How to Check if Someone is Remotely Accessing Your Computer

Поделиться
HTML-код
  • Опубликовано: 9 янв 2025

Комментарии •

  • @jbrou123
    @jbrou123 Год назад +126

    What I got from this video.
    How to Check if Someone is Remotely Accessing Your Computer
    1. Open up Task Manager and look for rogue programs.
    2. Run programs that look for roque programs.
    Thanks, that helps a lot.

    • @BillAnt
      @BillAnt Год назад +4

      lol

    • @leecowell8165
      @leecowell8165 Год назад +6

      Unless of course they're ain't no "Task Manager" what then? Yeah under linux WTF IS THAT?

    • @Catinthehackmatrix
      @Catinthehackmatrix 10 месяцев назад

      ​​@@leecowell8165Linux has process managers. Try Linux mint, lubuntu, etc .

    • @blackaudrey367
      @blackaudrey367 4 месяца назад +2

      Exactly! The print is so small on his demonstration, I can't even see it🤦🏾

    • @stonalisa3729
      @stonalisa3729 Месяц назад

      @@leecowell8165 you are less likely to have issue on linux because 99% of malware is for windows and on Linux you would have to conciously download it

  • @OldManJimmy1
    @OldManJimmy1 Год назад +29

    Yeah, when you get a computer running Windows virused or malwareed up it's never the same just cleaning them off. Seems to leave glitches and issues from then on. Clean install of windows is the way to clean this up. Thanks for the tips on keeping an eye on malicious programs infecting our PCs

    • @leecowell8165
      @leecowell8165 Год назад +6

      No. The way to clean it up is to install linux because guess what IF you don't within in a month they'll be newbie malware on your box.

    • @OldManJimmy1
      @OldManJimmy1 Год назад

      I need to spend a little time learning Linux and install it on one of my computers.@@leecowell8165

  • @yourpcmd
    @yourpcmd Год назад +206

    The only rogue programs I see in Task Manager are Chrome and Microsoft.

    • @homuraakemi9556
      @homuraakemi9556 Год назад +2

      Yes, I'm pretty sure some of the things he was pointing out in task manager were actually normal. Search being paused/suspended by Windows is totally normal, for example.

    • @Britec09
      @Britec09  Год назад +12

      You obviously don't know anything about windows

    • @myekuntz
      @myekuntz Год назад +7

      more like forceded and enforced malware

    • @gittube417
      @gittube417 Год назад

      Change to Mac then !

    • @ASMR_Lighting
      @ASMR_Lighting Год назад +5

      My comment supporting this post was removed by YT as violating its policy - no dissent permitted, apparently!

  • @kpv123
    @kpv123 Год назад +218

    This is Michael. I usually like your work but this was pretty useless. The first major fail is that you don't tell people how to disable remote access. The second is that there's no way the average person can know what's a rogue program when there are so many weird names on programs in the operating system both in terms of processes and services. The only useful things you said were to get a good antivirus program and utilize process Explorer

    • @Pancajayna
      @Pancajayna Год назад +14

      There are literally thousands of files and processes that he can't even start to address for the "average person"... this is a first step and then you can HIRE a tech if you find something OR you can check the names one by one and research it YOURSELF... what do you really think this is?

    • @t.stephen5086
      @t.stephen5086 Год назад +27

      He could've shown how to disable remote access as you suggested, that would be the first step a non tech person should so

    • @flashwashington2735
      @flashwashington2735 Год назад

      @@t.stephen5086 Because mal ware would never mal that? Still it should be done, but what about governments, mandatory OS and hardware backdoors? Microsofts continual data collection and giving to governments? And the big corporates' anti spy - malware's backdoors and data sharing an awfulot of vectors for compromise and harm? Well, do what you will and can. God bless.

    • @jimkyle8008
      @jimkyle8008 Год назад +25

      My thoughts exactly. The information might be useful if you're a computer nerd, but it's pretty meaningless to the average user.

    • @Hs5687
      @Hs5687 Год назад

      Hi Guys , just wanted to let You know that if You are Politically Targeted , try not to rely too much on Internet … even Telcos can be Compromised…

  • @ripleyhrgiger4669
    @ripleyhrgiger4669 Год назад +30

    I just recieved my first high end router in my entire life (it was a Christmas gift to myself (early I know) for completing several projects at work) and I never knew just how powerful a router can be for security once configured properly. Your channel and others like it have been a great boon for a lot of people out there and we do really appreciate the hardwork you do to educate people. Seasoned IT professionals and amateurs alike always have something to learn in this field. (There is too much for us to know everything!)
    Thank you so much, Mr. Britec! I look forward to your next lesson!

