How to Check if Someone is Remotely Accessing Your Computer
Вставка
- Опубліковано 18 жов 2023
- How to Check if Someone is Remotely Accessing Your Computer
have you got a suspension someone is accessing your computer? I will show you how to detect a remote access to your PC. Sometimes malware can cause major problems with your pc where it will add a malicious files which opens a backdoor on your computer.
Process Explorer
learn.microsoft.com/en-us/sys...
TCPView
learn.microsoft.com/en-us/sys...
Download Kaspersky Rescue Disk
www.kaspersky.co.uk/downloads...
HitmanPro
www.hitmanpro.com/en-us
🔔 SUBSCRIBE for more:
ua-cam.com/users/Britec09...
------------------------------------------------------------------------------------------
🛍 Support me with your Amazon purchases:
UK amzn.to/3diZslY
US amzn.to/2OwZWux
Please note that as an Amazon Associate I earn a commission from any qualifying purchases that you may make through these links.
------------------------------------------------------------------------------------------
❤️ Join Britec UA-cam Members:
/ @britec09
------------------------------------------------------------------------------------------
📃Watch related playlists and videos
🖥️ / britec09
------------------------------------------------------------------------------------------
👕Check out our merch:
teespring.com/en-GB/stores/br...
------------------------------------------------------------------------------------------
💻Discord Access:
/ discord
------------------------------------------------------------------------------------------
🐦Follow and interact with me on Twitter:
/ britec09
------------------------------------------------------------------------------------------
✅Follow and interact with me on Facebook:
/ briteccomputers
-----------------------------------------------------------------------------------------
🎬 View my Website:
BritecComputers.co.uk
-----------------------------------------------------------------------------------------
#windows11 #windows10 #tech
What I got from this video.
How to Check if Someone is Remotely Accessing Your Computer
1. Open up Task Manager and look for rogue programs.
2. Run programs that look for roque programs.
Thanks, that helps a lot.
lol
Unless of course they're ain't no "Task Manager" what then? Yeah under linux WTF IS THAT?
@@leecowell8165Linux has process managers. Try Linux mint, lubuntu, etc .
The only rogue programs I see in Task Manager are Chrome and Microsoft.
Yes, I'm pretty sure some of the things he was pointing out in task manager were actually normal. Search being paused/suspended by Windows is totally normal, for example.
Windows 11 is a rouge program haha
You obviously don't know anything about windows
more like forceded and enforced malware
Change to Mac then !
Yeah, when you get a computer running Windows virused or malwareed up it's never the same just cleaning them off. Seems to leave glitches and issues from then on. Clean install of windows is the way to clean this up. Thanks for the tips on keeping an eye on malicious programs infecting our PCs
No. The way to clean it up is to install linux because guess what IF you don't within in a month they'll be newbie malware on your box.
I need to spend a little time learning Linux and install it on one of my computers.@@leecowell8165
I just recieved my first high end router in my entire life (it was a Christmas gift to myself (early I know) for completing several projects at work) and I never knew just how powerful a router can be for security once configured properly. Your channel and others like it have been a great boon for a lot of people out there and we do really appreciate the hardwork you do to educate people. Seasoned IT professionals and amateurs alike always have something to learn in this field. (There is too much for us to know everything!)
Thank you so much, Mr. Britec! I look forward to your next lesson!
Oh lord.
send link pls XD
This is very very very helpful and important information man thank you...
Part of the problem is Windows is so primitive they allow any program to get installed anywhere the creator wanted even in the OS area. The OS should be protected, no one should be installing anything in the OS directory. Each application should be installed under its own tree, and it should not require root for installation. Applications should not be using OS locations, OS utilities, OS "registries", OS anything other than using shared system libraries (that are read-only). This chaotic, messy setup that Microsoft has created makes it difficult to see if a process is legit or not.
I have no idea what you are talking about.
Thank you very much for sharing. Help a lot!
Cheers Brian, good to know, I do a Kaspersky Total full scan every 10 days or so.
Good stuff
@@Britec09 There was a lot of controversy over Kaspersky in the past, can you do an update about this and or other security providers ?
@@maxgood42 No he can't because he's a tool.
Hi Brian. Just a quick one.
