• 🏆 Texturing Contest #33 is OPEN! Contestants must re-texture a SD unit model found in-game (Warcraft 3 Classic), recreating the unit into a peaceful NPC version. 🔗Click here to enter!

how can hackers hack pc without network connection

Status
Not open for further replies.
Level 15
Joined
Mar 9, 2008
Messages
2,174
he first post mentions one problem, and then we say "reinstall your OS" and suddenly the hackers has blocked BIOS :p
Hackers must be reading these topics then. xD
2402029-8387291288-13632.jpg
 
Level 13
Joined
Sep 13, 2010
Messages
550
i tried to reinstall windows several times but the installer got blocked every time. now you are trolling. please stop trolling and try to be helpful instead. is there a tool that can fix damaged system files?

Actually, believe me or not, there is, and it is the installer :D It can repair shit, but won't fix virus shit. Also HOW CAN AN INSTALLATION GET BLOCKED?
 
i tried to reinstall windows several times but the installer got blocked every time. now you are trolling. please stop trolling and try to be helpful instead. is there a tool that can fix damaged system files?
There is no tool my dear, just succumb to the ObeXity and DiabeteX that cake brings!
 
Level 16
Joined
May 25, 2004
Messages
1,170
i have 3 pcs just in my living-room and they all gets hacked.(i shut down one and the hacker turns on another one.)
wait, does the hacker live at your home? smack him!

Anyways, one time my wife had a laptop get infected with a virus. Back when she played WoW, she downloaded a mod for the game, the mod however was a virus that installed a "fake virus scanner" and blocked her from suing the virus software and from trying to get on the internet.

each time she tried to use a browser or run the virus software it would flag the program and shut ti down claiming it was infected with a virus.

I just installed Malware Chameleon and fixed the issue. After that I did a fresh install just to make sure.
 

Dr Super Good

Spell Reviewer
Level 64
Joined
Jan 18, 2005
Messages
27,202
post a screenshot that shows that the installer is blocked or something then -.-
He will either.
1. Not post one and say it is not the issue.
2. Google (or in his case, Bing) one.
3. Photoshop one.

In reality 1 is the likely response he will give as 2 and 3 are not his usual method of operation and 3 will probably need too much work and be spotted too easily by anyone experienced.

In any case, to stay on topic...
Do not install from within the OS. All Windows installation USBs/DVDs come with a bootstrap loader (or maybe are just bootable?) which will run before the OS starts. Simply discard the contents of the hard disk (backup anything you want to keep, avoid executable as they may be Trojans now due to extended malware exposure) and install everything anew.

Alternativly you may want to look into Linux multi boot solution. If this ever is infected with malware you can simply reinstall it at any time and best of all most builds are completely free (no licence, fully open source). Sure you may have problem with some games on them but they will certainly work for browsing, programming and other such tasks. You can then use your malware filled Windows installation (that you cannot reinstall for some reason) only for games.
 
Level 23
Joined
Apr 16, 2012
Messages
4,041
ok, the first link within your link mentions that the hacker must be literally few meters out of you for it to work, which is not possible unless its your parents doing it.

The second one is basically copy of the first one.

Both imply that some mobile phone in close proximity to your computer must be hacked or contain viruses, which is sad if someone has virus on their phone
 

sentrywiz

S

sentrywiz

I've read through this thread because I was bored and came up with my list of suspects, although I'm not pro at computer hardware or hackz0r, a simple google search (complex right??)



