Geeks on Site Warns of Remote Repair Hackers

 

 


 

 The past few years we have seen a rise in fixing computers remotely through an internet connection as a viable alternative to on-site computer repair. The convenience of having one's computer fixed from the comfort of home, many times at a lower cost, has contributed to the growing number of customers who prefer this method of computer repair. However, more customers translate to more remote support providers and more competition, which in turn has had a negative impact on the methods used to obtain customers.

Online computer repair companies use third-party software, such as remote control software or virtual network computing (VNC) software, to establish a remote connection. A software tool is downloaded to the customer's computer with permission, and once the application has been installed it creates an interface between the remote technician's computer and the customer's computer. The technician can see the customer's screen, move the cursor around and initiate scans and use software for diagnostic repairs. The customer in turn can follow the technician's work on the computer and intervene with his or her mouse if required. Remote access software uses a proprietary remote desktop protocol that is transmitted via Transport Layer Security (TLS). TLS and its predecessor, Secure Socket Layer (SSL), are protocols that allow secure communication over networks. Establishing a remote session is thus as secure as online banking or purchasing products or services from a reputable retailer.
genuine hackers for hire however have found ways in which to break into remote repair sessions. For example, hackers can detect established remote connections and locate connected customers through their IP address. While a remote technician is working on a computer the hacker can call the customer and ask him or her to disconnect. The hackers then re-establish the connection from their own location and steal the customer from the original remote support provider. Not only does this unethical method of acquiring customers present a security threat to the customer, but it is also a headache for legitimate remote repair companies trying to gain ground in the market.

Go here To get about much more details : black hat hackers for hire


Another example of remote repair hacking is MTIM attack, i.e. the "Man in the Middle" attack. Here the attacker poses as the server towards the user, and as the user towards the server. The attacker, in this case, can sit between the two parties while accessing the data in transit. Therefore the computer technicians establishing the remote connection must be sure that the computer they are about to exchange data with is really the one to which they intended to connect. Computer repair companies do so by establishing the connection while on the phone or on the chat with the customer. Customers should be advised to write down their technician's name, so that if they have any doubts about the legitimacy of the technician they can call their repair service providers and check if the person operating their computer is who he claims to be!

After a remote session the client might be concerned that the technician still has access to his or her computer. A legitimate computer repair company will always remove all software tools that enabled the remote access. To make sure that this has been done accordingly, you can try the following:

* Check your Firewall. Go to START (Windows button) > CONTROL PANEL > windows FIREWALL. On the Exceptions tab you will see a list of programs. The programs that are checked have access to your computer. Go through the list and see if there is a program you are not familiar with or that matches VNC, remote control or similar. You can block the unwanted program's access by un-checking it.

* Check in your Task Manager CLTR + ALT + DEL which applications and processes are running on your computer.

* Run anti-spyware and anti-keylogger programs.

* A keylogger is a program that records each keystroke a user types on the keyboard. There are two types of keyloggers: hardware and software. A hardware keylogger is a physical device under your keyboard that you can only detect by physical inspection. To detect a software keylogger look in startup applications as follows: START > RUN > type MSCONFIG and in the Startup tab look for any unusual looking applications that would imply key logging or remote access and disable them (but be sure to ask for advice from a tech savvy person if you are not sure of what you are disabling!).

Finally, common sense and caution will take most consumers a long way. In an increasingly virtual world security threats are always present; but luckily a lot of systems have been put in place to protect the guy next door who just wants to get his computer fixed.

Geeks On Site provides computer repair and support services to homes and businesses nationwide, both onsite and remotely. Services include but are not limited to: PCs/Macs, networks, printers and scanners, PDAs and MP3 players, software and hardware.

Read more

Comments

Popular posts from this blog

New post

new blog post

Genuine Hackers For Hire