If i dissable all Remote settings in windows can this type of thing still happen??
Disabling Remote settings is one of the first things ive always done.
Unfortunately there aren’t a lot of accessible options when it comes to anti virus/malware software for us blind users. We are an underserved demographic in this regard.
There's all kind of blindness, you'd know better than me. However, everybody needs help some times, pray and act to get it. Don't let your eyes be merely be one \ among other avoidable impairments. Life is hard enough my friend. God bless.
God is still in business healing. If you believe it, if you want to believe it. Get help with your believing. Like the Father of the possessed son, Some might say epilepsy, 'I believe. Help thou my unbelief.' He asked the master. He got results.
Mark 9:24:21 And he asked his father, How long is it ago since this came unto him? And he said, Of a child.
22 And ofttimes it hath cast him into the fire, and into the waters, to destroy him: but if thou canst do any thing, have compassion on us, and help us.
23 Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
24 And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
25 When Jesus saw that the people came running together, he rebuked the foul spirit, saying unto him, Thou dumb and deaf spirit, I charge thee, come out of him, and enter no more into him.
26 And the spirit cried, and rent him sore, and came out of him: and he was as one dead; insomuch that many said, He is dead.
27 But Jesus took him by the hand, and lifted him up; and he arose.
Remember: Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
God bless.
Thank you it's nice to be aware of all that
I get Phishing Emails constantly. Have to always look twice. Thanks, once again.
When I check my email, I look at the address especially if the content body looks suspicious.
That's exactly how it is whenever I try shopping online...where I'm literally minding my own damn business while someone else clearly cannot do so.
Report them. If there's a lot just mass delete them and report them (do both).
Thanks so much for your great work with load of knowledges and details!
When I click on Whois it said : Failed to get Whois information. Any suggest?
Will using a firewall/virus protection like Norton be sufficient to combat these things. I ask because you state that running multiple scans with different programs is a good idea (but having more than one antivrus package could create program conflicts.).
I worked for a terrible employer (…didn’t know this til the end…). I was an outside sales guy where I used my personal private home computer, on rare occasions, to do some work related tasks - simple spreadsheet development, print an email, etc. Well, to my not knowing or being notified they somehow gained remote access to my computer. They could see everything, every click, every mouse move, bank accounts….ALL! It was not good, felt violated & all sorts of the like. Wish I would have known of this video content back then.
thank you mate.. your videos are everyday informative and helpful.. cheers..💛💙
Information you will NEVER FUCKING NEED. But thank you bro. Jesus!!
This is Michael. I usually like your work but this was pretty useless. The first major fail is that you don't tell people how to disable remote access. The second is that there's no way the average person can know what's a rogue program when there are so many weird names on programs in the operating system both in terms of processes and services. The only useful things you said were to get a good antivirus program and utilize process Explorer
There are literally thousands of files and processes that he can't even start to address for the "average person"... this is a first step and then you can HIRE a tech if you find something OR you can check the names one by one and research it YOURSELF... what do you really think this is?
He could've shown how to disable remote access as you suggested, that would be the first step a non tech person should so
@@t.stephen5086 Because mal ware would never mal that? Still it should be done, but what about governments, mandatory OS and hardware backdoors? Microsofts continual data collection and giving to governments? And the big corporates' anti spy - malware's backdoors and data sharing an awfulot of vectors for compromise and harm? Well, do what you will and can. God bless.
My thoughts exactly. The information might be useful if you're a computer nerd, but it's pretty meaningless to the average user.
Hi Guys , just wanted to let You know that if You are Politically Targeted , try not to rely too much on Internet … even Telcos can be Compromised…
Thank you for the information, I try hitman . It seems to work
sweet merciful jesus, THANK YOU. Just facts and brass tacks. concise disambiguation and walkthrough.
I love you.
Oh very easy. Look for rogue processes, there is one problem immediately apparent. Nothing is ever identified as being rouge.
expected video sir😊thank you❤love from India ❤😊
Hope you enjoyed it!
Will regular use of SFC and DISM help to remove remote connections?
Still recommending Kaspersky rescue disk? I thought that does not exist and has not been updated. I loved it, but their support says it no longer exists...
Correct?
Can you recommend many virus rescue / boot disks to use, that are still updated?
