Тёмный

How to Check if Someone is Remotely Accessing Your Computer 

Britec09
Подписаться 814 тыс.
Просмотров 460 тыс.
50% 1

How to Check if Someone is Remotely Accessing Your Computer
have you got a suspension someone is accessing your computer? I will show you how to detect a remote access to your PC. Sometimes malware can cause major problems with your pc where it will add a malicious files which opens a backdoor on your computer.
Process Explorer
learn.microsoft.com/en-us/sys...
TCPView
learn.microsoft.com/en-us/sys...
Download Kaspersky Rescue Disk
www.kaspersky.co.uk/downloads...
HitmanPro
www.hitmanpro.com/en-us
🔔 SUBSCRIBE for more:
ru-vid.com...
------------------------------------------------------------------------------------------
🛍 Support me with your Amazon purchases:
UK amzn.to/3diZslY
US amzn.to/2OwZWux
Please note that as an Amazon Associate I earn a commission from any qualifying purchases that you may make through these links.
------------------------------------------------------------------------------------------
❤️ Join Britec RU-vid Members:
/ @britec09
------------------------------------------------------------------------------------------
📃Watch related playlists and videos
🖥️ / britec09
------------------------------------------------------------------------------------------
👕Check out our merch:
teespring.com/en-GB/stores/br...
------------------------------------------------------------------------------------------
💻Discord Access:
/ discord
------------------------------------------------------------------------------------------
🐦Follow and interact with me on Twitter:
/ britec09
------------------------------------------------------------------------------------------
✅Follow and interact with me on Facebook:
/ briteccomputers
-----------------------------------------------------------------------------------------
🎬 View my Website:
BritecComputers.co.uk
-----------------------------------------------------------------------------------------
#windows11 #windows10 #tech

Опубликовано:

 

18 окт 2023

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 330   
@jbrou123
@jbrou123 7 месяцев назад
What I got from this video. How to Check if Someone is Remotely Accessing Your Computer 1. Open up Task Manager and look for rogue programs. 2. Run programs that look for roque programs. Thanks, that helps a lot.
@BillAnt
@BillAnt 7 месяцев назад
lol
@leecowell8165
@leecowell8165 6 месяцев назад
Unless of course they're ain't no "Task Manager" what then? Yeah under linux WTF IS THAT?
@jjcdrumplay
@jjcdrumplay 3 месяца назад
​​@@leecowell8165Linux has process managers. Try Linux mint, lubuntu, etc .
@eddiesneeh4266
@eddiesneeh4266 5 месяцев назад
Part of the problem is Windows is so primitive they allow any program to get installed anywhere the creator wanted even in the OS area. The OS should be protected, no one should be installing anything in the OS directory. Each application should be installed under its own tree, and it should not require root for installation. Applications should not be using OS locations, OS utilities, OS "registries", OS anything other than using shared system libraries (that are read-only). This chaotic, messy setup that Microsoft has created makes it difficult to see if a process is legit or not.
@kpv123
@kpv123 7 месяцев назад
This is Michael. I usually like your work but this was pretty useless. The first major fail is that you don't tell people how to disable remote access. The second is that there's no way the average person can know what's a rogue program when there are so many weird names on programs in the operating system both in terms of processes and services. The only useful things you said were to get a good antivirus program and utilize process Explorer
@Pancajayna
@Pancajayna 7 месяцев назад
There are literally thousands of files and processes that he can't even start to address for the "average person"... this is a first step and then you can HIRE a tech if you find something OR you can check the names one by one and research it YOURSELF... what do you really think this is?
@t.stephen5086
@t.stephen5086 7 месяцев назад
He could've shown how to disable remote access as you suggested, that would be the first step a non tech person should so
@flashwashington2735
@flashwashington2735 7 месяцев назад
@@t.stephen5086 Because mal ware would never mal that? Still it should be done, but what about governments, mandatory OS and hardware backdoors? Microsofts continual data collection and giving to governments? And the big corporates' anti spy - malware's backdoors and data sharing an awfulot of vectors for compromise and harm? Well, do what you will and can. God bless.
@jimkyle8008
@jimkyle8008 7 месяцев назад
My thoughts exactly. The information might be useful if you're a computer nerd, but it's pretty meaningless to the average user.
@Hs5687
@Hs5687 6 месяцев назад
Hi Guys , just wanted to let You know that if You are Politically Targeted , try not to rely too much on Internet … even Telcos can be Compromised…
@yourpcmd
@yourpcmd 7 месяцев назад
The only rogue programs I see in Task Manager are Chrome and Microsoft.
@homuraakemi9556
@homuraakemi9556 7 месяцев назад
Yes, I'm pretty sure some of the things he was pointing out in task manager were actually normal. Search being paused/suspended by Windows is totally normal, for example.