  • @PastaFazool4266
    @PastaFazool4266 Год назад +32

    Part of the problem is Windows is so primitive they allow any program to get installed anywhere the creator wanted even in the OS area. The OS should be protected, no one should be installing anything in the OS directory. Each application should be installed under its own tree, and it should not require root for installation. Applications should not be using OS locations, OS utilities, OS "registries", OS anything other than using shared system libraries (that are read-only). This chaotic, messy setup that Microsoft has created makes it difficult to see if a process is legit or not.

    • @qt3dot146
      @qt3dot146 29 дней назад

      And how is it that you don't work for Microsoft? I believe that they could utilize your version of how to protect us users.

  • @EHD351
    @EHD351 Год назад +10

    I get Phishing Emails constantly. Have to always look twice. Thanks, once again.

    • @excxmoody
      @excxmoody Год назад

      That's exactly how it is whenever I try shopping online...where I'm literally minding my own damn business while someone else clearly cannot do so.

    • @TurielTyrael44-bf1ld6zu6s
      @TurielTyrael44-bf1ld6zu6s 8 месяцев назад

      Report them. If there's a lot just mass delete them and report them (do both).

  • @stephenluttrell8958
    @stephenluttrell8958 Год назад +24

    Unfortunately there aren’t a lot of accessible options when it comes to anti virus/malware software for us blind users. We are an underserved demographic in this regard.

    • @flashwashington2735
      @flashwashington2735 Год назад

      There's all kind of blindness, you'd know better than me. However, everybody needs help some times, pray and act to get it. Don't let your eyes be merely be one \ among other avoidable impairments. Life is hard enough my friend. God bless.
      God is still in business healing. If you believe it, if you want to believe it. Get help with your believing. Like the Father of the possessed son, Some might say epilepsy, 'I believe. Help thou my unbelief.' He asked the master. He got results.
      Mark 9:24:21 And he asked his father, How long is it ago since this came unto him? And he said, Of a child.
      22 And ofttimes it hath cast him into the fire, and into the waters, to destroy him: but if thou canst do any thing, have compassion on us, and help us.
      23 Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
      24 And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
      25 When Jesus saw that the people came running together, he rebuked the foul spirit, saying unto him, Thou dumb and deaf spirit, I charge thee, come out of him, and enter no more into him.
      26 And the spirit cried, and rent him sore, and came out of him: and he was as one dead; insomuch that many said, He is dead.
      27 But Jesus took him by the hand, and lifted him up; and he arose.
      Remember: Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
      And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
      God bless.

    • @alfonzo7822
      @alfonzo7822 6 месяцев назад +1

      That's actually something I had never considered. I'm currently a Cyber Security degree student. This is giving me an idea for a program/app for those with visual impairments. I'm sorry it doesn't help you just now, but hopefully there will be things in future that can help you navigate these kinds of issues better.

  • @EveMarie
    @EveMarie 6 месяцев назад

    Words cannot describe how grateful i am for this Caroline series. You have helped me so much and also showed me that it was ok to open up about the grief on my channel. Thank you, thank you, thank you 🙏🏻

  • @t.stephen5086
    @t.stephen5086 Год назад +13

    Wouldn't it just be easier to type a netstat -a command to check foreign connections?

    • @Lachausis
      @Lachausis Год назад +3

      not all viruses connect to the web. Some are just there to screw your OS up. So both, I guess.

    • @julianciahaconsulting8663
      @julianciahaconsulting8663 2 месяца назад

      i did that and for 2 seconds i could see a screen of something happening then nothing

  • @MrPir84free
    @MrPir84free Год назад +15

    I believe you failed to mention one of the best countermeasures for a typical system is to create and use a regular user account for everything, put a strong password on the administrator account and use it only when needed.
    I work IT, and even at home, I refuse to run as Administrator for things like browsing the internet, or doing darn near anything else. It is JUST one of many measures that one takes to keep their system clean. It matters not if you are using Linux or Windows, the concept is exactly the same. Not running as Administrator is one of the best things one can do for their own computers; sometimes less convenient, but better practice.
    Some folks may think that this is about merely finding out if one's computer is compromised; and how to clean it up; but staying clean is part of the problem.

    • @Britec09
      @Britec09  Год назад +3

      I made videos on that before, no one wants to run as standard user.

    • @Absamo97
      @Absamo97 Год назад +3

      I mean ... if the attacker got into your system its a matter of time that he can privilege escalate his user to become admin and take over your machine, so instead of limiting my self with some features or have some limitations I run my system as admin all the time and I believe most of the people do this.

    • @lordhriley
      @lordhriley Год назад

      ​@Britec09 well you can't very easily with windows making u use a Microsoft account to log into your computer.

    • @leecowell8165
      @leecowell8165 Год назад +1

      By default you're not running as Admin in linux. In fact without doing so you cannot access anyone else's /home directory on YOUR system without their knowledge because you need THERE PW. So never run as Admin by default on a linux box. The only way to access everyone is you need to elevate your user level to Admin. That means you need access to the box itself because it ain't happening remotely without the PW.

