Have you been hacked? Hacker explains how to find out!

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 286

  • @davidbombal
    @davidbombal  18 дней назад +17

    Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal
    // OTW Discount //
    Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/
    // Occupy The Web Books //
    Linux Basics for Hackers:
    US: amzn.to/3wqukgC
    UK: amzn.to/43PHFev
    Getting Started Becoming a Master Hacker
    US: amzn.to/4bmGqX2
    UK: amzn.to/43JG2iA
    Network Basics for hackers:
    US: amzn.to/3yeYVyb
    UK: amzn.to/4aInbGK
    // Occupy The Web SOCIAL //
    X: twitter.com/three_cube
    Website: hackers-arise.net/
    // Playlists REFERENCE //
    Linux Basics for Hackers: ruclips.net/video/YJUVNlmIO6E/видео.html&pp=iAQB
    Mr Robot: ruclips.net/video/3yiT_WMlosg/видео.html&pp=iAQB
    Hackers Arise / Occupy the Web Hacks: ruclips.net/video/GxkKszPVD1M/видео.html&pp=iAQB
    // David's SOCIAL //
    Discord: discord.com/invite/usKSyzb
    X: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: www.youtube.com/@davidbombal
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MENU //
    0:00 - Have you been hacked?
    04:42 - Brilliant add
    07:05 - Indicators of being hacked
    07:49 - Your computer is much slower
    08:53 - Strange behaviour of your system
    10:14 - Unusual activity in your email or messaging apps
    10:57 - Dark web data dumps
    13:08 - Use different passwords
    14:59 - Alerts that someone is trying to access your account
    15:39 - Browser fingerprinting
    17:37 - You can no longer access some of your online accounts
    19:39 - Unexpected pop-ups or directs
    20:56 - Your email appears on the Dark Web Data Dumps
    23:03 - Friends or Colleagues are receiving emails from you that you did not send.
    25:19 - Unknown charges to your bank or credit
    25:51 - Your Anti-Virus/Malware is disabled
    27:51 - Indicators of compromise
    29:04 - Unknown services running on Kali
    33:13 - Unknown services running on Windows
    36:50 - Windows CMD : netstat
    37:32 - Windows SysinternalsSuite
    40:47 - Windows Wireshark
    44:42 - Learn your system
    46:16 - Getting a message asking for money
    47:26 - How does your DEMO work?
    51:31 - Outro00:00 - Intro
    04:42 - Brilliant add
    07:05 - Indicators of being hacked
    07:49 - Your computer is much slower
    08:53 - Strange behaviour of your system
    10:14 - Unusual activity in your email or messaging apps
    10:57 - Dark web data dumps
    13:08 - Use different passwords
    14:59 - Alerts that someone is trying to access your account
    15:39 - Browser fingerprinting
    17:37 - You can no longer access some of your online accounts
    19:39 - Unexpected pop-ups or directs
    20:56 - Your email appears on the Dark Web Data Dumps
    23:03 - Friends or Colleagues are receiving emails from you that you did not send.
    25:19 - Unknown charges to your bank or credit
    25:51 - Your Anti-Virus/Malware is disabled
    27:51 - Indicators of compromise
    29:04 - Unknown services running on Kali
    33:13 - Unknown services running on Windows
    36:50 - Windows CMD : netstat
    37:32 - Windows SysinternalsSuite
    40:47 - Windows Wireshark
    44:42 - Learn your system
    46:16 - Getting a message asking for money
    47:26 - How does your DEMO work?
    51:31 - Outro
    hack
    hacked
    compromise
    computer hacked
    my computer has been hacked
    cybersecurity
    indicators of compromise
    tor
    proxy chains
    linux
    android
    iphone
    ios
    tails
    tails linux
    invisible online
    hide identity
    privacy
    kali linux
    online privacy
    internet security
    online privacy and security
    online privacy tips
    online privacy guide
    internet security tutorial
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    Disclaimer: This video is for educational purposes only.
    #hack #hacked #privacy