@RAM_845
@RAM_845 7 месяцев назад
Windows 11 is a rouge program haha
@Britec09
@Britec09 7 месяцев назад
You obviously don't know anything about windows
@myekuntz
@myekuntz 7 месяцев назад
more like forceded and enforced malware
@gittube417
@gittube417 7 месяцев назад
Change to Mac then !
@maureneschlosz6404
@maureneschlosz6404 5 месяцев назад
I have no idea what you are talking about.
@deciodasilva3960
@deciodasilva3960 7 месяцев назад
This is very very very helpful and important information man thank you...
@stephenluttrell8958
@stephenluttrell8958 6 месяцев назад
Unfortunately there aren’t a lot of accessible options when it comes to anti virus/malware software for us blind users. We are an underserved demographic in this regard.
@flashwashington2735
@flashwashington2735 6 месяцев назад
There's all kind of blindness, you'd know better than me. However, everybody needs help some times, pray and act to get it. Don't let your eyes be merely be one \ among other avoidable impairments. Life is hard enough my friend. God bless. God is still in business healing. If you believe it, if you want to believe it. Get help with your believing. Like the Father of the possessed son, Some might say epilepsy, 'I believe. Help thou my unbelief.' He asked the master. He got results. Mark 9:24:21 And he asked his father, How long is it ago since this came unto him? And he said, Of a child. 22 And ofttimes it hath cast him into the fire, and into the waters, to destroy him: but if thou canst do any thing, have compassion on us, and help us. 23 Jesus said unto him, If thou canst believe, all things are possible to him that believeth. 24 And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief. 25 When Jesus saw that the people came running together, he rebuked the foul spirit, saying unto him, Thou dumb and deaf spirit, I charge thee, come out of him, and enter no more into him. 26 And the spirit cried, and rent him sore, and came out of him: and he was as one dead; insomuch that many said, He is dead. 27 But Jesus took him by the hand, and lifted him up; and he arose. Remember: Jesus said unto him, If thou canst believe, all things are possible to him that believeth. And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief. God bless.
@OldManJimmy1
@OldManJimmy1 7 месяцев назад
Yeah, when you get a computer running Windows virused or malwareed up it's never the same just cleaning them off. Seems to leave glitches and issues from then on. Clean install of windows is the way to clean this up. Thanks for the tips on keeping an eye on malicious programs infecting our PCs
@leecowell8165
@leecowell8165 6 месяцев назад
No. The way to clean it up is to install linux because guess what IF you don't within in a month they'll be newbie malware on your box.
@OldManJimmy1
@OldManJimmy1 6 месяцев назад
I need to spend a little time learning Linux and install it on one of my computers.@@leecowell8165
@alexandercle
@alexandercle 7 месяцев назад
Thank you very much for sharing. Help a lot!
@WheelerRickRambles
@WheelerRickRambles 5 месяцев назад
I worked for a terrible employer (…didn’t know this til the end…). I was an outside sales guy where I used my personal private home computer, on rare occasions, to do some work related tasks - simple spreadsheet development, print an email, etc. Well, to my not knowing or being notified they somehow gained remote access to my computer. They could see everything, every click, every mouse move, bank accounts….ALL! It was not good, felt violated & all sorts of the like. Wish I would have known of this video content back then.
@maydaygoingdown5602
@maydaygoingdown5602 7 месяцев назад
Hi Brian. Just a quick one. If i dissable all Remote settings in windows can this type of thing still happen?? Disabling Remote settings is one of the first things ive always done.
@ripleyhrgiger4669
@ripleyhrgiger4669 7 месяцев назад
I just recieved my first high end router in my entire life (it was a Christmas gift to myself (early I know) for completing several projects at work) and I never knew just how powerful a router can be for security once configured properly. Your channel and others like it have been a great boon for a lot of people out there and we do really appreciate the hardwork you do to educate people. Seasoned IT professionals and amateurs alike always have something to learn in this field. (There is too much for us to know everything!) Thank you so much, Mr. Britec! I look forward to your next lesson!
@InstigatorDJ
@InstigatorDJ 7 месяцев назад
Oh lord.
@abrahamdsl
@abrahamdsl 6 месяцев назад
send link pls XD
@EHD351
@EHD351 7 месяцев назад
I get Phishing Emails constantly. Have to always look twice. Thanks, once again.
@RAM_845
@RAM_845 7 месяцев назад
When I check my email, I look at the address especially if the content body looks suspicious.
@excxmoody
@excxmoody 7 месяцев назад
That's exactly how it is whenever I try shopping online...where I'm literally minding my own damn business while someone else clearly cannot do so.
