What I got from this video. How to Check if Someone is Remotely Accessing Your Computer 1. Open up Task Manager and look for rogue programs. 2. Run programs that look for roque programs. Thanks, that helps a lot.
Yes, I'm pretty sure some of the things he was pointing out in task manager were actually normal. Search being paused/suspended by Windows is totally normal, for example.
Yeah, when you get a computer running Windows virused or malwareed up it's never the same just cleaning them off. Seems to leave glitches and issues from then on. Clean install of windows is the way to clean this up. Thanks for the tips on keeping an eye on malicious programs infecting our PCs
This is Michael. I usually like your work but this was pretty useless. The first major fail is that you don't tell people how to disable remote access. The second is that there's no way the average person can know what's a rogue program when there are so many weird names on programs in the operating system both in terms of processes and services. The only useful things you said were to get a good antivirus program and utilize process Explorer
There are literally thousands of files and processes that he can't even start to address for the "average person"... this is a first step and then you can HIRE a tech if you find something OR you can check the names one by one and research it YOURSELF... what do you really think this is?
@@t.stephen5086 Because mal ware would never mal that? Still it should be done, but what about governments, mandatory OS and hardware backdoors? Microsofts continual data collection and giving to governments? And the big corporates' anti spy - malware's backdoors and data sharing an awfulot of vectors for compromise and harm? Well, do what you will and can. God bless.
Part of the problem is Windows is so primitive they allow any program to get installed anywhere the creator wanted even in the OS area. The OS should be protected, no one should be installing anything in the OS directory. Each application should be installed under its own tree, and it should not require root for installation. Applications should not be using OS locations, OS utilities, OS "registries", OS anything other than using shared system libraries (that are read-only). This chaotic, messy setup that Microsoft has created makes it difficult to see if a process is legit or not.
I just recieved my first high end router in my entire life (it was a Christmas gift to myself (early I know) for completing several projects at work) and I never knew just how powerful a router can be for security once configured properly. Your channel and others like it have been a great boon for a lot of people out there and we do really appreciate the hardwork you do to educate people. Seasoned IT professionals and amateurs alike always have something to learn in this field. (There is too much for us to know everything!) Thank you so much, Mr. Britec! I look forward to your next lesson!
Unfortunately there aren’t a lot of accessible options when it comes to anti virus/malware software for us blind users. We are an underserved demographic in this regard.
There's all kind of blindness, you'd know better than me. However, everybody needs help some times, pray and act to get it. Don't let your eyes be merely be one \ among other avoidable impairments. Life is hard enough my friend. God bless. God is still in business healing. If you believe it, if you want to believe it. Get help with your believing. Like the Father of the possessed son, Some might say epilepsy, 'I believe. Help thou my unbelief.' He asked the master. He got results. Mark 9:24:21 And he asked his father, How long is it ago since this came unto him? And he said, Of a child. 22 And ofttimes it hath cast him into the fire, and into the waters, to destroy him: but if thou canst do any thing, have compassion on us, and help us. 23 Jesus said unto him, If thou canst believe, all things are possible to him that believeth. 24 And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief. 25 When Jesus saw that the people came running together, he rebuked the foul spirit, saying unto him, Thou dumb and deaf spirit, I charge thee, come out of him, and enter no more into him. 26 And the spirit cried, and rent him sore, and came out of him: and he was as one dead; insomuch that many said, He is dead. 27 But Jesus took him by the hand, and lifted him up; and he arose. Remember: Jesus said unto him, If thou canst believe, all things are possible to him that believeth. And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief. God bless.
That's actually something I had never considered. I'm currently a Cyber Security degree student. This is giving me an idea for a program/app for those with visual impairments. I'm sorry it doesn't help you just now, but hopefully there will be things in future that can help you navigate these kinds of issues better.
I believe you failed to mention one of the best countermeasures for a typical system is to create and use a regular user account for everything, put a strong password on the administrator account and use it only when needed. I work IT, and even at home, I refuse to run as Administrator for things like browsing the internet, or doing darn near anything else. It is JUST one of many measures that one takes to keep their system clean. It matters not if you are using Linux or Windows, the concept is exactly the same. Not running as Administrator is one of the best things one can do for their own computers; sometimes less convenient, but better practice. Some folks may think that this is about merely finding out if one's computer is compromised; and how to clean it up; but staying clean is part of the problem.
I mean ... if the attacker got into your system its a matter of time that he can privilege escalate his user to become admin and take over your machine, so instead of limiting my self with some features or have some limitations I run my system as admin all the time and I believe most of the people do this.
