Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers: US: amzn.to/3wqukgC UK: amzn.to/43PHFev Getting Started Becoming a Master Hacker US: amzn.to/4bmGqX2 UK: amzn.to/43JG2iA Network Basics for hackers: US: amzn.to/3yeYVyb UK: amzn.to/4aInbGK // Occupy The Web SOCIAL // X: twitter.com/three_cube Website: hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: ua-cam.com/video/YJUVNlmIO6E/v-deo.html&pp=iAQB Mr Robot: ua-cam.com/video/3yiT_WMlosg/v-deo.html&pp=iAQB Hackers Arise / Occupy the Web Hacks: ua-cam.com/video/GxkKszPVD1M/v-deo.html&pp=iAQB // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Have you been hacked? 04:42 - Brilliant add 07:05 - Indicators of being hacked 07:49 - Your computer is much slower 08:53 - Strange behaviour of your system 10:14 - Unusual activity in your email or messaging apps 10:57 - Dark web data dumps 13:08 - Use different passwords 14:59 - Alerts that someone is trying to access your account 15:39 - Browser fingerprinting 17:37 - You can no longer access some of your online accounts 19:39 - Unexpected pop-ups or directs 20:56 - Your email appears on the Dark Web Data Dumps 23:03 - Friends or Colleagues are receiving emails from you that you did not send. 25:19 - Unknown charges to your bank or credit 25:51 - Your Anti-Virus/Malware is disabled 27:51 - Indicators of compromise 29:04 - Unknown services running on Kali 33:13 - Unknown services running on Windows 36:50 - Windows CMD : netstat 37:32 - Windows SysinternalsSuite 40:47 - Windows Wireshark 44:42 - Learn your system 46:16 - Getting a message asking for money 47:26 - How does your DEMO work? 51:31 - Outro00:00 - Intro 04:42 - Brilliant add 07:05 - Indicators of being hacked 07:49 - Your computer is much slower 08:53 - Strange behaviour of your system 10:14 - Unusual activity in your email or messaging apps 10:57 - Dark web data dumps 13:08 - Use different passwords 14:59 - Alerts that someone is trying to access your account 15:39 - Browser fingerprinting 17:37 - You can no longer access some of your online accounts 19:39 - Unexpected pop-ups or directs 20:56 - Your email appears on the Dark Web Data Dumps 23:03 - Friends or Colleagues are receiving emails from you that you did not send. 25:19 - Unknown charges to your bank or credit 25:51 - Your Anti-Virus/Malware is disabled 27:51 - Indicators of compromise 29:04 - Unknown services running on Kali 33:13 - Unknown services running on Windows 36:50 - Windows CMD : netstat 37:32 - Windows SysinternalsSuite 40:47 - Windows Wireshark 44:42 - Learn your system 46:16 - Getting a message asking for money 47:26 - How does your DEMO work? 51:31 - Outro hack hacked compromise computer hacked my computer has been hacked cybersecurity indicators of compromise tor proxy chains linux android iphone ios tails tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hack #hacked #privacy
Working on a helpdesk and the stories I heard of these people (that weren't hacked 99.9%) are insane. Freezing the mobile phone in ice, throwing a brick through the TV since the hackers were in it are some of the sad stuff Ive seen. Mental health is a thing.
It's quite troublesome when your privacy is invaded. Mental health is a thing. The sad part is that those people could easily be viewed as insane, despite truly being under threat. Gangstalking and Harassment as a Service is also a thing.
Remember the 3 codes of conduct, 1. Documentation. 2. Security Clearance. Move In Secrecy. The code of anonymity is to not reveal your name, age, sex, ID, etc because you never know.
@@KeebHoard I just had one yesterday get his DocuSign account compromised. Received a request for signature and clicked through it all. We don't sign anything, we request signatures, so don't know wtf he was thinking.
You can more often than not discover you were actually hacked. File accesses, installs you didn’t install…open ports…hell, look for edited metadata. So so so soooo many ways. Hackers aren’t gods bro.
That’s the great thing aboot this video. David and guest explain how to arm yourself with enough information to go from Yes or “I don’t know” - to Yes or No.