  • @petervan7372
    @petervan7372 11 месяцев назад +3

    Some processes can't be seen in any monitoring tools, it's made this way by Windows or any OS on purpose, like when the three letter agencies remote into your PC, you won't be able to see it

    • @joebailey5607
      @joebailey5607 7 месяцев назад

      My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?

  • @ros-spur98
    @ros-spur98 Год назад +5

    Cheers Brian, good to know, I do a Kaspersky Total full scan every 10 days or so.

    • @Britec09
      @Britec09  Год назад +3

      Good stuff

    • @maxgood42
      @maxgood42 Год назад +5

      @@Britec09 There was a lot of controversy over Kaspersky in the past, can you do an update about this and or other security providers ?

    • @thefreestylefrEaK
      @thefreestylefrEaK Год назад +2

      @@maxgood42 No he can't because he's a tool.

  • @WheelerRickRambles
    @WheelerRickRambles Год назад +7

    I worked for a terrible employer (…didn’t know this til the end…). I was an outside sales guy where I used my personal private home computer, on rare occasions, to do some work related tasks - simple spreadsheet development, print an email, etc. Well, to my not knowing or being notified they somehow gained remote access to my computer. They could see everything, every click, every mouse move, bank accounts….ALL! It was not good, felt violated & all sorts of the like. Wish I would have known of this video content back then.

    • @Etleng-yf9fq
      @Etleng-yf9fq 7 месяцев назад

      Same happening to me. People are abusing their power.

    • @smokagaming
      @smokagaming 4 месяца назад

      @@Etleng-yf9fq Likewise here :/ Its been depressing not gonna lie, though Ive been studying and hopefully will be smart enough to stop the stuff soon

    • @yasminasaidii
      @yasminasaidii 2 месяца назад

      is their access to the email enough to have all that access to monitoring all of that?

  • @maydaygoingdown5602
    @maydaygoingdown5602 Год назад +7

    Hi Brian. Just a quick one.
    If i dissable all Remote settings in windows can this type of thing still happen??
    Disabling Remote settings is one of the first things ive always done.

  • @danbromberg
    @danbromberg Год назад +21

    Great video but it's helpful to have links to the programs used in your video as you often do.

    • @Britec09
      @Britec09  Год назад +15

      I will add them, I forgot

  • @rumno_tepruno
    @rumno_tepruno Месяц назад +1

    Thank pro your explanation, but if I format reinstall Windows after format, one day or two after I see that Explorer crash and relaad and after when installing .exe, letter unicode seem problematic some of them. So what to do in this case ? Because it look like that a professional team of hacker/ asker, watch. And then I have trouble with some apps or cloud drive synchronisation. Do you have an advice ?

  • @WatchesTrainsAndRockets
    @WatchesTrainsAndRockets Год назад +9

    Do you expect the average user to comprehend any of this?

  • @qt3dot146
    @qt3dot146 29 дней назад

    Ok, now I need some more info.
    When my computer boots, it does show a few of DOS windows you show at the 2:25 mark. The problem for me is that they just flash for a second and they're gone so quick that I can't read the message.
    Any suggestions on how to capture that info so I can see if they are part of something that is remotely accessing my computer?

  • @wannabedal-adx458
    @wannabedal-adx458 11 месяцев назад +1

    "Or maybe you a have suspicion that someone is remote viewing your computer without your knowledge." You mean like Microsoft, Google, NSA, GCHQ, etc!! 😂
    Thanks for a good video Brian. A good reminder to look up and use some the tools you mentioned here.

  • @crumblingsanity6455
    @crumblingsanity6455 10 месяцев назад

    With the start process around 4:42 mines is pretty much the same as shown on here where the location and everything is the same, so with that in mind from the video, I'd assume that someone has remote access to my computer, right? I'm not really sure how anyone would have been able to do this and I've already run a million scans (mainly full ones of course) and nothing has of course popped up and I haven't seen any weird changes to my computer either signifying that I am being remotely hacked either.

  • @AndroCom69
    @AndroCom69 7 месяцев назад

    This is what I need to know now, cause like any something strange on my PC turn off suddenly. Thanks for tutorial, Sir.

  • @petefluffy7420
    @petefluffy7420 Год назад +4

    Oh very easy. Look for rogue processes, there is one problem immediately apparent. Nothing is ever identified as being rouge.

  • @dreammanifest9
    @dreammanifest9 Месяц назад

    u straight away went into things not in a beginner angle no use for many.

  • @deciodasilva3960
    @deciodasilva3960 Год назад +2

    This is very very very helpful and important information man thank you...

  • @familyhopeschildrenandlegal
    @familyhopeschildrenandlegal 2 месяца назад

    Video was very insightful. I have all that you have mention plus more. One thing i am confused with is that every time i reinstall windows it re appears everytime. I cannot work out what is going on.

