How is it possible... - Page 3
Page 3 of 3 FirstFirst 123
Results 21 to 24 of 24

Thread: How is it possible...

  1. #21
    Member
    Join Date
    Jun 2003
    Posts
    57
    Originally posted here by rednekluvmonkey
    I have about 50 processes running. I cannot tell which should or shouldn't be running. any suggestions?
    Go to Black Viper's service config page and red through it. Very useful for any windows user.

    Corn

  2. #22
    Junior Member
    Join Date
    May 2003
    Posts
    10
    I have about 50 processes running. I cannot tell which should or shouldn't be running. any suggestions?
    Also, if you have xxxx.exe process running then do a google on xxxx.exe and you'll find a more detailed explanation somewhere on the net.
    One note is that you'll find maybe 3 or 4 instances of svchost.exe, not really 100% sure why, but most of them are needed for an associated app/prog/process.
    Also, its not uncommon to have 20 or so processes during normal running.

    And I also thought that if a_person was on dial-up that his IP address would always be different on connecting, thus more difficult to get hacked etc, so there must be a trojan if the he/she haXor can connect to a_persons box.

    And I would also try another AV, nod32 comes to mind.

  3. #23
    But the answer to my original question... is it possible to find out what people are doing on there computers without having some sort of trojan or sniffer or something like that installed installed on it. It doens't seem possilbe to me.

  4. #24
    Junior Member
    Join Date
    Sep 2003
    Posts
    27
    Going a bit to the extreme, someone can find the current tcp/ip session that you have with the AOL server, actively hijack it, emulate you still sending/receiving messages, and go from there.

    There are always extraneous cases, just becuase you have no 'software' installed on your computer from somone else doesn't make you secure. As previosuly mentioned a legitimate application such as remote desktop could be used against you.

    As a short answer, yes, it is very possible for someone to do anything to your computer without first putting software on it.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •