How to Check if Someone is Remotely Accessing Your Computer

Поделиться
HTML-код
  • Опубликовано: 21 ноя 2024

Комментарии • 386

  • @jbrou123
    @jbrou123 Год назад +112

    What I got from this video.
    How to Check if Someone is Remotely Accessing Your Computer
    1. Open up Task Manager and look for rogue programs.
    2. Run programs that look for roque programs.
    Thanks, that helps a lot.

    • @BillAnt
      @BillAnt Год назад +3

      lol

    • @leecowell8165
      @leecowell8165 11 месяцев назад +6

      Unless of course they're ain't no "Task Manager" what then? Yeah under linux WTF IS THAT?

    • @Catinthehackmatrix
      @Catinthehackmatrix 8 месяцев назад

      ​​@@leecowell8165Linux has process managers. Try Linux mint, lubuntu, etc .

    • @blackaudrey367
      @blackaudrey367 3 месяца назад +1

      Exactly! The print is so small on his demonstration, I can't even see it🤦🏾

    • @stonalisa3729
      @stonalisa3729 7 дней назад

      @@leecowell8165 you are less likely to have issue on linux because 99% of malware is for windows and on Linux you would have to conciously download it

  • @yourpcmd
    @yourpcmd Год назад +200

    The only rogue programs I see in Task Manager are Chrome and Microsoft.

    • @homuraakemi9556
      @homuraakemi9556 Год назад +2

      Yes, I'm pretty sure some of the things he was pointing out in task manager were actually normal. Search being paused/suspended by Windows is totally normal, for example.

    • @Britec09
      @Britec09  Год назад +11

      You obviously don't know anything about windows

    • @myekuntz
      @myekuntz Год назад +7

      more like forceded and enforced malware

    • @gittube417
      @gittube417 Год назад

      Change to Mac then !

    • @ASMR_Lighting
      @ASMR_Lighting Год назад +5

      My comment supporting this post was removed by YT as violating its policy - no dissent permitted, apparently!

  • @OldManJimmy1
    @OldManJimmy1 Год назад +27

    Yeah, when you get a computer running Windows virused or malwareed up it's never the same just cleaning them off. Seems to leave glitches and issues from then on. Clean install of windows is the way to clean this up. Thanks for the tips on keeping an eye on malicious programs infecting our PCs

    • @leecowell8165
      @leecowell8165 11 месяцев назад +6

      No. The way to clean it up is to install linux because guess what IF you don't within in a month they'll be newbie malware on your box.

    • @OldManJimmy1
      @OldManJimmy1 11 месяцев назад

      I need to spend a little time learning Linux and install it on one of my computers.@@leecowell8165

  • @kpv123
    @kpv123 Год назад +205

    This is Michael. I usually like your work but this was pretty useless. The first major fail is that you don't tell people how to disable remote access. The second is that there's no way the average person can know what's a rogue program when there are so many weird names on programs in the operating system both in terms of processes and services. The only useful things you said were to get a good antivirus program and utilize process Explorer

    • @Pancajayna
      @Pancajayna Год назад +14

      There are literally thousands of files and processes that he can't even start to address for the "average person"... this is a first step and then you can HIRE a tech if you find something OR you can check the names one by one and research it YOURSELF... what do you really think this is?

    • @t.stephen5086
      @t.stephen5086 Год назад +27

      He could've shown how to disable remote access as you suggested, that would be the first step a non tech person should so

    • @flashwashington2735
      @flashwashington2735 Год назад

      @@t.stephen5086 Because mal ware would never mal that? Still it should be done, but what about governments, mandatory OS and hardware backdoors? Microsofts continual data collection and giving to governments? And the big corporates' anti spy - malware's backdoors and data sharing an awfulot of vectors for compromise and harm? Well, do what you will and can. God bless.

    • @jimkyle8008
      @jimkyle8008 Год назад +25

      My thoughts exactly. The information might be useful if you're a computer nerd, but it's pretty meaningless to the average user.