  • @Moist_yet_Crispy
    @Moist_yet_Crispy Год назад +1

    I have some sus processes but when I right click properties is grayed out. How else can I track down the properties address to remove?

  • @lswinney1000
    @lswinney1000 10 месяцев назад +4

    My head is spinning from this video. It may be malicious or it may not. NOT MUCH HELP.

  • @d1m18
    @d1m18 Год назад +1

    Still recommending Kaspersky rescue disk? I thought that does not exist and has not been updated. I loved it, but their support says it no longer exists...
    Correct?
    Can you recommend many virus rescue / boot disks to use, that are still updated?

  • @rickoshay6554
    @rickoshay6554 7 месяцев назад

    You have a decided advantage in spotting rogue programs when you installed the rogue programs yourself. It's more problematic when someone else did it.
    In my experience, most of the rogue programs that plague Windows were put there by Microsoft.

  • @B3-R
    @B3-R Год назад

    If using any exterior virus check with for example Kaspersky, before shutting down Windows,the Hibernation should also be cleared, otherwise won't work.

  • @James-k6z5e
    @James-k6z5e 8 месяцев назад

    You explained a bit fast for me personally but appreciated and would advise you to somehow enhance the size of the written document so we can see what u r pointing out. I gather most people already know. I am quite the novice❤

  • @earnestleesaddened3779
    @earnestleesaddened3779 Год назад

    Will regular use of SFC and DISM help to remove remote connections?

  • @babumohan4549
    @babumohan4549 Год назад +1

    expected video sir😊thank you❤love from India ❤😊

    • @Britec09
      @Britec09  Год назад +4

      Hope you enjoyed it!

  • @lapasorsa9022
    @lapasorsa9022 5 месяцев назад +1

    Lovely! Only suspicious thing leaking information here is Windows. Malware is working fine.

  • @spherasidereal
    @spherasidereal Год назад +2

    Will Malwarebytes installed in my PC prevent or detect any of this?

  • @nmbdy4732
    @nmbdy4732 Год назад +1

    Thanks so much for your great work with load of knowledges and details!
    When I click on Whois it said : Failed to get Whois information. Any suggest?

  • @paideia-e9u
    @paideia-e9u Год назад

    Thank you very much for sharing. Help a lot!

  • @nonshatter7
    @nonshatter7 Год назад

    Will using a firewall/virus protection like Norton be sufficient to combat these things. I ask because you state that running multiple scans with different programs is a good idea (but having more than one antivrus package could create program conflicts.).

  • @MeBaddaDanDem
    @MeBaddaDanDem 3 месяца назад +1

    I think you should show everyone how to setup crowdsec engine on their devices.

  • @xavierkreiss8394
    @xavierkreiss8394 Год назад +1

    You might like to change the title of your clip so it mentions "your PC" rather than "your computer". I have a computer but the clip for me is useless - I have an iMac.

  • @MGKing-888
    @MGKing-888 10 месяцев назад +1

    Please do a video on how to check if someone is remotely accessing my RUclips and Gmail accounts. From where is my RUclips and Gmail being accessed from?

    • @jjann54321
      @jjann54321 8 месяцев назад

      First, change your passwords. Second, enable 2FA/MFA. Require all active/current sessions to log back in. Whomever was logged in (if any) will be kicked out and can only reconnect if they have access to your 2FA/MFA solution. To answer your question specifically, usually you can go to Profile > Security and you'll see "session logs" and you can see when/where your most recent logons occurred.

  • @markcorrigan293
    @markcorrigan293 8 месяцев назад

    I am able to fully reinstall windows (refresh it) in about 20 minutes. Another 20 to reinstall favourite apps. I suggest this approach if pc starts misbehaving as you will spend hours trying to fix / remove bugs where 40 minutes for a fresh start is best.

  • @michalwiktorow2188
    @michalwiktorow2188 Год назад

    Hi, this was great educational video. Considering how corporations are forced to work with gov. that are not always non-totalitarian, which of the software provider is most independent and has robust antivirus? Thanks.

    • @flashwashington2735
      @flashwashington2735 Год назад

      That are not totalitarian, but want to be badly, and have formed a multi national coalition like Five Eyes. She's an ugly date that Five Eyes. 🤔🤔🤣🤣🤣😘😘🙏🙏

  • @lindscarus
    @lindscarus 2 месяца назад

    Is it weird that cpu numbers are moving around even after force quit everything? It’s like fluctuating and switching places 🙄 MacBook Pro m3 somehow believe I got a virus

  • @joebailey5607
    @joebailey5607 7 месяцев назад

    My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?

  • @KTHKUHNKK
    @KTHKUHNKK Год назад

    Thank you it's nice to be aware of all that

  • @axq3837
    @axq3837 Год назад +2

    Why do they specifically install the Opera browser?

