Posted on 07/27/2014 9:47:12 AM PDT by TwelveOfTwenty
Here are 11 sure signs you've been hacked and what to do in the event of compromise. Note that in all cases, the No. 1 recommendation is to completely restore your system to a known good state before proceeding. In the early days, this meant formatting the computer and restoring all programs and data. Today, depending on your operating system, it might simply mean clicking on a Restore button. Either way, a compromised computer can never be fully trusted again. The recovery steps listed in each category below are the recommendations to follow if you don't want to do a full restore -- but again, a full restore is always a better option, risk-wise.
(Excerpt) Read more at csoonline.com ...
I knew I had been hacked when i started getting spam from myself.
FOURlater
The two most important signs are not on this list.
12. You actually have installed malware protection.
13. You actually use a Microsoft operating system.
ping
Anyone who works for Yontoo should be shot, then drawn and quartered.
0/11
If you run windows 7 or 8, take the time to create a system recovery image and the bootable media. When you need it, it is one of the best moments ever.
I created a storage space array in windows 8 that holds 2x 250 gig 2.5” drives. It uses 2 sata ports but if you use the dell 2.5” adapters, it only eats up one drive bay. I house my recovery image on it. I set my clients up like this and they spend the extra money for redundancy. Its also portable, unlike hardware raid. Storage space is so good, I don’t even bother with hardware raid on anything other than enterprise equipment.
you don’t need something this complex but redundancy and good data practices are a must. Never work off your backups, especially if your backup is a single USB type drive. A client who didn’t listen to me just lost 3tb of video, about 15k worth of work. He’s out 1500 plus for data recovery.
Windows backup works and its a godsend if you use it. Most people don’t then complain blaming whomever is convienent to them not taking ownership. Windows 8 backups are a little different than 7 but still excellent once you spend 5 minutes learning how to create and backup a library.
Programs like ccleaner are great for cleaning temp folders and keeping your system clean.
Or just use linux.
He got all the way down to 6 before getting to anything that really indicates being hacked. Most of the things on his list come from installing stupid software with malwarish packages. Which isn’t much better than being hacked, but is not being hacked.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.