Great video but it's helpful to have links to the programs used in your video as you often do.
I will add them, I forgot
wheres the link for kasper exe, only find the iso ?@@Britec09
You explained a bit fast for me personally but appreciated and would advise you to somehow enhance the size of the written document so we can see what u r pointing out. I gather most people already know. I am quite the novice❤
Great video. Thanks for taking the time to make it.
Will help literally NOBODY!! Great VIDEO MAN!!!!!!!!! WOW OMG!!
I believe you failed to mention one of the best countermeasures for a typical system is to create and use a regular user account for everything, put a strong password on the administrator account and use it only when needed.
I work IT, and even at home, I refuse to run as Administrator for things like browsing the internet, or doing darn near anything else. It is JUST one of many measures that one takes to keep their system clean. It matters not if you are using Linux or Windows, the concept is exactly the same. Not running as Administrator is one of the best things one can do for their own computers; sometimes less convenient, but better practice.
Some folks may think that this is about merely finding out if one's computer is compromised; and how to clean it up; but staying clean is part of the problem.
I made videos on that before, no one wants to run as standard user.
I mean ... if the attacker got into your system its a matter of time that he can privilege escalate his user to become admin and take over your machine, so instead of limiting my self with some features or have some limitations I run my system as admin all the time and I believe most of the people do this.
@Britec09 well you can't very easily with windows making u use a Microsoft account to log into your computer.
By default you're not running as Admin in linux. In fact without doing so you cannot access anyone else's /home directory on YOUR system without their knowledge because you need THERE PW. So never run as Admin by default on a linux box. The only way to access everyone is you need to elevate your user level to Admin. That means you need access to the box itself because it ain't happening remotely without the PW.
Some processes can't be seen in any monitoring tools, it's made this way by Windows or any OS on purpose, like when the three letter agencies remote into your PC, you won't be able to see it
"Or maybe you a have suspicion that someone is remote viewing your computer without your knowledge." You mean like Microsoft, Google, NSA, GCHQ, etc!! 😂
Thanks for a good video Brian. A good reminder to look up and use some the tools you mentioned here.
Will Malwarebytes installed in my PC prevent or detect any of this?
Wouldn't it just be easier to type a netstat -a command to check foreign connections?
not all viruses connect to the web. Some are just there to screw your OS up. So both, I guess.
Do you expect the average user to comprehend any of this?
I have some sus processes but when I right click properties is grayed out. How else can I track down the properties address to remove?
Hi, this was great educational video. Considering how corporations are forced to work with gov. that are not always non-totalitarian, which of the software provider is most independent and has robust antivirus? Thanks.
That are not totalitarian, but want to be badly, and have formed a multi national coalition like Five Eyes. She's an ugly date that Five Eyes. 🤔🤔🤣🤣🤣😘😘🙏🙏
With the start process around 4:42 mines is pretty much the same as shown on here where the location and everything is the same, so with that in mind from the video, I'd assume that someone has remote access to my computer, right? I'm not really sure how anyone would have been able to do this and I've already run a million scans (mainly full ones of course) and nothing has of course popped up and I haven't seen any weird changes to my computer either signifying that I am being remotely hacked either.
Is there a way to add a column to process explorer that shows any remote addresses a process may have? It would make it so you don't really have to go through each one. I can imagine some of those rats having names that sound very similar to process names found in Windows so that you might not see them as easily. It would be similar to the way some websites might have a strange character in the name that looks similar to the one in our 26 letter alphabet (unless you live somewhere the alphabet is different). Also it would not be a bad idea to have a good known clean installation media made for the OS of your choice. This way if it is a computer that will have personal stuff on it that you don't want stolen there is much less of a chance that it would happen. Just don't change your passwords and other stuff on a machine that might still be infected since the malware is likely to just send those to the person who hacked you and then they don't really help. You may even want a separate computer for personal stuff like paying bills and other similar things. It would be a computer that doesn't really have any extra software installed and is also one you never let anyone else really use. For those purposes that one can be a little NUC and then it would take a lot less desk space than a typical PC while having all of the functionality. They are not something that I would game on but they would be good for trying out Linux if you are not ready do install it on all computers. I really have only installed Linux on a spare PC just to get used to it before I ever attempt to switch the other ones over. It is just a spare one that I can use to learn to get used to Linux and has no data on it for me to worry about losing accidentally and nothing sensitive to worry about falling into someone else's hands.