By default you're not running as Admin in linux. In fact without doing so you cannot access anyone else's /home directory on YOUR system without their knowledge because you need THERE PW. So never run as Admin by default on a linux box. The only way to access everyone is you need to elevate your user level to Admin. That means you need access to the box itself because it ain't happening remotely without the PW.
Words cannot describe how grateful i am for this Caroline series. You have helped me so much and also showed me that it was ok to open up about the grief on my channel. Thank you, thank you, thank you 🙏🏻
I worked for a terrible employer (…didn’t know this til the end…). I was an outside sales guy where I used my personal private home computer, on rare occasions, to do some work related tasks - simple spreadsheet development, print an email, etc. Well, to my not knowing or being notified they somehow gained remote access to my computer. They could see everything, every click, every mouse move, bank accounts….ALL! It was not good, felt violated & all sorts of the like. Wish I would have known of this video content back then.
You explained a bit fast for me personally but appreciated and would advise you to somehow enhance the size of the written document so we can see what u r pointing out. I gather most people already know. I am quite the novice❤
"Or maybe you a have suspicion that someone is remote viewing your computer without your knowledge." You mean like Microsoft, Google, NSA, GCHQ, etc!! 😂 Thanks for a good video Brian. A good reminder to look up and use some the tools you mentioned here.
You have a decided advantage in spotting rogue programs when you installed the rogue programs yourself. It's more problematic when someone else did it. In my experience, most of the rogue programs that plague Windows were put there by Microsoft.
Video was very insightful. I have all that you have mention plus more. One thing i am confused with is that every time i reinstall windows it re appears everytime. I cannot work out what is going on.
Hi Brian. Just a quick one. If i dissable all Remote settings in windows can this type of thing still happen?? Disabling Remote settings is one of the first things ive always done.
Some processes can't be seen in any monitoring tools, it's made this way by Windows or any OS on purpose, like when the three letter agencies remote into your PC, you won't be able to see it
My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?
I am able to fully reinstall windows (refresh it) in about 20 minutes. Another 20 to reinstall favourite apps. I suggest this approach if pc starts misbehaving as you will spend hours trying to fix / remove bugs where 40 minutes for a fresh start is best.
Accidentally, I was cleaning my computer, and curious, I went into security, Blocked/allowed, I was surprised HOW MANY ticked boxes, Private AND public, saying different versions of Remote Access. Needless to say, I unblocked ALL of them. Probably, when I HAD allowed Remote Access to a Tech. Well, apparently they don't always disable the permissions; or, can't disable ALL of them. If I allow remote access in the future, I will be sure to keep those tics unticked.☺🤔
These comments 👎🏼 I can tell from spotlight search then activity I’m infected but removing the right things is what’s giving me a hard time knowing where to start and if I should download something to remove the malicious activity
Hi, this was great educational video. Considering how corporations are forced to work with gov. that are not always non-totalitarian, which of the software provider is most independent and has robust antivirus? Thanks.
That are not totalitarian, but want to be badly, and have formed a multi national coalition like Five Eyes. She's an ugly date that Five Eyes. 🤔🤔🤣🤣🤣😘😘🙏🙏
If using any exterior virus check with for example Kaspersky, before shutting down Windows,the Hibernation should also be cleared, otherwise won't work.
Still recommending Kaspersky rescue disk? I thought that does not exist and has not been updated. I loved it, but their support says it no longer exists... Correct? Can you recommend many virus rescue / boot disks to use, that are still updated?
1. Move to Windows 11 x64 Core isolation mode. 2. Cypher the DISK 2.1 Backups ? 3. Pay The Kaspersky license with pre secured VPN servers. VPN services are the door for the botnets Greetings from Bilbao and ty for the video !
EVERYONE should find this useful and those that don't can continue to live with their head in the sand... you literally have no idea how impactful this bit of information is...
EXELLANT----EXPLANATION. Dear Sir, I have installed AV software- BITDEFENDER TOTAL. Do I need to buy additional AntiMalware software? Do it necessary to carry out other processes you described above? Please reply as many other READERS are waiting for answer of this question. Thanks
WHAT "Task Manager"? I don't have one of those and in fact haven't had one for over 20 years. Now just WHY is that? Because I run LINUX, that's why! And so should you because IF you did you would NOT have to be concerned about ANY malware and here's why: Because NTFS partitions are protected by the OS... but ext4 is protected by the partition itself. That means if YOU don't have the PW you are NOT getting IN! This is why I can boot any windows box with a LINUX stick and steal EVERYTHING within that box and there ain't nothing windows can do about it because it hasn't even been booted! But because there's NO PROTECTION at the FILE level guess what I can do? Anything I want. But that is FAR from the case on a linux box. The bottom line here is that to install malware code the bad guy MUST HAVE ACCESS TO THE BOX! It doesn't matter WHAT instrument they're using, see? And on linux you gotta have the PW or trick the STUPID user into giving it up. Well most people that run linux ain't stupid or they probably couldn't even install it.
