It
was on the 23rd of September, after booting my system to window 7 Desktop.
I decided to dis engage hackers through the task manger, having noticed that
there are four established intrusion in my system through “NETSTAT –ANO” Command.
But
I noticed that these intruded hackers has manipulated the task manager, that I
cannot disengaged them. I have to right click on the task manager and get to
click on the properties of the task manager to see security setting . I noticed
that they have reset the user from permitting access to “single user” to “Administrators” so I have to reset it myself again. When I am
done with this. I tried to reboot my system, I noticed that the operating
system could not boot to windows menu which was initial problem I solved which
was corrupted operating system . the problem continued.
I
have to fix it, this time in advanced form, but each time I am concluding the
repair, the nearby hackers who are living just close to my house on the other
building and under my yard are disabling it. This the people living next to me in
another yard are using a magnetic reaver
plug in device mounted to their system to magnet my wi-fi as well as disabled
my repairs through MS-DOS.
The
advanced repair are similar to the previous one but this time the command goes
like this:
(1) I
have to repair the master Boot Record (MBR)
This
I achieved through MS-DOS having launched for windows repairs and after it was
completed, I click advanced repair and click next. I then entered Admin
password which the system requested after clicking next and it displayed
options to include windows startup repair and MS DOS. The MS-DOS I selected and
type:
C:\>Bootrec.exe
/Fixmbr
The
above command permit the repair of the corrupted damaged Master Boot Record
(MBR). It is the first sector of your drive and its purpose is to instruct the
BIOS the position to locate the
operating system on your computer
(2) The
Second step is to write a New Boot Sector
C:\>Bootrec.exe
/Fixboot
The
above command /Fixboot will write a new boot in the system partition. The
command will select a boot sector that is compatible with your windows version.
This is not limited to window 7, but include other windows. We can use this
command when the boot sector is installed with windows that is not original
copy. This means low standard operating system or copyright. And we also use it
when the boot sector is damaged. When the original windows is installed and use
another version to replace it.
(1)
The 3rd command I used was to rebuild the
Boot confuguration Data (BCD)
C:\>Bootrec.exe
/RebuildBCD
This
command is used to fix some error in the BCD. The BCD is where a complete list
of what is being load when your state your booting. Also some booting errors
are as a result of damaged or missing files in BCD which we use /Rebuildbcd to
fix.
(2)
The Final Command I issued before the Hackers Disabled
my repair was:
C:\>Bootrec.exe
/Scanos
This
command is issued when we have multiple operating system installed in our
systems but not all of them are available. This command will select the current
Operating System compatible for the system which are not included in the BCD
(Boot Configuration Data).
Having
completed this process, the Hacker disabled it. But due to my DVD ROM was
already failing still being the handwork of this particular hacker with the
help of Reaver magnetic device was able to manipulate my DVD ROM by deleting things
in the registry Editor. Which almost rendered the DVD ROM ineffective. The first DVD ROM I changed it because
they damaged it through the same process. The new one I replaced, yet they are
struggling with it, especially when I am running installation. Is that not
wickedness? Somebody that says that he or she is your neighbour?
The
most painful thing I experienced from this Hackers was deleting files on my new
installation disc I bought through the same mean, whenever I am running
installation they will cease the MS DOS Command through the magnetic gadget to
my WI-FI causing havock on my system. Sometime I will want to capture the
gadget to cancel it but because they are very fast in connecting, I miss the
cancellation. And whenever they connect, they must disable one thing or the
other. So I bought new Avira Rescue System software; one of the powerful
antivirus for wiping off virus from operating system. I insert the disc into
DVD Drive to run installation through MS DOS, when i switch from x:\> Drive which is one of my hard disk because the system has
dual core but one hard disk is unfunctional to E:\>
Drive which is DVD ROM and I was
successful. I then type X:\>DIR/P/W to
display the directories of the Avira virus on the DVD DISK, it showed complete.
When I tried to run installation I noticed that the DVD ROM was failing, I
tried to know what was wrong by stopping the whole process. But it was strange
because that was a new DVD.