    • @kadwasach4294
      @kadwasach4294 18 дней назад

      hello devid sir i have idea i want explain you but my english not good

    • @نسمهالشميري
      @نسمهالشميري 18 дней назад

      ليش ماتسوي ترجمه للعربيه😢😢

    • @نسمهالشميري
      @نسمهالشميري 18 дней назад

      ​@@kadwasach4294 اذا كان فيديو مترجم سيكون رائعا

    • @joseroshe1059
      @joseroshe1059 18 дней назад

      Can this be posted to spotify and as a video episode? Please please

    • @ThaInfamousStitch
      @ThaInfamousStitch 18 дней назад

      Please tell OTW it's powned not pawned

  • @SirPeterlll
    @SirPeterlll 17 дней назад +9

    Working on a helpdesk and the stories I heard of these people (that weren't hacked 99.9%) are insane. Freezing the mobile phone in ice, throwing a brick through the TV since the hackers were in it are some of the sad stuff Ive seen. Mental health is a thing.

    • @Dewa-s3i
      @Dewa-s3i 10 дней назад

      It's quite troublesome when your privacy is invaded. Mental health is a thing. The sad part is that those people could easily be viewed as insane, despite truly being under threat. Gangstalking and Harassment as a Service is also a thing.

  • @AnonymousVv3
    @AnonymousVv3 8 дней назад +2

    Remember the 3 codes of conduct, 1. Documentation. 2. Security Clearance. Move In Secrecy. The code of anonymity is to not reveal your name, age, sex, ID, etc because you never know.

  • @brandonw1604
    @brandonw1604 18 дней назад +38

    “Malfunctioning users” the IT admin part of me felt that. They’re 95% of the issue.

    • @BGodsVoice
      @BGodsVoice 18 дней назад

      Malfunctioning NPCs u mean? Lol

    • @Wolfrich666
      @Wolfrich666 17 дней назад +2

      the biggest vulnerability on a system is the human factor

    • @KeebHoard
      @KeebHoard 16 дней назад +2

      The average user is so completely clueless.

    • @brandonw1604
      @brandonw1604 16 дней назад

      @@KeebHoard I just had one yesterday get his DocuSign account compromised. Received a request for signature and clicked through it all. We don't sign anything, we request signatures, so don't know wtf he was thinking.

    • @m3chanist
      @m3chanist 16 дней назад

      pebkac=1

  • @50PullUps
    @50PullUps 18 дней назад +68

    The question of "Have you ever been hacked?" does not have a Yes/No answer. The two possible responses are Yes, and, "I don't know."

    • @davidbombal
      @davidbombal  18 дней назад +17

      The video explains how to find out and things to look for.

    • @lumikarhu
      @lumikarhu 18 дней назад +3

      this guy gets it

    • @threestans9096
      @threestans9096 18 дней назад +3

      You can more often than not discover you were actually hacked. File accesses, installs you didn’t install…open ports…hell, look for edited metadata. So so so soooo many ways. Hackers aren’t gods bro.

    • @kamakaziozzie3038
      @kamakaziozzie3038 18 дней назад +4

      That’s the great thing aboot this video. David and guest explain how to arm yourself with enough information to go from Yes or “I don’t know” - to
      Yes or No.

    • @tomasotreasaigh111
      @tomasotreasaigh111 18 дней назад

      So is this guy a Hacker then?

  • @Medus24
    @Medus24 18 дней назад +18

    One time I had my mouse moving on its own. I calmed down and started to think of a solution. Then I got up from my chair just to find out that I was sitting on my wireless mouse that I forgot was plugged in and all the mouse movements were just my pants moving across the sensor.

    • @hirogochitomayto7018
      @hirogochitomayto7018 16 дней назад +1

      Lies

    • @TechSavvySense
      @TechSavvySense 9 дней назад

      When yout cursor moves without you having an act
      actual mouse or clicking anything, you've been hacked/compromised.

  • @ferripaganovamersfoort6279
    @ferripaganovamersfoort6279 18 дней назад +10

    what about creating a few videos centered on mobile security, android and ios? would be really useful

  • @ChrisGreer
    @ChrisGreer 18 дней назад +4

    Great job David and OTW! You know I'm all ears at 40:48, the packets tell all. 👏🦈

    • @phillydee3592
      @phillydee3592 17 дней назад +2

      Was immediately thinking,spin up wireshark🤣😂

    • @micro-helper
      @micro-helper 13 дней назад +1

      Shark is here 🤣😂

  • @austinebangura2249
    @austinebangura2249 18 дней назад +10

    Thanks, David, for all your videos

  • @landrover827
    @landrover827 18 дней назад +8

    As always we love your videos. Thank you OTW and David. ❤

    • @davidbombal
      @davidbombal  18 дней назад

      Thank you! Glad you like them!