You might like to change the title of your clip so it mentions "your PC" rather than "your computer". I have a computer but the clip for me is useless - I have an iMac.
Will using a firewall/virus protection like Norton be sufficient to combat these things. I ask because you state that running multiple scans with different programs is a good idea (but having more than one antivrus package could create program conflicts.).
Is there a way to add a column to process explorer that shows any remote addresses a process may have? It would make it so you don't really have to go through each one. I can imagine some of those rats having names that sound very similar to process names found in Windows so that you might not see them as easily. It would be similar to the way some websites might have a strange character in the name that looks similar to the one in our 26 letter alphabet (unless you live somewhere the alphabet is different). Also it would not be a bad idea to have a good known clean installation media made for the OS of your choice. This way if it is a computer that will have personal stuff on it that you don't want stolen there is much less of a chance that it would happen. Just don't change your passwords and other stuff on a machine that might still be infected since the malware is likely to just send those to the person who hacked you and then they don't really help. You may even want a separate computer for personal stuff like paying bills and other similar things. It would be a computer that doesn't really have any extra software installed and is also one you never let anyone else really use. For those purposes that one can be a little NUC and then it would take a lot less desk space than a typical PC while having all of the functionality. They are not something that I would game on but they would be good for trying out Linux if you are not ready do install it on all computers. I really have only installed Linux on a spare PC just to get used to it before I ever attempt to switch the other ones over. It is just a spare one that I can use to learn to get used to Linux and has no data on it for me to worry about losing accidentally and nothing sensitive to worry about falling into someone else's hands.
I look at it like this. Whenever you go on line it's like going into a battlefield. I plug my Ethernet cable in, take care of business and then get the hell out by physically removing the Ethernet cable. Even with a VPN.
Why do you do that the ultimate paranoia attack? Good reason under windows. However I spend hours everyday on the internet. And in 20 years I've never been hacked or had ANY malware or virus installed on my boxes. Why? I run linux. I run ClamAV every quarter or so to see if any windows files have picked anything up in my NTFS formatted partitions or even stick partitions (which are generally formatted FAT32). Those partitions have absolutely NO PROTECTION at the FILE LEVEL thus they get attacked unmercifully. Yep generally something gets picked up by ClamAV but guess what they still need my PW and I rarely run as Admin. BTW ClamAV takes HOURS to run if you gotta big box. I generally just let it run overnight. I only run it on NTFS/FAT32 partitions that are actually physically on the system because it ain't happening on ext4 partitions. yeah I have maybe 40 partitions on my big box (well beyond windows capability as they alphabetize their partitions (and no longer use A or B if you newbies happen to notice that)). Linux is a bit more complex regarding naming convention but there's virtually no limit to the number of partitions on a linux box. You can also install linux anywhere even across many physical drives (while windows always installs to C:)
My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?
As an electronics teacher of thirty years your teaching method is vague and ham fisted. It serves only to have most people visit their tech nerd. Itis not worth the carbon footprint.
Please do a video on how to check if someone is remotely accessing my RUclips and Gmail accounts. From where is my RUclips and Gmail being accessed from?
First, change your passwords. Second, enable 2FA/MFA. Require all active/current sessions to log back in. Whomever was logged in (if any) will be kicked out and can only reconnect if they have access to your 2FA/MFA solution. To answer your question specifically, usually you can go to Profile > Security and you'll see "session logs" and you can see when/where your most recent logons occurred.
Hmm wouldn't it be nice if Windows would supply the software that scans the pc for this sort of thing, you know, put the running programs thru queueing algo and warn of any programs it does not recognize so the user can confirm if it is a legit program or not. And, add to the queue any programs the user has approved for installation. This should remove viruses and malware.
@@Britec09 If someone is currently accessing you system 'users' will tell you. sudo lynis audit system Will find any nasties if they're not currently active.
Don't believe computers are private. In order for privacy. You have to put the hardware in a Faraday cage and hope it is sealed.If it is not sealed a near by computer will act as a bridge. There is a peer to peer that is unknown. I observed it talking on 462 mhz .I observed it advertising it's self every so often in the Faraday cage.before I put it in the Faraday it would not stop talking on 462 mhz. I setup a laptop near the computer in the Faraday cage because i need it.long after I put it in the Faraday cage. The next time the computer advertised it's self they both started screaming on 462 mhz. The only reason i know this is because I had a scanner on . Every time I turned on my the mobo I bought for my gpu to run llm's on. It made alot of noise on 462 mhz. So i put in a Faraday cage because I didn't want to lose my hardware to the FCC. I found out all this.