Thanks!
Thanks, cheers
I am able to fully reinstall windows (refresh it) in about 20 minutes. Another 20 to reinstall favourite apps. I suggest this approach if pc starts misbehaving as you will spend hours trying to fix / remove bugs where 40 minutes for a fresh start is best.
What about the usb key with windows what if its infected before i reinstall windows..is that possible?
If using any exterior virus check with for example Kaspersky, before shutting down Windows,the Hibernation should also be cleared, otherwise won't work.
I get thise black command promtpts pop uo and disappeae quickly. But how do i know where or wjag is the malware doinb
can someone help me with suspended in search shown in task bar and when i open microsoft store again i saw suspended and it says they increase the processor power 🤔🤔
EXELLANT----EXPLANATION.
Dear Sir, I have installed AV software- BITDEFENDER TOTAL.
Do I need to buy additional AntiMalware software?
Do it necessary to carry out other processes you described above?
Please reply as many other READERS are waiting for answer of this question.
Thanks
I have a brand new windows install and have that blank search paused in my task bar. Is it really something fishy??
When I was using windows before installing Ubuntu. My computer kept on hanging mid use. Gaming was fine. Each time it happend I've checked event viewer nothing.
That's why you disable remote services in services.msc and in Gropu Policy.
*UPDATE* I've moved onto Linux Mint coz simple
Bravo! Glad you became enlightened. I dumped Windoze after 3.11 never looked back.
Good move! Hopefully you'll remove the windows partition from your system? You'll then need to rerun grub probably from your install stick via CLI (because your linux partition won't be located on your box until you do that). However take heart grub WILL find it! That way your BIOS will be redirected to the correct "handoff" partition on correct drive upon reboot, got it? btw do NOT install /home, /root to an SSD. always install those guys to HDD. Anything else can be installed to SSD though because they don't get the usage that main guys do.
@@leecowell8165 Update: I'm back on Windows due to compatibility issues with the software and plugins I use for music production...the DAW works BUT, the plugins themselves are buggy in Linux
heavy heavy renders make the mouse pointer fly off screen, not unholy possession as i once thought, just a precursor to some unsaved project crashing
I am having issues with taskbar after upgrading to windows 11 from 10, Taskbar doesn't load on time after a restart ?
Just Wireshark it.
Or use intrusion detection.
I was upgrading my pc, and when I pc starting to going boot up my pc saying others will lose connection?
Accidentally, I was cleaning my computer, and curious, I went into security, Blocked/allowed, I was surprised HOW MANY ticked boxes, Private AND public, saying different versions of Remote Access.
Needless to say, I unblocked ALL of them. Probably, when I HAD allowed Remote Access to a Tech. Well, apparently they don't always disable the permissions; or, can't disable ALL of them.
If I allow remote access in the future, I will be sure to keep those tics unticked.☺🤔
@ days ago, I found teamviewer running as a background task on my computer. I killed it twice and it restarted itself both times. I don't recall installing Teamviewer but I may have. But it is normal for a program I am NOT running to have a background task running continuously? I uninstalled it and it does appear to be gone so I don't think it was a part of any specific malware.
Cheers bman❤
Please please please answer the doubt.
Someone did the same with me. I downloaded a cracked software and since then I'm getting some creepy requests (as pop ups) to for a remote desktop connection. And point is it's not actually a request, it's simply a notification that someone has connected, now you can decide whether you want him to remain connected or not. And if I click NO, it says, the remote user has "declined" your "request" to disconnect. I mean what the hell is that! Why should I be the one requesting and who is he to decline it!
To resolve this I simply reset my PC, with all the files removed and installed a fresh Windows. BUT I DOUBT THAT WILL SOLVE THE PROBLEM. Coz as far as I could understand the cracked software's job was to just extract the sensitive information like IP address etc of my device, now once done that, even if I reinstall the windows, but the IP address will remain the same correct?
It's been 10 mins I reinstalled and haven't got any creepy remote connection notifications. But my doubt is, whether the problem is really solved? Or not? Please please please answer.
