Hacking- how to check?
By DoctorDidi
@DoctorDidi (7018)
India
January 2, 2012 11:12am CST
Hacking is very common now. I think it is on the increase as more and more people have started using the Internet and also as there is no international agency to punish such offenders involved in hacking. In most cases, the hacked person, if not cheated financially or if not his social honour is at stake or severely hampered, takes it for granted that if one uses the Internet, one should be mentally prepared to face such hacking. At best, he may report it to the local police station or if his email account is hacked, he opens a new email account or reports to the email account provider to send the new password which is being used by the hacker, to another email address of self that has already been registered with the email account provider. Thus, in most cases, the hacker gets Scot free. But if there is any international agency to look into such affairs, it could easily track down the computer used for the purpose by analyzing the IP address of the said computer. Cyber café owners must be instructed to allow users after verifying their identity proofs. They should carefully maintain records of details of identity proofs of all the users so that if there is any suspicion about the role of any such user, he or she may easily be identified and if found guilty, may be punished. This is my humble suggestion to prevent hacking which may or may not be appropriate or sufficient for the purpose to curb the growing tendency to hack but may be a step forward to save the Internet users from the ugly hands of the hackers. I also hope that if all the Internet users think deep into the matter and offer their own views, it would definitely be of immense help to the experts who are working hard on it because they may be provided with some new ideas which they were quite unaware of.
1 person likes this
1 response
@deadbeat (82)
• United States
2 Jan 12
There are programs out there that will help you know if you've been hacked or had an account hijacked, however I tried to use one once, and had to have help from someone who was more experienced in the technological field to understand what I was reading in the reports.
It is all to easy these days to include code that will log keystroke or add an add one to your computer without your knowledge, leaving you your system, and your information stored on your computer vulnerable.
The one program I used several years ago, I believe was called Hijack this.