I
tried to open the disc the second time through MSDOS, behold the Avira Virus CD
was empty, the files I saw initially had been wiped out by the hackers, I
noticed that the hackers who I knew their locations had deleted my the file on
my DVD ROM through MS DOS by connect to my wi-fi, I was mad, I have to pick up
my phone and alerted the police of the incident, I told them to investigate in
the matter. Because things are getting out of hand. I would have go to state
CID the following day to make the official report but it was a Sanitation day
which was Saturday. I suspended it. So with evidence I know I can catch up with
their wickedness.
I
also noticed someone organise teenage boys of 14, 15, 16 and 17 years to use the same monitoring gadget
like phone and laptop, under my yard, all they do is to copy my blogging message
through wi-fi whenever I am ready to send it. I wonder how people that are
martured enough who knows that they cannot read and write, instead of embarking
on a seroius trade that will yield them profit at the long run will cease
criminality to achieve success. That does not work these days. Those things
they are copying are waste, because when the original person relocate to
another destination their blogs will fold up. They better start from scratch to
learn how to write and type as well as the techniques to blog. This is the main
thing that makes a successful blogger. And google can never approve a copyright,
may be you thing they don’t know the original owner of those write up. They know.
And that is their duty.
Next
thing I did was to get the evidence to stop the Hackers on my system with IP
addresses I copied down and their port number, I have to do this with my friend
in another sytem because mine is no more working. But I first tried it in my
system before proceeding to another one.
Now
in achieving this I have to take the following steps:
(1)
After restarting
the system and pressing F1
(2)
I choose launch
for repair
(3)
After the
attempted repair and it showed information that it cannot repair the system
(4)
I close the
report
(5)
Click on Advance
option when it showed up
(6)
I have to click
Next
(7)
It requested for
my Administrator password which I inserted
(8)
It now displayed
five options to include:
A. Startup Repair
B. System Restore
C. System Image Recovery
D. Windows Memory Diagnostic
E. Command Prompt
(9)
I have to choose the last option which is the
command prompt, it took me to MS-DOS environment.
(10)
I have to type NETSTAT –ANO again to know the active
established connections. I copied their Ip addresses from the Foreign address
column and their Host ID or name from the PID column. And use the same MS DOS
command to trace route location and information about them.
X:\>
tracert *type ip address/Hostname*
The above command gives you details of the hackers and
his ISP Company, what the command does is to give you the information of the
source of the attacker from his system which he uses to attack both time and
date. But you should know that the address listed before the final one always
belongs to the Hacker’s ISP Company.
(11)
Simply Print the
information from MS DOS
(12)
And use it as an
evidence, report it to your local police department for further tracing route.
Now the duty of the police is to contact the ISP Company of the Hacker and
trace them from there.
Another
thing I did was to eliminate some virus they cease to operate using MS DOS
Command:
TYPE:
X:\> DIR/P/W
and hit the
enter key
X:\>
Attrib –r –s –H ** /S /D
Or
X:\>
Attrib –r
Once
the directories displays, delete or
remove the ones that ends with
extensions like: .inf, .exe, .dll and
.log
Example:
X:\> Del SETUP.EXE
But
if anyone refuses to delete rename it, example rename emeka.exe with emeka.bak
I
also noticed that fixmbr command can damage a system partition table if a virus
is present or if a hardware problem exist. And once damaged partitions might be inaccessible, so that data cannot be used. So
I have to go and get mini tool partition wizard Bootable CD to rebuild MBR to
avoid bringing dmage to data and partition. But I notice mine partition is
damaged already. But I cannot penetrate the DVD ROM due to the Hacker keep on
deleting the file on the disc. Though the file will be there, but access denied
is showing that the files have been deleted.
So
I have to remove it from that environment to repair it some other place,
because I don’t have the facilities to format and reinstall programs. So I went
to a road side computer engineer who aid me with his tools and we formatted the
system and reinstall anti virus first before installing new windows unltimate 7
as well as copying back the files. At least the system has come back to it initial
state, but the hackers are still trying on to penetrate by all means. So it is a continuos monitoring affairs.
WRITTEN BY ONYIA EMEKA HARFORD
+2348186388641b
No comments:
Post a Comment