    • @Hs5687
      @Hs5687 Год назад

      Hi Guys , just wanted to let You know that if You are Politically Targeted , try not to rely too much on Internet … even Telcos can be Compromised…

  • @eddiesneeh4266
    @eddiesneeh4266 10 месяцев назад +31

    Part of the problem is Windows is so primitive they allow any program to get installed anywhere the creator wanted even in the OS area. The OS should be protected, no one should be installing anything in the OS directory. Each application should be installed under its own tree, and it should not require root for installation. Applications should not be using OS locations, OS utilities, OS "registries", OS anything other than using shared system libraries (that are read-only). This chaotic, messy setup that Microsoft has created makes it difficult to see if a process is legit or not.

  • @ripleyhrgiger4669
    @ripleyhrgiger4669 Год назад +30

    I just recieved my first high end router in my entire life (it was a Christmas gift to myself (early I know) for completing several projects at work) and I never knew just how powerful a router can be for security once configured properly. Your channel and others like it have been a great boon for a lot of people out there and we do really appreciate the hardwork you do to educate people. Seasoned IT professionals and amateurs alike always have something to learn in this field. (There is too much for us to know everything!)
    Thank you so much, Mr. Britec! I look forward to your next lesson!

  • @stephenluttrell8958
    @stephenluttrell8958 11 месяцев назад +24

    Unfortunately there aren’t a lot of accessible options when it comes to anti virus/malware software for us blind users. We are an underserved demographic in this regard.

    • @flashwashington2735
      @flashwashington2735 11 месяцев назад

      There's all kind of blindness, you'd know better than me. However, everybody needs help some times, pray and act to get it. Don't let your eyes be merely be one \ among other avoidable impairments. Life is hard enough my friend. God bless.
      God is still in business healing. If you believe it, if you want to believe it. Get help with your believing. Like the Father of the possessed son, Some might say epilepsy, 'I believe. Help thou my unbelief.' He asked the master. He got results.
      Mark 9:24:21 And he asked his father, How long is it ago since this came unto him? And he said, Of a child.
      22 And ofttimes it hath cast him into the fire, and into the waters, to destroy him: but if thou canst do any thing, have compassion on us, and help us.
      23 Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
      24 And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
      25 When Jesus saw that the people came running together, he rebuked the foul spirit, saying unto him, Thou dumb and deaf spirit, I charge thee, come out of him, and enter no more into him.
      26 And the spirit cried, and rent him sore, and came out of him: and he was as one dead; insomuch that many said, He is dead.
      27 But Jesus took him by the hand, and lifted him up; and he arose.
      Remember: Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
      And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
      God bless.

    • @alfonzo7822
      @alfonzo7822 4 месяца назад

      That's actually something I had never considered. I'm currently a Cyber Security degree student. This is giving me an idea for a program/app for those with visual impairments. I'm sorry it doesn't help you just now, but hopefully there will be things in future that can help you navigate these kinds of issues better.

  • @MrPir84free
    @MrPir84free Год назад +15

    I believe you failed to mention one of the best countermeasures for a typical system is to create and use a regular user account for everything, put a strong password on the administrator account and use it only when needed.
    I work IT, and even at home, I refuse to run as Administrator for things like browsing the internet, or doing darn near anything else. It is JUST one of many measures that one takes to keep their system clean. It matters not if you are using Linux or Windows, the concept is exactly the same. Not running as Administrator is one of the best things one can do for their own computers; sometimes less convenient, but better practice.
    Some folks may think that this is about merely finding out if one's computer is compromised; and how to clean it up; but staying clean is part of the problem.

    • @Britec09
      @Britec09  Год назад +3

      I made videos on that before, no one wants to run as standard user.

    • @Absamo97
      @Absamo97 Год назад +3

      I mean ... if the attacker got into your system its a matter of time that he can privilege escalate his user to become admin and take over your machine, so instead of limiting my self with some features or have some limitations I run my system as admin all the time and I believe most of the people do this.

    • @lordhriley
      @lordhriley Год назад

      ​@Britec09 well you can't very easily with windows making u use a Microsoft account to log into your computer.

