Risk of system getting hacked through the internet or Wi-fi?

%3CLINGO-SUB%20id%3D%22lingo-sub-2247936%22%20slang%3D%22en-US%22%3ERisk%20of%20system%20getting%20hacked%20through%20the%20internet%20or%20Wi-fi%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2247936%22%20slang%3D%22en-US%22%3E%3CP%3EDear%20everyone%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20am%20not%20a%20high%20profile%20person%20or%20anything%20like%20that.%20I%20just%20dislike%20the%20idea%2C%20that%20someone%20with%20bad%20intentions%20could%20access%20my%20personal%20files%2C%20documents%2C%20photos%20etc.%20(personal%20diary%2C%20baby%20pictures%20of%20my%20children%20etc.)%3C%2FP%3E%3CP%3EI%20am%20not%20worried%20about%20anyone%20getting%20a%20look%20at%20my%20internet%20traffic%20%2F%20man-in-the-middle%20attack%20etc.%20I%20am%20only%20concerned%20about%2C%20that%20someone%20with%20bad%20intentions%20being%20able%20to%20access%20my%20personal%20files.%3C%2FP%3E%3CP%3EI%20assume%2C%20that%20it%20is%20not%20impossible%20to%20%E2%80%9Chack%E2%80%9D%20my%20system%20and%20get%20access%20to%20my%20files%2C%20but%20%E2%80%9Chow%20hard%E2%80%9D%20would%20it%20be%20for%20someone%20commited%20to%20the%20task%3F%3C%2FP%3E%3CP%3EIs%20the%20only%20way%20to%20access%20my%20files%2C%20if%20they%20planted%20malware%20on%20my%20system%3F%3C%2FP%3E%3CP%3EOr%20if%20they%20accessed%20screen%20share%3F%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%3CP%3EMy%20questions%20concerns%20both%3A%3C%2FP%3E%3CP%3EIf%20the%20person%20accessed%20%2F%20hacked%20my%20wi-fi%20%2F%20home%20network%3C%2FP%3E%3CP%3EOr%3C%2FP%3E%3CP%3EOnly%20through%20the%20internet%3CBR%20%2F%3E%3CBR%20%2F%3ESettings%3A%3C%2FP%3E%3CP%3EMicrosoft%20Windows%2010%20Home%3C%2FP%3E%3CP%3EWindows%20login%20password%20protected%3C%2FP%3E%3CP%3EWindows%20Defender%20firewall%3C%2FP%3E%3CP%3ENo%20file%20or%20folder%20sharing%20enabled%3C%2FP%3E%3CP%3ENetwork%20discovery%20is%20turned%20off%3C%2FP%3E%3CP%3EFile%20and%20printer%20sharing%20is%20turned%20off%3C%2FP%3E%3CP%3EAVG%20registers%20threats%20in%20real-time%3C%2FP%3E%3CP%3EAll%20software%20drivers%20etc.%20fully%20updated%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWi-fi%20is%20password%20protected%3C%2FP%3E%3CP%3ENetwork%20%2F%20Wi-fi%20profile%3A%20Private%3C%2FP%3E%3CP%3ERouter%20security%20WPA2-Personal%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20become%20uneasy%2C%20when%20I%20read%20posts%20like%20this%2C%20which%20makes%20it%20sound%20%E2%80%9Ceasy%E2%80%9D%3A%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.quora.com%2FCan-a-hacker-control-my-computer-through-Wi-Fi-connection-only%2Fanswer%2FAaron-Shbeeb%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.quora.com%2FCan-a-hacker-control-my-computer-through-Wi-Fi-connection-only%2Fanswer%2FAaron-Shbeeb%3C%2FA%3E%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.quora.com%2FHow-do-I-hack-a-computer-on-same-network%2Fanswer%2FHar**bleep**-Dangwal%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.quora.com%2FHow-do-I-hack-a-computer-on-same-network%2Fanswer%2FHar**bleep**-Dangwal%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPlease%20let%20me%20know%2C%20if%20I%20shall%20add%20more%20info%20concerning%20the%20above.%3CBR%20%2F%3E%3CBR%20%2F%3EThanks%20in%20advance%20for%20replying%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EBest%20regards%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2248371%22%20slang%3D%22zh-CN%22%3EReply%3A%20Risk%20of%20system%20get%20hacked%20via%20internet%20or%20Wi-fi%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2248371%22%20slang%3D%22zh-CN%22%3Eit%20depends%20the%20software%20what%20you%20used...%20%3CBR%20%2F%3E%201.keeping%20the%20firewall%20running%2C%20%3CBR%20%2F%3E%202.close%20the%20software's%20upload%20function%20%3CBR%20%2F%3E%203.make%20sure%20the%20softwares%20you%20need%20are%20download%20from%20offical%20website%20or%20application%20store%20%3CBR%20%2F%3E%204.I%20used%20360%20Antivirus%20software%2Cyou%20can%20try%20it%2Cit%20has%20a%20function%20named%20Network%20traffic%20monitoring.%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2248374%22%20slang%3D%22zh-CN%22%3EReply%3A%20Risk%20of%20system%20get%20hacked%20via%20internet%20or%20Wi-fi%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2248374%22%20slang%3D%22zh-CN%22%3Eby%20the%20way%2Ckeep%20hotfix%20has%20been%20upgraded%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2249163%22%20slang%3D%22en-US%22%3ERe%3A%20Risk%20of%20system%20getting%20hacked%20through%20the%20internet%20or%20Wi-fi%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2249163%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%20for%20your%20question%20and%20this%20is%20a%20valid%20concern%26nbsp%3Bnot%20only%20for%20you%20but%20with%20everyone%20who%20is%20using%20any%20device%20connected%20to%20the%20internet.