  • @woritsez
    @woritsez 10 месяцев назад

    heavy heavy renders make the mouse pointer fly off screen, not unholy possession as i once thought, just a precursor to some unsaved project crashing

  • @geezerStriker
    @geezerStriker 2 месяца назад

    hey i need help, ive got a weird problem where i think someones been tying to access my information, ive woken up today and my laptop has chrome open and it looks like they have been trying to look for my info, i like every account i have, twitter, paypal, amazon, yahoo, something about Third-party apps and services, and i noticed this because something popped up and said something like "failed to open host thing", i went into task manager and theres alot of host stuff, and it said it was first downloaded in 2022 and opened 36 minutes ago, ive used the virus checker and it said nothing is wrong, i need help.

  • @TylerPugh-m9p
    @TylerPugh-m9p Месяц назад +1

    Man wtf do I do . . . I got infected with remote access and they have blocked from windows defender and everything , and reseting windows HELPP PLEASEE

  • @vicmartinez4532
    @vicmartinez4532 Год назад

    Windows is super safe because Billy the Kid makes make sure he can shoot you into your computer

  • @_szymskyy
    @_szymskyy 7 месяцев назад

    So i've downloaded a trojan few weeks back and ran eset in-depth scan, hit man pro scan and Norton power eraser scan. When I opened up the task manager and looked at search it is suspended and I dont really know if it should be suspended after those three scans. Could you give me an answer?

    • @1BackUpPlan1
      @1BackUpPlan1 6 месяцев назад

      THIS GUY IS AS MENACE BECAUSE HE'S AN IDIOT. That is the text input host. The path is "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\ " . It's normal being suspended..

  • @lobzangdorjay757
    @lobzangdorjay757 10 месяцев назад

    I am having issues with taskbar after upgrading to windows 11 from 10, Taskbar doesn't load on time after a restart ?

  • @CampSorya
    @CampSorya 7 месяцев назад

    how do you enable that thing u enabled in prosess explorer to see if there are any virouses

  • @LightInRoom
    @LightInRoom 3 месяца назад

    do you have a pc to test viruses or smth becouse i got visus never seen before and i need help with it but nothing works even scans. if you can help i will mean a lot for me

  • @Robert08010
    @Robert08010 9 месяцев назад

    @ days ago, I found teamviewer running as a background task on my computer. I killed it twice and it restarted itself both times. I don't recall installing Teamviewer but I may have. But it is normal for a program I am NOT running to have a background task running continuously? I uninstalled it and it does appear to be gone so I don't think it was a part of any specific malware.

  • @dishankchauhan8153
    @dishankchauhan8153 Год назад

    Please please please answer the doubt.
    Someone did the same with me. I downloaded a cracked software and since then I'm getting some creepy requests (as pop ups) to for a remote desktop connection. And point is it's not actually a request, it's simply a notification that someone has connected, now you can decide whether you want him to remain connected or not. And if I click NO, it says, the remote user has "declined" your "request" to disconnect. I mean what the hell is that! Why should I be the one requesting and who is he to decline it!
    To resolve this I simply reset my PC, with all the files removed and installed a fresh Windows. BUT I DOUBT THAT WILL SOLVE THE PROBLEM. Coz as far as I could understand the cracked software's job was to just extract the sensitive information like IP address etc of my device, now once done that, even if I reinstall the windows, but the IP address will remain the same correct?
    It's been 10 mins I reinstalled and haven't got any creepy remote connection notifications. But my doubt is, whether the problem is really solved? Or not? Please please please answer.

  • @richardmagic101
    @richardmagic101 5 месяцев назад

    when you type in you login code type your number and if you type 5 times until it shows you have a key logger on you computer someone is spying and recording every key stroke

  • @UmarO
    @UmarO Год назад +2

    "look for weird processes" - how can we know!

  • @t.i.awareness4roma860
    @t.i.awareness4roma860 Год назад

    I get thise black command promtpts pop uo and disappeae quickly. But how do i know where or wjag is the malware doinb

  • @brianchandler8727
    @brianchandler8727 10 месяцев назад

    Thank you for the information, I try hitman . It seems to work

  • @NiazMohammad
    @NiazMohammad 10 месяцев назад

    I don't see the Virus total counter as in your video. Mine is blank column.

  • @madgamer4749
    @madgamer4749 4 месяца назад

    I don't know what happening with my windows 10 laptop. when I press wifi trying to connect it. Airplane mode turns on automatically. I can't able to scroll anything though my mouse is working. I need use my arrows key to switch and enter key to open something. Even if it need to shutdown or restart my laptop I need to use my arrows and enter button. And if I open setting only white blank appears.
    Please help.
    Please help me

  • @cringesh1t427
    @cringesh1t427 8 месяцев назад

    I have a brand new windows install and have that blank search paused in my task bar. Is it really something fishy??