    • @leecowell8165
      @leecowell8165 11 месяцев назад +1

      By default you're not running as Admin in linux. In fact without doing so you cannot access anyone else's /home directory on YOUR system without their knowledge because you need THERE PW. So never run as Admin by default on a linux box. The only way to access everyone is you need to elevate your user level to Admin. That means you need access to the box itself because it ain't happening remotely without the PW.

  • @EHD351
    @EHD351 Год назад +9

    I get Phishing Emails constantly. Have to always look twice. Thanks, once again.

    • @excxmoody
      @excxmoody Год назад

      That's exactly how it is whenever I try shopping online...where I'm literally minding my own damn business while someone else clearly cannot do so.

    • @TurielTyrael44-bf1ld6zu6s
      @TurielTyrael44-bf1ld6zu6s 6 месяцев назад

      Report them. If there's a lot just mass delete them and report them (do both).

  • @EveMarie
    @EveMarie 4 месяца назад

    Words cannot describe how grateful i am for this Caroline series. You have helped me so much and also showed me that it was ok to open up about the grief on my channel. Thank you, thank you, thank you 🙏🏻

  • @WheelerRickRambles
    @WheelerRickRambles 11 месяцев назад +7

    I worked for a terrible employer (…didn’t know this til the end…). I was an outside sales guy where I used my personal private home computer, on rare occasions, to do some work related tasks - simple spreadsheet development, print an email, etc. Well, to my not knowing or being notified they somehow gained remote access to my computer. They could see everything, every click, every mouse move, bank accounts….ALL! It was not good, felt violated & all sorts of the like. Wish I would have known of this video content back then.

    • @Etleng-yf9fq
      @Etleng-yf9fq 5 месяцев назад

      Same happening to me. People are abusing their power.

    • @smokagaming
      @smokagaming 2 месяца назад

      @@Etleng-yf9fq Likewise here :/ Its been depressing not gonna lie, though Ive been studying and hopefully will be smart enough to stop the stuff soon

    • @yasminasaidii
      @yasminasaidii 15 дней назад

      is their access to the email enough to have all that access to monitoring all of that?

  • @WatchesTrainsAndRockets
    @WatchesTrainsAndRockets Год назад +8

    Do you expect the average user to comprehend any of this?

  • @maureneschlosz6404
    @maureneschlosz6404 11 месяцев назад +45

    I have no idea what you are talking about.

  • @petefluffy7420
    @petefluffy7420 Год назад +4

    Oh very easy. Look for rogue processes, there is one problem immediately apparent. Nothing is ever identified as being rouge.

  • @danbromberg
    @danbromberg Год назад +21

    Great video but it's helpful to have links to the programs used in your video as you often do.

    • @Britec09
      @Britec09  Год назад +15

      I will add them, I forgot

    • @therealcrazymazey
      @therealcrazymazey Год назад

      wheres the link for kasper exe, only find the iso ?@@Britec09

  • @James-k6z5e
    @James-k6z5e 6 месяцев назад

    You explained a bit fast for me personally but appreciated and would advise you to somehow enhance the size of the written document so we can see what u r pointing out. I gather most people already know. I am quite the novice❤

  • @ros-spur98
    @ros-spur98 Год назад +5

    Cheers Brian, good to know, I do a Kaspersky Total full scan every 10 days or so.

    • @Britec09
      @Britec09  Год назад +3

      Good stuff

    • @maxgood42
      @maxgood42 Год назад +5

      @@Britec09 There was a lot of controversy over Kaspersky in the past, can you do an update about this and or other security providers ?

    • @thefreestylefrEaK
      @thefreestylefrEaK 10 месяцев назад +2

      @@maxgood42 No he can't because he's a tool.

  • @wannabedal-adx458
    @wannabedal-adx458 9 месяцев назад +1

    "Or maybe you a have suspicion that someone is remote viewing your computer without your knowledge." You mean like Microsoft, Google, NSA, GCHQ, etc!! 😂
    Thanks for a good video Brian. A good reminder to look up and use some the tools you mentioned here.

