ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Computer Hacked: What To Do Now

Updated on September 22, 2012

What is Hacking

Is your computer hacked? what to do now. Let's first start with some hacking definitions. Hacking is the practice of making modifications to a system in order to achieve an aim different of the creator's true objective. A person who involves in an act of hacking is called a Hacker. This is a more formal definition, but speaking candidly, a hacker is someone who breaks into your resources and uses them, without your approval, for his own false purposes.

Dangers of Hacking

The dangers of hacking are countless. Some of the most dreaded ones are:

  • Misuse of resources
  • Stealing of personal information.
  • Spoil of Reputation

Let Your Voice Heard

What is the purpose of hackers?

See results

Is My Computer Hacked

Although there are a range of different signs indicating that your computer has been hacked but the situation becomes ever so critical when there are no changes or symptoms helping to disguise the hacker. Most sophisticated hackers leave no clues behind to go against them. In these cases, it can be quite techy for an average computer user to detect the intruder. Without going in too technical detail and making you scratch your head, these are the common symptoms that will help you to diagnose if your computer system has been compromised.

New Programs Installed

In some cases, you see new programs installed on your computers which do not belong to you. New programs can often be installed because of completely legal reasons like operating system updates and as an additional add-on for a software you installed yourself or they may also be installed by someone else who shares your computer. So, its good to confirm everything first.

Commonly software installed on your computer which may indicate a hacker intrusion are Backdoors, Trojans, IRC clients and rogue antivirus programs. These programs can perform several tasks for the hacker from weakening your computer defences allowing the hacker to penetrate deeper as well as collect your personal data and send it to the hacker.

Increased Network Activity

If your network activity seems high, even when you're not doing anything, someone else may be using your machine. In most cases, your computer becomes slow, or in more techy terms, turns into a "zombie".

Security Programs Modified

Security programs like antivirus and anti-spyware installed on your computer may be modified by a hacker to allow it to penetrate even more in your system. So, you may find your antivirus and antispyware programs uninstalled or deactivated on its own.

Passwords Changed

Online Passwords

When hackers breakthrough in your computer system, they install such software which track your keystrokes in order to find your passwords and send the data to the hacker. Usually, when hackers hack an online account, they change the password. Go for resetting your password and if you find that the your email has been changed or the feature doesn't work, then contact your service provider company because they are the ones who can solve your problem. Email accounts are most commonly hacked and used by hackers to send spams and viruses to your contacts.

System Passwords

System passwords are also changed by hackers in order to minimize your control over your system. If you find yours changed, then its surely a hacker's activity because no passwords change on its own.

Computer Acting On Its Own

If you see processes running that are not started by you, then they may belong to a hacker. These activities can make your computer drastically slow as they use a substantial amount of CPU resources. Sometimes, a computer works on its own like the cursor moved or any key pressed indicating an hacker intrusion.

Computer Hacked: What To Do

If you've checked everything and now you're sure that your computer is compromised, then don't panic. There are some simple steps you can take to prevent further damage as well as recover your system.

Backup Your PC

One of the most important things to do, if your computer get hacked is to backup your most important files and data to ensure that you don't lose anything precious. Save your files, applications and data on an external hard drive. This will protect your data in case your computer dies. Although, you should backup your system regularly, but definitely do it now.

Turn Off All Networks

The first thing to do to stop the hacker is to unplug all internet connections (ethernet, isdn, etc) to prevent further hacker access. This is not a complete solution because it only cuts your computer from hacker's access. Although this will not shut down the running processes, it will protect your computer from further damage.

Run Scans

If you still have your antivirus and antispyware programs installed on your computer, then you have one thing in your advantage. Run security scans for your whole system and find infected files. I recommend coping the infected files and saving them to a password-protected zip file and send it your antivirus and antispyware company before you delete them.

Format Your Computer And Reinstall Operating System

I hate to say this, but this is surely the best way to ensure that your computer is free from all nuisances (hackers, viruses, spyware, etc). This will cleanse your computer of every type of malicious software. Do this if you have no other choice left or better, contact a professional before you take this step.

How To Protect Your Computer From Hacking

"Prevention is better than cure"

Hacking is a nuisance but it you can protect your computer by following some basic measures, like:

  • Educate yourself about hacking and the methods of hacking.
  • Scan your computer on regular basis.
  • Use firewalls when connecting to the internet.

Here's a complete guide featuring the tips and tricks to protect your computer from hackers. Simple Tips To Protect Computer Against Hackers

One of the best and most important step in ensuring a hacker free system is to have a good antivirus and antispyware software installed. These are some tools to assist you in protecting your computer from hackers and their malicious actions. Computer hacked what to do

Norton AntiVirus 2012 - 1 User [Download] [Old Version]
Norton AntiVirus 2012 - 1 User [Download] [Old Version]

A must have tool to ensure a hacker free tool. It proactively stops online threats before they can infect your computer. Detects and eliminates viruses and spyware; protects against dangerous applications. Complete allround protection.

 

Conclusion

Hacking is dangerous but it is possible to ensure protection for your computer with basic security measures.

If you like my work, please don't hesitate to share with your friends and comment to let me know of your feedback.

Comments

    0 of 8192 characters used
    Post Comment

    • profile image

      Arsalan 

      4 years ago from pakistan

      good work.

    • anasshad profile imageAUTHOR

      Anas Shad 

      6 years ago from Pakistan

      Hey FrogyFish, thanks for visiting and commenting. Its always great to know that your work could be useful to others. Keep visiting Man.

    • frogyfish profile image

      frogyfish 

      6 years ago from Central United States of America

      I recently got my computer fixed because it started messing up things in Word and was very slow. I had Panda Cloud, firewall, Windows Defender and ran ESET online...none of them found the malware. It is frustrating to worry about the hackers and their successes. Thanks for good tips here, and keep up the great advice for us.

    • anasshad profile imageAUTHOR

      Anas Shad 

      6 years ago from Pakistan

      Thanks for your visit, Pearl. Great to know you liked it.

    • Pearldiver profile image

      Rob Welsh 

      6 years ago from Tomorrow - In Words & NZ Time.

      Thanks for sharing this advice... you have provided some solid advice here, especially in regard to using an external hard drive and backing up your files... Look forward to more of the same... take care..

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)