  • @LordMercyy
    @LordMercyy 9 месяцев назад

    can someone help me with suspended in search shown in task bar and when i open microsoft store again i saw suspended and it says they increase the processor power 🤔🤔

    • @1BackUpPlan1
      @1BackUpPlan1 6 месяцев назад

      That search is normally suspended. Open the task manager and set it to always on top. Then simply press the win key and it unsuspends like normal. Do a file search while it's suspended, it will search for the files yet that process stays suspended because it's NOT for searching for files..
      This guy is a menace. There is malware that hijacks that process but you certainly cannot tell by it being suspended...And it's a million to one you have the malware

  • @charleshines2142
    @charleshines2142 Год назад +1

    Is there a way to add a column to process explorer that shows any remote addresses a process may have? It would make it so you don't really have to go through each one. I can imagine some of those rats having names that sound very similar to process names found in Windows so that you might not see them as easily. It would be similar to the way some websites might have a strange character in the name that looks similar to the one in our 26 letter alphabet (unless you live somewhere the alphabet is different). Also it would not be a bad idea to have a good known clean installation media made for the OS of your choice. This way if it is a computer that will have personal stuff on it that you don't want stolen there is much less of a chance that it would happen. Just don't change your passwords and other stuff on a machine that might still be infected since the malware is likely to just send those to the person who hacked you and then they don't really help. You may even want a separate computer for personal stuff like paying bills and other similar things. It would be a computer that doesn't really have any extra software installed and is also one you never let anyone else really use. For those purposes that one can be a little NUC and then it would take a lot less desk space than a typical PC while having all of the functionality. They are not something that I would game on but they would be good for trying out Linux if you are not ready do install it on all computers. I really have only installed Linux on a spare PC just to get used to it before I ever attempt to switch the other ones over. It is just a spare one that I can use to learn to get used to Linux and has no data on it for me to worry about losing accidentally and nothing sensitive to worry about falling into someone else's hands.

  • @maureneschlosz6404
    @maureneschlosz6404 Год назад +45

    I have no idea what you are talking about.

  • @Phoenix-kj2fn
    @Phoenix-kj2fn Год назад

    EXELLANT----EXPLANATION.
    Dear Sir, I have installed AV software- BITDEFENDER TOTAL.
    Do I need to buy additional AntiMalware software?
    Do it necessary to carry out other processes you described above?
    Please reply as many other READERS are waiting for answer of this question.
    Thanks

  • @digudc
    @digudc Год назад

    thank you mate.. your videos are everyday informative and helpful.. cheers..💛💙

    • @InstigatorDJ
      @InstigatorDJ Год назад

      Information you will NEVER FUCKING NEED. But thank you bro. Jesus!!

  • @JackNotJack
    @JackNotJack Год назад +1

    Great video. Thanks for taking the time to make it.

    • @InstigatorDJ
      @InstigatorDJ Год назад

      Will help literally NOBODY!! Great VIDEO MAN!!!!!!!!! WOW OMG!!

  • @Technie87
    @Technie87 Год назад

    Pretty sure someone is remote into my computer on chrome - how would I be able to see what they are using to connect?

  • @leecowell8165
    @leecowell8165 Год назад +2

    WHAT "Task Manager"? I don't have one of those and in fact haven't had one for over 20 years. Now just WHY is that? Because I run LINUX, that's why! And so should you because IF you did you would NOT have to be concerned about ANY malware and here's why: Because NTFS partitions are protected by the OS... but ext4 is protected by the partition itself. That means if YOU don't have the PW you are NOT getting IN! This is why I can boot any windows box with a LINUX stick and steal EVERYTHING within that box and there ain't nothing windows can do about it because it hasn't even been booted! But because there's NO PROTECTION at the FILE level guess what I can do? Anything I want. But that is FAR from the case on a linux box. The bottom line here is that to install malware code the bad guy MUST HAVE ACCESS TO THE BOX! It doesn't matter WHAT instrument they're using, see? And on linux you gotta have the PW or trick the STUPID user into giving it up. Well most people that run linux ain't stupid or they probably couldn't even install it.

  • @haroldsmith768
    @haroldsmith768 Год назад

    What about the usb key with windows what if its infected before i reinstall windows..is that possible?

  • @AKASHSHARMA-e9v
    @AKASHSHARMA-e9v 5 дней назад

    in tcpview when i go to whois then its showing fail to get whois information

  • @Matthewcoveyphotography
    @Matthewcoveyphotography 9 месяцев назад

    What if you have no wi-fi or internet. And I tried to disable all Wi-Fi connections or network connections in the laptop can somebody still access it remotely if they were nearby? I have a feeling that cell phones can actually access your devices is that true?

