Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
ok maybe i am paranoid but its because i do know someone is in my system and i know who it is. Even when i reformat my Harddrive he is able to get back into my system by the way i dual boot red hat and windows ME. But im talking about when i use windows for this problem. He is able to get in i dont know how i have dynamic ip i use phone line i use a stealth firewall im even behind a router and this person is still able to track me down and get in and he does it fast too. The reason why i know he does it fast is because when i reformatted and got all my software installed (i didnt put any data that was in before. It was a clean install and all the software were from cd's that i purchased so no trojans couldve been installed.) I connected to the internet and installed a chat program that i used put fake information name everything and than BOOM! he sent me a message trying to be someone else. I also put the option for others not to see me online or offline for icq. Maybe someone knows how he got in my system in a matter of minutes after i reformatted my HD?
When using Windows, never connect to the internet without installing something like ZoneAlarm first. Download with Linux, install Windows, install ZoneAlarm and watch your internet connection carefully. Windows is not secure out of the box. It's probably the chat program that lets him through.
dont ever directly connect to someone on a chat program such as aim or somthing like that... its easy to get IPs and such from someone without then knowing..... btw sending messages to a computer through DOS is easy and maybe it makes him think hes cool... btw if hes sending messages that doesnt mean hes actually inside his system.... tis a simple dos command.... give me details on what he does..
i do install a firewall a very good one like norton internet security 2003 and i get all the updates and the icq program i made a new account with fake info this is how i know and there is a few other ways i know hes in he also deletes all my programs a few times so than none of them work.
I agree with fancypiper, disconnect your internet connection re-format and then re-install windows, add your Firewall, place a password on your grub file, then after everything is up and running then re-connect to the internet using Windows and go straight to the Windows Update add all security patches and watch your firewall.
JayCnrs thats exactly what i did many many many times and he constantly gets in. The only way i think he gets in is if he hacked my isp's server and got my ip tables and knows what ip i use and than goes from there. Is this a possiblilty?
Any more ideas?
ive been told he keeps getting into my system cause if you have dynamic ip you can just go to the isp's website and type the persons userid and log into your account and you can check what ip the person is using someone correct me if im wrong about this.
What kind of internet connection do you have? Nearly all broadband service providers issue you a semi-static IP address (it's not permanent but your "lease" on the IP doesn't expire each time you log off, but rather on a certain date). Some dialup places do as well. Also, if you're behind a router, and you have a cable or DSL modem that plugs directly into the router rather than one of your computers, then the modem itself never actually logs off unles it power-cycles or the ISP cuts the connection on their end. Either way, it sure sounds as if the guy is using your IP address to track you down, at least if you have a static or semi-static IP.
i have dsl and my router does switch ip every once inawhile. Ive checked about the website logging your ip and it doesnt. At least not the isp im with. Than the only way he could possibly do it is by ip scanning me within a range and checking for what vulnerabilities i have but the part i dont get is i use a stealth firewall norton 2003 maybe he uses some other kind of stealth scan. Who agrees with this?