  • @chrisb2997
    @chrisb2997 18 дней назад +3

    I love when OTW is on your show! I am almost to graduate with a degree in CS with an emphasis on cybersecurity. When I can afford it I’ve been wanting to go through the Hackers Arise Courses, hopefully sooner than later! 😊 Thanks for continuing to host OTW!! He never disappoints!!!

  • @funkymonk2254
    @funkymonk2254 5 дней назад

    ThankYou David and Master OTW.

  • @JafarAliyu-z1t
    @JafarAliyu-z1t 18 дней назад +5

    David bombal we dey look your videos always Nigeria ❤

    • @davidbombal
      @davidbombal  18 дней назад +4

      Thank you! And welcome Nigeria!!

    • @JafarAliyu-z1t
      @JafarAliyu-z1t 18 дней назад +1

      @davidbombal I really want become a hacker but unfortunately I don't know any programming language how do I do

    • @Artic_wolf122
      @Artic_wolf122 18 дней назад +1

      werey wan hack tinubu

    • @نسمهالشميري
      @نسمهالشميري 18 дней назад

      ​@@davidbombalسوي ترجمه لفيديوهاتك 😢

  • @Alex-vx1ty
    @Alex-vx1ty 18 дней назад +1

    Excellent video. Thank you.

  • @tonybarraclough9064
    @tonybarraclough9064 9 дней назад

    Mouse moving without you touching it will give you a big fright, I know! However, sometimes it's just dust affecting the laser.
    Don't Panic, try another mouse first.

  • @gamereditor59ner22
    @gamereditor59ner22 18 дней назад +5

    Cool information! Thank you, David!
    Edit: Especially thank you, OTW, and your books are awesome!

    • @davidbombal
      @davidbombal  18 дней назад +2

      Awesome, thank you!

    • @crtune
      @crtune 18 дней назад +2

      OTW's books must be great. He has no hesitation in recommending Sysinternals which also has association with some great tech books on details of how Windows works (the Sysinternals project was originally independent, but eventually was brought on board MSFT, with the contractual provision that they not be neutered, but maintained and still provide reasonable insight into Operating System internals). I'll make sure to put OTW books on the list and get them. I'm already somewhat sophisticated, but everything here rings not only true, but is also the EFFECTIVE way of finding out about one's system. I cannot recommend "Process Explorer" enough. That tool, which I deem "killer app", alone, can act as a "Swiss Army Knife" of insight into our machine.

    • @gamereditor59ner22
      @gamereditor59ner22 17 дней назад +1

      @@davidbombal You welcome!

  • @AnonymousVv3
    @AnonymousVv3 8 дней назад

    I don't link emails, just synchronization updates.

  • @lonnieo4676
    @lonnieo4676 18 дней назад

    i had a couple emails that had been hacked... thanks david, and hacker...

  • @aussiegruber86
    @aussiegruber86 17 дней назад

    My bloody credit card was compromised again for the second time this year, and I am super careful and cannot explain how it’s happened

    • @snowflakemelter7171
      @snowflakemelter7171 17 дней назад +1

      It could be a disgruntled employee working in the business you purchased from selling on customers credit card details.

    • @corruptedvortex4425
      @corruptedvortex4425 День назад

      @@snowflakemelter7171 Or a card skimmer in a common location he shops at that's well hidden

  • @interestingspagetti
    @interestingspagetti 18 дней назад +1

    I don't the question is "Have you been hacked?". But have sites that hold our personal info been hacked?

  • @nabiel220
    @nabiel220 18 дней назад +1

    Thank you!! Sir

  • @joonglegamer9898
    @joonglegamer9898 18 дней назад

    A far more useful piece of software would be one that scrutinizes known processes and inform you that they're regular processes, and leave the unknown ones more exposed.
    It's daunting for anyone to know and google every single process thats going on, nevermind looking up every single target IP address, no one is gonna do that but those with a ton of time on their hands and real concerns.

