Overclock.net › Forums › Software, Programming and Coding › Networking & Security › a couple security questions
New Posts  All Forums:Forum Nav:

a couple security questions - Page 2

post #11 of 37
Oh and on the p2p issue , no they can't take control unless they exploit the program your using which is unlikely if it's up to date. i doubt someone with the skills to be able to do that target a day to day user.
Prometheus
(14 items)
 
  
Reply
Prometheus
(14 items)
 
  
Reply
post #12 of 37
Thread Starter 
Quote:
Originally Posted by beers View Post
A port is just a number. There are a range of specific ports that are typically used for certain services (0-1024 for the sake of argument), but it depends on the application that is listening on that port.
So if I open a port, can it be used by anyone to do whatever they want through it on my computer?
Blurgh
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II X4 965 M4a77t evga gtx 560 ti fpb 12gb DDR3 1333mhz 
Hard DriveOSPower
1tb windows 7 home premium 64bit 500w 
  hide details  
Reply
Blurgh
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II X4 965 M4a77t evga gtx 560 ti fpb 12gb DDR3 1333mhz 
Hard DriveOSPower
1tb windows 7 home premium 64bit 500w 
  hide details  
Reply
post #13 of 37
Quote:
Originally Posted by nachoz View Post
So if I open a port, can it be used by anyone to do whatever they want through it on my computer?
As stated previously, no.
Waiting on X399
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II B57 @ X4 3.9 Gigabyte 790FXTA-UD5 Sapphire Radeon 290 8 GB G.Skill 2133 
Hard DriveCoolingOSKeyboard
250 GB 840 EVO Noctua NH-D14 Windows 10 Logitech K350 
PowerCaseMouseMouse Pad
Seasonic x750 Corsair 600T Logitech G100s Razer Goliathus Speed 
Audio
Plantronics Gamecom 788 
  hide details  
Reply
Waiting on X399
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II B57 @ X4 3.9 Gigabyte 790FXTA-UD5 Sapphire Radeon 290 8 GB G.Skill 2133 
Hard DriveCoolingOSKeyboard
250 GB 840 EVO Noctua NH-D14 Windows 10 Logitech K350 
PowerCaseMouseMouse Pad
Seasonic x750 Corsair 600T Logitech G100s Razer Goliathus Speed 
Audio
Plantronics Gamecom 788 
  hide details  
Reply
post #14 of 37
Thread Starter 
Quote:
Originally Posted by KillServ View Post
Oh and on the p2p issue , no they can't take control unless they exploit the program your using which is unlikely if it's up to date. i doubt someone with the skills to be able to do that target a day to day user.
So, if someone knows my ip address and a port I have opened, they can't connect to me without going through the program? I thought they would be able to go straight to me without requiring something else to connect to me since they know my info.
Blurgh
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II X4 965 M4a77t evga gtx 560 ti fpb 12gb DDR3 1333mhz 
Hard DriveOSPower
1tb windows 7 home premium 64bit 500w 
  hide details  
Reply
Blurgh
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II X4 965 M4a77t evga gtx 560 ti fpb 12gb DDR3 1333mhz 
Hard DriveOSPower
1tb windows 7 home premium 64bit 500w 
  hide details  
Reply
post #15 of 37
Also thats why you add firewall rules, it allows the connection but it also monitors it for anything dodgy going on.
Prometheus
(14 items)
 
  
Reply
Prometheus
(14 items)
 
  
Reply
post #16 of 37
I think you should stop flapping about it, the likely hood of someone trying to hack into your computer is so small it's not worth thinking about, sorry to say it but i very doubt your worth the effort.

instead they'd just put a infected file on the p2p network and wait for someone to download it and run it without scanning it. so trust me you have nothing to worry about just scan everything you download and don't be on a administrator account on windows and if you are just that unlucky person who bad stuff always happens to the damage will be minimal.
Prometheus
(14 items)
 
  
Reply
Prometheus
(14 items)
 
  
Reply
post #17 of 37
Thread Starter 
Quote:
Originally Posted by KillServ View Post
I think you should stop flapping about it, the likely hood of someone trying to hack into your computer is so small it's not worth thinking about, sorry to say it but i very doubt your worth the effort.

instead they'd just put a infected file on the p2p network and wait for someone to download it and run it without scanning it. so trust me you have nothing to worry about just scan everything you download and don't be on a administrator account on windows and if you are just that unlucky person who bad stuff always happens to the damage will be minimal.
I only use 1 account on my computer which is an administrator, is it really that bad to do?
Blurgh
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II X4 965 M4a77t evga gtx 560 ti fpb 12gb DDR3 1333mhz 
Hard DriveOSPower
1tb windows 7 home premium 64bit 500w 
  hide details  
Reply
Blurgh
(13 items)
 
  
CPUMotherboardGraphicsRAM
AMD Phenom II X4 965 M4a77t evga gtx 560 ti fpb 12gb DDR3 1333mhz 
Hard DriveOSPower
1tb windows 7 home premium 64bit 500w 
  hide details  
Reply
post #18 of 37
Quote:
Originally Posted by beers View Post
A port is just a number. There are a range of specific ports that are typically used for certain services (0-1024 for the sake of argument), but it depends on the application that is listening on that port.
You can look at the different port numbers assigned to well know applications through the Internet Assigned Numbers Authority (ianna.org)

Quote:
if I'm using a program like utorrent, and I'm connecting to other people with an open port, they could exploit that because they would know my ip address along with an open port, and pretty much do anything they want(view my desktop, monitor what information I'm sending out, like passwords, change my settings and files on my computer, etc.). Am I wrong?
That's a bit of a stretch. Having your IP address isn't a problem.. Knowing what ports you have running on your machine is not a problem. Running out of date, known vulnerable services on your machine are a problem.. Keep your software upto date.
My System
(13 items)
 
  
CPUMotherboardGraphicsRAM
Cisco Cisco Cisco Cisco 
  hide details  
Reply
My System
(13 items)
 
  
CPUMotherboardGraphicsRAM
Cisco Cisco Cisco Cisco 
  hide details  
Reply
post #19 of 37
Not really, if your careful as to what your doing. If your infected whilst being on a admin account then the virus has all the access you have, if your on a user account it's limited.

I always use a admin account, because i know common mistakes alot of people make e.g. downloading files from unsafe sources then running before scanning,
opening email attachments.

Theres so many different ways to get infected you just have to be careful, i went without a anti virus for over two years and then got one scanned and i had nothing.

But in Jan my laptop got a virus from me opening a pdf online for a template for some 120mm fans. it took over my desktop removed my antivirus it proper screwed me over, i rebooted went into safemode found where it was, deleted it and rebooted, problem solved.
Prometheus
(14 items)
 
  
Reply
Prometheus
(14 items)
 
  
Reply
post #20 of 37
Quote:
Originally Posted by nachoz View Post
So if I open a port, can it be used by anyone to do whatever they want through it on my computer?
If the open port has a vulnerable service running behind it that someone knows how to exploit. You betcha. Are you running any programs that are on metasploits exploit list with working payloads?
My System
(13 items)
 
  
CPUMotherboardGraphicsRAM
Cisco Cisco Cisco Cisco 
  hide details  
Reply
My System
(13 items)
 
  
CPUMotherboardGraphicsRAM
Cisco Cisco Cisco Cisco 
  hide details  
Reply
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Networking & Security
Overclock.net › Forums › Software, Programming and Coding › Networking & Security › a couple security questions