One time I had my mouse moving on its own. I calmed down and started to think of a solution. Then I got up from my chair just to find out that I was sitting on my wireless mouse that I forgot was plugged in and all the mouse movements were just my pants moving across the sensor.
I love when OTW is on your show! I am almost to graduate with a degree in CS with an emphasis on cybersecurity. When I can afford it I’ve been wanting to go through the Hackers Arise Courses, hopefully sooner than later! 😊 Thanks for continuing to host OTW!! He never disappoints!!!
Mouse moving without you touching it will give you a big fright, I know! However, sometimes it's just dust affecting the laser. Don't Panic, try another mouse first.
OTW's books must be great. He has no hesitation in recommending Sysinternals which also has association with some great tech books on details of how Windows works (the Sysinternals project was originally independent, but eventually was brought on board MSFT, with the contractual provision that they not be neutered, but maintained and still provide reasonable insight into Operating System internals). I'll make sure to put OTW books on the list and get them. I'm already somewhat sophisticated, but everything here rings not only true, but is also the EFFECTIVE way of finding out about one's system. I cannot recommend "Process Explorer" enough. That tool, which I deem "killer app", alone, can act as a "Swiss Army Knife" of insight into our machine.
A far more useful piece of software would be one that scrutinizes known processes and inform you that they're regular processes, and leave the unknown ones more exposed. It's daunting for anyone to know and google every single process thats going on, nevermind looking up every single target IP address, no one is gonna do that but those with a ton of time on their hands and real concerns.
@@joonglegamer9898 how is the software supposed to know what is "regular processes" when everyone's running different pieces of software, both bought and freeware stuff? Also, people install and uninstall software on their PCs all the time, so it would be difficult for someone to write software to do what you're asking
That is a basic, or layperson description of "Intrusion Detection System" or IDS. Basically this attempts to keep a model of a healthy system, and detect when any type or appearance of events within a system show an EXCEPTION to the healthy model attributes (this includes various objects, but also various actions). Thus, they generate "exceptions" which percolate up the IDS. As other commenters are noting, it's actually IMPOSSIBLE to have a complete, detailed, undefeatable model or inventory of "healthy system" since this would have to include the entire universe of extant software, and also all possible system behaviors, so that is entirely too massive to model. Our guest is right that at the level of "Nation State" hacking it's so sophisticated that even opponent nations cannot guarantee to detect the hack payload or it's activity, so individual users would be at even more disadvantage.
@@scroopynooperz9051 Thats the easy part. As he said, most of it is not malware but standard processes, even with that, there's no chance that each individual out there knows what standard processes are for Windows alone.
Yeah the Linux basic for hackers is a very good book and I do recommend it for software engineers, QA and Pen testers. As almost every server runs on Linux, and there's a popular free game for that!
Hey guys I have a question. I've been wanting to buy OTW's courses because I love the way he teaches, but some say his stuff isn't worth the price. For the people who've taken his courses, what do you guys think?(Not saying anything is true btw just looking for more info)
For zero day exploits you can't do anything about it if you are a simple user... however simple network basics TCP connections to initialize such as UDP connections for media with all range 65535 ports firewall can do a lot! systems are built on systems. Just one weakest chain will result in collapse of a system.
Around the 12 minute mark my question is even if you use the same password how does the hacker know what hang you use? Trial and error would just take so long. Then not to mention you could be u.s or Canada or somewhere else. I’m just really curious
Love hearing OTW s point of view 👑 We should sometime see ways to prevent hacker to hack our system and OTW Linux and becoming and networking don't go into serious deeps of securing our selfs
Meh, im a nobody with nothing but time. I have nothing to my name. So its pretty pointless to get my information, if anythings the hacker themselves will be in debt for using my information.
wow so you wrote a cpl books but ya know any hacker worth their salt knows it is not pAwned its an old mistype like hodl .. for OWNED and as such pronounced POWNED.
