How to Check if Someone is Remotely Accessing Your Computer

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 385

  • @jbrou123
    @jbrou123 Рік тому +112

    What I got from this video.
    How to Check if Someone is Remotely Accessing Your Computer
    1. Open up Task Manager and look for rogue programs.
    2. Run programs that look for roque programs.
    Thanks, that helps a lot.

    • @BillAnt
      @BillAnt Рік тому +3

      lol

    • @leecowell8165
      @leecowell8165 11 місяців тому +6

      Unless of course they're ain't no "Task Manager" what then? Yeah under linux WTF IS THAT?

    • @Catinthehackmatrix
      @Catinthehackmatrix 8 місяців тому

      ​​@@leecowell8165Linux has process managers. Try Linux mint, lubuntu, etc .

    • @blackaudrey367
      @blackaudrey367 3 місяці тому +1

      Exactly! The print is so small on his demonstration, I can't even see it🤦🏾

    • @stonalisa3729
      @stonalisa3729 7 днів тому

      @@leecowell8165 you are less likely to have issue on linux because 99% of malware is for windows and on Linux you would have to conciously download it

  • @yourpcmd
    @yourpcmd Рік тому +200

    The only rogue programs I see in Task Manager are Chrome and Microsoft.

    • @homuraakemi9556
      @homuraakemi9556 Рік тому +2

      Yes, I'm pretty sure some of the things he was pointing out in task manager were actually normal. Search being paused/suspended by Windows is totally normal, for example.

    • @Britec09
      @Britec09  Рік тому +11

      You obviously don't know anything about windows

    • @myekuntz
      @myekuntz Рік тому +7

      more like forceded and enforced malware

    • @gittube417
      @gittube417 Рік тому

      Change to Mac then !

    • @ASMR_Lighting
      @ASMR_Lighting Рік тому +5

      My comment supporting this post was removed by YT as violating its policy - no dissent permitted, apparently!

  • @OldManJimmy1
    @OldManJimmy1 Рік тому +27

    Yeah, when you get a computer running Windows virused or malwareed up it's never the same just cleaning them off. Seems to leave glitches and issues from then on. Clean install of windows is the way to clean this up. Thanks for the tips on keeping an eye on malicious programs infecting our PCs

    • @leecowell8165
      @leecowell8165 11 місяців тому +6

      No. The way to clean it up is to install linux because guess what IF you don't within in a month they'll be newbie malware on your box.

    • @OldManJimmy1
      @OldManJimmy1 11 місяців тому

      I need to spend a little time learning Linux and install it on one of my computers.@@leecowell8165

  • @kpv123
    @kpv123 Рік тому +205

    This is Michael. I usually like your work but this was pretty useless. The first major fail is that you don't tell people how to disable remote access. The second is that there's no way the average person can know what's a rogue program when there are so many weird names on programs in the operating system both in terms of processes and services. The only useful things you said were to get a good antivirus program and utilize process Explorer

    • @Pancajayna
      @Pancajayna Рік тому +14

      There are literally thousands of files and processes that he can't even start to address for the "average person"... this is a first step and then you can HIRE a tech if you find something OR you can check the names one by one and research it YOURSELF... what do you really think this is?

    • @t.stephen5086
      @t.stephen5086 Рік тому +27

      He could've shown how to disable remote access as you suggested, that would be the first step a non tech person should so

    • @flashwashington2735
      @flashwashington2735 Рік тому

      @@t.stephen5086 Because mal ware would never mal that? Still it should be done, but what about governments, mandatory OS and hardware backdoors? Microsofts continual data collection and giving to governments? And the big corporates' anti spy - malware's backdoors and data sharing an awfulot of vectors for compromise and harm? Well, do what you will and can. God bless.

    • @jimkyle8008
      @jimkyle8008 Рік тому +25

      My thoughts exactly. The information might be useful if you're a computer nerd, but it's pretty meaningless to the average user.

    • @Hs5687
      @Hs5687 Рік тому

      Hi Guys , just wanted to let You know that if You are Politically Targeted , try not to rely too much on Internet … even Telcos can be Compromised…

  • @eddiesneeh4266
    @eddiesneeh4266 10 місяців тому +31

    Part of the problem is Windows is so primitive they allow any program to get installed anywhere the creator wanted even in the OS area. The OS should be protected, no one should be installing anything in the OS directory. Each application should be installed under its own tree, and it should not require root for installation. Applications should not be using OS locations, OS utilities, OS "registries", OS anything other than using shared system libraries (that are read-only). This chaotic, messy setup that Microsoft has created makes it difficult to see if a process is legit or not.

