What should I do if a port on my computer is attacked?

Updated on technology 2024-05-14
23 answers
  1. Anonymous users2024-02-10

    It's okay, normal packet reception.

  2. Anonymous users2024-02-09

    It's nice to have a firewall, that's okay.

  3. Anonymous users2024-02-08

    Not necessarily. If sharing is on. For example, sharing printers and the like. When you turn it on, you must automatically check which printers are available on the local area network. It doesn't have to be a virus.

  4. Anonymous users2024-02-07

    It's been stopped, it's okay.

    LAN someone is getting dark at night.

    Or maybe it's a shared printer.

    It is recommended to install a network firewall. or ARP Firewall.

  5. Anonymous users2024-02-06

    It should be that the other party has a virus.

    See if the other person's computer is connected to your computer's file-sharing printer.

  6. Anonymous users2024-02-05

    Generally, the Internet has viruses. As long as you have antivirus software on all the way, you'll be fine.

  7. Anonymous users2024-02-04

    Install a 360ARP firewall to mitigate attacks.

    The best thing to do is to access the router and bind the IP address to the MAC address in it, so that the ARP attack is ineffective.

    Also, if you know who attacked you, it's better to negotiate amicably.

  8. Anonymous users2024-02-03

    Install 360 Security Guard, and the firewall it comes with is very useful.

  9. Anonymous users2024-02-02

    Hello, this situation should be that you have been attacked, it is recommended that you use 360 Security Guard to open all its firewalls to prevent this attack, and at the same time use 360's Trojan Detection and Killing function to scan and kill viruses.

  10. Anonymous users2024-02-01

    This is when the remote host is infected with a ghost wave virus, and then the virus automatically attacks the host against a random IP range.

    It's called an infection, and once the attack is successful, it's automatically infected.

    This virus is attacked through the system's shared services, that is, port 135 and port 6000 of the attack machine are the attack ports opened by the host virus.

    It's okay if it's blocked, but the vulnerability used by this virus is very old, and even if the firewall doesn't block it, the attack won't succeed.

    Firewalls are generally alarmist, how can the attack be so easy to succeed, if it is so easy, it will be successful.

    Trust me, don't worry.

  11. Anonymous users2024-01-31

    Try it as I said, it should be able to be repaired, if it still can't be repaired, uninstall, restart, and reinstall again.

    Click the "Start" menu and enter it in "Run".

    chkdsk

    C: FOK to see the prompt for "Do you plan to check this volume on the next system reboot" input: Enter and restart the computer manually, do not do anything when you boot up, let the computer boot up completely on its own, because the system is being repaired.

  12. Anonymous users2024-01-30

    Hello pro, happy to answer your questions, according to your questions, for you to find the following answers for your reference dear. Hackers can do the following to hack a computer. 1. Immediately restore the modified web page through backup.

    2. Establish a complete system snapshot of the compromised system, or only save the snapshot of the modified part for post-analysis and evidence.

    3. Understand the vulnerabilities exploited by hackers by analyzing system log files or through vulnerability detection tools. If a hacker exploits a vulnerability in a system or network application to compromise a system, then we should look for a patch for the vulnerability of the system or application to patch it, and if there is no patch for the vulnerability, we should use other means to temporarily prevent the re-exploitation of the vulnerability.

    4. After fixing the system or application vulnerability, the corresponding firewall rules should be added to prevent the recurrence of such events, and if IDS IPS and anti-virus software are installed, their signature libraries should also be upgraded.

    5. Finally, use the system or corresponding application detection software to conduct a thorough vulnerability detection of the system or service, and ensure that its detection feature database is up-to-date before detection. After all the work is completed, a special person should be arranged to monitor the system in real time for a period of time to ensure that the system will not be attacked by such intrusions again.

  13. Anonymous users2024-01-29

    [17:49:59] UDP packet received for , native port: netbios-dgn[138], counter port: netbios-dgn[138] the packet is intercepted.

    This one is normal.

    Add other suspicious IP addresses to the firewall blacklist.

  14. Anonymous users2024-01-28

    It doesn't have to be attacked, Skynet has always been used to that.

    7 8 years ago, when I used it, I closed the chat window and it would :80 The package was intercepted I can't think of it now.

  15. Anonymous users2024-01-27

    You go to hack. Attacked him.

  16. Anonymous users2024-01-26

    It doesn't matter, it's been intercepted by Kaba, I suggest you take a look at this.

  17. Anonymous users2024-01-25

    It's okay, you check the port of your own computer.

  18. Anonymous users2024-01-24

    First of all, this type of attack is common on the Internet and can be defended against as long as a firewall is installed. What you mean by this tip is an attack on a local area network, that is, a computer that belongs to the same IP range. For ARP attacks, 360 can defend against them.

    If you are not at ease, you can choose the Komodo Firewall, this firewall is free, the world's top three, as long as the firewall task, the port hiding is set to prohibit all incoming keys, your computer can be invisible to the outside. Very easy to use. There is also a cracked version of the domestic Skynet in the same kind, which needs to import a rule package, and it is also very powerful.

    This has nothing to do with antivirus, the firewall is port-proof, and it prevents hackers from using the port to implant a Trojan horse program on your computer and obtain your account password. Port problems cannot be prevented by stand-alone antivirus, unless it is the network version.

  19. Anonymous users2024-01-23

    Inside the LAN.

    In general, the default is the router.

    Depending on your situation, it is estimated that the guy who pulled the cable for you is ready to limit your Internet speed on the route.

  20. Anonymous users2024-01-22

    With antivirus, antivirus, the best with 360, hope it helps you, adopt.

  21. Anonymous users2024-01-21

    It's okay There are countless computers on the Internet, others may not know that they have been hit by a virus, there may be someone scanning, but it is all garbage, or it may be someone else's virus automatic scanning, don't be afraid if you block it.

  22. Anonymous users2024-01-20

    This means that your Skynet fire-setting wall is working, and you don't have to take any action.

  23. Anonymous users2024-01-19

    If you're too worried, this is a hint from the Tianwang Firewall for network monitoring, not who is attacking your computer.

Related questions
11 answers2024-05-14

Something is wrong with the system!

It is recommended to reinstall the system: buy a system disk, insert the disk after booting, and then restart the computer, the interface of the system disk will be displayed on the computer screen, choose to install the system directly into the first partition (C disk), wait for 10 minutes, and install it. >>>More

9 answers2024-05-14

You tell him that you are not good, that you are telling the other person that you are deliberately offending him, and that you are speaking too bluntly, that you are not skillful in offending him. And the actual situation is that you are just expressing your own opinion, not intentionally offending and attacking him, or even expressing a different opinion because he is worried, so you are not expressing your heart correctly, what you need to do is to tell the other person that you are worried about him, and only say such things for his consideration, and the other party's emotions will calm down.

10 answers2024-05-14

Cause analysis: one. Loosening caused by deformation of the contact spring blade inside the network cable socket. >>>More

8 answers2024-05-14

You add my mailbox, and I'll send you a good firewall, which is free forever. >>>More

37 answers2024-05-14

At this time, the trumpet is the most likely to be bullied, and I have a few suggestions: >>>More