12:33 If someone has taken over your email/ messaging service “That’s a good indication that NOT NECESSARILY THAT YOU’VE BEEN HACKED” ..? 🧐 huh? Well… what’s a fowl call that?🧐😅 Maybe I’m just a bit too green here, but wouldn’t that qualify as a hack? If someone has taken over your email/ and or is sending emails on your behalf? Maybe he just misspoke..
Thanks David my friend í just learned about this. I have a windows PC my Brother in law got used and I seen it's very slow and I seen this in task manager too. You got me to remember more. I been using the system from 2000 and yeah the hacker is right.. I'll tell my brother we need to delete windows it's not safe there spyware and malware in it. So I'll put linux on it no more windows garbage héhe thanks my friend. I wish you and me could chat il would love to learn from you and he'll who knows we learn from each other right.. 😊
I always cover my camera with black tape, but how to make sure microphone of my laptop is blocked from all sounds? (I hope i am not paranoid about privacy)
@@davidbombal yeah that's the idea - just because something is named correctly doesn't mean it belongs there - especially if its acting weird and using lots of resources when you're system is supposed to be idle. Dead giveaway is usually the "phoning home" part and network communication. On Windows, its a good idea to run something like Tinyfirewall > Block Outgoing then do your checks.
@davidbombal I appreciate your content but I have watched several interviews with this guy (guest) and I'm honestly wondering why this guy is coming on. He NEVER speaks anything the average person doesn't know and that's if he stays on topic. Your channel isn't for uneducated consumers and his information is a waste of time. I've watched tons of your videos and I can say I won't watch another with this guy. Hopefully you can find a new guy.
A Next generation firewall is a must for any business or individual who has any public internet facing server. Like you’re gonna have a really bad time otherwise, and especially small businesses who don’t have time, money or personel to do routine vulnerability scanning. So bite the bullet and buy that $1200 firewall instead of new iPhone 😂😂
Olá pessoal, tenho me interessado em aprender a língua inglesa, principalmente para ouvir e entender melhor as entrevistas. Obrigado Bombal. (Written in portuguese)
someone who i think i know has hijacked my system somehow ,i think it was from the bios and not sure what command to do. ive tried few commands but it says i dont have permission and no matter what i do isnt working if theres anything you could help me with it. i know they have them gadjets like flipper zero and few other gadjets.
21:33 how can we know that this exactly is not one step closer to us, we need to type in our email, now they have our email, ip, browser, location......
is there no windows tool that can detect what is not allowed in processes or a netstat tool that will tell you what is going out to interent and what is coming in.I do not run any antivirus on my pc cause i cant as i use frp applications
Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: Brilliant.org/davidbombal
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers:
US: amzn.to/3wqukgC
UK: amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: amzn.to/4bmGqX2
UK: amzn.to/43JG2iA
Network Basics for hackers:
US: amzn.to/3yeYVyb
UK: amzn.to/4aInbGK
// Occupy The Web SOCIAL //
X: twitter.com/three_cube
Website: hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: ua-cam.com/video/YJUVNlmIO6E/v-deo.html&pp=iAQB
Mr Robot: ua-cam.com/video/3yiT_WMlosg/v-deo.html&pp=iAQB
Hackers Arise / Occupy the Web Hacks: ua-cam.com/video/GxkKszPVD1M/v-deo.html&pp=iAQB
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Have you been hacked?
04:42 - Brilliant add
07:05 - Indicators of being hacked
07:49 - Your computer is much slower
08:53 - Strange behaviour of your system
10:14 - Unusual activity in your email or messaging apps
10:57 - Dark web data dumps
13:08 - Use different passwords
14:59 - Alerts that someone is trying to access your account
15:39 - Browser fingerprinting
17:37 - You can no longer access some of your online accounts
19:39 - Unexpected pop-ups or directs
20:56 - Your email appears on the Dark Web Data Dumps
23:03 - Friends or Colleagues are receiving emails from you that you did not send.
25:19 - Unknown charges to your bank or credit
25:51 - Your Anti-Virus/Malware is disabled
27:51 - Indicators of compromise
29:04 - Unknown services running on Kali
33:13 - Unknown services running on Windows
36:50 - Windows CMD : netstat
37:32 - Windows SysinternalsSuite
40:47 - Windows Wireshark
44:42 - Learn your system
46:16 - Getting a message asking for money
47:26 - How does your DEMO work?