    • @scroopynooperz9051
      @scroopynooperz9051 18 дней назад

      @@joonglegamer9898 how is the software supposed to know what is "regular processes" when everyone's running different pieces of software, both bought and freeware stuff?
      Also, people install and uninstall software on their PCs all the time, so it would be difficult for someone to write software to do what you're asking

    • @crtune
      @crtune 18 дней назад

      That is a basic, or layperson description of "Intrusion Detection System" or IDS. Basically this attempts to keep a model of a healthy system, and detect when any type or appearance of events within a system show an EXCEPTION to the healthy model attributes (this includes various objects, but also various actions). Thus, they generate "exceptions" which percolate up the IDS.
      As other commenters are noting, it's actually IMPOSSIBLE to have a complete, detailed, undefeatable model or inventory of "healthy system" since this would have to include the entire universe of extant software, and also all possible system behaviors, so that is entirely too massive to model. Our guest is right that at the level of "Nation State" hacking it's so sophisticated that even opponent nations cannot guarantee to detect the hack payload or it's activity, so individual users would be at even more disadvantage.

    • @joonglegamer9898
      @joonglegamer9898 18 дней назад

      @@scroopynooperz9051 Thats the easy part. As he said, most of it is not malware but standard processes, even with that, there's no chance that each individual out there knows what standard processes are for Windows alone.

  • @Channelsurfer3579
    @Channelsurfer3579 16 дней назад

    If you can resolve external IP addresses accessing your private local network to a gov contractor, you haven’t been hacked

  • @Archibong.samuel
    @Archibong.samuel 15 дней назад

    Yeah the Linux basic for hackers is a very good book and I do recommend it for software engineers, QA and Pen testers.
    As almost every server runs on Linux, and there's a popular free game for that!

  • @BinAdnan23
    @BinAdnan23 18 дней назад +1

    Thank you David

  • @logcom482
    @logcom482 18 дней назад

    Thanks Chris for that guess.

  • @BibhatsuKuiri
    @BibhatsuKuiri 18 дней назад

    basically backup your files ince a week or month . no way out :/
    keep different password and longer ones

  • @timothywhitt5220
    @timothywhitt5220 14 дней назад

    Hey guys I have a question. I've been wanting to buy OTW's courses because I love the way he teaches, but some say his stuff isn't worth the price. For the people who've taken his courses, what do you guys think?(Not saying anything is true btw just looking for more info)

  • @Dawisco
    @Dawisco 18 дней назад

    Everyone be aware current Win 11 Task Manager does NOT look like that. The Task Manager shown in the video is an older version

  • @axzphere03
    @axzphere03 18 дней назад +1

    Thank you!

  • @AnonymousVv3
    @AnonymousVv3 8 дней назад

    Why I don't link emails, due to apt or other attacks. Great content Occupytheway. I didn't reveal you name.

  • @MItchBrown-n2v
    @MItchBrown-n2v 17 дней назад

    I actually just bought that book.

  • @AtindriyaDas
    @AtindriyaDas 18 дней назад

    Thanks very much David!!

  • @quincyofarrell3061
    @quincyofarrell3061 18 дней назад +1

    Thanks Davide

  • @Therealvulture
    @Therealvulture 18 дней назад +2

    David bombal a real chad 🔥

  • @AcaciaResearch19k
    @AcaciaResearch19k 18 дней назад +1

    Another great podcast

  • @Mary-le5db
    @Mary-le5db 9 дней назад +1

    Me and my hacker watching this together.

  • @NoobAscending
    @NoobAscending 17 дней назад +1

    If your mouse is moving by itself, your home may be haunted! 😅

  • @the-matrix-has-you
    @the-matrix-has-you 7 дней назад

    For zero day exploits you can't do anything about it if you are a simple user... however simple network basics TCP connections to initialize such as UDP connections for media with all range 65535 ports firewall can do a lot! systems are built on systems. Just one weakest chain will result in collapse of a system.

  • @thatstrangekid9091
    @thatstrangekid9091 18 дней назад

    Me checking my Task Manager and I have "Service Host..." In my Processes

  • @guilherme5094
    @guilherme5094 18 дней назад

    Thanks guys.

  • @lumikarhu
    @lumikarhu 18 дней назад

    please do some malware analysis David!

