wazua Fri, Apr 24, 2026
Welcome Guest Search | Active Topics | Log In

3 Pages<123>
Network Security - Internet experts please help
Mjasirii
#11 Posted : Monday, November 12, 2012 5:07:07 PM
Rank: Member

Joined: 11/8/2012
Posts: 257
Only shared documents can be viewed or can be easily be accessed however one can easily access your computer remotely if the checkbox "Allow user to connect remotly to this computer" is checked.With this the other person logs you out and takes control of your machine.
Lolest!
#12 Posted : Monday, November 12, 2012 7:53:31 PM
Rank: Elder

Joined: 3/18/2011
Posts: 12,069
Location: Kianjokoma
Mjasirii wrote:
Only shared documents can be viewed or can be easily be accessed however one can easily access your computer remotely if the checkbox "Allow user to connect remotly to this computer" is checked.With this the other person logs you out and takes control of your machine.

how will they log in if they dont have the right username and pswd combination?
Laughing out loudly smile Applause d'oh! Sad Drool Liar Shame on you Pray
PROMANETT
#13 Posted : Monday, November 12, 2012 8:33:06 PM
Rank: New-farer

Joined: 1/25/2012
Posts: 15
lemiso wrote:
i get my internet from my next-door neighbor who runs a cyber cafe, is it possible for them to access information on my computers? If they can access, what measures can i put in place to prevent this? Please help.


Yes, its possible to access...it only takes 5 mins to do so.

If you want to block any access..just enable your windows firewall...with ur firewall on its very difficult to attack.smile
Wealth, like happiness, is never attained when sought after directly. It comes as a by-product of providing a useful service - Henry Ford
sitaki.kujulikana
#14 Posted : Tuesday, November 13, 2012 11:40:32 AM
Rank: Veteran

Joined: 8/25/2012
Posts: 1,826
dnn wrote:
sitaki.kujulikana wrote:
richdad wrote:
They can only access what you have share publicly. Like shared docs and other shared drives/folders. Also depends on OS. W7 & 8 have better security than Xp. Linux is better.

It also depends on how skilled the neighbour is or cafe users. Most importantly what there is in your computer that someone would wish to access.

Signed: richdad: CCIE, CCNP, CCNA, NKT, A+, N+, B+,NKT, PHD.


any folder or file on a computer can be accessed remotely, its not only the shared ones.


care to explain further?


drive letter + $
admin$
sitaki.kujulikana
#15 Posted : Tuesday, November 13, 2012 11:43:26 AM
Rank: Veteran

Joined: 8/25/2012
Posts: 1,826
Lolest! wrote:
richdad wrote:


Signed: richdad: CCIE, CCNP, CCNA, NKT, A+, N+, B+,NKT, PHD.
Laughing out loudly Laughing out loudly Laughing out loudly

asiyetakatumjue wrote:
any folder or file on a computer can be accessed remotely, its not only the shared ones.

How will one do remote access if it is deactivated or if they don't have login details?


by getting the login details
Drobos fly
#16 Posted : Wednesday, November 14, 2012 1:20:22 AM
Rank: Member

Joined: 4/24/2012
Posts: 331
Location: Vantage point
If you are hearing the word Encryption for the very first time or vaguely rings a bell or you hardware has nothing like TPM encryption feature that is enabled via BIOS, just do yourself a favour and get your own personal connection. Least of your worries should be someone breaking into your system, greatest of your worries is someone with the ability to intercept your communication, believe me it is very easy.... so easy I freak out using the cyber, I don't even use flashdisks to the cyber, I have my own mechanized ways of getting data from point to point.
ChessMaster
#17 Posted : Wednesday, November 14, 2012 6:38:16 AM
Rank: Elder

Joined: 2/23/2009
Posts: 1,626
I doubt someone that good is working in a cyber
Uncertainty is certain.Let go
Drobos fly
#18 Posted : Wednesday, November 14, 2012 12:36:41 PM
Rank: Member

Joined: 4/24/2012
Posts: 331
Location: Vantage point
ChessMaster wrote:
I doubt someone that good is working in a cyber


I found this very amusing but it happened and they didn't say which cyber.....hehehe
Rink
quicksand
#19 Posted : Wednesday, November 14, 2012 1:03:50 PM
Rank: Veteran

Joined: 7/5/2010
Posts: 2,061
Location: Nairobi
Drobos fly wrote:
ChessMaster wrote:
I doubt someone that good is working in a cyber


I found this very amusing but it happened and they didn't say which cyber.....hehehe
Rink


Cloning a UI to trick people to enter their id and password is not exactly hacking .....its subterfuge, a con. A hack is vastly more technical than that.
Drobos fly
#20 Posted : Wednesday, November 14, 2012 3:48:10 PM
Rank: Member

Joined: 4/24/2012
Posts: 331
Location: Vantage point
quicksand wrote:
Drobos fly wrote:
ChessMaster wrote:
I doubt someone that good is working in a cyber


I found this very amusing but it happened and they didn't say which cyber.....hehehe
Rink


Cloning a UI to trick people to enter their id and password is not exactly hacking .....its subterfuge, a con. A hack is vastly more technical than that.



Let me make it clear. The point is... it happened and the results are the same,your system is compromised, there is no exception that it can't happen again wherever.
3 Pages<123>
Forum Jump  
You cannot post new topics in this forum.
You cannot reply to topics in this forum.
You cannot delete your posts in this forum.
You cannot edit your posts in this forum.
You cannot create polls in this forum.
You cannot vote in polls in this forum.

Copyright © 2026 Wazua.co.ke. All Rights Reserved.