51:31 - Outro00:00 - Intro
04:42 - Brilliant add
07:05 - Indicators of being hacked
07:49 - Your computer is much slower
08:53 - Strange behaviour of your system
10:14 - Unusual activity in your email or messaging apps
10:57 - Dark web data dumps
13:08 - Use different passwords
14:59 - Alerts that someone is trying to access your account
15:39 - Browser fingerprinting
17:37 - You can no longer access some of your online accounts
19:39 - Unexpected pop-ups or directs
20:56 - Your email appears on the Dark Web Data Dumps
23:03 - Friends or Colleagues are receiving emails from you that you did not send.
25:19 - Unknown charges to your bank or credit
25:51 - Your Anti-Virus/Malware is disabled
27:51 - Indicators of compromise
29:04 - Unknown services running on Kali
33:13 - Unknown services running on Windows
36:50 - Windows CMD : netstat
37:32 - Windows SysinternalsSuite
40:47 - Windows Wireshark
44:42 - Learn your system
46:16 - Getting a message asking for money
47:26 - How does your DEMO work?
51:31 - Outro
hack
hacked
compromise
computer hacked
my computer has been hacked
cybersecurity
indicators of compromise
tor
proxy chains
linux
android
iphone
ios
tails
tails linux
invisible online
hide identity
privacy
kali linux
online privacy
internet security
online privacy and security
online privacy tips
online privacy guide
internet security tutorial
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hack #hacked #privacy
hello devid sir i have idea i want explain you but my english not good
ليش ماتسوي ترجمه للعربيه😢😢
@@kadwasach4294 اذا كان فيديو مترجم سيكون رائعا
Can this be posted to spotify and as a video episode? Please please
Please tell OTW it's powned not pawned
Working on a helpdesk and the stories I heard of these people (that weren't hacked 99.9%) are insane. Freezing the mobile phone in ice, throwing a brick through the TV since the hackers were in it are some of the sad stuff Ive seen. Mental health is a thing.
It's quite troublesome when your privacy is invaded. Mental health is a thing. The sad part is that those people could easily be viewed as insane, despite truly being under threat. Gangstalking and Harassment as a Service is also a thing.
Remember the 3 codes of conduct, 1. Documentation. 2. Security Clearance. Move In Secrecy. The code of anonymity is to not reveal your name, age, sex, ID, etc because you never know.
“Malfunctioning users” the IT admin part of me felt that. They’re 95% of the issue.
Malfunctioning NPCs u mean? Lol
the biggest vulnerability on a system is the human factor
The average user is so completely clueless.
@@KeebHoard I just had one yesterday get his DocuSign account compromised. Received a request for signature and clicked through it all. We don't sign anything, we request signatures, so don't know wtf he was thinking.
pebkac=1
The question of "Have you ever been hacked?" does not have a Yes/No answer. The two possible responses are Yes, and, "I don't know."
The video explains how to find out and things to look for.
this guy gets it
You can more often than not discover you were actually hacked. File accesses, installs you didn’t install…open ports…hell, look for edited metadata. So so so soooo many ways. Hackers aren’t gods bro.
That’s the great thing aboot this video. David and guest explain how to arm yourself with enough information to go from Yes or “I don’t know” - to
Yes or No.
So is this guy a Hacker then?
One time I had my mouse moving on its own. I calmed down and started to think of a solution. Then I got up from my chair just to find out that I was sitting on my wireless mouse that I forgot was plugged in and all the mouse movements were just my pants moving across the sensor.
Lies
When yout cursor moves without you having an act
actual mouse or clicking anything, you've been hacked/compromised.
what about creating a few videos centered on mobile security, android and ios? would be really useful
Great job David and OTW! You know I'm all ears at 40:48, the packets tell all. 👏🦈
Was immediately thinking,spin up wireshark🤣😂
Shark is here 🤣😂
Thanks, David, for all your videos
You're welcome!