  • @rickoshay6554
    @rickoshay6554 5 месяцев назад

    You have a decided advantage in spotting rogue programs when you installed the rogue programs yourself. It's more problematic when someone else did it.
    In my experience, most of the rogue programs that plague Windows were put there by Microsoft.

  • @lswinney1000
    @lswinney1000 8 месяцев назад +4

    My head is spinning from this video. It may be malicious or it may not. NOT MUCH HELP.

  • @AndroCom69
    @AndroCom69 5 месяцев назад

    This is what I need to know now, cause like any something strange on my PC turn off suddenly. Thanks for tutorial, Sir.

  • @familyhopeschildrenandlegal
    @familyhopeschildrenandlegal 11 дней назад

    Video was very insightful. I have all that you have mention plus more. One thing i am confused with is that every time i reinstall windows it re appears everytime. I cannot work out what is going on.

  • @t.stephen5086
    @t.stephen5086 Год назад +12

    Wouldn't it just be easier to type a netstat -a command to check foreign connections?

    • @Lachausis
      @Lachausis 11 месяцев назад +2

      not all viruses connect to the web. Some are just there to screw your OS up. So both, I guess.

    • @julianciahaconsulting8663
      @julianciahaconsulting8663 Месяц назад

      i did that and for 2 seconds i could see a screen of something happening then nothing

  • @maydaygoingdown5602
    @maydaygoingdown5602 Год назад +7

    Hi Brian. Just a quick one.
    If i dissable all Remote settings in windows can this type of thing still happen??
    Disabling Remote settings is one of the first things ive always done.

  • @MeBaddaDanDem
    @MeBaddaDanDem Месяц назад +1

    I think you should show everyone how to setup crowdsec engine on their devices.

  • @lapasorsa9022
    @lapasorsa9022 3 месяца назад

    Lovely! Only suspicious thing leaking information here is Windows. Malware is working fine.

  • @petervan7372
    @petervan7372 10 месяцев назад +3

    Some processes can't be seen in any monitoring tools, it's made this way by Windows or any OS on purpose, like when the three letter agencies remote into your PC, you won't be able to see it

    • @joebailey5607
      @joebailey5607 6 месяцев назад

      My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?

  • @ipadize
    @ipadize Год назад +3

    if you watch this video and the tab suddenly disappears, you know someone is remotely accessing your computer :P

  • @markcorrigan293
    @markcorrigan293 7 месяцев назад

    I am able to fully reinstall windows (refresh it) in about 20 minutes. Another 20 to reinstall favourite apps. I suggest this approach if pc starts misbehaving as you will spend hours trying to fix / remove bugs where 40 minutes for a fresh start is best.

  • @deciodasilva3960
    @deciodasilva3960 Год назад +2

    This is very very very helpful and important information man thank you...

  • @spazoq
    @spazoq Год назад +2

    Kaspersky? Really? For those that don't know Kaspersky is based in Russia. Make up your own mind, but there's that information.

    • @zilverman7820
      @zilverman7820 Год назад

      Nah kaspersky is fine and the best av out of all the others.

  • @opsvixen
    @opsvixen 8 месяцев назад

    Accidentally, I was cleaning my computer, and curious, I went into security, Blocked/allowed, I was surprised HOW MANY ticked boxes, Private AND public, saying different versions of Remote Access.
    Needless to say, I unblocked ALL of them. Probably, when I HAD allowed Remote Access to a Tech. Well, apparently they don't always disable the permissions; or, can't disable ALL of them.
    If I allow remote access in the future, I will be sure to keep those tics unticked.☺🤔

  • @nmbdy4732
    @nmbdy4732 Год назад +1

    Thanks so much for your great work with load of knowledges and details!
    When I click on Whois it said : Failed to get Whois information. Any suggest?

  • @İlindsaycaruso
    @İlindsaycaruso Месяц назад

    These comments 👎🏼 I can tell from spotlight search then activity I’m infected but removing the right things is what’s giving me a hard time knowing where to start and if I should download something to remove the malicious activity

  • @michalwiktorow2188
    @michalwiktorow2188 Год назад

    Hi, this was great educational video. Considering how corporations are forced to work with gov. that are not always non-totalitarian, which of the software provider is most independent and has robust antivirus? Thanks.