@Tyrael7-bf1ld6zu6s
@Tyrael7-bf1ld6zu6s Месяц назад
Report them. If there's a lot just mass delete them and report them (do both).
@KTHKUHNKK
@KTHKUHNKK 7 месяцев назад
Thank you it's nice to be aware of all that
@ros-spur98
@ros-spur98 7 месяцев назад
Cheers Brian, good to know, I do a Kaspersky Total full scan every 10 days or so.
@Britec09
@Britec09 7 месяцев назад
Good stuff
@maxgood42
@maxgood42 7 месяцев назад
@@Britec09 There was a lot of controversy over Kaspersky in the past, can you do an update about this and or other security providers ?
@thefreestylefrEaK
@thefreestylefrEaK 5 месяцев назад
@@maxgood42 No he can't because he's a tool.
@nonshatter7
@nonshatter7 7 месяцев назад
Will using a firewall/virus protection like Norton be sufficient to combat these things. I ask because you state that running multiple scans with different programs is a good idea (but having more than one antivrus package could create program conflicts.).
@nmbdy4732
@nmbdy4732 7 месяцев назад
Thanks so much for your great work with load of knowledges and details! When I click on Whois it said : Failed to get Whois information. Any suggest?
@t.stephen5086
@t.stephen5086 7 месяцев назад
Wouldn't it just be easier to type a netstat -a command to check foreign connections?
@Lachausis
@Lachausis 5 месяцев назад
not all viruses connect to the web. Some are just there to screw your OS up. So both, I guess.
@Moist_yet_Crispy
@Moist_yet_Crispy 6 месяцев назад
I have some sus processes but when I right click properties is grayed out. How else can I track down the properties address to remove?
@petefluffy7420
@petefluffy7420 7 месяцев назад
Oh very easy. Look for rogue processes, there is one problem immediately apparent. Nothing is ever identified as being rouge.
@babumohan4549
@babumohan4549 7 месяцев назад
expected video sir😊thank you❤love from India ❤😊
@Britec09
@Britec09 7 месяцев назад
Hope you enjoyed it!
@digudc
@digudc 7 месяцев назад
thank you mate.. your videos are everyday informative and helpful.. cheers..💛💙
@InstigatorDJ
@InstigatorDJ 7 месяцев назад
Information you will NEVER FUCKING NEED. But thank you bro. Jesus!!
@d1m18
@d1m18 7 месяцев назад
Still recommending Kaspersky rescue disk? I thought that does not exist and has not been updated. I loved it, but their support says it no longer exists... Correct? Can you recommend many virus rescue / boot disks to use, that are still updated?
@wannabedal-adx458
@wannabedal-adx458 4 месяца назад
"Or maybe you a have suspicion that someone is remote viewing your computer without your knowledge." You mean like Microsoft, Google, NSA, GCHQ, etc!! 😂 Thanks for a good video Brian. A good reminder to look up and use some the tools you mentioned here.
@earnestleesaddened3779
@earnestleesaddened3779 6 месяцев назад
Will regular use of SFC and DISM help to remove remote connections?
@rickoshay6554
@rickoshay6554 3 дня назад
You have a decided advantage in spotting rogue programs when you installed the rogue programs yourself. It's more problematic when someone else did it. In my experience, most of the rogue programs that plague Windows were put there by Microsoft.
@marimarmarimar25
@marimarmarimar25 3 месяца назад
Thanks!
@mikepennington8088
@mikepennington8088 7 месяцев назад
Do you expect the average user to comprehend any of this?
@danbromberg
@danbromberg 7 месяцев назад
Great video but it's helpful to have links to the programs used in your video as you often do.
@Britec09
@Britec09 7 месяцев назад
I will add them, I forgot
@therealcrazymazey
@therealcrazymazey 6 месяцев назад
wheres the link for kasper exe, only find the iso ?@@Britec09
@charleshines2142
@charleshines2142 7 месяцев назад
Is there a way to add a column to process explorer that shows any remote addresses a process may have? It would make it so you don't really have to go through each one. I can imagine some of those rats having names that sound very similar to process names found in Windows so that you might not see them as easily. It would be similar to the way some websites might have a strange character in the name that looks similar to the one in our 26 letter alphabet (unless you live somewhere the alphabet is different). Also it would not be a bad idea to have a good known clean installation media made for the OS of your choice. This way if it is a computer that will have personal stuff on it that you don't want stolen there is much less of a chance that it would happen. Just don't change your passwords and other stuff on a machine that might still be infected since the malware is likely to just send those to the person who hacked you and then they don't really help. You may even want a separate computer for personal stuff like paying bills and other similar things. It would be a computer that doesn't really have any extra software installed and is also one you never let anyone else really use. For those purposes that one can be a little NUC and then it would take a lot less desk space than a typical PC while having all of the functionality. They are not something that I would game on but they would be good for trying out Linux if you are not ready do install it on all computers. I really have only installed Linux on a spare PC just to get used to it before I ever attempt to switch the other ones over. It is just a spare one that I can use to learn to get used to Linux and has no data on it for me to worry about losing accidentally and nothing sensitive to worry about falling into someone else's hands.