I hope at least you had fun - rambling down issues that come to your mind on the fly, randomly clicking away, opening windows, and shutting them almost instantly down again. All actions are totally unrelated to anything other than your ego trip.
With the start process around 4:42 mines is pretty much the same as shown on here where the location and everything is the same, so with that in mind from the video, I'd assume that someone has remote access to my computer, right? I'm not really sure how anyone would have been able to do this and I've already run a million scans (mainly full ones of course) and nothing has of course popped up and I haven't seen any weird changes to my computer either signifying that I am being remotely hacked either.
when you type in you login code type your number and if you type 5 times until it shows you have a key logger on you computer someone is spying and recording every key stroke
It looks like this video is specific to Windows. You might have warned us by putting "Windows" in the title. There is a sizable population that doesn't run Windows.
Is it weird that cpu numbers are moving around even after force quit everything? It’s like fluctuating and switching places 🙄 MacBook Pro m3 somehow believe I got a virus
What I got from this video.
How to Check if Someone is Remotely Accessing Your Computer
1. Open up Task Manager and look for rogue programs.
2. Run programs that look for roque programs.
Thanks, that helps a lot.
lol
Unless of course they're ain't no "Task Manager" what then? Yeah under linux WTF IS THAT?
@@leecowell8165Linux has process managers. Try Linux mint, lubuntu, etc .
Exactly! The print is so small on his demonstration, I can't even see it🤦🏾
@@leecowell8165 you are less likely to have issue on linux because 99% of malware is for windows and on Linux you would have to conciously download it
The only rogue programs I see in Task Manager are Chrome and Microsoft.
Yes, I'm pretty sure some of the things he was pointing out in task manager were actually normal. Search being paused/suspended by Windows is totally normal, for example.
You obviously don't know anything about windows
more like forceded and enforced malware
Change to Mac then !
My comment supporting this post was removed by YT as violating its policy - no dissent permitted, apparently!
Yeah, when you get a computer running Windows virused or malwareed up it's never the same just cleaning them off. Seems to leave glitches and issues from then on. Clean install of windows is the way to clean this up. Thanks for the tips on keeping an eye on malicious programs infecting our PCs
No. The way to clean it up is to install linux because guess what IF you don't within in a month they'll be newbie malware on your box.
I need to spend a little time learning Linux and install it on one of my computers.@@leecowell8165
This is Michael. I usually like your work but this was pretty useless. The first major fail is that you don't tell people how to disable remote access. The second is that there's no way the average person can know what's a rogue program when there are so many weird names on programs in the operating system both in terms of processes and services. The only useful things you said were to get a good antivirus program and utilize process Explorer
There are literally thousands of files and processes that he can't even start to address for the "average person"... this is a first step and then you can HIRE a tech if you find something OR you can check the names one by one and research it YOURSELF... what do you really think this is?
He could've shown how to disable remote access as you suggested, that would be the first step a non tech person should so
@@t.stephen5086 Because mal ware would never mal that? Still it should be done, but what about governments, mandatory OS and hardware backdoors? Microsofts continual data collection and giving to governments? And the big corporates' anti spy - malware's backdoors and data sharing an awfulot of vectors for compromise and harm? Well, do what you will and can. God bless.
My thoughts exactly. The information might be useful if you're a computer nerd, but it's pretty meaningless to the average user.
Hi Guys , just wanted to let You know that if You are Politically Targeted , try not to rely too much on Internet … even Telcos can be Compromised…
Part of the problem is Windows is so primitive they allow any program to get installed anywhere the creator wanted even in the OS area. The OS should be protected, no one should be installing anything in the OS directory. Each application should be installed under its own tree, and it should not require root for installation. Applications should not be using OS locations, OS utilities, OS "registries", OS anything other than using shared system libraries (that are read-only). This chaotic, messy setup that Microsoft has created makes it difficult to see if a process is legit or not.
I just recieved my first high end router in my entire life (it was a Christmas gift to myself (early I know) for completing several projects at work) and I never knew just how powerful a router can be for security once configured properly. Your channel and others like it have been a great boon for a lot of people out there and we do really appreciate the hardwork you do to educate people. Seasoned IT professionals and amateurs alike always have something to learn in this field. (There is too much for us to know everything!)