    • @flashwashington2735
      @flashwashington2735 Год назад

      That are not totalitarian, but want to be badly, and have formed a multi national coalition like Five Eyes. She's an ugly date that Five Eyes. 🤔🤔🤣🤣🤣😘😘🙏🙏

  • @dnwatts55
    @dnwatts55 Год назад +5

    Nope, I use Linux.

  • @allanpatterson7653
    @allanpatterson7653 11 месяцев назад

    Sign in as a guest with no privilides, Admin use only to make changes. Use Linux Mint. Thats a basic the other stuff is a little tedious

  • @B3-R
    @B3-R Год назад

    If using any exterior virus check with for example Kaspersky, before shutting down Windows,the Hibernation should also be cleared, otherwise won't work.

  • @ThinqK
    @ThinqK Год назад

    if someone is remote accessing my computer and sees what i do and say, will become enlightened

  • @babumohan4549
    @babumohan4549 Год назад +1

    expected video sir😊thank you❤love from India ❤😊

    • @Britec09
      @Britec09  Год назад +4

      Hope you enjoyed it!

  • @jamegumb7298
    @jamegumb7298 Год назад +1

    Just Wireshark it.
    Or use intrusion detection.

  • @d1m18
    @d1m18 Год назад +1

    Still recommending Kaspersky rescue disk? I thought that does not exist and has not been updated. I loved it, but their support says it no longer exists...
    Correct?
    Can you recommend many virus rescue / boot disks to use, that are still updated?

  • @inigoacha1166
    @inigoacha1166 5 месяцев назад

    1. Move to Windows 11 x64 Core isolation mode.
    2. Cypher the DISK
    2.1 Backups ?
    3. Pay The Kaspersky license with pre secured VPN servers.
    VPN services are the door for the botnets
    Greetings from Bilbao and ty for the video !

  • @Pancajayna
    @Pancajayna Год назад

    EVERYONE should find this useful and those that don't can continue to live with their head in the sand... you literally have no idea how impactful this bit of information is...

  • @shawnkeys4963
    @shawnkeys4963 Год назад +4

    You keep saying "weird stuff" how are we ( the people who don't know) supposed to know what is "weird stuff " from stuff that is normal or ok?

  • @spherasidereal
    @spherasidereal Год назад +2

    Will Malwarebytes installed in my PC prevent or detect any of this?

  • @fubu7942
    @fubu7942 10 месяцев назад +1

    If someone is remote viewing your computer then they are a sinner that needs to repent.

  • @UmarO
    @UmarO 11 месяцев назад +2

    "look for weird processes" - how can we know!

  • @danielgartin-oh9ik
    @danielgartin-oh9ik Год назад +1

    That's useful, I'm still torn between the Surface Book and the Surface 3 LTE

  • @theguywithone
    @theguywithone Год назад +1

    I have successfully avoided this for many many years. Never had to do anything special or buy anything. I just don't own a computer. Simple.

  • @julianciahaconsulting8663
    @julianciahaconsulting8663 Месяц назад

    a little more talk about how to recognize a rogue program would be helpful

  • @brianchandler8727
    @brianchandler8727 9 месяцев назад

    Thank you for the information, I try hitman . It seems to work

  • @KTHKUHNKK
    @KTHKUHNKK Год назад

    Thank you it's nice to be aware of all that

  • @earnestleesaddened3779
    @earnestleesaddened3779 Год назад

    Will regular use of SFC and DISM help to remove remote connections?

  • @paideia-e9u
    @paideia-e9u Год назад

    Thank you very much for sharing. Help a lot!

  • @Moist_yet_Crispy
    @Moist_yet_Crispy 11 месяцев назад +1

    I have some sus processes but when I right click properties is grayed out. How else can I track down the properties address to remove?