  • @spitpea
    @spitpea 18 дней назад +1

    I already know

  • @X-razcal-X
    @X-razcal-X 18 дней назад +1

    He's back! Great! 🎉

    • @davidbombal
      @davidbombal  18 дней назад +2

      Hope you enjoyed the video!

    • @X-razcal-X
      @X-razcal-X 18 дней назад +1

      Always. Thank you both 🙏

  • @FastHands1504
    @FastHands1504 18 дней назад +3

    I'm a simple cyber guy;
    I see new David Bombal & OTW, I click like.

  • @tomasotreasaigh111
    @tomasotreasaigh111 18 дней назад

    I kinda get the feeling that this guest could be a Hacker...maybe I am just being paranoid?

  • @Teclado1995
    @Teclado1995 18 дней назад

    For studying network, what u suggest? Brilliant has courses of network? like OSI and TCP/IP etc? cheers

  • @That_Guy_In_The_Sky
    @That_Guy_In_The_Sky 18 дней назад +3

    Keep on doing what you're doing David, you two are an inspiration, thank you.

    • @davidbombal
      @davidbombal  18 дней назад +1

      Thank you! I appreciate that!

  • @AnonymousVv3
    @AnonymousVv3 8 дней назад

    Oh an Occuptheweb, how are you doing?

  • @Odim65
    @Odim65 18 дней назад +3

    David my favorite channel! Always good content 👍

    • @davidbombal
      @davidbombal  18 дней назад

      Thank you! Glad you enjoy it!

  • @Heretobehere
    @Heretobehere 18 дней назад

    Around the 12 minute mark my question is even if you use the same password how does the hacker know what hang you use? Trial and error would just take so long. Then not to mention you could be u.s or Canada or somewhere else. I’m just really curious

  • @Current-blue
    @Current-blue 18 дней назад +4

    Love hearing OTW s point of view 👑
    We should sometime see ways to prevent hacker to hack our system and OTW Linux and becoming and networking don't go into serious deeps of securing our selfs

  • @AnonymousVv3
    @AnonymousVv3 8 дней назад

    G.R.I.M. Alliance is to move is silence.

  • @NaseebullahHaidary
    @NaseebullahHaidary 16 дней назад

    Thanks a lot 🙏 🎉

  • @TheSmartGuy-yk7to
    @TheSmartGuy-yk7to 18 дней назад

    Your so welcome

  • @Zagnikasalam
    @Zagnikasalam 18 дней назад

    Thanks man for again bringing otw please cover bitcoin forensics topic with otw🙏🙏

  • @GOD_GAMMING.-990
    @GOD_GAMMING.-990 18 дней назад +2

    You are amazing sir I learned Linux and ccna from your RUclips channel I think you make the most practical vedios on the internet

    • @davidbombal
      @davidbombal  18 дней назад

      Thank you very much! I appreciate that!

    • @GOD_GAMMING.-990
      @GOD_GAMMING.-990 18 дней назад

      Sir I have a question which is the best programming language I should learn for hacking

    • @GOD_GAMMING.-990
      @GOD_GAMMING.-990 18 дней назад

      And also apart from programming languages what more should I learn for hacking

    • @John-wd5cb
      @John-wd5cb 15 дней назад

      ​@@GOD_GAMMING.-990 if you need to ask that then you never looked around for the answer. It's C of course.

  • @AnonymousVv3
    @AnonymousVv3 8 дней назад

    Why did they hack your passport? Why because you're right?

  • @Joe-gl8sr
    @Joe-gl8sr 18 дней назад +1

    Luv the video

  • @Cee0666
    @Cee0666 17 дней назад

    Meh, im a nobody with nothing but time.
    I have nothing to my name. So its pretty pointless to get my information, if anythings the hacker themselves will be in debt for using my information.

    • @Cee0666
      @Cee0666 17 дней назад

      I am hellbound, I have no passport, so if you use my credentials outside of my country you're putting a BIG TARGET on yourself.

  • @anvayashakti2374
    @anvayashakti2374 18 дней назад +1

    Thank you, gentleman, for the great podcast, as aways is a leasure of watching! Thank and all the best to all of you 🙏

  • @Naturalmedicineprescription
    @Naturalmedicineprescription 15 дней назад +1

    wow so you wrote a cpl books but ya know any hacker worth their salt knows it is not pAwned its an old mistype like hodl .. for OWNED and as such pronounced POWNED.