Thank you so much, Mr. Britec! I look forward to your next lesson!
Oh lord.
send link pls XD
Unfortunately there aren’t a lot of accessible options when it comes to anti virus/malware software for us blind users. We are an underserved demographic in this regard.
There's all kind of blindness, you'd know better than me. However, everybody needs help some times, pray and act to get it. Don't let your eyes be merely be one \ among other avoidable impairments. Life is hard enough my friend. God bless.
God is still in business healing. If you believe it, if you want to believe it. Get help with your believing. Like the Father of the possessed son, Some might say epilepsy, 'I believe. Help thou my unbelief.' He asked the master. He got results.
Mark 9:24:21 And he asked his father, How long is it ago since this came unto him? And he said, Of a child.
22 And ofttimes it hath cast him into the fire, and into the waters, to destroy him: but if thou canst do any thing, have compassion on us, and help us.
23 Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
24 And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
25 When Jesus saw that the people came running together, he rebuked the foul spirit, saying unto him, Thou dumb and deaf spirit, I charge thee, come out of him, and enter no more into him.
26 And the spirit cried, and rent him sore, and came out of him: and he was as one dead; insomuch that many said, He is dead.
27 But Jesus took him by the hand, and lifted him up; and he arose.
Remember: Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
God bless.
That's actually something I had never considered. I'm currently a Cyber Security degree student. This is giving me an idea for a program/app for those with visual impairments. I'm sorry it doesn't help you just now, but hopefully there will be things in future that can help you navigate these kinds of issues better.
I believe you failed to mention one of the best countermeasures for a typical system is to create and use a regular user account for everything, put a strong password on the administrator account and use it only when needed.
I work IT, and even at home, I refuse to run as Administrator for things like browsing the internet, or doing darn near anything else. It is JUST one of many measures that one takes to keep their system clean. It matters not if you are using Linux or Windows, the concept is exactly the same. Not running as Administrator is one of the best things one can do for their own computers; sometimes less convenient, but better practice.
Some folks may think that this is about merely finding out if one's computer is compromised; and how to clean it up; but staying clean is part of the problem.
I made videos on that before, no one wants to run as standard user.
I mean ... if the attacker got into your system its a matter of time that he can privilege escalate his user to become admin and take over your machine, so instead of limiting my self with some features or have some limitations I run my system as admin all the time and I believe most of the people do this.
@Britec09 well you can't very easily with windows making u use a Microsoft account to log into your computer.
By default you're not running as Admin in linux. In fact without doing so you cannot access anyone else's /home directory on YOUR system without their knowledge because you need THERE PW. So never run as Admin by default on a linux box. The only way to access everyone is you need to elevate your user level to Admin. That means you need access to the box itself because it ain't happening remotely without the PW.
I get Phishing Emails constantly. Have to always look twice. Thanks, once again.
That's exactly how it is whenever I try shopping online...where I'm literally minding my own damn business while someone else clearly cannot do so.
Report them. If there's a lot just mass delete them and report them (do both).
Words cannot describe how grateful i am for this Caroline series. You have helped me so much and also showed me that it was ok to open up about the grief on my channel. Thank you, thank you, thank you 🙏🏻
I worked for a terrible employer (…didn’t know this til the end…). I was an outside sales guy where I used my personal private home computer, on rare occasions, to do some work related tasks - simple spreadsheet development, print an email, etc. Well, to my not knowing or being notified they somehow gained remote access to my computer. They could see everything, every click, every mouse move, bank accounts….ALL! It was not good, felt violated & all sorts of the like. Wish I would have known of this video content back then.
Same happening to me. People are abusing their power.
@@Etleng-yf9fq Likewise here :/ Its been depressing not gonna lie, though Ive been studying and hopefully will be smart enough to stop the stuff soon
is their access to the email enough to have all that access to monitoring all of that?
Do you expect the average user to comprehend any of this?
Yeah was heavy :(
I have no idea what you are talking about.
That Part
Oh very easy. Look for rogue processes, there is one problem immediately apparent. Nothing is ever identified as being rouge.
Great video but it's helpful to have links to the programs used in your video as you often do.
I will add them, I forgot
wheres the link for kasper exe, only find the iso ?@@Britec09
You explained a bit fast for me personally but appreciated and would advise you to somehow enhance the size of the written document so we can see what u r pointing out. I gather most people already know. I am quite the novice❤
Cheers Brian, good to know, I do a Kaspersky Total full scan every 10 days or so.
Good stuff
@@Britec09 There was a lot of controversy over Kaspersky in the past, can you do an update about this and or other security providers ?
@@maxgood42 No he can't because he's a tool.