@spherasidereal
@spherasidereal 7 месяцев назад
Will Malwarebytes installed in my PC prevent or detect any of this?
@brianchandler8727
@brianchandler8727 3 месяца назад
Thank you for the information, I try hitman . It seems to work
@_szymsky6692
@_szymsky6692 8 дней назад
So i've downloaded a trojan few weeks back and ran eset in-depth scan, hit man pro scan and Norton power eraser scan. When I opened up the task manager and looked at search it is suspended and I dont really know if it should be suspended after those three scans. Could you give me an answer?
@MrPir84free
@MrPir84free 7 месяцев назад
I believe you failed to mention one of the best countermeasures for a typical system is to create and use a regular user account for everything, put a strong password on the administrator account and use it only when needed. I work IT, and even at home, I refuse to run as Administrator for things like browsing the internet, or doing darn near anything else. It is JUST one of many measures that one takes to keep their system clean. It matters not if you are using Linux or Windows, the concept is exactly the same. Not running as Administrator is one of the best things one can do for their own computers; sometimes less convenient, but better practice. Some folks may think that this is about merely finding out if one's computer is compromised; and how to clean it up; but staying clean is part of the problem.
@Britec09
@Britec09 7 месяцев назад
I made videos on that before, no one wants to run as standard user.
@Absamo97
@Absamo97 7 месяцев назад
I mean ... if the attacker got into your system its a matter of time that he can privilege escalate his user to become admin and take over your machine, so instead of limiting my self with some features or have some limitations I run my system as admin all the time and I believe most of the people do this.
@lordhriley
@lordhriley 7 месяцев назад
​@Britec09 well you can't very easily with windows making u use a Microsoft account to log into your computer.
@leecowell8165
@leecowell8165 6 месяцев назад
By default you're not running as Admin in linux. In fact without doing so you cannot access anyone else's /home directory on YOUR system without their knowledge because you need THERE PW. So never run as Admin by default on a linux box. The only way to access everyone is you need to elevate your user level to Admin. That means you need access to the box itself because it ain't happening remotely without the PW.
@crumblingsanity6455
@crumblingsanity6455 3 месяца назад
With the start process around 4:42 mines is pretty much the same as shown on here where the location and everything is the same, so with that in mind from the video, I'd assume that someone has remote access to my computer, right? I'm not really sure how anyone would have been able to do this and I've already run a million scans (mainly full ones of course) and nothing has of course popped up and I haven't seen any weird changes to my computer either signifying that I am being remotely hacked either.
@benjaminstevens6043
@benjaminstevens6043 5 месяцев назад
sweet merciful jesus, THANK YOU. Just facts and brass tacks. concise disambiguation and walkthrough. I love you.
@JackNotJack
@JackNotJack 7 месяцев назад
Great video. Thanks for taking the time to make it.
@InstigatorDJ
@InstigatorDJ 7 месяцев назад
Will help literally NOBODY!! Great VIDEO MAN!!!!!!!!! WOW OMG!!
@richardlong8736
@richardlong8736 4 месяца назад
Thanks, cheers
@michalwiktorow2188
@michalwiktorow2188 7 месяцев назад
Hi, this was great educational video. Considering how corporations are forced to work with gov. that are not always non-totalitarian, which of the software provider is most independent and has robust antivirus? Thanks.
@flashwashington2735
@flashwashington2735 7 месяцев назад
That are not totalitarian, but want to be badly, and have formed a multi national coalition like Five Eyes. She's an ugly date that Five Eyes. 🤔🤔🤣🤣🤣😘😘🙏🙏
@user-tv4ki7yc1k
@user-tv4ki7yc1k Месяц назад
You explained a bit fast for me personally but appreciated and would advise you to somehow enhance the size of the written document so we can see what u r pointing out. I gather most people already know. I am quite the novice❤
@CampSorya
@CampSorya 14 дней назад
how do you enable that thing u enabled in prosess explorer to see if there are any virouses
@B3-R
@B3-R 7 месяцев назад
If using any exterior virus check with for example Kaspersky, before shutting down Windows,the Hibernation should also be cleared, otherwise won't work.
@lobzangdorjay757
@lobzangdorjay757 3 месяца назад
I am having issues with taskbar after upgrading to windows 11 from 10, Taskbar doesn't load on time after a restart ?
@haroldsmith768
@haroldsmith768 7 месяцев назад
What about the usb key with windows what if its infected before i reinstall windows..is that possible?