%20We%20couldn't%20setup%20a%20system%20and%20make%20it%20impossible%20to%20hack%20but%20we%20could%20make%20it%26nbsp%3Bvery%20hard%20and%20expensive%20to%20hack%20%2C%20so%20the%20hacker%20would%20look%20for%20other%20target%20and%20normally%20hackers%20would%20go%20for%20easier%20target%20unless%20you%20have%20some%20special%20or%20sensitive%20data%20which%20is%26nbsp%3Bnot%20your%20case.%3C%2FP%3E%3CP%3EFirst%20you%20need%20to%20secure%20your%20Wi-Fi%2C%20you%20should%20setup%20strong%20Wi-Fi%20password%20which%20you%20did%20and%20also%20place%20Wi-Fi%20in%20a%20location%20which%20is%20accessible%20with%20your%20family%20members%20and%20devices%20and%20less%20access%20with%20outsiders%20and%20neighbors%2C%20somewhere%20in%20the%20middle%20of%20house%20would%20be%20nice.%20You%20may%20also%20use%20a%20feature%20called%26nbsp%3BMAC%20filtering%2C%20every%20device%20would%20have%20a%26nbsp%3BMAC%20Address%20and%20you%20could%20setup%20it%20to%20only%20permit%20your%20devices%20to%20access%20the%20Wi-Fi%20and%20block%20other%20devices%20which%20are%26nbsp%3Bnot%20listed%20and%20you%20may%20regularly%20check%20list%20of%20connected%20devices%20and%20in%20case%20you%20see%20any%20unknown%20devices%2C%20then%20investigate%20and%20if%20you%20believe%20it%20is%20a%20hacker%2C%20then%20block%20it%20and%20change%20your%20Wi-Fi%20password.%20All%20these%20settings%20are%20in%20your%26nbsp%3BWi-Fi%20router%20and%20may%20refer%20to%20its%20manual%20for%20additional%20protections.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHowever%2C%20as%20for%20Windows%20%2C%20it%20is%20important%20to%20make%20sure%20update%20your%20Windows%2C%20Anti-Malware%20product%20and%20all%20of%20your%20applications%20regularly%20and%26nbsp%3BNEVER%20download%20anything%20from%20untrusted%20sources%20and%20never%20open%20suspicious%20files%20and%20emails%20and%26nbsp%3BNEVER%20click%20on%20untrusted%20links.%20Hackers%20might%20use%20several%20methods%20to%20get%20into%20your%20system%20and%20let%20say%20if%20your%20system%20is%26nbsp%3Bnot%20update%2C%20they%20only%20scan%20and%20find%20a%20vulnerable%20system%20and%20try%20to%20hack%20into%20it.%20If%20it%20is%20NOT%20possible%2C%20they%20will%20try%20to%20send%20you%20a%20malicious%20link%20%2C%20file%20%2C%20application%20or%20they%20might%20share%20it%20somewhere%20and%20you%20download%20it.%20These%20are%20basic%20tips%20and%20easy%20to%20implement%20but%20they%20provide%20you%20with%20a%20great%20security%20advantage.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2249882%22%20slang%3D%22en-US%22%3ERe%3A%20Risk%20of%20system%20getting%20hacked%20through%20the%20internet%20or%20Wi-fi%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2249882%22%20slang%3D%22en-US%22%3EIs%20there%20a%20method%20%2F%20log%20system%2C%20where%20I%20can%20if%20any%20alien%20devices%20has%20connected%20to%20my%20network%3F%3CBR%20%2F%3E%3CBR%20%2F%3EIf%20a%20hacker%20should%20get%20access%20to%20personal%20files%20through%20the%20internet%2C%20are%20these%20the%20only%20ways%3A%3CBR%20%2F%3E%22they%20will%20try%20to%20send%20you%20a%20malicious%20link%20%2C%20file%20%2C%20application%20or%20they%20might%20share%20it%20somewhere%20and%20you%20download%20it%22%20%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2250928%22%20slang%3D%22en-US%22%3ERe%3A%20Risk%20of%20system%20getting%20hacked%20through%20the%20internet%20or%20Wi-fi%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2250928%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20case%20you%20are%20referring%20the%20Wi-Fi%20network%20or%20router%2C%20you%20need%20to%20refer%20to%20the%20manual%20for%20your%20Wi-Fi%20router%20because%20it%20depends%20on%20the%20manufacturer.%3CBR%20%2F%3EYou%20may%20also%20check%20the%20%3CSTRONG%3EEvent%20Viewer%3C%2FSTRONG%3E%20in%20Windows%20and%20also%20try%20open%20%3CSTRONG%3EResource%3C%2FSTRONG%3E%20%3CSTRONG%3EMonitor%3C%2FSTRONG%3E%26nbsp%3Bto%20observe%20logs%20and%20activities%20in%20your%20Windows.%20These%20would%20need%20some%20advance%20knowledge%20but%20in%20the%26nbsp%3B%3CSTRONG%3EResource%20Monitor%3C%2FSTRONG%3E%20you%20may%20check%20the%20network%20tab%20and%20see%20if%20there%20is%20any%20suspicious%20application%20or%20connection.%3C%2FP%3E%3CP%3EMethods%20I%20shared%20are%20the%20most%20common%20ways%20but%20like%20I%20said%2C%20in%20case%20you%20won't%20update%20your%20Windows%20or%20turn%20off%20your%20Firewall%2C%20they%20will%20be%20able%20to%20gain%20access%20even%20if%20you%20are%20connected%20to%20the%20internet.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Contributor