As always we love your videos. Thank you OTW and David. ❤
Thank you! Glad you like them!
I love when OTW is on your show! I am almost to graduate with a degree in CS with an emphasis on cybersecurity. When I can afford it I’ve been wanting to go through the Hackers Arise Courses, hopefully sooner than later! 😊 Thanks for continuing to host OTW!! He never disappoints!!!
ThankYou David and Master OTW.
David bombal we dey look your videos always Nigeria ❤
Thank you! And welcome Nigeria!!
@davidbombal I really want become a hacker but unfortunately I don't know any programming language how do I do
werey wan hack tinubu
@@davidbombalسوي ترجمه لفيديوهاتك 😢
Excellent video. Thank you.
Mouse moving without you touching it will give you a big fright, I know! However, sometimes it's just dust affecting the laser.
Don't Panic, try another mouse first.
Cool information! Thank you, David!
Edit: Especially thank you, OTW, and your books are awesome!
Awesome, thank you!
OTW's books must be great. He has no hesitation in recommending Sysinternals which also has association with some great tech books on details of how Windows works (the Sysinternals project was originally independent, but eventually was brought on board MSFT, with the contractual provision that they not be neutered, but maintained and still provide reasonable insight into Operating System internals). I'll make sure to put OTW books on the list and get them. I'm already somewhat sophisticated, but everything here rings not only true, but is also the EFFECTIVE way of finding out about one's system. I cannot recommend "Process Explorer" enough. That tool, which I deem "killer app", alone, can act as a "Swiss Army Knife" of insight into our machine.
@@davidbombal You welcome!
I don't link emails, just synchronization updates.
i had a couple emails that had been hacked... thanks david, and hacker...
My bloody credit card was compromised again for the second time this year, and I am super careful and cannot explain how it’s happened
It could be a disgruntled employee working in the business you purchased from selling on customers credit card details.
@@snowflakemelter7171 Or a card skimmer in a common location he shops at that's well hidden
I don't the question is "Have you been hacked?". But have sites that hold our personal info been hacked?
Thank you!! Sir
You're welcome!
A far more useful piece of software would be one that scrutinizes known processes and inform you that they're regular processes, and leave the unknown ones more exposed.
It's daunting for anyone to know and google every single process thats going on, nevermind looking up every single target IP address, no one is gonna do that but those with a ton of time on their hands and real concerns.
@@joonglegamer9898 how is the software supposed to know what is "regular processes" when everyone's running different pieces of software, both bought and freeware stuff?
Also, people install and uninstall software on their PCs all the time, so it would be difficult for someone to write software to do what you're asking
That is a basic, or layperson description of "Intrusion Detection System" or IDS. Basically this attempts to keep a model of a healthy system, and detect when any type or appearance of events within a system show an EXCEPTION to the healthy model attributes (this includes various objects, but also various actions). Thus, they generate "exceptions" which percolate up the IDS.
As other commenters are noting, it's actually IMPOSSIBLE to have a complete, detailed, undefeatable model or inventory of "healthy system" since this would have to include the entire universe of extant software, and also all possible system behaviors, so that is entirely too massive to model. Our guest is right that at the level of "Nation State" hacking it's so sophisticated that even opponent nations cannot guarantee to detect the hack payload or it's activity, so individual users would be at even more disadvantage.
@@scroopynooperz9051 Thats the easy part. As he said, most of it is not malware but standard processes, even with that, there's no chance that each individual out there knows what standard processes are for Windows alone.
If you can resolve external IP addresses accessing your private local network to a gov contractor, you haven’t been hacked
Yeah the Linux basic for hackers is a very good book and I do recommend it for software engineers, QA and Pen testers.
As almost every server runs on Linux, and there's a popular free game for that!
Thank you David
You're welcome!
Thanks Chris for that guess.
basically backup your files ince a week or month . no way out :/
keep different password and longer ones
Hey guys I have a question. I've been wanting to buy OTW's courses because I love the way he teaches, but some say his stuff isn't worth the price. For the people who've taken his courses, what do you guys think?(Not saying anything is true btw just looking for more info)
Everyone be aware current Win 11 Task Manager does NOT look like that. The Task Manager shown in the video is an older version
Thank you!