1. Air-Gap Hacking (requires malware on computer + cell phone & gul'dan's black magic)

http://cacm.acm.org/news/175724-with-new-hack-cellphone-can-get-data-out-of-computers/fulltext

2. Keylogger (crazy girlfriend/boyfriend spying on you while you watch porn?)

http://en.wikipedia.org/wiki/Keystroke_logging

3. Virus (yay, oldschool hacking movies!)

http://en.wikipedia.org/wiki/Computer_virus


With that said I've never heard of OS being rejected upon installing.
Now on to my suggestions:

1. Install a new OS
2. Beat the shit out of your sibling/room mate/parent/friend that MUST BE IN THE SAME HOUSE AS YOU WHO IS OBVIOUSLY HACKING YOU
3. Retry step 1
4. If step 3 fails, retry step 2
 
Level 25
Joined
May 11, 2007
Messages
4,651
1. Is impossible.
2. Can't be done.
3. No no no, that's not a solution.
4. I'm telling you!! Internet Explorer has stopped supporting javascript!!!

This will probably be my last reply to this thread as all the mods on this site are going to ban me.
 

Deleted member 219079

D

Deleted member 219079

Do not necropost, you might summon this guy, and obviously noone wants that.
I found andrea's threads entertaining :/
 

pyf

pyf

Level 32
Joined
Mar 21, 2016
Messages
2,985
Do not necropost, you might summon this guy, and obviously noone wants that.
Yet, some questions in this thread ought to be answered. Therefore...
...
Necrobump!


@andreasaspenberg
The guys at BleepingComputer.com can help with such issues:
Bleeping Computer Technical Support Forums

[...] svchost have been compromised but sfc was made before that threat even existed and is therefore unable to find it but roguekiller finds that issue however it cant repair that file as it lacks that tool. i need a tool that can fix svchost.

You can check whether or not svchost has been tampered, by using FRST or FSS
Farbar Recovery Scan Tool Download (under 'Bamital & volsnap')
Farbar Service Scanner Download (under 'File Check')

If SFC does not help, then use DISM (8 and up) or CheckSUR (Vista, 7, Server 2008):
https://support.microsoft.com/en-us/kb/947821
Installing/fixing may take 30 minutes or more, and program may seem to be stuck; just be patient

Also, I would suggest you give MSRT a try too. It might try to repair broken stuff if it finds an infection (though I personally doubt it). Type 'mrt' at a command prompt.

[...] is there any good bootkit removal tools.
Careful! Partially removing a bootkit/rootkit may lead to OS instability and lots of trouble.

You may use:
- MSRT (part of the OS since Vista)
- TDSSKiller
- RogueKiller
- MalwareBytes Anti Rootkit (its functionalities are included into MBAM over time)
- BootkitRemoval
- aswMBR (*only* if you know what you are doing - might be outdated?)
- Stinger (in the Advanced/Settings menu, check 'Rootkits' scan, and select 'Report' on detection).

Careful again! Stinger will install and run an unkillable 'mfevtps' process, which you can remove only by using MCPR (McAfee Consumer Product Removal tool) + doing a computer restart.

For a simple check, or a second opinion scan:
- HitmanPro (not specializing in bootkits/rootkits)
- GMER (*only* if you know what you are doing)

reinstalling the system is not an option as it rejects any attempts at doing so.
RKill should be able to close malicious running processes preventing repair tools from running.

[...] the hackers destroyed microsoft security essentials(or at least hacked it so that i cant use it) [...].
After cleaning the computer, uninstalling MSE then reinstalling it, should solve this issue. Tested on XP and works.

is there any multipupose tool that can fix broken systemfiles?

Windows Repair All in One (WR AiO) can fix damaged registry entries:
Tweaking.com - Windows Repair Free/Pro

Use it *last*, after the OS has been completely cleaned, and it has been repaired with CheckSUR/DISM/SFC, and you have installed the most current MS security updates.

WR AiO can most notably successfully repair a broken Windows Firewall, where Fixit would miserably fail at it. Tested on Vista32.


You can spot subtle issues with the Windows Firewall, by using MBSA (look for an exclamation mark + an error code).
Microsoft Baseline Security Analyzer – MBSA - TechNet Security

MBSA also allows to check offline (by using wsusscn2.cab), security updates are properly installed. This is most useful for XP users.
 
Last edited:

Roland

R

Roland

Yet, some questions in this thread ought to be answered. Therefore...
... Necrobump!