  • @ripleyhrgiger4669
    @ripleyhrgiger4669 Рік тому +30

    I just recieved my first high end router in my entire life (it was a Christmas gift to myself (early I know) for completing several projects at work) and I never knew just how powerful a router can be for security once configured properly. Your channel and others like it have been a great boon for a lot of people out there and we do really appreciate the hardwork you do to educate people. Seasoned IT professionals and amateurs alike always have something to learn in this field. (There is too much for us to know everything!)
    Thank you so much, Mr. Britec! I look forward to your next lesson!

  • @stephenluttrell8958
    @stephenluttrell8958 11 місяців тому +24

    Unfortunately there aren’t a lot of accessible options when it comes to anti virus/malware software for us blind users. We are an underserved demographic in this regard.

    • @flashwashington2735
      @flashwashington2735 11 місяців тому

      There's all kind of blindness, you'd know better than me. However, everybody needs help some times, pray and act to get it. Don't let your eyes be merely be one \ among other avoidable impairments. Life is hard enough my friend. God bless.
      God is still in business healing. If you believe it, if you want to believe it. Get help with your believing. Like the Father of the possessed son, Some might say epilepsy, 'I believe. Help thou my unbelief.' He asked the master. He got results.
      Mark 9:24:21 And he asked his father, How long is it ago since this came unto him? And he said, Of a child.
      22 And ofttimes it hath cast him into the fire, and into the waters, to destroy him: but if thou canst do any thing, have compassion on us, and help us.
      23 Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
      24 And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
      25 When Jesus saw that the people came running together, he rebuked the foul spirit, saying unto him, Thou dumb and deaf spirit, I charge thee, come out of him, and enter no more into him.
      26 And the spirit cried, and rent him sore, and came out of him: and he was as one dead; insomuch that many said, He is dead.
      27 But Jesus took him by the hand, and lifted him up; and he arose.
      Remember: Jesus said unto him, If thou canst believe, all things are possible to him that believeth.
      And straightway the father of the child cried out, and said with tears, Lord, I believe; help thou mine unbelief.
      God bless.

    • @alfonzo7822
      @alfonzo7822 4 місяці тому

      That's actually something I had never considered. I'm currently a Cyber Security degree student. This is giving me an idea for a program/app for those with visual impairments. I'm sorry it doesn't help you just now, but hopefully there will be things in future that can help you navigate these kinds of issues better.

  • @MrPir84free
    @MrPir84free Рік тому +15

    I believe you failed to mention one of the best countermeasures for a typical system is to create and use a regular user account for everything, put a strong password on the administrator account and use it only when needed.
    I work IT, and even at home, I refuse to run as Administrator for things like browsing the internet, or doing darn near anything else. It is JUST one of many measures that one takes to keep their system clean. It matters not if you are using Linux or Windows, the concept is exactly the same. Not running as Administrator is one of the best things one can do for their own computers; sometimes less convenient, but better practice.
    Some folks may think that this is about merely finding out if one's computer is compromised; and how to clean it up; but staying clean is part of the problem.

    • @Britec09
      @Britec09  Рік тому +3

      I made videos on that before, no one wants to run as standard user.

    • @Absamo97
      @Absamo97 Рік тому +3

      I mean ... if the attacker got into your system its a matter of time that he can privilege escalate his user to become admin and take over your machine, so instead of limiting my self with some features or have some limitations I run my system as admin all the time and I believe most of the people do this.

    • @lordhriley
      @lordhriley Рік тому

      ​@Britec09 well you can't very easily with windows making u use a Microsoft account to log into your computer.

    • @leecowell8165
      @leecowell8165 11 місяців тому +1

      By default you're not running as Admin in linux. In fact without doing so you cannot access anyone else's /home directory on YOUR system without their knowledge because you need THERE PW. So never run as Admin by default on a linux box. The only way to access everyone is you need to elevate your user level to Admin. That means you need access to the box itself because it ain't happening remotely without the PW.

  • @EHD351
    @EHD351 Рік тому +9

    I get Phishing Emails constantly. Have to always look twice. Thanks, once again.

    • @excxmoody
      @excxmoody Рік тому

      That's exactly how it is whenever I try shopping online...where I'm literally minding my own damn business while someone else clearly cannot do so.

    • @TurielTyrael44-bf1ld6zu6s
      @TurielTyrael44-bf1ld6zu6s 6 місяців тому

      Report them. If there's a lot just mass delete them and report them (do both).