    • @jjann54321
      @jjann54321 8 месяцев назад

      If you disable the Ethernet and Wi-Fi (wireless) adapter as well as Bluetooth adapter/app/service there's no (reasonable) way someone can connect to your computer. A phone can only connect using Bluetooth (via tethering) and in most (all?) cases you have to authorize access and physically be close to the device/laptop. If you are THAT concerned with security you may want to look into running TAILS from a "live USB" or (micro)SD.

  • @sissaboolives2012
    @sissaboolives2012 4 месяца назад

    Hmm wouldn't it be nice if Windows would supply the software that scans the pc for this sort of thing, you know, put the running programs thru queueing algo and warn of any programs it does not recognize so the user can confirm if it is a legit program or not. And, add to the queue any programs the user has approved for installation. This should remove viruses and malware.

  • @opsvixen
    @opsvixen 10 месяцев назад

    Accidentally, I was cleaning my computer, and curious, I went into security, Blocked/allowed, I was surprised HOW MANY ticked boxes, Private AND public, saying different versions of Remote Access.
    Needless to say, I unblocked ALL of them. Probably, when I HAD allowed Remote Access to a Tech. Well, apparently they don't always disable the permissions; or, can't disable ALL of them.
    If I allow remote access in the future, I will be sure to keep those tics unticked.☺🤔

  • @larryharrison734
    @larryharrison734 Год назад

    If windows is reinstalled, doesn’t that remove all of your programs? If it does, and you don’t have the software to reinstall, then what do you do?

    • @MalhaIIa
      @MalhaIIa Год назад

      you reinstall it. then add your user setting backup, saved personal files and whatever. if this all to much for you find someone more knowledgeable, you don't need to listen to them just do as they say. from your question one can tell your computer knowledge is a bare minimum. no offense. also. a thorough clean go a long way, a windows install used daily for over a decade can easily still do its job if maintained well. mind you, a lot of this is very dry work with seek and destroy troubleshooting that can take hours. do not expect a family member to optimize your computer in 15 minutes and beware that anything you have installed on your computer, even if uninstalled, have remnants left. sometimes in large quantity. it takes a long time for a new user of your system to identify the computers content where a trojan which is like a needle in a haystack can be very well hidden. the trojan is not even your primary target at this point, the slow computer which should run faster is.

    • @jjann54321
      @jjann54321 8 месяцев назад

      Telling the average user to reinstall Windows is crazy because most don't have access to the software or license key to activate it... Ideally(ish) you would take daily/weekly backups (using Windows Backups) and in the event of something catastrophic you would "Restore/Reset" Windows and once you have a clean/new Windows environment you would "recover from backup" (using Windows Recovery) with your last known "clean" backup. Easy, fast(ish) and free.

  • @davidconiglio7577
    @davidconiglio7577 9 месяцев назад

    I was upgrading my pc, and when I pc starting to going boot up my pc saying others will lose connection?

  • @INerd2024
    @INerd2024 8 месяцев назад

    How can I activate virus total in process explorer? I can't see it in my downloaded software.

  • @shawnkeys4963
    @shawnkeys4963 Год назад +4

    You keep saying "weird stuff" how are we ( the people who don't know) supposed to know what is "weird stuff " from stuff that is normal or ok?

  • @ViIgax
    @ViIgax Год назад

    Could you make a video on SeroXen (RAT & Rootkit)?

    • @Britec09
      @Britec09  Год назад

      If I can find a sample

    • @1337-exe
      @1337-exe Год назад +1

      you realize seroxen is quasar rat ,right ? Theres a ton of vid of quasar on youtube 😂
      edit:Type quasar rat and you'll see hackersploit, he's far from being a script skiddie. lol like you are.

    • @ViIgax
      @ViIgax Год назад +1

      @@1337-exe
      Those videos are made by amateurs and skiddies who don’t know anything about Malware.

    • @jjann54321
      @jjann54321 8 месяцев назад

      @@1337-exe It's crazy (ok not really) how many content creators have no real idea what they are doing. There are many many repos of "live malware" samples on the Internet.

    • @jjann54321
      @jjann54321 8 месяцев назад

      @@ViIgax Agree or in this case basic Windows remote access. He never even mentioned disabling RDP or checking for active users...

  • @ThinqK
    @ThinqK Год назад

    if someone is remote accessing my computer and sees what i do and say, will become enlightened

  • @spazoq
    @spazoq Год назад +2

    Kaspersky? Really? For those that don't know Kaspersky is based in Russia. Make up your own mind, but there's that information.

    • @zilverman7820
      @zilverman7820 Год назад

      Nah kaspersky is fine and the best av out of all the others.

  • @RockyAllenLane
    @RockyAllenLane Год назад

    The Kasperski Rescue Disk fails to run on my modern Windows 10 PC. Their website is useless for support.

    • @Britec09
      @Britec09  Год назад

      I have had no issue running it

    • @EIRE55
      @EIRE55 Год назад

      @@Britec09
      Hello, Brian.
      Can I just download Kaspersky Rescue Disk straight onto my PC, and use it from there? Thank you.

