Free tools to protect your PC from attack

Process Explorer
Process Explorer gives you a comprehensive view of your running system, so it's a useful tool to have around during security emergencies

From a neighbour stealing your Wi-Fi bandwidth to a professional hacker using your hardware to attack a high-value target, hacking comes in many forms. We're going to look at common hacking scenarios and learn how to detect and deal with unauthorised activity.

The first reaction many people have to the possibility of their computer being hacked is one of disbelief. Who would bother, they ask, to hack a home server that's of limited interest to the world? In fact, it's this very obscurity that's so attractive to serious professional hackers.

Process expolorer verify

If there's a process you don't recognise, right-click on it and select 'Search Online...'. This opens a browser and searches the web for information about the process. If it's malicious, the results will soon tell you so.

Secure your Wi-Fi

Now let's examine a social problem that still catches out users of older Wi-Fi equipment. If your computer is switched off, yet the data lights on your Wi-Fi router are blinking away like mad, you should be suspicious.

If, in conjunction with this, you find that when you use the internet, your connection is slower than it used to be, you should assume the worst: someone in the vicinity is using your Wi-Fi connection.

Some people think it's OK to steal wireless bandwidth rather than buying their own. Some believe it's acceptable to do so for a few days while they wait for a provider to hook them up. The simplest way to lock out freeloaders is to access your Wi-Fi router's web interface and select 'WPA security'.

You'll have to consult the manual for your router to find out how to do this on your hardware. If your router and Wi-Fi network cards support WPA2 security, it's best to use this because it's stronger.

Some security consultants now also advise further deterring people looking to leech Wi-Fi by giving your network an unappealing name. Something like 'Unstable network' is good, but 'Infected network' may be a better option.