Welcome to YLOAN.COM
yloan.com » Windows » Geeks On Site Warns Of Remote Repair Hackers
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Geeks On Site Warns Of Remote Repair Hackers

The past few years we have seen a rise in fixing computers remotely through an internet connection as a viable alternative to on-site computer repair

. The convenience of having ones computer fixed from the comfort of home, many times at a lower cost, has contributed to the growing number of customers who prefer this method of computer repair. However, more customers translate to more remote support providers and more competition, which in turn has had a negative impact on the methods used to obtain customers.

Online computer repair companies use third-party software, such as remote control software or virtual network computing (VNC) software, to establish a remote connection. A software tool is downloaded to the customers computer with permission, and once the application has been installed it creates an interface between the remote technicians computer and the customers computer. The technician can see the customers screen, move the cursor around and initiate scans and use software for diagnostic repairs. The customer in turn can follow the technicians work on the computer and intervene with his or her mouse if required. Remote access software uses a proprietary remote desktop protocol that is transmitted via Transport Layer Security (TLS). TLS and its predecessor, Secure Socket Layer (SSL), are protocols that allow secure communication over networks designed to prevent eavesdropping and tampering. Establishing a remote session is thus as secure as online banking or purchasing products or services from a reputable retailer.

Hackers however have found ways in which to break into remote repair sessions. For example, hackers can detect established remote connections and locate connected customers through their IP address. While a remote technician is working on a computer the hacker can call the customer and ask him or her to disconnect. The hackers then re-establish the connection from their own location and steal the customer from the original remote support provider. Not only does this unethical method of acquiring customers present a security threat to the customer, but it is also a headache for legitimate remote repair companies trying to gain ground in the market.

Another example of remote repair hacking is MTIM attack, i.e. the Man in the Middle attack. Here the attacker poses as the server towards the user, and as the user towards the server. The attacker, in this case, can sit between the two parties while accessing the data in transit. Therefore the computer technicians establishing the remote connection must be sure that the computer they are about to exchange data with is really the one to which they intended to connect. Computer repair companies do so by establishing the connection while on the phone or on the chat with the customer. Customers should be advised to write down their technicians name, so that if they have any doubts about the legitimacy of the company they can call their repair service providers and check if the person operating their computer is who he claims to be!


After a remote session the client might be concerned that the technician still has access to his or her computer. A legitimate computer repair company will always remove all software tools that enabled the remote access. To make sure that a computer does not have remote access software running on it, Geeks On Site suggests you try the following:

1.Check your Firewall. Go to START (Windows button)> CONTROL PANEL > Windows FIREWALL. On the Exceptions tab you will see a list of programs. The programs that are checked have access to your computer. Go through the list and see if there is a program you are not familiar with or that matches VNC, remote control or similar. You can block the unwanted programs access by un-checking it.

2.Check in your Task Manager CLTR + ALT + DEL which applications and processes are running on your computer.


3.Run anti-spyware programs, such as SpyHunter, Spy Sweeper, Spybot or anti-keylogger.

4.A keylogger is a program that records each keystroke a user types on the keyboard. There are two types of keyloggers: hardware and software. A hardware keylogger is a physical device under your keyboard that you can only detect by physical inspection. To detect a software keylogger look in startup applications as follows: START > RUN > type MSCONFIG and in the Startup tab look for any unusual looking applications that would imply key logging or remote access and disable them (but be sure to ask for advice from a tech savvy person if you are not sure of what you are disabling!)

Finally, common sense and caution will take most consumers a long way. In an increasingly virtual world security threats are always present; but luckily a lot of systems have been put in place to protect the guy next door who just wants to get his computer fixed.

by: Erica K.
Great Plains Accounting For Dos, Windows Or Mac Versus Microsoft Dynamics Gp Version 2010 Hiring A Home Repair Contractor Remote Computer Repair Software: An Overview Of How It Works How to Fix Mfc80 Dll Error With Registry Cleaner How to encrypt a folder in Windows XP How to encrypt a file in Windows XP Fix Runtime Error 429 - How to Repair Runtime Error 429 Three Reasons To Repair Rather Than Replace Your Appliances Recovering Hard Drive When Blue Screen Of Death Appears In Windows Xp System Repairing Corrupt Bkf File From A Tape Drive Registary Repair Best Spyware Scanner Review – What is Window vista security and How to Remove it? Inbox Repair Tool Freezes While You Repair Pst
print
www.yloan.com guest:  register | login | search IP(3.142.237.38) / Processed in 0.009026 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 20 , 4951, 13,
Geeks On Site Warns Of Remote Repair Hackers