"look for weird processes" - how can we know!
EVERYONE should find this useful and those that don't can continue to live with their head in the sand... you literally have no idea how impactful this bit of information is...
if you watch this video and the tab suddenly disappears, you know someone is remotely accessing your computer :P
How can I activate virus total in process explorer? I can't see it in my downloaded software.
That's useful, I'm still torn between the Surface Book and the Surface 3 LTE
I don't see the Virus total counter as in your video. Mine is blank column.
I can hear weird sounds coming from my headset like someone is talking, car horns, and ads. I have tried turning the wifi off and restarting the pc multiple times now but nothing helps. IDK what's happening someone
PLS HELP.
i cant get rid of the trojan virus its still on my laptop. i do all scans and do the savemode thing and dont fix it.its still pop up
You might like to change the title of your clip so it mentions "your PC" rather than "your computer". I have a computer but the clip for me is useless - I have an iMac.
Every minute of every day.
!
Could you make a video on SeroXen (RAT & Rootkit)?
If I can find a sample
you realize seroxen is quasar rat ,right ? Theres a ton of vid of quasar on youtube 😂
edit:Type quasar rat and you'll see hackersploit, he's far from being a script skiddie. lol like you are.
@@1337exe
Those videos are made by amateurs and skiddies who don’t know anything about Malware.
@@1337exe It's crazy (ok not really) how many content creators have no real idea what they are doing. There are many many repos of "live malware" samples on the Internet.
@@ViIgax Agree or in this case basic Windows remote access. He never even mentioned disabling RDP or checking for active users...
I keep getting "A connection with the server could not be established" under virus total :(
Why do they specifically install the Opera browser?
Maybe they are norwegian lol
i literally have a "search suspeded".... wth....
also you didnt really explain what to look for. and how to get into the advance version of processes.
Sign in as a guest with no privilides, Admin use only to make changes. Use Linux Mint. Thats a basic the other stuff is a little tedious
Thanks for reminding me why I always buy physical.
Please do a video on how to check if someone is remotely accessing my UA-cam and Gmail accounts. From where is my UA-cam and Gmail being accessed from?
First, change your passwords. Second, enable 2FA/MFA. Require all active/current sessions to log back in. Whomever was logged in (if any) will be kicked out and can only reconnect if they have access to your 2FA/MFA solution. To answer your question specifically, usually you can go to Profile > Security and you'll see "session logs" and you can see when/where your most recent logons occurred.
if someone is remote accessing my computer and sees what i do and say, will become enlightened
Pretty sure someone is remote into my computer on chrome - how would I be able to see what they are using to connect?
Think you meant "suspicion" in the description, not "suspension." ;)
What if you have no wi-fi or internet. And I tried to disable all Wi-Fi connections or network connections in the laptop can somebody still access it remotely if they were nearby? I have a feeling that cell phones can actually access your devices is that true?
If you disable the Ethernet and Wi-Fi (wireless) adapter as well as Bluetooth adapter/app/service there's no (reasonable) way someone can connect to your computer. A phone can only connect using Bluetooth (via tethering) and in most (all?) cases you have to authorize access and physically be close to the device/laptop. If you are THAT concerned with security you may want to look into running TAILS from a "live USB" or (micro)SD.
In stead of reinstalling windows 10 if you install windows 11 would that clean up any virus and malware and save my current apps and files. Thank you
No, it won't. If you do a fresh install it will remove the malware.
For worst cases, All-in-one solution is to install new windows image and reset all settings to default immediately.
Make sure they have their license key... Worst case, you would *restore* Windows and select "Reset this PC." Now you're not having to manually reinstall/reimage anything or deal with license key issues and you have a new/clean Windows environment.
Boy will they be disappointed! There ain't crap here.
If windows is reinstalled, doesn’t that remove all of your programs? If it does, and you don’t have the software to reinstall, then what do you do?
you reinstall it. then add your user setting backup, saved personal files and whatever. if this all to much for you find someone more knowledgeable, you don't need to listen to them just do as they say. from your question one can tell your computer knowledge is a bare minimum. no offense. also. a thorough clean go a long way, a windows install used daily for over a decade can easily still do its job if maintained well. mind you, a lot of this is very dry work with seek and destroy troubleshooting that can take hours. do not expect a family member to optimize your computer in 15 minutes and beware that anything you have installed on your computer, even if uninstalled, have remnants left. sometimes in large quantity. it takes a long time for a new user of your system to identify the computers content where a trojan which is like a needle in a haystack can be very well hidden. the trojan is not even your primary target at this point, the slow computer which should run faster is.
