Hacker attacks from the network to your computer
Nowadays, there has been an attack on the computer of people who are accessing the Internet. These hackers use some software to search (Scan) all computers online
Nowadays, there has been an attack on the computer of people who are accessing the Internet. These hackers use some software to search (Scan) all computers online. (Figure 1)
Figure 1 In the picture above is an example. In the first column, the names of the computers detected by Hacker are online. Notice the third column RS. If the computer has YES in this column, it is likely to be attacked. In case hackers want to attack them, just click on your computer's name and you will see the information in your computer and they can steal or delete it. The advantage of this form of attack is that hackers do not need to install a virus into your computer, at any time, they can search for some computers that are online to steal information and this happens. Quickly, you don't know that people are stealing information on your device. Prevention: To avoid being attacked by Hacker in this case, do not share any resources when you are online (Figure 2).
Figure 2 In case if you are forced to Share disk resources (For some companies) it is best to set the password when sharing resources.
Figure 1 In the picture above is an example. In the first column, the names of the computers detected by Hacker are online. Notice the third column RS. If the computer has YES in this column, it is likely to be attacked. In case hackers want to attack them, just click on your computer's name and you will see the information in your computer and they can steal or delete it. The advantage of this form of attack is that hackers do not need to install a virus into your computer, at any time, they can search for some computers that are online to steal information and this happens. Quickly, you don't know that people are stealing information on your device. Prevention: To avoid being attacked by Hacker in this case, do not share any resources when you are online (Figure 2).
Figure 2 In case if you are forced to Share disk resources (For some companies) it is best to set the password when sharing resources.You've just finished reading the article "Hacker attacks from the network to your computer" edited by the TipsMake team. You can save hacker-attacks-from-the-network-to-your-computer.pdf to your computer here to read later or print it out. We hope this article has provided you with many useful tech tips and tricks. You can search for similar articles on tips and guides. Thank you for reading and for following us regularly.
Read more
- Prepare the total force to respond to DDoS attacks in 2014
- Hackers use Raspberry PI computer to steal 500 MB of NASA important data
- Microsoft: There is a big hacker organization trying to sabotage the 2020 Olympics
- Hacker purged two-factor security just by automated phishing attacks
- How to Become a Hacker
- Check out the 10 most notorious 'hacker groups' in the world