You're welcome!
Why I don't link emails, due to apt or other attacks. Great content Occupytheway. I didn't reveal you name.
I actually just bought that book.
Thanks very much David!!
Thanks Davide
You're welcome!
David bombal a real chad 🔥
Another great podcast
Glad you enjoyed it!
Me and my hacker watching this together.
If your mouse is moving by itself, your home may be haunted! 😅
For zero day exploits you can't do anything about it if you are a simple user... however simple network basics TCP connections to initialize such as UDP connections for media with all range 65535 ports firewall can do a lot! systems are built on systems. Just one weakest chain will result in collapse of a system.
Me checking my Task Manager and I have "Service Host..." In my Processes
Thanks guys.
please do some malware analysis David!
I already know
He's back! Great! 🎉
Hope you enjoyed the video!
Always. Thank you both 🙏
I'm a simple cyber guy;
I see new David Bombal & OTW, I click like.
You're a smart guy
I kinda get the feeling that this guest could be a Hacker...maybe I am just being paranoid?
For studying network, what u suggest? Brilliant has courses of network? like OSI and TCP/IP etc? cheers
Keep on doing what you're doing David, you two are an inspiration, thank you.
Thank you! I appreciate that!
Oh an Occuptheweb, how are you doing?
David my favorite channel! Always good content 👍
Thank you! Glad you enjoy it!
Around the 12 minute mark my question is even if you use the same password how does the hacker know what hang you use? Trial and error would just take so long. Then not to mention you could be u.s or Canada or somewhere else. I’m just really curious
Love hearing OTW s point of view 👑
We should sometime see ways to prevent hacker to hack our system and OTW Linux and becoming and networking don't go into serious deeps of securing our selfs
G.R.I.M. Alliance is to move is silence.
Thanks a lot 🙏 🎉
Your so welcome
Thanks man for again bringing otw please cover bitcoin forensics topic with otw🙏🙏
You are amazing sir I learned Linux and ccna from your UA-cam channel I think you make the most practical vedios on the internet
Thank you very much! I appreciate that!
Sir I have a question which is the best programming language I should learn for hacking
And also apart from programming languages what more should I learn for hacking
@@GOD_GAMMING.-990 if you need to ask that then you never looked around for the answer. It's C of course.
Why did they hack your passport? Why because you're right?
Luv the video
Meh, im a nobody with nothing but time.
I have nothing to my name. So its pretty pointless to get my information, if anythings the hacker themselves will be in debt for using my information.
I am hellbound, I have no passport, so if you use my credentials outside of my country you're putting a BIG TARGET on yourself.
Thank you, gentleman, for the great podcast, as aways is a leasure of watching! Thank and all the best to all of you 🙏
wow so you wrote a cpl books but ya know any hacker worth their salt knows it is not pAwned its an old mistype like hodl .. for OWNED and as such pronounced POWNED.
Remember the code of anonymity.
Yes how do i know if i been hacked this is series question
amazing keep shine sir
great idea for a vid
Glad you enjoyed it
My PC doesn't shut down anymore after a Microsoft update.
Is this hacked?
vi:"ads_conversion_hit",Qd:"container_execute_start",yi:"container_setup_end",rg:"container_setup_start",wi:"container_blocking_end",xi:"container_execute_end",zi:"container_yield_end",sg:"container_yield_start",zj:"event_execute_end",yj:"event_evaluation_end",ph:"event_evaluation_start",Aj:"event_setup_end",ve:"event_setup_start",Cj:"ga4_conversion_hit",Ae:"page_load",On:"pageview",oc:"snippet_load",Vj:"tag_callback_error",Wj:"tag_callback_failure",Xj:"tag_callback_success",Yj:"tag_execute_end",
yd:"tag_execute_start"}};function Ev(){function a(c,d){var e=Wa(d);e&&b.push([c,e])}var b=[];a("u","GTM");a("ut","TAGGING");a("h","HEALTH");return b};var Fv=!1;functio
tutorial for Mac users please Bombal. Thank you
ty so much boss
12:33 If someone has taken over your email/ messaging service “That’s a good indication that NOT NECESSARILY THAT YOU’VE BEEN HACKED” ..? 🧐 huh? Well… what’s a fowl call that?🧐😅 Maybe I’m just a bit too green here, but wouldn’t that qualify as a hack? If someone has taken over your email/ and or is sending emails on your behalf? Maybe he just misspoke..