Dear everyone

 

I am not a high profile person or anything like that. I just dislike the idea, that someone with bad intentions could access my personal files, documents, photos etc. (personal diary, baby pictures of my children etc.)

I am not worried about anyone getting a look at my internet traffic / man-in-the-middle attack etc. I am only concerned about, that someone with bad intentions being able to access my personal files.

I assume, that it is not impossible to “hack” my system and get access to my files, but “how hard” would it be for someone commited to the task?

Is the only way to access my files, if they planted malware on my system?

Or if they accessed screen share?

My questions concerns both:

If the person accessed / hacked my wi-fi / home network

Or

Only through the internet

Settings:

Microsoft Windows 10 Home

Windows login password protected

Windows Defender firewall

No file or folder sharing enabled

Network discovery is turned off

File and printer sharing is turned off

AVG registers threats in real-time

All software drivers etc. fully updated

 

Wi-fi is password protected

Network / Wi-fi profile: Private

Router security WPA2-Personal

 

I become uneasy, when I read posts like this, which makes it sound “easy”:

https://www.quora.com/Can-a-hacker-control-my-computer-through-Wi-Fi-connection-only/answer/Aaron-Sh...

https://www.quora.com/How-do-I-hack-a-computer-on-same-network/answer/Har**bleep**-Dangwal

 

Please let me know, if I shall add more info concerning the above.

Thanks in advance for replying


Best regards

13 Replies
it depends the software what you used...
1.keeping the firewall running,
2.close the software's upload function
3.make sure the softwares you need are download from offical website or application store
4.I used 360 Antivirus software,you can try it,it has a function named Network traffic monitoring.
by the way,keep hotfix has been upgraded

@emil frederiksen 

Thank you for your question and this is a valid concern not only for you but with everyone who is using any device connected to the internet. We couldn't setup a system and make it impossible to hack but we could make it very hard and expensive to hack , so the hacker would look for other target and normally hackers would go for easier target unless you have some special or sensitive data which is not your case.

