Friday, 16 September 2016

MY EXPERIENCE ON HOW I RESTORED MY DESKTOP COMPUTER DELL MODEL: OPTIPLEX GX620 BRAND FROM THREAT OF DANGEROUS HACKERS

Hacker hacked my system for a long time to the extent that they are consuming my Broadband airtime that are meant to last for a month under few days or weeks depending on the capacity and this made me to be subscribing a maximum of 4.5 Airtel ISP gigabyte monthly to meet up with their demands, yet these unscrupulous and wicked personalities that are even living close to my area relentlessly did not give up in attacking my system. So as an ICT personnel I have to apply my skills to figure out solutions to these problem which even at this moment I have not finally concluded their mission of doing such act but what I know is at the moment at least I can stop so many from gaining entrance to my system except some stubborn ones that has manipulated my BROADBAND MODEM through my IMEI number and other information that came with the modem which they got through entering my Wi-Fi that does not have control point yet.

Now these are the radical steps I took which did not prove successful initially, but now is yielding result, though I have tried so many ways to completely eliminate their operation through my Wi-Fi to my Dell Desktop Optiplex GX 620 which I said earlier did not have a control point or a button to turn it off or on and as a result these nearby scammers cease the Wi-fi to have access to my system including my files. I have to set up Bitlock Key encryption password to lock up my document, I wanted to lock up the entire Hard Disk but already they have tampered with the (Trusted Platform Module)TPM through BIOS and other roots as well as disabled it completely, so the security Bitlock Key was not possible to the Hard Disk because the TPM security was not enable. So I have to go through Program Bitlock Key in Application software like Microsoft word to secure some important document from scammers; these I achieve by taking the following steps under ms-word 2007:
(i)                Clicking on the office button before the menu “Home” on the menu bar to display the drop down list
(ii)              Select “Prepare” on the dropdown list to view options
(iii)            From the options, then select Bitlock and lock up your document with Username and password
I think with this your main documents are secured a bit.

Now, the second step I took was to diagnose my system for intruders or hackers through MS-DOS or command prompt by issuing command at the MS-DOS environment like:
C :\> NETSTAT A-         to display Options

Then I will select: “-A” from the options to display and know if potential hackers have intruded into my system and I type the command as follows:
C :\> NETSTAT –A

The above command will display the active connections and the intending active connection which has not succeeded in gaining entrance to your system. The active connection will display “Established” under the STATE of the active PC while others waiting or trying to gain entrance but has not succeeded yet will show listening. So I tried the process  to disengage these established intruders .

Now, this is how I go about trying to disengage them, this achieved by pressing down at once the keyboard CTRL +SHIFT+ESCAPE keys at once to pop up the task manager where all the programs running in your computer both internal and external will be visible. Now trying to locate their Process Identification (PID) to right click it and end their process which will finally terminate their operation on your system, it happened that the Hackers has also manipulated the PID also in disguise. So merging the PID in established Hackers from MS-DOS with the one on the Task Manager do not rhyme. So there are other alternatives to locate. But I skipped the alternative initially to try some other thing to see if I can eliminate them completely through those means.

So I have no option than to go and purchase NORTON ANTI VIRUS SOFTWARE and run it in my system. I could not successfully installed it initially due to their continual use of magnetic device to hook my system through Wi-Fi to manipulate what I was doing, but finally installed it, but they later used that means and disable the anti-virus twice so that they can be gaining entrance. Though the antivirus sanitize my system when it was successfully installed, but it did not solve the problem of the four identified established connection. I have to try Norton power Eraser as I was connected to the internet. It did not still solve the problem of the threats on my system which I discovered through “NETSTAT –A” command at the MS-DOS Prompt. These became a battle for a long time, as these hackers penetrate my computer system and change my Broadband settings as they want.

Also I came to discover that antivirus software is there to detect new threat, terminate them and constantly protect your system while reimages windows repairs professional software is there to heal damages these viruses have already caused. So I decided to download and also run reimages windows repairs professional software from the internet as well to see if I can fix this problem myself. Reimage could not fix the problem as well.

Now, I have to go back to the task manager and select system column from view menu. Now click on the “commit size” to see the size of the memory of all active system connection. I have to end their process as you merge it with the image name column which they have manipulated as well, they can still manipulate even the sizes, but you need to use your psychic to detect their movement and action, sometimes you may click the wrong program and end it thinking they are part of the hackers but sometime computer will warn you when you want to do that. Now one thing here is that as you are ending them you need to be observant with the MS-DOS COMMAND which is NETSTAT -A and NETSTAT –S, to make sure that your assignment is completed. If they still exist, continue to end the suspected process until you wipe them off. And while working with your computer keep on checking them through this means because sometime some will disguise and hide, when you are off, the will surface to operate again on your system and this is how I restored my system to control hacker from exhausting my Airtime.

WRITTEN BY ONYIA EMEKA HARFORD
+2348186388641b


No comments:

Post a Comment