Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and beginning April 20th, 2021 (Eastern Time) the Yahoo Answers website will be in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.

RICK asked in Computers & InternetSecurity · 1 decade ago

How do I get rid of a hacker who has gotten into my network?

He has compromised my blackberry via bluetooth, and gotten onto all my Windows 98 machines. I have closed all ports except 80, and even tried changing the static IP address for the network.

2 Answers

Relevance
  • 1 decade ago
    Favorite Answer

    If somebody gets into your cell phone from your computer, he had to hack into your computer first. If you have done all this, and some hacker is still dogging you, the most likely thing explanations are:

    1) Somebody who has access to back doors programmed into your OS and security protocols for NSA. In that case, the only thing you can do is get a new ISP/email accounts under an assumed name. You would really need to ask yourself why would these guys have so much interest in you.

    2) Somebody who can get access to your passwords and computers. In other words somebody who belongs inside your network, and wishes to dog your paranoia in order to make you look like a fool. In that case, you need to catch him/her. This is most likely the person who will "fix" the problem once you are out of the way.

    Note: When this is the problem, sometimes things will magically act normal when you bring in an outside consultant to fix things.

    3) Somebody good at hacking, but not in such a powerful position as the 2 possibilities above.

    In that case you might be able to frustrate him by using layers of routers.

    ________ ________ ______________________________

    | internet |--> | Router 1 |-->| Old infected computers to distract |

    -------------- -------------- ----------------------------------------------------

    |

    ________ ______________________________

    | Router 2 |-->| Linux computers armed with dtrace|

    --------------- ----------------------------------------------------

    |

    ________ ______________________________

    | Router 3 |-->| New computers in sub sub network|

    --------------- ----------------------------------------------------

    The reserved IP address ranges for setting up sub nets are shown in the table below:-

    NAT is sometimes and perhaps more accurately, called Port Address Translation (PAT) but NAT is what it's commonly known as.

    Internet IP addresses are sometimes called Public IP addresses.

    Internal LAN IP addresses are sometimes called Private IP addresses.

    Start Address End Address Number of Individual IP Addresses

    192.168.0.0 192.168.255.255 65,536

    172.16.0.0 172.31.255.255 1,048,576

    10.0.0.0 10.255.255.255 16,777,216

    Good Luck.

    Update your OS.

  • Danf2
    Lv 4
    1 decade ago

    Your question makes no sense, bluetooth via blackberry would mean that the hacker would have with in about 3 yards of you. Also Bluetooth on a blackberry is quite secure.

    Also, how is your blackberry tied to your home network? Wi-fi connection? if so, that connection is very limited.

Still have questions? Get your answers by asking now.