First you need to secure your Wi-Fi, you should setup strong Wi-Fi password which you did and also place Wi-Fi in a location which is accessible with your family members and devices and less access with outsiders and neighbors, somewhere in the middle of house would be nice. You may also use a feature called MAC filtering, every device would have a MAC Address and you could setup it to only permit your devices to access the Wi-Fi and block other devices which are not listed and you may regularly check list of connected devices and in case you see any unknown devices, then investigate and if you believe it is a hacker, then block it and change your Wi-Fi password. All these settings are in your Wi-Fi router and may refer to its manual for additional protections.

 

However, as for Windows , it is important to make sure update your Windows, Anti-Malware product and all of your applications regularly and NEVER download anything from untrusted sources and never open suspicious files and emails and NEVER click on untrusted links. Hackers might use several methods to get into your system and let say if your system is not update, they only scan and find a vulnerable system and try to hack into it. If it is NOT possible, they will try to send you a malicious link , file , application or they might share it somewhere and you download it. These are basic tips and easy to implement but they provide you with a great security advantage. 

Is there a method / log system, where I can if any alien devices has connected to my network?

If a hacker should get access to personal files through the internet, are these the only ways:
"they will try to send you a malicious link , file , application or they might share it somewhere and you download it" ?

In case you are referring the Wi-Fi network or router, you need to refer to the manual for your Wi-Fi router because it depends on the manufacturer.
You may also check the Event Viewer in Windows and also try open Resource Monitor to observe logs and activities in your Windows. These would need some advance knowledge but in the Resource Monitor you may check the network tab and see if there is any suspicious application or connection.

Methods I shared are the most common ways but like I said, in case you won't update your Windows or turn off your Firewall, they will be able to gain access even if you are connected to the internet.

Regarding the Event Viewer - what shall I look for, if I want to fint out, "hacker" has gotten access to my system?

I have used Resource Monitor alot. I have used it at it a couple of minutes, each week (this was for another topic). Here I have noted network activity and network processes. I have researched / clarified all the ID's i have seen, and none of them were "alien" or critical.
Resource Monitor will display in real-time.
Event Viewer would need some expertise and skills and you have to go through log files and know how to investigate it.
However, the most easier way would be performing a full scan with updated Anti-Malware program , because if anyone wants to access to your PC, normally they will place a Hacking tools or Trojans which are being detected by Anti-Malware product.
Hi! The easiest way to take over your computer is to gain the trust of device owners = you will consent to access in a way that is not aware of what you are doing! It's the daily struggle with elections that really decides! Any OK :ok_button: maybe after 2 clicks can cause unauthorised access = being on the Net, but I think you have nothing to worry about private computers not interested in hackers, more malware - can cause data loss and it is very possible . Just copy on external media, or OneDrive, loo not store sensitive data on your PC and sleep peacefully without worries! Just copy on external media, or OneDrive, loo not store sensitive data on your PC and sleep peacefully without worries! Thank you very much!
I will try to research Event Viewer further.

I often scan my system, and I never have any malware etc.
Do you mean, that someone could place a button on their website, that I somehow clicked by mistake, so I would grand them access to my PC?

Or could you please try to elaborate.

Thank you!

Witam To jest dokładnie tak, jak to się robi! Skanowanie nie zrobi nic w tym przypadku, ponieważ sam dał pozwolenie na działanie na urządzeniu! ale nie powinieneś mieć obsesji na jego punkcie! To programy antywirusowe tworzą taką atmosferę, aby udowodnić, że pomogły ci tak bardzo i dobrze, że jest to ich produkt wybrałeś = marketing! normalne korzystanie z komputera jest naprawdę bezpieczne! Powodzenia!

Hi This is exactly how it does it! The scan will do nothing in this case, because he himself gave himself permission to allow the device! but you shouldn't be obsessed with it! For antivirus programs create such an atmosphere to prove that so much and well that it is up to their product you have chosen = marketing! normal use of the computer is really safe! Good luck!

Could you please try to reply in english?

It tried translating it from Polish to English, and I was not quite sure about the meaning.
Excuse me! I forgot to translate . Hi This is exactly how it is done! The scan will not do anything in this case, because he himself gave permission to operate on the device! but you shouldn't be obsessed with it! It is antivirus programs create such an atmosphere to prove that they have helped you so much and well that this is their product you have chosen = marketing! normal use of the computer is really safe! Good luck! Addsm yet that the same interest in security will help everyone on this Forum MTC thank you for the topic! Andrzej