@joebailey5607
@joebailey5607 19 дней назад
My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?
@t.i.awareness4roma860
@t.i.awareness4roma860 5 месяцев назад
I get thise black command promtpts pop uo and disappeae quickly. But how do i know where or wjag is the malware doinb
@cringesh1t427
@cringesh1t427 Месяц назад
I have a brand new windows install and have that blank search paused in my task bar. Is it really something fishy??
@Robert08010
@Robert08010 2 месяца назад
@ days ago, I found teamviewer running as a background task on my computer. I killed it twice and it restarted itself both times. I don't recall installing Teamviewer but I may have. But it is normal for a program I am NOT running to have a background task running continuously? I uninstalled it and it does appear to be gone so I don't think it was a part of any specific malware.
@dishankchauhan8153
@dishankchauhan8153 7 месяцев назад
Please please please answer the doubt. Someone did the same with me. I downloaded a cracked software and since then I'm getting some creepy requests (as pop ups) to for a remote desktop connection. And point is it's not actually a request, it's simply a notification that someone has connected, now you can decide whether you want him to remain connected or not. And if I click NO, it says, the remote user has "declined" your "request" to disconnect. I mean what the hell is that! Why should I be the one requesting and who is he to decline it! To resolve this I simply reset my PC, with all the files removed and installed a fresh Windows. BUT I DOUBT THAT WILL SOLVE THE PROBLEM. Coz as far as I could understand the cracked software's job was to just extract the sensitive information like IP address etc of my device, now once done that, even if I reinstall the windows, but the IP address will remain the same correct? It's been 10 mins I reinstalled and haven't got any creepy remote connection notifications. But my doubt is, whether the problem is really solved? Or not? Please please please answer.
@davidconiglio7577
@davidconiglio7577 2 месяца назад
I was upgrading my pc, and when I pc starting to going boot up my pc saying others will lose connection?
@user-ys7ro3ue6d
@user-ys7ro3ue6d 2 месяца назад
can someone help me with suspended in search shown in task bar and when i open microsoft store again i saw suspended and it says they increase the processor power 🤔🤔
@petervan7372
@petervan7372 4 месяца назад
Some processes can't be seen in any monitoring tools, it's made this way by Windows or any OS on purpose, like when the three letter agencies remote into your PC, you won't be able to see it
@joebailey5607
@joebailey5607 19 дней назад
My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?
@Phoenix-kj2fn
@Phoenix-kj2fn 5 месяцев назад
EXELLANT----EXPLANATION. Dear Sir, I have installed AV software- BITDEFENDER TOTAL. Do I need to buy additional AntiMalware software? Do it necessary to carry out other processes you described above? Please reply as many other READERS are waiting for answer of this question. Thanks
@ipadize
@ipadize 7 месяцев назад
if you watch this video and the tab suddenly disappears, you know someone is remotely accessing your computer :P
@RAM_845
@RAM_845 7 месяцев назад
When I was using windows before installing Ubuntu. My computer kept on hanging mid use. Gaming was fine. Each time it happend I've checked event viewer nothing. That's why you disable remote services in services.msc and in Gropu Policy. *UPDATE* I've moved onto Linux Mint coz simple
@rty1955
@rty1955 7 месяцев назад
Bravo! Glad you became enlightened. I dumped Windoze after 3.11 never looked back.
@leecowell8165
@leecowell8165 6 месяцев назад
Good move! Hopefully you'll remove the windows partition from your system? You'll then need to rerun grub probably from your install stick via CLI (because your linux partition won't be located on your box until you do that). However take heart grub WILL find it! That way your BIOS will be redirected to the correct "handoff" partition on correct drive upon reboot, got it? btw do NOT install /home, /root to an SSD. always install those guys to HDD. Anything else can be installed to SSD though because they don't get the usage that main guys do.
@RAM_845
@RAM_845 6 месяцев назад
@@leecowell8165 Update: I'm back on Windows due to compatibility issues with the software and plugins I use for music production...the DAW works BUT, the plugins themselves are buggy in Linux
@UmarO
@UmarO 6 месяцев назад
"look for weird processes" - how can we know!
@INerd2024
@INerd2024 28 дней назад
How can I activate virus total in process explorer? I can't see it in my downloaded software.
@user-tv4ki7yc1k
@user-tv4ki7yc1k Месяц назад
Cheers bman❤
@ludwigwillemse2433
@ludwigwillemse2433 5 месяцев назад
i cant get rid of the trojan virus its still on my laptop. i do all scans and do the savemode thing and dont fix it.its still pop up
@xavierkreiss8394
@xavierkreiss8394 6 месяцев назад
You might like to change the title of your clip so it mentions "your PC" rather than "your computer". I have a computer but the clip for me is useless - I have an iMac.