  • @Phoenix-kj2fn
    @Phoenix-kj2fn 10 месяцев назад

    EXELLANT----EXPLANATION.
    Dear Sir, I have installed AV software- BITDEFENDER TOTAL.
    Do I need to buy additional AntiMalware software?
    Do it necessary to carry out other processes you described above?
    Please reply as many other READERS are waiting for answer of this question.
    Thanks

  • @leecowell8165
    @leecowell8165 11 месяцев назад +2

    WHAT "Task Manager"? I don't have one of those and in fact haven't had one for over 20 years. Now just WHY is that? Because I run LINUX, that's why! And so should you because IF you did you would NOT have to be concerned about ANY malware and here's why: Because NTFS partitions are protected by the OS... but ext4 is protected by the partition itself. That means if YOU don't have the PW you are NOT getting IN! This is why I can boot any windows box with a LINUX stick and steal EVERYTHING within that box and there ain't nothing windows can do about it because it hasn't even been booted! But because there's NO PROTECTION at the FILE level guess what I can do? Anything I want. But that is FAR from the case on a linux box. The bottom line here is that to install malware code the bad guy MUST HAVE ACCESS TO THE BOX! It doesn't matter WHAT instrument they're using, see? And on linux you gotta have the PW or trick the STUPID user into giving it up. Well most people that run linux ain't stupid or they probably couldn't even install it.

  • @xavierkreiss8394
    @xavierkreiss8394 11 месяцев назад +1

    You might like to change the title of your clip so it mentions "your PC" rather than "your computer". I have a computer but the clip for me is useless - I have an iMac.

  • @woritsez
    @woritsez 9 месяцев назад

    heavy heavy renders make the mouse pointer fly off screen, not unholy possession as i once thought, just a precursor to some unsaved project crashing

  • @hvfd5956
    @hvfd5956 Год назад

    Boy will they be disappointed! There ain't crap here.

  • @nonshatter7
    @nonshatter7 Год назад

    Will using a firewall/virus protection like Norton be sufficient to combat these things. I ask because you state that running multiple scans with different programs is a good idea (but having more than one antivrus package could create program conflicts.).

  • @digudc
    @digudc Год назад

    thank you mate.. your videos are everyday informative and helpful.. cheers..💛💙

    • @InstigatorDJ
      @InstigatorDJ Год назад

      Information you will NEVER FUCKING NEED. But thank you bro. Jesus!!

  • @soiltek2015
    @soiltek2015 11 месяцев назад

    Thanks for reminding me why I always buy physical.

  • @bruce8321
    @bruce8321 11 месяцев назад +2

    This is way too fast and moving around for the average Joe to understand. I had to leave it.

  • @JackNotJack
    @JackNotJack Год назад +1

    Great video. Thanks for taking the time to make it.

    • @InstigatorDJ
      @InstigatorDJ Год назад

      Will help literally NOBODY!! Great VIDEO MAN!!!!!!!!! WOW OMG!!

  • @axq3837
    @axq3837 Год назад +2

    Why do they specifically install the Opera browser?

  • @MrYossarianuk
    @MrYossarianuk Год назад +1

    Better to run Linux so you can actually tell what your computer is doing as YOU have full control

  • @rexford9019
    @rexford9019 Год назад

    Owned a MacBook since 2010 and never had a single virus on it.

  • @marimarmarimar25
    @marimarmarimar25 8 месяцев назад

    Thanks!

  • @charleshines2142
    @charleshines2142 Год назад +1

    Is there a way to add a column to process explorer that shows any remote addresses a process may have? It would make it so you don't really have to go through each one. I can imagine some of those rats having names that sound very similar to process names found in Windows so that you might not see them as easily. It would be similar to the way some websites might have a strange character in the name that looks similar to the one in our 26 letter alphabet (unless you live somewhere the alphabet is different). Also it would not be a bad idea to have a good known clean installation media made for the OS of your choice. This way if it is a computer that will have personal stuff on it that you don't want stolen there is much less of a chance that it would happen. Just don't change your passwords and other stuff on a machine that might still be infected since the malware is likely to just send those to the person who hacked you and then they don't really help. You may even want a separate computer for personal stuff like paying bills and other similar things. It would be a computer that doesn't really have any extra software installed and is also one you never let anyone else really use. For those purposes that one can be a little NUC and then it would take a lot less desk space than a typical PC while having all of the functionality. They are not something that I would game on but they would be good for trying out Linux if you are not ready do install it on all computers. I really have only installed Linux on a spare PC just to get used to it before I ever attempt to switch the other ones over. It is just a spare one that I can use to learn to get used to Linux and has no data on it for me to worry about losing accidentally and nothing sensitive to worry about falling into someone else's hands.

