Instruction

1

That your computer is hacked or trying to hack, can indicate a variety of signs, and their detailed description you can find on the Internet. Consider a few options in the case if you notice signs of penetration on your computer.

2

Open a command prompt, type the command "netstat –aon" (without the quotes). You will see a list of current connections. Suppose that you see an established connection on some port that does not use neither "legal" program. So, it is likely that your computer is the server part of backdoor Trojans that allows you to remotely control your computer.

3

On connection, it shows the line ESTABLISHED. In that case, if there is no connection and Trojan listening on a port waiting for a connection in the column "Status" will be LISTENING. When a connection is in the "External address" you will see the ip of the connected computer.

4

To receive information about this network address, use any of the appropriate network services. For example, this:

*http://www.all-nettools.com/toolbox/smart-whois.php*.5

Search for ip in the form field, click "Submit". If the received information indicates that the network address belongs to the address range (it is listed) such a provider, it is likely that you have managed to calculate the hacker.

6

But in most cases, in such a situation, you will be able to reach only to the proxy server at this break – the owners of the server are unlikely to give you information about who used their service. Although try to write a respectful letter stating the reason for the treatment.

7

Even if you managed to find the ip belonging to a specific person, it means nothing. It is possible that the user's computer is also compromised and is being used by a hacker as intermediates.

8

Possible situation in which the firewall reports that some present on your computer, the software tries to access the Internet. Chances are that your computer got a Trojan that collects sensitive data and sending them to a postal address.

9

In this case, you can try to explore the Trojan program to determine where exactly she sends her reports. For the study applies a set of tools: virtual machines, traffic analyzers, monitors, registry analyzers, PE files, and others. On the Internet you will find a detailed article on this topic.

10

One of the easiest ways to penetrate other people's computers is the use of the program Radmin. Many users, installing the program, forget to change the default password. A hacker scanning the network for open port 4899, finds similar computers and hacking into them with brute force.

11

If your computer was hacked through radmin, track the ip of the connected computer, then change the program password. Do not use old versions of this program, which is used to log on password only, they are the most vulnerable.

12

No matter how well was not protected your computer experienced hacker always has a chance to penetrate him. Therefore, never store in plaintext sensitive data, it is better to create an archive with these data and set a password. Do not use without firewall and antivirus. Using these simple rules, you will minimize the effects of infiltration on your computer.

# Advice 2: How to calculate the probability

In mathematical statistics the most basic and most important concept is considered to be

**the probability**of an event. The probability describes the degree of possibility of occurrence of an event. How to calculate**the probability**?Instruction

1

The probability of an event is the ratio of the number of all favorable outcomes to the number of all possible outcomes. A favorable outcome is the outcome, which invariably leads to the realization of the event. To understand this better, you need to disassemble a simple example with dice. The probability of rolling a three when throwing dice, is calculated as follows. Just when throwing dice, there are six possible events. They are defined by the number of its faces. But in this case there is only one favorable outcome - a loss of three. Then

**the probability**to throw all three in a single throw of the dice is equal to 1/6. It should be noted that the probability of any event is in the interval from zero to one.2

If the desired event can be easily decomposed into several events that are incompatible with each other, then

**the probability**of this desired event is equal to the sum of the probabilities of each of the incompatible events. In mathematical statistics, this statement is called the theorem of addition of probabilities. It can also be considered when throwing dice. Now you need to determine**the probability**of loss of the odd numbers. Such numbers on the three dice, namely 1, 3 and 5. The probability of each of them is 1/6. By theorem find**the probability**of loss of the odd numbers. It is equal to the sum of the probabilities of each of these events: 3/6 = 1/2.3

Sometimes, you need to determine

**the probability**of occurrence of two independent from each other events. Events Can be considered as independent if their probability of non-occurrence or occurrence does not depend from each other. In this case,**the probability of**find as the product of the probabilities of occurrence of both events. To understand it better, you need to try to find**the probability**of hair loss at the same time two sixes on two dice. These events are independent from each other. The probability that on the dice roll of a six is 1/6. So**the probability**of occurrence of two sixes is 1/36.# Advice 3: How hackers crack passwords

The majority of Internet users have had their phone stolen accounts – many hackers do this kind of in a really huge scale. However, few people know how the process of hacking.

Instruction

1

The most common option – brute force common passwords. To them, above all, is "12345", "qwerty" and even "password." By the way, by combining these words, you are unlikely to save account from hacking. The program is able to sort out their combinations and writing to another layout.

2

The second method is similar to the first, but the chance of breaking higher. In addition to the most common passwords hackers begin to touch all the words and variations. This method is called brute force (Brutus or reduced). This is a very long and expensive way. It is rarely used for mass hacking, brute force often focused on individual victims.

3

The use of rainbow tables. Under such a fancy name is hiding a huge database of computed hashes, which are used on most modern websites. The hash is a numeric value of the encrypted password. This method is significantly faster than the previous one, but also requires considerable time. The fact that to use hash, it must first find from a huge table with millions of items.

4

On many websites is protected from such hacks. They just add a few random characters to the password before encryption. But this problem tried to get around and have created a sophisticated rainbow table. It is worth noting that modern power with it allow to break the password up to 12 characters. However, it is only the state hackers.

5

The easiest way to get the password is to ask them from the user. This method is called phishing, or fishing. Creates a fake page looking exactly like the login page for the account. The user enters the username and password, then the system simply stores the data sets in the page, and changes data.

6

Many famous hackers use a method called "social engineering". The bottom line is that some office worker calling under the guise of information security and are asking for the password from the network. Surprisingly, this method works in 90% of cases.

7

Give the hackers a password on your account, simply by installing some free application. Together with him you will make the way computer virus, which will copy the input data and send them to the hacker. These can be applications that are fully recording the actions of the user and full programs which is able to block or even delete all the data.