@NiazMohammad
@NiazMohammad 3 месяца назад
I don't see the Virus total counter as in your video. Mine is blank column.
@Technie87
@Technie87 4 месяца назад
Pretty sure someone is remote into my computer on chrome - how would I be able to see what they are using to connect?
@diobrando8172
@diobrando8172 Месяц назад
I can hear weird sounds coming from my headset like someone is talking, car horns, and ads. I have tried turning the wifi off and restarting the pc multiple times now but nothing helps. IDK what's happening someone PLS HELP.
@opsvixen
@opsvixen 3 месяца назад
Accidentally, I was cleaning my computer, and curious, I went into security, Blocked/allowed, I was surprised HOW MANY ticked boxes, Private AND public, saying different versions of Remote Access. Needless to say, I unblocked ALL of them. Probably, when I HAD allowed Remote Access to a Tech. Well, apparently they don't always disable the permissions; or, can't disable ALL of them. If I allow remote access in the future, I will be sure to keep those tics unticked.☺🤔
@leecowell8165
@leecowell8165 6 месяцев назад
WHAT "Task Manager"? I don't have one of those and in fact haven't had one for over 20 years. Now just WHY is that? Because I run LINUX, that's why! And so should you because IF you did you would NOT have to be concerned about ANY malware and here's why: Because NTFS partitions are protected by the OS... but ext4 is protected by the partition itself. That means if YOU don't have the PW you are NOT getting IN! This is why I can boot any windows box with a LINUX stick and steal EVERYTHING within that box and there ain't nothing windows can do about it because it hasn't even been booted! But because there's NO PROTECTION at the FILE level guess what I can do? Anything I want. But that is FAR from the case on a linux box. The bottom line here is that to install malware code the bad guy MUST HAVE ACCESS TO THE BOX! It doesn't matter WHAT instrument they're using, see? And on linux you gotta have the PW or trick the STUPID user into giving it up. Well most people that run linux ain't stupid or they probably couldn't even install it.
@woritsez
@woritsez 3 месяца назад
heavy heavy renders make the mouse pointer fly off screen, not unholy possession as i once thought, just a precursor to some unsaved project crashing
@axq3837
@axq3837 7 месяцев назад
Why do they specifically install the Opera browser?
@doctorsocrates4413
@doctorsocrates4413 7 месяцев назад
Maybe they are norwegian lol
@markcorrigan293
@markcorrigan293 Месяц назад
I am able to fully reinstall windows (refresh it) in about 20 minutes. Another 20 to reinstall favourite apps. I suggest this approach if pc starts misbehaving as you will spend hours trying to fix / remove bugs where 40 minutes for a fresh start is best.
@lswinney1000
@lswinney1000 3 месяца назад
My head is spinning from this video. It may be malicious or it may not. NOT MUCH HELP.
@MGKing-888
@MGKing-888 3 месяца назад
Please do a video on how to check if someone is remotely accessing my RU-vid and Gmail accounts. From where is my RU-vid and Gmail being accessed from?
@jjann54321
@jjann54321 Месяц назад
First, change your passwords. Second, enable 2FA/MFA. Require all active/current sessions to log back in. Whomever was logged in (if any) will be kicked out and can only reconnect if they have access to your 2FA/MFA solution. To answer your question specifically, usually you can go to Profile > Security and you'll see "session logs" and you can see when/where your most recent logons occurred.
@danielgartin-oh9ik
@danielgartin-oh9ik 7 месяцев назад
That's useful, I'm still torn between the Surface Book and the Surface 3 LTE
@Hub3rtCumb3rdal3
@Hub3rtCumb3rdal3 3 месяца назад
I keep getting "A connection with the server could not be established" under virus total :(
@ourv9603
@ourv9603 7 месяцев назад
Every minute of every day. !
@Matthewcoveyphotography
@Matthewcoveyphotography 2 месяца назад
What if you have no wi-fi or internet. And I tried to disable all Wi-Fi connections or network connections in the laptop can somebody still access it remotely if they were nearby? I have a feeling that cell phones can actually access your devices is that true?
@jjann54321
@jjann54321 Месяц назад
If you disable the Ethernet and Wi-Fi (wireless) adapter as well as Bluetooth adapter/app/service there's no (reasonable) way someone can connect to your computer. A phone can only connect using Bluetooth (via tethering) and in most (all?) cases you have to authorize access and physically be close to the device/laptop. If you are THAT concerned with security you may want to look into running TAILS from a "live USB" or (micro)SD.
@RonLarhz
@RonLarhz 7 месяцев назад
i literally have a "search suspeded".... wth.... also you didnt really explain what to look for. and how to get into the advance version of processes.