  • @yadiman7295
    @yadiman7295 10 месяцев назад

    Uncheck the check-box of "Allow Remote Assistance connection to this computer" in System Properties

  • @MK-fd5pc
    @MK-fd5pc Год назад +1

    Do not use Kaspersky and opera. Find out why first

  • @RealityCollapseTheory
    @RealityCollapseTheory Год назад

    There is no security you would have to rebuild everything using new technology making sure it is foolproof

  • @Sand15676
    @Sand15676 Год назад

    I look at it like this. Whenever you go on line it's like going into a battlefield. I plug my Ethernet cable in, take care of business and then get the hell out by physically removing the Ethernet cable. Even with a VPN.

    • @leecowell8165
      @leecowell8165 11 месяцев назад

      Why do you do that the ultimate paranoia attack? Good reason under windows. However I spend hours everyday on the internet. And in 20 years I've never been hacked or had ANY malware or virus installed on my boxes. Why? I run linux. I run ClamAV every quarter or so to see if any windows files have picked anything up in my NTFS formatted partitions or even stick partitions (which are generally formatted FAT32). Those partitions have absolutely NO PROTECTION at the FILE LEVEL thus they get attacked unmercifully. Yep generally something gets picked up by ClamAV but guess what they still need my PW and I rarely run as Admin. BTW ClamAV takes HOURS to run if you gotta big box. I generally just let it run overnight. I only run it on NTFS/FAT32 partitions that are actually physically on the system because it ain't happening on ext4 partitions. yeah I have maybe 40 partitions on my big box (well beyond windows capability as they alphabetize their partitions (and no longer use A or B if you newbies happen to notice that)). Linux is a bit more complex regarding naming convention but there's virtually no limit to the number of partitions on a linux box. You can also install linux anywhere even across many physical drives (while windows always installs to C:)

  • @InstigatorDJ
    @InstigatorDJ Год назад +1

    The chances someone IS ACCESSING your compuiter is LITERALLY NIL.

  • @myhatmyseat9924
    @myhatmyseat9924 11 месяцев назад

    i still check my Hosts file on a regular basis, not sure if it is still relevant but habits be habits

  • @joebailey5607
    @joebailey5607 6 месяцев назад

    My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?

  • @terrylast7034
    @terrylast7034 Год назад +1

    As an electronics teacher of thirty years your teaching method is vague and ham fisted. It serves only to have most people visit their tech nerd. Itis not worth the carbon footprint.

  • @MGKing-888
    @MGKing-888 8 месяцев назад +1

    Please do a video on how to check if someone is remotely accessing my RUclips and Gmail accounts. From where is my RUclips and Gmail being accessed from?

    • @jjann54321
      @jjann54321 6 месяцев назад

      First, change your passwords. Second, enable 2FA/MFA. Require all active/current sessions to log back in. Whomever was logged in (if any) will be kicked out and can only reconnect if they have access to your 2FA/MFA solution. To answer your question specifically, usually you can go to Profile > Security and you'll see "session logs" and you can see when/where your most recent logons occurred.

  • @sissaboolives2012
    @sissaboolives2012 3 месяца назад

    Hmm wouldn't it be nice if Windows would supply the software that scans the pc for this sort of thing, you know, put the running programs thru queueing algo and warn of any programs it does not recognize so the user can confirm if it is a legit program or not. And, add to the queue any programs the user has approved for installation. This should remove viruses and malware.

  • @chevyyyyyyy
    @chevyyyyyyy 11 месяцев назад +1

    This demo. is useful only to you and your friends because it does not explain.

  • @supertrexandroidx
    @supertrexandroidx Год назад

    Think you meant "suspicion" in the description, not "suspension." ;)

  • @UQRXD
    @UQRXD 11 месяцев назад

    Microsoft does it all the time. I am use to it.