"Or maybe you a have suspicion that someone is remote viewing your computer without your knowledge." You mean like Microsoft, Google, NSA, GCHQ, etc!! 😂
Thanks for a good video Brian. A good reminder to look up and use some the tools you mentioned here.
You have a decided advantage in spotting rogue programs when you installed the rogue programs yourself. It's more problematic when someone else did it.
In my experience, most of the rogue programs that plague Windows were put there by Microsoft.
My head is spinning from this video. It may be malicious or it may not. NOT MUCH HELP.
This is what I need to know now, cause like any something strange on my PC turn off suddenly. Thanks for tutorial, Sir.
Video was very insightful. I have all that you have mention plus more. One thing i am confused with is that every time i reinstall windows it re appears everytime. I cannot work out what is going on.
Wouldn't it just be easier to type a netstat -a command to check foreign connections?
not all viruses connect to the web. Some are just there to screw your OS up. So both, I guess.
i did that and for 2 seconds i could see a screen of something happening then nothing
Hi Brian. Just a quick one.
If i dissable all Remote settings in windows can this type of thing still happen??
Disabling Remote settings is one of the first things ive always done.
I think you should show everyone how to setup crowdsec engine on their devices.
Lovely! Only suspicious thing leaking information here is Windows. Malware is working fine.
Some processes can't be seen in any monitoring tools, it's made this way by Windows or any OS on purpose, like when the three letter agencies remote into your PC, you won't be able to see it
My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?
if you watch this video and the tab suddenly disappears, you know someone is remotely accessing your computer :P
I am able to fully reinstall windows (refresh it) in about 20 minutes. Another 20 to reinstall favourite apps. I suggest this approach if pc starts misbehaving as you will spend hours trying to fix / remove bugs where 40 minutes for a fresh start is best.
This is very very very helpful and important information man thank you...
Kaspersky? Really? For those that don't know Kaspersky is based in Russia. Make up your own mind, but there's that information.
Nah kaspersky is fine and the best av out of all the others.
Accidentally, I was cleaning my computer, and curious, I went into security, Blocked/allowed, I was surprised HOW MANY ticked boxes, Private AND public, saying different versions of Remote Access.
Needless to say, I unblocked ALL of them. Probably, when I HAD allowed Remote Access to a Tech. Well, apparently they don't always disable the permissions; or, can't disable ALL of them.
If I allow remote access in the future, I will be sure to keep those tics unticked.☺🤔
Thanks so much for your great work with load of knowledges and details!
When I click on Whois it said : Failed to get Whois information. Any suggest?
These comments 👎🏼 I can tell from spotlight search then activity I’m infected but removing the right things is what’s giving me a hard time knowing where to start and if I should download something to remove the malicious activity
Hi, this was great educational video. Considering how corporations are forced to work with gov. that are not always non-totalitarian, which of the software provider is most independent and has robust antivirus? Thanks.
That are not totalitarian, but want to be badly, and have formed a multi national coalition like Five Eyes. She's an ugly date that Five Eyes. 🤔🤔🤣🤣🤣😘😘🙏🙏
Nope, I use Linux.
Ever heard of knark? Lol
Sign in as a guest with no privilides, Admin use only to make changes. Use Linux Mint. Thats a basic the other stuff is a little tedious
If using any exterior virus check with for example Kaspersky, before shutting down Windows,the Hibernation should also be cleared, otherwise won't work.
if someone is remote accessing my computer and sees what i do and say, will become enlightened
expected video sir😊thank you❤love from India ❤😊
Hope you enjoyed it!
Just Wireshark it.
Or use intrusion detection.
Still recommending Kaspersky rescue disk? I thought that does not exist and has not been updated. I loved it, but their support says it no longer exists...
Correct?
Can you recommend many virus rescue / boot disks to use, that are still updated?
1. Move to Windows 11 x64 Core isolation mode.
2. Cypher the DISK
2.1 Backups ?
3. Pay The Kaspersky license with pre secured VPN servers.
VPN services are the door for the botnets
Greetings from Bilbao and ty for the video !
EVERYONE should find this useful and those that don't can continue to live with their head in the sand... you literally have no idea how impactful this bit of information is...
You keep saying "weird stuff" how are we ( the people who don't know) supposed to know what is "weird stuff " from stuff that is normal or ok?
Will Malwarebytes installed in my PC prevent or detect any of this?
If someone is remote viewing your computer then they are a sinner that needs to repent.
"look for weird processes" - how can we know!