  • @AnonymousVv3
    @AnonymousVv3 8 дней назад

    Remember the code of anonymity.

  • @Hwmestrey
    @Hwmestrey 17 дней назад +1

    Yes how do i know if i been hacked this is series question

  • @ayatweb
    @ayatweb 18 дней назад

    amazing keep shine sir

  • @MikeJohnCore
    @MikeJohnCore 18 дней назад +1

    great idea for a vid

  • @RADIUMGLASS
    @RADIUMGLASS 18 дней назад

    My PC doesn't shut down anymore after a Microsoft update.

  • @newkoviak
    @newkoviak 13 дней назад

    Is this hacked?
    vi:"ads_conversion_hit",Qd:"container_execute_start",yi:"container_setup_end",rg:"container_setup_start",wi:"container_blocking_end",xi:"container_execute_end",zi:"container_yield_end",sg:"container_yield_start",zj:"event_execute_end",yj:"event_evaluation_end",ph:"event_evaluation_start",Aj:"event_setup_end",ve:"event_setup_start",Cj:"ga4_conversion_hit",Ae:"page_load",On:"pageview",oc:"snippet_load",Vj:"tag_callback_error",Wj:"tag_callback_failure",Xj:"tag_callback_success",Yj:"tag_execute_end",
    yd:"tag_execute_start"}};function Ev(){function a(c,d){var e=Wa(d);e&&b.push([c,e])}var b=[];a("u","GTM");a("ut","TAGGING");a("h","HEALTH");return b};var Fv=!1;functio

  • @khokhar9856
    @khokhar9856 18 дней назад

    tutorial for Mac users please Bombal. Thank you

  • @Hakkee1980
    @Hakkee1980 18 дней назад

    ty so much boss

  • @Phosphene_Dr3am
    @Phosphene_Dr3am 3 дня назад

    12:33 If someone has taken over your email/ messaging service “That’s a good indication that NOT NECESSARILY THAT YOU’VE BEEN HACKED” ..? 🧐 huh? Well… what’s a fowl call that?🧐😅 Maybe I’m just a bit too green here, but wouldn’t that qualify as a hack? If someone has taken over your email/ and or is sending emails on your behalf? Maybe he just misspoke..

  • @MichiganHypnosisInstitute
    @MichiganHypnosisInstitute 18 дней назад +1

    Love your videos. Especially these kind. Looking forward to more!

  • @Blackstone.security.utopia
    @Blackstone.security.utopia 10 дней назад

    Thanks David my friend í just learned about this. I have a windows PC my Brother in law got used and I seen it's very slow and I seen this in task manager too. You got me to remember more. I been using the system from 2000 and yeah the hacker is right.. I'll tell my brother we need to delete windows it's not safe there spyware and malware in it. So I'll put linux on it no more windows garbage héhe thanks my friend. I wish you and me could chat il would love to learn from you and he'll who knows we learn from each other right.. 😊

  • @outlawsforlife999
    @outlawsforlife999 18 дней назад +2

    Thank you David! Much appreciated.

  • @IFaisal9
    @IFaisal9 18 дней назад +1

    12:00 This made me frustrated; I thought David's muscles were real 😅. Thanks for the great content as always 👍

  • @Desperado665
    @Desperado665 18 дней назад

    Does the out of the box Microsoft protection protect from these?

    • @snowflakemelter7171
      @snowflakemelter7171 17 дней назад

      I would use another anti malware program along side it like Malwarebytes just to have a second layer of security.

  • @krishanukarmakar6817
    @krishanukarmakar6817 18 дней назад

    I always cover my camera with black tape, but how to make sure microphone of my laptop is blocked from all sounds? (I hope i am not paranoid about privacy)

  • @scroopynooperz9051
    @scroopynooperz9051 18 дней назад +2

    I always call my malware "necessary windows service" just to confuse the normies 😂

    • @davidbombal
      @davidbombal  18 дней назад +2

      Makes sense to obfuscate the code. But please only do this ethically and to teach users how to better protect themselves.