    • @ZenAndPsychedelicHealingCenter
      @ZenAndPsychedelicHealingCenter Год назад

      Also look up how to run Tron, to clean up a badly infected machine.

  • @ludwigwillemse2433
    @ludwigwillemse2433 Год назад

    i cant get rid of the trojan virus its still on my laptop. i do all scans and do the savemode thing and dont fix it.its still pop up

  • @lindscarus
    @lindscarus 2 месяца назад

    These comments 👎🏼 I can tell from spotlight search then activity I’m infected but removing the right things is what’s giving me a hard time knowing where to start and if I should download something to remove the malicious activity

  • @julianciahaconsulting8663
    @julianciahaconsulting8663 2 месяца назад

    a little more talk about how to recognize a rogue program would be helpful

  • @JCO2002
    @JCO2002 Год назад

    I'm not sure that's even possible with my Linux machine. I don't have a remote desktop app, and drive-by downloads aren't likely.

    • @rty1955
      @rty1955 Год назад

      Yes of course you can RDP to Linux. You have a LOT of choices to do so. Also it has a LOT more security

    • @JCO2002
      @JCO2002 Год назад

      @@rty1955 Yes, you can, but I'd have enter my password to download it, which would never happen unless there were a specific reason. It's not just going to sneak in somehow like with MS.

    • @rty1955
      @rty1955 Год назад

      @@JCO2002 it depends on how you set it up tbh

    • @JCO2002
      @JCO2002 Год назад

      @@rty1955 I'm far from being an expert on Linux, but I know I can't even run timeshift for a system snapshot without entering my password. The greater danger would be phishing where I go to a fake website and enter my username and password, like my bank or something. Otherwise, I can't see how anyone can just connect remotely without me being part of the process. Linux is inherently more secure than Windows - that's one of the advantages, along with it being faster and simpler to use.

    • @jjann54321
      @jjann54321 8 месяцев назад

      Linux users are savvy enough to use password protected keypairs and tunnel via SSH to Secure VNC.

  • @91099Babar
    @91099Babar 10 месяцев назад

    5:07 ... And what about Mobiles ?

  • @Hub3rtCumb3rdal3
    @Hub3rtCumb3rdal3 10 месяцев назад

    I keep getting "A connection with the server could not be established" under virus total :(

  • @RonLarhz
    @RonLarhz Год назад

    i literally have a "search suspeded".... wth....
    also you didnt really explain what to look for. and how to get into the advance version of processes.

  • @allanpatterson7653
    @allanpatterson7653 Год назад

    Sign in as a guest with no privilides, Admin use only to make changes. Use Linux Mint. Thats a basic the other stuff is a little tedious

  • @diobrando8172
    @diobrando8172 8 месяцев назад

    I can hear weird sounds coming from my headset like someone is talking, car horns, and ads. I have tried turning the wifi off and restarting the pc multiple times now but nothing helps. IDK what's happening someone
    PLS HELP.

  • @swollenproperty8682
    @swollenproperty8682 Месяц назад

    How do I do this for my I phone?

  • @lloydrobertevans
    @lloydrobertevans 5 месяцев назад

    All my neighbours next door, including 54 Bower Street, say sagehr and avast sticks of gas back to booby bouncer😅😊
    I think I been moped

  • @Workplaylister
    @Workplaylister 4 месяца назад

    I have one person who did this to my pc and I get "goodnight" error messages randomly at night

  • @johnurban7333
    @johnurban7333 Год назад +1

    They still sell computers? People still buy them? I thought people used their hand held device that doubles as a communication device

    • @leecowell8165
      @leecowell8165 Год назад +1

      Hand held devices are toys. I build my own boxes (I've never purchased one at the retail level). However I do modify laptops because I can't really build those because nobody sells the "shell" separate from the mobo. Also with the exception of very pricey "system76" selling linux boxes nobody sells linux preloaded. thus I wind up wiping NTFS on laptops, upgrading the default SSD that these now come with to an installed 2nd HDD and installing linux there and reformatting the SSD to a backup partition. Acer sells graat laptops at great prices because almost all of them have the capability of installing a 2nd drive. Everybody with a brain needs at least a laptop but really smart people have boxes as well. I run BIG dual monitors as well that way I can watch all kindsa stuff on them. I don't even own a TV. Ever try watching a feetsball game on a toy or even a laptop? ridiculous.

    • @johnurban7333
      @johnurban7333 Год назад

      @@leecowell8165 sounds like you know what you’re doing

  • @inigoacha1166
    @inigoacha1166 6 месяцев назад

    1. Move to Windows 11 x64 Core isolation mode.
    2. Cypher the DISK
    2.1 Backups ?
    3. Pay The Kaspersky license with pre secured VPN servers.
    VPN services are the door for the botnets
    Greetings from Bilbao and ty for the video !