That's useful, I'm still torn between the Surface Book and the Surface 3 LTE
I have successfully avoided this for many many years. Never had to do anything special or buy anything. I just don't own a computer. Simple.
a little more talk about how to recognize a rogue program would be helpful
Best comment
Thank you for the information, I try hitman . It seems to work
Thank you it's nice to be aware of all that
Will regular use of SFC and DISM help to remove remote connections?
Thank you very much for sharing. Help a lot!
I have some sus processes but when I right click properties is grayed out. How else can I track down the properties address to remove?
EXELLANT----EXPLANATION.
Dear Sir, I have installed AV software- BITDEFENDER TOTAL.
Do I need to buy additional AntiMalware software?
Do it necessary to carry out other processes you described above?
Please reply as many other READERS are waiting for answer of this question.
Thanks
WHAT "Task Manager"? I don't have one of those and in fact haven't had one for over 20 years. Now just WHY is that? Because I run LINUX, that's why! And so should you because IF you did you would NOT have to be concerned about ANY malware and here's why: Because NTFS partitions are protected by the OS... but ext4 is protected by the partition itself. That means if YOU don't have the PW you are NOT getting IN! This is why I can boot any windows box with a LINUX stick and steal EVERYTHING within that box and there ain't nothing windows can do about it because it hasn't even been booted! But because there's NO PROTECTION at the FILE level guess what I can do? Anything I want. But that is FAR from the case on a linux box. The bottom line here is that to install malware code the bad guy MUST HAVE ACCESS TO THE BOX! It doesn't matter WHAT instrument they're using, see? And on linux you gotta have the PW or trick the STUPID user into giving it up. Well most people that run linux ain't stupid or they probably couldn't even install it.
You might like to change the title of your clip so it mentions "your PC" rather than "your computer". I have a computer but the clip for me is useless - I have an iMac.
heavy heavy renders make the mouse pointer fly off screen, not unholy possession as i once thought, just a precursor to some unsaved project crashing
Boy will they be disappointed! There ain't crap here.
Will using a firewall/virus protection like Norton be sufficient to combat these things. I ask because you state that running multiple scans with different programs is a good idea (but having more than one antivrus package could create program conflicts.).
thank you mate.. your videos are everyday informative and helpful.. cheers..💛💙
Information you will NEVER FUCKING NEED. But thank you bro. Jesus!!
Thanks for reminding me why I always buy physical.
This is way too fast and moving around for the average Joe to understand. I had to leave it.
Great video. Thanks for taking the time to make it.
Will help literally NOBODY!! Great VIDEO MAN!!!!!!!!! WOW OMG!!
Why do they specifically install the Opera browser?
Maybe they are norwegian lol
Better to run Linux so you can actually tell what your computer is doing as YOU have full control
Owned a MacBook since 2010 and never had a single virus on it.
Thanks!
Is there a way to add a column to process explorer that shows any remote addresses a process may have? It would make it so you don't really have to go through each one. I can imagine some of those rats having names that sound very similar to process names found in Windows so that you might not see them as easily. It would be similar to the way some websites might have a strange character in the name that looks similar to the one in our 26 letter alphabet (unless you live somewhere the alphabet is different). Also it would not be a bad idea to have a good known clean installation media made for the OS of your choice. This way if it is a computer that will have personal stuff on it that you don't want stolen there is much less of a chance that it would happen. Just don't change your passwords and other stuff on a machine that might still be infected since the malware is likely to just send those to the person who hacked you and then they don't really help. You may even want a separate computer for personal stuff like paying bills and other similar things. It would be a computer that doesn't really have any extra software installed and is also one you never let anyone else really use. For those purposes that one can be a little NUC and then it would take a lot less desk space than a typical PC while having all of the functionality. They are not something that I would game on but they would be good for trying out Linux if you are not ready do install it on all computers. I really have only installed Linux on a spare PC just to get used to it before I ever attempt to switch the other ones over. It is just a spare one that I can use to learn to get used to Linux and has no data on it for me to worry about losing accidentally and nothing sensitive to worry about falling into someone else's hands.
Uncheck the check-box of "Allow Remote Assistance connection to this computer" in System Properties
Do not use Kaspersky and opera. Find out why first
There is no security you would have to rebuild everything using new technology making sure it is foolproof
I look at it like this. Whenever you go on line it's like going into a battlefield. I plug my Ethernet cable in, take care of business and then get the hell out by physically removing the Ethernet cable. Even with a VPN.