    • @scroopynooperz9051
      @scroopynooperz9051 18 дней назад

      @@davidbombal yeah that's the idea - just because something is named correctly doesn't mean it belongs there - especially if its acting weird and using lots of resources when you're system is supposed to be idle.
      Dead giveaway is usually the "phoning home" part and network communication. On Windows, its a good idea to run something like Tinyfirewall > Block Outgoing then do your checks.

    • @lumikarhu
      @lumikarhu 18 дней назад

      who hasn't called their malware svchost.exe please stand up

    • @SuggonDeeznutz-z6o
      @SuggonDeeznutz-z6o 18 дней назад

      Mine never shoe up.

  • @jeremyimhoff
    @jeremyimhoff 14 дней назад

    I'm probably think i should get a VPN?

  • @carneyusaf
    @carneyusaf 10 дней назад +1

    @davidbombal I appreciate your content but I have watched several interviews with this guy (guest) and I'm honestly wondering why this guy is coming on. He NEVER speaks anything the average person doesn't know and that's if he stays on topic. Your channel isn't for uneducated consumers and his information is a waste of time. I've watched tons of your videos and I can say I won't watch another with this guy. Hopefully you can find a new guy.

  • @ach.raf05
    @ach.raf05 18 дней назад +1

    thanks for the video David!!

  • @ahmadpupi
    @ahmadpupi 15 дней назад

    he locked laptops key boards some of keys

  • @seansingh4421
    @seansingh4421 17 дней назад

    A Next generation firewall is a must for any business or individual who has any public internet facing server. Like you’re gonna have a really bad time otherwise, and especially small businesses who don’t have time, money or personel to do routine vulnerability scanning. So bite the bullet and buy that $1200 firewall instead of new iPhone 😂😂

  • @fcfarao22
    @fcfarao22 8 дней назад

    Olá pessoal, tenho me interessado em aprender a língua inglesa, principalmente para ouvir e entender melhor as entrevistas. Obrigado Bombal. (Written in portuguese)

  • @prodiqi
    @prodiqi 18 дней назад +1

    MOTW and hackers arise! Looking forward to this one.

  • @Quillo7
    @Quillo7 18 дней назад +2

    Thanks! Also, would really like forensics info!

    • @davidbombal
      @davidbombal  18 дней назад

      Glad you enjoyed the video. Thanks for voting for the forensics video :)

  • @sys_br3ach3r
    @sys_br3ach3r 17 дней назад

    OTW and David 🔥💯

  • @oisinlearn
    @oisinlearn 6 дней назад

    someone who i think i know has hijacked my system somehow ,i think it was from the bios and not sure what command to do. ive tried few commands but it says i dont have permission and no matter what i do isnt working if theres anything you could help me with it. i know they have them gadjets like flipper zero and few other gadjets.

  • @PolarizedxD
    @PolarizedxD 18 дней назад +1

    Good video wish we could get the general public more invested in their own security.

  • @sergioramirez1693
    @sergioramirez1693 18 дней назад

    My phone is actually slow

  • @AnonymousVv3
    @AnonymousVv3 8 дней назад

    I can't seem to find him on RUclips.

  • @Light.--
    @Light.-- 17 дней назад +2

    Video so good it literally made my phone crash. Best part is that when I came back this scene was playing 0:25😭

  • @j.a.velarde5901
    @j.a.velarde5901 18 дней назад +2

    I appreciate this vid. Thank you both.

  • @AnonymousVv3
    @AnonymousVv3 8 дней назад

    Is he still doing things?

  • @Current-blue
    @Current-blue 18 дней назад +1

    Love hearing OTW s point of view 👑

  • @HOPELESSALICE
    @HOPELESSALICE 18 дней назад +1

    a lot of cryptojacking those days ^^

  • @NotMolly-jf2rh
    @NotMolly-jf2rh 8 дней назад

    How to defeat bios hacks? And keyloggers?

  • @mmenjic
    @mmenjic 11 дней назад

    21:33 how can we know that this exactly is not one step closer to us, we need to type in our email, now they have our email, ip, browser, location......

  • @Current-blue
    @Current-blue 18 дней назад +2

    Love hearing OTW s point of view 👑

  • @dablakmark8
    @dablakmark8 18 дней назад

    is there no windows tool that can detect what is not allowed in processes or a netstat tool that will tell you what is going out to interent and what is coming in.I do not run any antivirus on my pc cause i cant as i use frp applications