Computers are hacked for a variety of reasons with a purpose, such as to steal credit card details for fraudulent use or a list of e-mail addresses for the purpose of unsolicited e-mail.
There are a variety of tools and methods used by hackers. No matter what tools they use, there is one thing that remains true that the hacker cannot change. They must access your information through your internet connection. As with viruses, the hacker-blocking software (firewall) monitors these connections for any abnormal activity. It alerts the user to this abnormal activity, block the connection, destroying the link between the hacker's computer and yours, preventing them from accessing your data.
Many security software have firewall, this should take care of low to med level hackers. High-level hacker would not be interested in your spreadsheet or password, they have higher goals and like to focus on some tough targets, for ex: CIA ......
|