Why do you do that the ultimate paranoia attack? Good reason under windows. However I spend hours everyday on the internet. And in 20 years I've never been hacked or had ANY malware or virus installed on my boxes. Why? I run linux. I run ClamAV every quarter or so to see if any windows files have picked anything up in my NTFS formatted partitions or even stick partitions (which are generally formatted FAT32). Those partitions have absolutely NO PROTECTION at the FILE LEVEL thus they get attacked unmercifully. Yep generally something gets picked up by ClamAV but guess what they still need my PW and I rarely run as Admin. BTW ClamAV takes HOURS to run if you gotta big box. I generally just let it run overnight. I only run it on NTFS/FAT32 partitions that are actually physically on the system because it ain't happening on ext4 partitions. yeah I have maybe 40 partitions on my big box (well beyond windows capability as they alphabetize their partitions (and no longer use A or B if you newbies happen to notice that)). Linux is a bit more complex regarding naming convention but there's virtually no limit to the number of partitions on a linux box. You can also install linux anywhere even across many physical drives (while windows always installs to C:)
The chances someone IS ACCESSING your compuiter is LITERALLY NIL.
i still check my Hosts file on a regular basis, not sure if it is still relevant but habits be habits
My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?
As an electronics teacher of thirty years your teaching method is vague and ham fisted. It serves only to have most people visit their tech nerd. Itis not worth the carbon footprint.
Please do a video on how to check if someone is remotely accessing my RUclips and Gmail accounts. From where is my RUclips and Gmail being accessed from?
First, change your passwords. Second, enable 2FA/MFA. Require all active/current sessions to log back in. Whomever was logged in (if any) will be kicked out and can only reconnect if they have access to your 2FA/MFA solution. To answer your question specifically, usually you can go to Profile > Security and you'll see "session logs" and you can see when/where your most recent logons occurred.
Hmm wouldn't it be nice if Windows would supply the software that scans the pc for this sort of thing, you know, put the running programs thru queueing algo and warn of any programs it does not recognize so the user can confirm if it is a legit program or not. And, add to the queue any programs the user has approved for installation. This should remove viruses and malware.
This demo. is useful only to you and your friends because it does not explain.
Think you meant "suspicion" in the description, not "suspension." ;)
Microsoft does it all the time. I am use to it.
Type "users" in a bash terminal.
not 100% guaranteed to find backdoor
@@Britec09 If someone is currently accessing you system 'users' will tell you.
sudo lynis audit system
Will find any nasties if they're not currently active.
Don't believe computers are private. In order for privacy. You have to put the hardware in a Faraday cage and hope it is sealed.If it is not sealed a near by computer will act as a bridge. There is a peer to peer that is unknown. I observed it talking on 462 mhz .I observed it advertising it's self every so often in the Faraday cage.before I put it in the Faraday it would not stop talking on 462 mhz. I setup a laptop near the computer in the Faraday cage because i need it.long after I put it in the Faraday cage. The next time the computer advertised it's self they both started screaming on 462 mhz. The only reason i know this is because I had a scanner on . Every time I turned on my the mobo I bought for my gpu to run llm's on. It made alot of noise on 462 mhz. So i put in a Faraday cage because I didn't want to lose my hardware to the FCC. I found out all this.
All my neighbours next door, including 54 Bower Street, say sagehr and avast sticks of gas back to booby bouncer😅😊
I think I been moped
Thanks, cheers
I hope at least you had fun - rambling down issues that come to your mind on the fly, randomly clicking away, opening windows, and shutting them almost instantly down again. All actions are totally unrelated to anything other than your ego trip.
Windows is super safe because Billy the Kid makes make sure he can shoot you into your computer
Too complicated for me to figure out.
sweet merciful jesus, THANK YOU. Just facts and brass tacks. concise disambiguation and walkthrough.
I love you.
With the start process around 4:42 mines is pretty much the same as shown on here where the location and everything is the same, so with that in mind from the video, I'd assume that someone has remote access to my computer, right? I'm not really sure how anyone would have been able to do this and I've already run a million scans (mainly full ones of course) and nothing has of course popped up and I haven't seen any weird changes to my computer either signifying that I am being remotely hacked either.
when you type in you login code type your number and if you type 5 times until it shows you have a key logger on you computer someone is spying and recording every key stroke
It looks like this video is specific to Windows. You might have warned us by putting "Windows" in the title. There is a sizable population that doesn't run Windows.
Pretty sure someone is remote into my computer on chrome - how would I be able to see what they are using to connect?
Probably they're shadows and fans of mine designed to serve me.
Video title lead me to assume there's actually forensic skills related to Windows 11 but it's just a generic mention that anti-virus programs exist.
Why check?
Always assume they are.
Is it weird that cpu numbers are moving around even after force quit everything? It’s like fluctuating and switching places 🙄 MacBook Pro m3 somehow believe I got a virus