Love your videos. Especially these kind. Looking forward to more!
Thanks David my friend í just learned about this. I have a windows PC my Brother in law got used and I seen it's very slow and I seen this in task manager too. You got me to remember more. I been using the system from 2000 and yeah the hacker is right.. I'll tell my brother we need to delete windows it's not safe there spyware and malware in it. So I'll put linux on it no more windows garbage héhe thanks my friend. I wish you and me could chat il would love to learn from you and he'll who knows we learn from each other right.. 😊
Thank you David! Much appreciated.
12:00 This made me frustrated; I thought David's muscles were real 😅. Thanks for the great content as always 👍
😂 I wish!
Does the out of the box Microsoft protection protect from these?
I would use another anti malware program along side it like Malwarebytes just to have a second layer of security.
I always cover my camera with black tape, but how to make sure microphone of my laptop is blocked from all sounds? (I hope i am not paranoid about privacy)
I always call my malware "necessary windows service" just to confuse the normies 😂
Makes sense to obfuscate the code. But please only do this ethically and to teach users how to better protect themselves.
@@davidbombal yeah that's the idea - just because something is named correctly doesn't mean it belongs there - especially if its acting weird and using lots of resources when you're system is supposed to be idle.
Dead giveaway is usually the "phoning home" part and network communication. On Windows, its a good idea to run something like Tinyfirewall > Block Outgoing then do your checks.
who hasn't called their malware svchost.exe please stand up
Mine never shoe up.
I'm probably think i should get a VPN?
@davidbombal I appreciate your content but I have watched several interviews with this guy (guest) and I'm honestly wondering why this guy is coming on. He NEVER speaks anything the average person doesn't know and that's if he stays on topic. Your channel isn't for uneducated consumers and his information is a waste of time. I've watched tons of your videos and I can say I won't watch another with this guy. Hopefully you can find a new guy.
thanks for the video David!!
he locked laptops key boards some of keys
A Next generation firewall is a must for any business or individual who has any public internet facing server. Like you’re gonna have a really bad time otherwise, and especially small businesses who don’t have time, money or personel to do routine vulnerability scanning. So bite the bullet and buy that $1200 firewall instead of new iPhone 😂😂
Olá pessoal, tenho me interessado em aprender a língua inglesa, principalmente para ouvir e entender melhor as entrevistas. Obrigado Bombal. (Written in portuguese)
MOTW and hackers arise! Looking forward to this one.
Thanks! Also, would really like forensics info!
Glad you enjoyed the video. Thanks for voting for the forensics video :)
OTW and David 🔥💯
someone who i think i know has hijacked my system somehow ,i think it was from the bios and not sure what command to do. ive tried few commands but it says i dont have permission and no matter what i do isnt working if theres anything you could help me with it. i know they have them gadjets like flipper zero and few other gadjets.
Good video wish we could get the general public more invested in their own security.
Thank you. Agreed.
My phone is actually slow
I can't seem to find him on UA-cam.
Video so good it literally made my phone crash. Best part is that when I came back this scene was playing 0:25😭
I appreciate this vid. Thank you both.
Is he still doing things?
Love hearing OTW s point of view 👑
a lot of cryptojacking those days ^^
How to defeat bios hacks? And keyloggers?
21:33 how can we know that this exactly is not one step closer to us, we need to type in our email, now they have our email, ip, browser, location......
Love hearing OTW s point of view 👑
is there no windows tool that can detect what is not allowed in processes or a netstat tool that will tell you what is going out to interent and what is coming in.I do not run any antivirus on my pc cause i cant as i use frp applications