............................................________
....................................,.-'"...................``~.,
.............................,.-"..................................."-.,
.........................,/...............................................":,
.....................,?......................................................,
.................../...........................................................,}
................./......................................................,:`^`..}
.............../...................................................,:"........./
..............?.....__.........................................:`.........../
............./__.(....."~-,_..............................,:`........../
.........../(_...."~,_........"~,_....................,:`........_/
..........{.._$;_......"=,_......."-,_.......,.-~-,},.~";/....}
...........((.....*~_......."=-._......";,,./`..../"............../
...,,,___.`~,......"~.,....................`.....}............../
............(....`=-,,.......`........................(......;_,,-"
............/.`~,......`-...................................../
.............`~.*-,.....................................|,./.....,__
,,_..........}.>-._...................................|..............`=~-,
.....`=~-,__......`,.................................
...................`=~-,,.,...............................
................................`:,,...........................`..............__
.....................................`=-,...................,%`>--==``
........................................_..........._,-%.......`
...................................,
 

pyf

pyf

Level 32
Joined
Mar 21, 2016
Messages
2,985
@Statharas: rotfl, I am not *that* gullible.
@Roland: (OT) hope you followed my advice with your recovered files. :wink:


This thread is great entertainment. But seriously guys, reinstalling an OS should only be necessary in rare cases.

Bleeping Computer's forums are the best place imho to post (and learn) about computer issues. They also help people clean/repair their OSes. The only drawback is, one has to do what the helper says, and provide him the required information the proper way. Should be easy for anybody to do so, though. :smile:


The problem here comes imho from within at least one of the networked PCs, and not from any 'hackers'.


Some of the software I listed here is sometimes overlooked by some IT professionals / helpers. This is why I posted in this thread. Well, everybody has his own ways of doing things, I guess...

Some internet users also might find the info / links provided here to be useful.

It's funny to read though, how he keeps adding extra information as solutions comes up. The first post mentions one problem, and then we say "reinstall your OS" and suddenly the hackers has blocked BIOS :p
Yeah I already noticed that in other threads. There is also not sufficient infos / data / proofs provided in OPs imho (if at all).

Imagination can run wild sometimes:p
It takes time and experience to understand how computers work. Or how they do not.:grin:
 
Level 19
Joined
Jul 2, 2011
Messages
2,162
It is possible to gain access to a persons hard drive if you boot their computer from a virtual machine. Since computers can have multiple users you wouldn't even necessarily know that the computer has been booted, and because a virtual machine can access your hard drive without needing your password... there is no better protection than zip filing your hard drive which isn't possible(or at least is not safe as boot systems when compressed or encrypted can no longer load).

So!!!

Bottom line... I suggest you encrypt any important files on your computer and research how to prevent usb attachments from running without your permission
 

Dr Super Good

Spell Reviewer
Level 64
Joined
Jan 18, 2005
Messages
27,202
It is possible to gain access to a persons hard drive if you boot their computer from a virtual machine. Since computers can have multiple users you wouldn't even necessarily know that the computer has been booted, and because a virtual machine can access your hard drive without needing your password... there is no better protection than zip filing your hard drive which isn't possible(or at least is not safe as boot systems when compressed or encrypted can no longer load).

So!!!

Bottom line... I suggest you encrypt any important files on your computer and research how to prevent usb attachments from running without your permission
This can be stopped by encrypting your hard drive. That way without the appropriate key it cannot be accessed.

Full drive encryption technology has been around for several decades now.
 
Level 19
Joined
Jul 2, 2011
Messages
2,162
This can be stopped by encrypting your hard drive. That way without the appropriate key it cannot be accessed.

Full drive encryption technology has been around for several decades now.
I do not personally know enough about it to suggest such a thing. All I do know is encrypting your boot drives(which are most often on your hard drive) causes your computer to fail on start up.

Which is why I say encrypting your hard drive will most likely break your computer
 
Status
Not open for further replies.
Top