![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
#11 |
Harper
![]() Join Date: October 2, 2001
Location: Aberdeen, Scotland
Age: 43
Posts: 4,774
|
A software firewall is useful here - since it shows a warning whenever something tries to connect to the internet, it makes it pretty obvious if theres something malicious in your system. Although I have heard tell of trojans that can actualy send a mouseclick signal to the OS, fooling the firewall into thinking the trojan has been granted internet access when all the user saw was a flicker, if that.
__________________
[img]\"http://www.sighost.us/members/Zvijer/andrewas.gif\" alt=\" - \" /> |
![]() |
![]() |
#12 |
Manshoon
![]() Join Date: January 7, 2002
Location: boulder, co
Age: 46
Posts: 242
|
ahh, thanks for reminder Andrewas! www.zonelabs.com for software firewall solution.
__________________
Freedom is the distance between government and religion |
![]() |
![]() |
#13 | |
Emerald Dragon
![]() Join Date: September 25, 2001
Location: NY , NY
Age: 64
Posts: 960
|
Quote:
__________________
\"How much do I love you?? I\'ll tell you one thing, it\'d be a whole hell of a lot more if you stopped nagging me and made me a friggin sandwich.\" |
|
![]() |
![]() |
#14 |
Drizzt Do'Urden
![]() Join Date: June 11, 2001
Location: Wherever the road takes me.....
Age: 54
Posts: 609
|
Yeah, I was going to ask what OS is on her PC, and His. The remote access is a neat tool, that can potentially allow access to your friends pc. I also think that there is a feature on Yahoo that can record chats, for future viewing.
__________________
I am the Angel of Death You Can Not Hide |
![]() |
![]() |
#15 |
Lord Soth
![]() Join Date: March 5, 2001
Location: Southern California
Posts: 1,948
|
Have her go to http://www.dslreports.com. Under the tools option, they have a utility which will run a full port scan on your IP address and it will give you a general idea how vulnerable her pc is to attack.
I don't use Yahoo messenger, but if it's anything like AIM there are all sorts of ways to get peoples information by using hacks in the program itself. The "hacker" wouldn't even need to gain access to the vicitms computer to get their login info or whatever else they wanted.
__________________
\"The object of war is not to die for your country but to make the other bastard die for his.\"<br />-General George Patton (1885-1945)<br /> ![]() |
![]() |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|
|