logged off and th
    next day upon hitting the button to turn the PC on it came on like i
    does when it boots from sleep or hibernate, and my wireless interne
    account was active. I closed the connection and shut the system down
    The day after that I had to re-add my wireless internet connection as
    was not listed with the other names in the connection box. Normally m
    wireless connection is the first one at the top of the connection box
    Then a day or so after that my name was at the bottom or further dow
    than it normally is in the connection box and another name/connectio
    was at the top where my name normally is. I immediately added a standar
    user instead of having just me as the only administrator/authorize
    user, and I activated parental control for the standard user and gav
    the standard user only limited access to the PC. For the most part
    only get online now with the new standard user, and for the last tw
    weeks or so I have not noticed any anomalies. But today using my norma
    admin account I downloaded a file online and I attempted to convert i
    using a software I bought last year to convert files from one format t
    another and my System ID has been changed (like it was when I restore
    to factory settings). I had already contacted the company and got a ne
    activation code for my new System ID when I restored a few months back
    Now I need to contact the company once again for another activation cod
    for this software to go with another System ID.

    1) Does it sound like my PC was and/or has been hacked?
    2) When I was noticing all the strange things before could someone hav
    changed my System ID then an
    I’m just now noticing it
    3) Could someone still have a window into my System?
    4) Is there any other way your System ID can be changed beside
    restoring to factory settings?
    5) I only restored once so how can my System ID be different agai
    without a second restore?
    6) Could just adding a new standard user have changed my whole Syste
    7) Or could the software itself or another software be screwing with m

    And finally
    8) If I have been compromised, how can I make my regular admin accoun
    more secure, with or without using UAC (which I don’t like using)

    Please help
    TeeFran, Aug 29, 2008
    1. Advertisements

  2. TeeFran

    Kayman Guest

    Help: I Got Hacked. Now What Do I Do?

    Installing and reinstalling Windows.
    Reinstalling Windows Vista when you want to restore default Windows
    settings or when you are having trouble with Windows and need to reinstall
    it by performing a clean installation.

    How To Perform a Repair Installation For Vista.

    For Vista the most dependable defenses are:
    1. Do not work in elevated level; Day-to-day work should be performed
    while the User Account Control (UAC) is enabled.
    User Account Control Step-by-Step Guide.
    Understanding and Configuring User Account Control in Windows Vista.

    2. Familiarize yourself with "Services Hardening in Windows Vista".
    Services Hardening in Windows Vista
    Educational reading:
    10 Immutable Laws of Security

    3. Don't expose services to public networks.
    Windows Vista Service Configurations Introduction

    4. Keep your operating (OS) system (and all software on it)
    updated/patched. (Got SP1 yet?).
    Why Service Packs are Better Than Patches.

    5. Reconsider the usage of IE.
    Utilizing another browser application can add to the overall security of
    the OS.
    Alternative Browsers:
    The SeaMonkey® Suite (Internet Browser)
    5a.Secure (Harden) Internet Explorer.
    IE7 safe/secure settings
    Internet Explorer7 Desktop Security Guide
    Internet Explorer Enhanced Security Configuration changes the browsing
    The Internet Explorer 7 Security Status Bar
    Extended Validation SSL Certificates
    Note: Tight security settings will break down some websites. You need to
    add these websites into the Trusted Zone for smooth access.
    You could consider disabling all Security Settings in IE and use IE only
    for the 'Patch Tuesday' updates; To do so you must add the following URL's
    to the Trusted sites:

    6. Review your installed 3rd party software applications/utilities;
    Remove clutter, *including* 3rd party software personal firewall
    application (PFW) - the one which claims:
    "It can stop/control malicious outbound traffic".
    Remove clutter, dispose of all your 'Anti-Whatever' applications. Keep your
    pc lean, install only applications you are really need - try to be a
    Belarc Advisor can assist
    --As can--
    Revo Uninstaller

    7. Activate the build-in firewall and tack together its advanced
    configuration settings.
    Tap into the Vista firewall's advanced configuration features
    Configure Vista Firewall to support outbound packet filtering
    Vista Firewall Control (Free versions available)
    Managing the Windows Vista Firewall

    7a.If on high-speed Internet connection use a router.
    Implement countermeasures against DNSChanger.

    And (just in case) Wired Equivalent Privacy (WEP) has been
    superseded by Wi-Fi Protected Access (WPA).

    8. Utilize one (1) each 'real-time' anti-virus and anti-spy
    Avira AntiVir® Personal - FREE Antivirus
    (The free version won't scan your emails.)
    Why You Don't Need Your Anti-Virus Program to Scan Your E-Mail
    Ensure your e-mail program is configured to display e-mail messages in
    'Plain Text' only.
    You may wish to consider removing the 'AntiVir Nagscreen'

    Windows Defender - (build-in in Vista)

    9. Employ vital operating system monitoring utilities/applications.
    Process Explorer, AutoRuns, TCPView etc.

    10. Routinely practice Safe-Hex.

    Also, ensure you back-up regularly; Develop a Contingency Plan; Be
    prepared! Consider "What if..."

    Good luck :)
    Kayman, Aug 29, 2008
    1. Advertisements

  3. TeeFran

    TeeFran Guest

    I knew it! I Knew it

    Every since I've been a member of this forum, it's never taken anyon
    this long to post back to me, or either this post is in the wron


    I"m screwd maaaaaan!!!!

    OH my GOD!!
    OH my GOD!!
    OH my GOD!!
    TeeFran, Aug 30, 2008
  4. You're a raving, moronic child.

    Did you look at anything in the reply from "kayman"?
    Paul Montgomery, Aug 30, 2008
  5. TeeFran

    TeeFran Guest

    OK I've been doing some searching on the web and came across som
    websites and other tech support sites and at Microsofts site my pos
    from here has been forwarded to them so much thanks to whoever did that

    Some guy named Kayman posted some articles over there that I'
    currently reading and printing out, and I'll go from there

    Anyway, thanks

    (BTW, if these posts ARE in the wrong place on the forum, maybe one o
    the moderators can delete them or move them)
    TeeFran, Aug 30, 2008
  6. The forum software you are on did that. All the posts from "guests"
    come from the Microsoft site, not from the forum users.
    Shows one of the big problems with your forum: it SHOULD have that
    post, but it doesn't.

    Stick with the groups here if you MUST use a web-interface:

    Paul Montgomery, Aug 30, 2008
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.