@shawnkeys4963
@shawnkeys4963 7 месяцев назад
You keep saying "weird stuff" how are we ( the people who don't know) supposed to know what is "weird stuff " from stuff that is normal or ok?
@GodzillaJawz
@GodzillaJawz Месяц назад
how do i enable the virus total thing?
@larryharrison734
@larryharrison734 6 месяцев назад
If windows is reinstalled, doesn’t that remove all of your programs? If it does, and you don’t have the software to reinstall, then what do you do?
@MalhaIIa
@MalhaIIa 5 месяцев назад
you reinstall it. then add your user setting backup, saved personal files and whatever. if this all to much for you find someone more knowledgeable, you don't need to listen to them just do as they say. from your question one can tell your computer knowledge is a bare minimum. no offense. also. a thorough clean go a long way, a windows install used daily for over a decade can easily still do its job if maintained well. mind you, a lot of this is very dry work with seek and destroy troubleshooting that can take hours. do not expect a family member to optimize your computer in 15 minutes and beware that anything you have installed on your computer, even if uninstalled, have remnants left. sometimes in large quantity. it takes a long time for a new user of your system to identify the computers content where a trojan which is like a needle in a haystack can be very well hidden. the trojan is not even your primary target at this point, the slow computer which should run faster is.
@jjann54321
@jjann54321 Месяц назад
Telling the average user to reinstall Windows is crazy because most don't have access to the software or license key to activate it... Ideally(ish) you would take daily/weekly backups (using Windows Backups) and in the event of something catastrophic you would "Restore/Reset" Windows and once you have a clean/new Windows environment you would "recover from backup" (using Windows Recovery) with your last known "clean" backup. Easy, fast(ish) and free.
@ViIgax
@ViIgax 7 месяцев назад
Could you make a video on SeroXen (RAT & Rootkit)?
@Britec09
@Britec09 7 месяцев назад
If I can find a sample
@1337exe
@1337exe 7 месяцев назад
you realize seroxen is quasar rat ,right ? Theres a ton of vid of quasar on youtube 😂 edit:Type quasar rat and you'll see hackersploit, he's far from being a script skiddie. lol like you are.
@ViIgax
@ViIgax 7 месяцев назад
@@1337exe Those videos are made by amateurs and skiddies who don’t know anything about Malware.
@jjann54321
@jjann54321 Месяц назад
@@1337exe It's crazy (ok not really) how many content creators have no real idea what they are doing. There are many many repos of "live malware" samples on the Internet.
@jjann54321
@jjann54321 Месяц назад
@@ViIgax Agree or in this case basic Windows remote access. He never even mentioned disabling RDP or checking for active users...
@jamegumb7298
@jamegumb7298 7 месяцев назад
Just Wireshark it. Or use intrusion detection.
@ThinqK
@ThinqK 7 месяцев назад
if someone is remote accessing my computer and sees what i do and say, will become enlightened
@soiltek2015
@soiltek2015 6 месяцев назад
Thanks for reminding me why I always buy physical.
@allanpatterson7653
@allanpatterson7653 6 месяцев назад
Sign in as a guest with no privilides, Admin use only to make changes. Use Linux Mint. Thats a basic the other stuff is a little tedious
@supertrexandroidx
@supertrexandroidx 7 месяцев назад
Think you meant "suspicion" in the description, not "suspension." ;)
@91099Babar
@91099Babar 2 месяца назад
2:15 .. Yesss
@16marbleman
@16marbleman 7 месяцев назад
In stead of reinstalling windows 10 if you install windows 11 would that clean up any virus and malware and save my current apps and files. Thank you
@kantizx1
@kantizx1 7 месяцев назад
No, it won't. If you do a fresh install it will remove the malware.
@myhatmyseat9924
@myhatmyseat9924 6 месяцев назад
i still check my Hosts file on a regular basis, not sure if it is still relevant but habits be habits
@RockyAllenLane
@RockyAllenLane 7 месяцев назад
The Kasperski Rescue Disk fails to run on my modern Windows 10 PC. Their website is useless for support.
@Britec09
@Britec09 7 месяцев назад
I have had no issue running it
@EIRE55
@EIRE55 7 месяцев назад
@@Britec09 Hello, Brian. Can I just download Kaspersky Rescue Disk straight onto my PC, and use it from there? Thank you.
@ObakuZenCenter
@ObakuZenCenter 7 месяцев назад
Also look up how to run Tron, to clean up a badly infected machine.
@hvfd5956
@hvfd5956 7 месяцев назад
Boy will they be disappointed! There ain't crap here.
@cliffbrown3002
@cliffbrown3002 7 месяцев назад
Can MalwareBytes detect these infections?
@getwetset
@getwetset 3 месяца назад
For worst cases, All-in-one solution is to install new windows image and reset all settings to default immediately.