Telling the average user to reinstall Windows is crazy because most don't have access to the software or license key to activate it... Ideally(ish) you would take daily/weekly backups (using Windows Backups) and in the event of something catastrophic you would "Restore/Reset" Windows and once you have a clean/new Windows environment you would "recover from backup" (using Windows Recovery) with your last known "clean" backup. Easy, fast(ish) and free.
If someone is remote viewing your computer then they are a sinner that needs to repent.
i still check my Hosts file on a regular basis, not sure if it is still relevant but habits be habits
Nope, I use Linux.
Ever heard of knark? Lol
@Britec09 I have the same "search" process on my pc that also sais suspended. Is this a legit process?
What is microft edge
A MicroSOFF Exploiter.
Just Playing.
Really, Microsoft Edge is actually a Web Browser that replaced the built-in former Web Browser Microsoft Explorer of Microsoft Windows.
Microsoft Edge is now built into Microsoft Windows Operating System.
If You use Windows OS, Microsoft Explorer should be deleted ASAP as it is now not supported by Microsoft and is vulnerable to being digitally attacked with viruses/malware/spyware.
This is so confusing. I feel like a gerbil running on a cage wheel!
2:15 .. Yesss
You keep saying "weird stuff" how are we ( the people who don't know) supposed to know what is "weird stuff " from stuff that is normal or ok?
Can MalwareBytes detect these infections?
Only applies to the Windows platform. Mac has no issues. 90% of all remote access happens at the Kernel level. Mac has build-in protection at the Kernel level.
so does linux... its called protection AT THE FILE LEVEL rather than OS LEVEL. I'm not familiar with MAC but they probably use a similar partition scheme because that OS IS unix based.
Does Resetting the PC and Reinstallling Windows will help in this?
Yes, "restoring" Windows and selecting "Reset this PC" will essentially reset your Windows machine as if it were new. When you reinstall Windows you are required to enter your Windows license key which 99.9% of Windows users don't have.
The Kasperski Rescue Disk fails to run on my modern Windows 10 PC. Their website is useless for support.
I have had no issue running it
@@Britec09
Hello, Brian.
Can I just download Kaspersky Rescue Disk straight onto my PC, and use it from there? Thank you.
Also look up how to run Tron, to clean up a badly infected machine.
Bro showed us how to see a remote connection WELL THATS HELPFULL i dont got malware but im just interested in this stuff and i wanted to tell u that this guide is garbage like any other guide on yt
Owned a MacBook since 2010 and never had a single virus on it.
5:07 ... And what about Mobiles ?
Better to run Linux so you can actually tell what your computer is doing as YOU have full control
WHAT "Task Manager"? I don't have one of those and in fact haven't had one for over 20 years. Now just WHY is that? Because I run LINUX, that's why! And so should you because IF you did you would NOT have to be concerned about ANY malware and here's why: Because NTFS partitions are protected by the OS... but ext4 is protected by the partition itself. That means if YOU don't have the PW you are NOT getting IN! This is why I can boot any windows box with a LINUX stick and steal EVERYTHING within that box and there ain't nothing windows can do about it because it hasn't even been booted! But because there's NO PROTECTION at the FILE level guess what I can do? Anything I want. But that is FAR from the case on a linux box. The bottom line here is that to install malware code the bad guy MUST HAVE ACCESS TO THE BOX! It doesn't matter WHAT instrument they're using, see? And on linux you gotta have the PW or trick the STUPID user into giving it up. Well most people that run linux ain't stupid or they probably couldn't even install it.
Kaspersky? Really? For those that don't know Kaspersky is based in Russia. Make up your own mind, but there's that information.
Nah kaspersky is fine and the best av out of all the others.
I have successfully avoided this for many many years. Never had to do anything special or buy anything. I just don't own a computer. Simple.
Windows is super safe because Billy the Kid makes make sure he can shoot you into your computer