  • @notjustforhackers4252
    @notjustforhackers4252 Год назад +1

    Type "users" in a bash terminal.

    • @Britec09
      @Britec09  Год назад +1

      not 100% guaranteed to find backdoor

    • @notjustforhackers4252
      @notjustforhackers4252 Год назад

      @@Britec09 If someone is currently accessing you system 'users' will tell you.
      sudo lynis audit system
      Will find any nasties if they're not currently active.

  • @mean10102
    @mean10102 Месяц назад

    Don't believe computers are private. In order for privacy. You have to put the hardware in a Faraday cage and hope it is sealed.If it is not sealed a near by computer will act as a bridge. There is a peer to peer that is unknown. I observed it talking on 462 mhz .I observed it advertising it's self every so often in the Faraday cage.before I put it in the Faraday it would not stop talking on 462 mhz. I setup a laptop near the computer in the Faraday cage because i need it.long after I put it in the Faraday cage. The next time the computer advertised it's self they both started screaming on 462 mhz. The only reason i know this is because I had a scanner on . Every time I turned on my the mobo I bought for my gpu to run llm's on. It made alot of noise on 462 mhz. So i put in a Faraday cage because I didn't want to lose my hardware to the FCC. I found out all this.

  • @lloydrobertevans
    @lloydrobertevans 3 месяца назад

    All my neighbours next door, including 54 Bower Street, say sagehr and avast sticks of gas back to booby bouncer😅😊
    I think I been moped

  • @richardlong8736
    @richardlong8736 9 месяцев назад

    Thanks, cheers

  • @BernhardSchwarz-xs8kp
    @BernhardSchwarz-xs8kp 6 месяцев назад

    I hope at least you had fun - rambling down issues that come to your mind on the fly, randomly clicking away, opening windows, and shutting them almost instantly down again. All actions are totally unrelated to anything other than your ego trip.

  • @vicmartinez4532
    @vicmartinez4532 Год назад

    Windows is super safe because Billy the Kid makes make sure he can shoot you into your computer

  • @truhunk1
    @truhunk1 Год назад +1

    Too complicated for me to figure out.

  • @benjaminstevens6043
    @benjaminstevens6043 11 месяцев назад +1

    sweet merciful jesus, THANK YOU. Just facts and brass tacks. concise disambiguation and walkthrough.
    I love you.

  • @crumblingsanity6455
    @crumblingsanity6455 9 месяцев назад

    With the start process around 4:42 mines is pretty much the same as shown on here where the location and everything is the same, so with that in mind from the video, I'd assume that someone has remote access to my computer, right? I'm not really sure how anyone would have been able to do this and I've already run a million scans (mainly full ones of course) and nothing has of course popped up and I haven't seen any weird changes to my computer either signifying that I am being remotely hacked either.

  • @richardmagic101
    @richardmagic101 3 месяца назад

    when you type in you login code type your number and if you type 5 times until it shows you have a key logger on you computer someone is spying and recording every key stroke

  • @dontwasteachance
    @dontwasteachance 7 месяцев назад

    It looks like this video is specific to Windows. You might have warned us by putting "Windows" in the title. There is a sizable population that doesn't run Windows.

  • @Technie87
    @Technie87 10 месяцев назад

    Pretty sure someone is remote into my computer on chrome - how would I be able to see what they are using to connect?

  • @francishubertovasquez2139
    @francishubertovasquez2139 Месяц назад

    Probably they're shadows and fans of mine designed to serve me.

  • @ShaunBest
    @ShaunBest Месяц назад

    Video title lead me to assume there's actually forensic skills related to Windows 11 but it's just a generic mention that anti-virus programs exist.

  • @tutifruti7488
    @tutifruti7488 Год назад

    Why check?
    Always assume they are.

  • @İlindsaycaruso
    @İlindsaycaruso Месяц назад

    Is it weird that cpu numbers are moving around even after force quit everything? It’s like fluctuating and switching places 🙄 MacBook Pro m3 somehow believe I got a virus