@jjann54321
@jjann54321 Месяц назад
Make sure they have their license key... Worst case, you would *restore* Windows and select "Reset this PC." Now you're not having to manually reinstall/reimage anything or deal with license key issues and you have a new/clean Windows environment.
@elizard
@elizard Месяц назад
This is so confusing. I feel like a gerbil running on a cage wheel!
@anupam1177
@anupam1177 4 месяца назад
Does Resetting the PC and Reinstallling Windows will help in this?
@jjann54321
@jjann54321 Месяц назад
Yes, "restoring" Windows and selecting "Reset this PC" will essentially reset your Windows machine as if it were new. When you reinstall Windows you are required to enter your Windows license key which 99.9% of Windows users don't have.
@truhunk1
@truhunk1 7 месяцев назад
Too complicated for me to figure out.
@myekuntz
@myekuntz 7 месяцев назад
does that mean the oprea browser is malware ?
@ObakuZenCenter
@ObakuZenCenter 7 месяцев назад
No, it means that the malware/virus installed Opera. Opera itself is fine, so long as you installed it on your system. If it was installed by someone else, then best to uninstall it and reinstall it from it's official site if you want to have it on your system at all.
@JCO2002
@JCO2002 7 месяцев назад
I'm not sure that's even possible with my Linux machine. I don't have a remote desktop app, and drive-by downloads aren't likely.
@rty1955
@rty1955 7 месяцев назад
Yes of course you can RDP to Linux. You have a LOT of choices to do so. Also it has a LOT more security
@JCO2002
@JCO2002 7 месяцев назад
@@rty1955 Yes, you can, but I'd have enter my password to download it, which would never happen unless there were a specific reason. It's not just going to sneak in somehow like with MS.
@rty1955
@rty1955 7 месяцев назад
@@JCO2002 it depends on how you set it up tbh
@JCO2002
@JCO2002 7 месяцев назад
@@rty1955 I'm far from being an expert on Linux, but I know I can't even run timeshift for a system snapshot without entering my password. The greater danger would be phishing where I go to a fake website and enter my username and password, like my bank or something. Otherwise, I can't see how anyone can just connect remotely without me being part of the process. Linux is inherently more secure than Windows - that's one of the advantages, along with it being faster and simpler to use.
@jjann54321
@jjann54321 Месяц назад
Linux users are savvy enough to use password protected keypairs and tunnel via SSH to Secure VNC.
@InstigatorDJ
@InstigatorDJ 7 месяцев назад
The chances someone IS ACCESSING your compuiter is LITERALLY NIL.
@theguywithone
@theguywithone 7 месяцев назад
I have successfully avoided this for many many years. Never had to do anything special or buy anything. I just don't own a computer. Simple.
@Sand15676
@Sand15676 6 месяцев назад
I look at it like this. Whenever you go on line it's like going into a battlefield. I plug my Ethernet cable in, take care of business and then get the hell out by physically removing the Ethernet cable. Even with a VPN.
@leecowell8165
@leecowell8165 6 месяцев назад
Why do you do that the ultimate paranoia attack? Good reason under windows. However I spend hours everyday on the internet. And in 20 years I've never been hacked or had ANY malware or virus installed on my boxes. Why? I run linux. I run ClamAV every quarter or so to see if any windows files have picked anything up in my NTFS formatted partitions or even stick partitions (which are generally formatted FAT32). Those partitions have absolutely NO PROTECTION at the FILE LEVEL thus they get attacked unmercifully. Yep generally something gets picked up by ClamAV but guess what they still need my PW and I rarely run as Admin. BTW ClamAV takes HOURS to run if you gotta big box. I generally just let it run overnight. I only run it on NTFS/FAT32 partitions that are actually physically on the system because it ain't happening on ext4 partitions. yeah I have maybe 40 partitions on my big box (well beyond windows capability as they alphabetize their partitions (and no longer use A or B if you newbies happen to notice that)). Linux is a bit more complex regarding naming convention but there's virtually no limit to the number of partitions on a linux box. You can also install linux anywhere even across many physical drives (while windows always installs to C:)
@ibh9999
@ibh9999 6 месяцев назад
Can someone remotely access my android phone or tablet ?
Далее
Installing Arch Linux The Simple Way
17:51
Просмотров 7 тыс.
OpenSSH for Absolute Beginners
23:00
Просмотров 96 тыс.
Редакция. News: 120-я неделя
52:26
Просмотров 1,4 млн
Track Phone & Computers on The Internet 🌎
30:50
Просмотров 1,8 млн
Disable These 3 Windows Settings Now! (For Security)
12:26
Signs Your PC Has Been Hacked
14:49
Просмотров 69 тыс.
55 Most Useful FREE SOFTWARE Everyone Should Know!
48:30