  • @EveMarie
    @EveMarie 4 місяці тому

    Words cannot describe how grateful i am for this Caroline series. You have helped me so much and also showed me that it was ok to open up about the grief on my channel. Thank you, thank you, thank you 🙏🏻

  • @WheelerRickRambles
    @WheelerRickRambles 11 місяців тому +7

    I worked for a terrible employer (…didn’t know this til the end…). I was an outside sales guy where I used my personal private home computer, on rare occasions, to do some work related tasks - simple spreadsheet development, print an email, etc. Well, to my not knowing or being notified they somehow gained remote access to my computer. They could see everything, every click, every mouse move, bank accounts….ALL! It was not good, felt violated & all sorts of the like. Wish I would have known of this video content back then.

    • @Etleng-yf9fq
      @Etleng-yf9fq 5 місяців тому

      Same happening to me. People are abusing their power.

    • @smokagaming
      @smokagaming 2 місяці тому

      @@Etleng-yf9fq Likewise here :/ Its been depressing not gonna lie, though Ive been studying and hopefully will be smart enough to stop the stuff soon

    • @yasminasaidii
      @yasminasaidii 15 днів тому

      is their access to the email enough to have all that access to monitoring all of that?

  • @WatchesTrainsAndRockets
    @WatchesTrainsAndRockets Рік тому +8

    Do you expect the average user to comprehend any of this?

  • @maureneschlosz6404
    @maureneschlosz6404 11 місяців тому +45

    I have no idea what you are talking about.

  • @petefluffy7420
    @petefluffy7420 Рік тому +4

    Oh very easy. Look for rogue processes, there is one problem immediately apparent. Nothing is ever identified as being rouge.

  • @danbromberg
    @danbromberg Рік тому +21

    Great video but it's helpful to have links to the programs used in your video as you often do.

    • @Britec09
      @Britec09  Рік тому +15

      I will add them, I forgot

    • @therealcrazymazey
      @therealcrazymazey Рік тому

      wheres the link for kasper exe, only find the iso ?@@Britec09

  • @James-k6z5e
    @James-k6z5e 6 місяців тому

    You explained a bit fast for me personally but appreciated and would advise you to somehow enhance the size of the written document so we can see what u r pointing out. I gather most people already know. I am quite the novice❤

  • @ros-spur98
    @ros-spur98 Рік тому +5

    Cheers Brian, good to know, I do a Kaspersky Total full scan every 10 days or so.

    • @Britec09
      @Britec09  Рік тому +3

      Good stuff

    • @maxgood42
      @maxgood42 Рік тому +5

      @@Britec09 There was a lot of controversy over Kaspersky in the past, can you do an update about this and or other security providers ?

    • @thefreestylefrEaK
      @thefreestylefrEaK 10 місяців тому +2

      @@maxgood42 No he can't because he's a tool.

  • @wannabedal-adx458
    @wannabedal-adx458 9 місяців тому +1

    "Or maybe you a have suspicion that someone is remote viewing your computer without your knowledge." You mean like Microsoft, Google, NSA, GCHQ, etc!! 😂
    Thanks for a good video Brian. A good reminder to look up and use some the tools you mentioned here.

  • @rickoshay6554
    @rickoshay6554 5 місяців тому

    You have a decided advantage in spotting rogue programs when you installed the rogue programs yourself. It's more problematic when someone else did it.
    In my experience, most of the rogue programs that plague Windows were put there by Microsoft.

  • @lswinney1000
    @lswinney1000 8 місяців тому +4

    My head is spinning from this video. It may be malicious or it may not. NOT MUCH HELP.

  • @AndroCom69
    @AndroCom69 5 місяців тому

    This is what I need to know now, cause like any something strange on my PC turn off suddenly. Thanks for tutorial, Sir.

  • @familyhopeschildrenandlegal
    @familyhopeschildrenandlegal 11 днів тому

    Video was very insightful. I have all that you have mention plus more. One thing i am confused with is that every time i reinstall windows it re appears everytime. I cannot work out what is going on.

  • @t.stephen5086
    @t.stephen5086 Рік тому +12

    Wouldn't it just be easier to type a netstat -a command to check foreign connections?

    • @Lachausis
      @Lachausis 11 місяців тому +2

      not all viruses connect to the web. Some are just there to screw your OS up. So both, I guess.

    • @julianciahaconsulting8663
      @julianciahaconsulting8663 Місяць тому

      i did that and for 2 seconds i could see a screen of something happening then nothing

  • @maydaygoingdown5602
    @maydaygoingdown5602 Рік тому +7

    Hi Brian. Just a quick one.
    If i dissable all Remote settings in windows can this type of thing still happen??
    Disabling Remote settings is one of the first things ive always done.

  • @MeBaddaDanDem
    @MeBaddaDanDem Місяць тому +1

    I think you should show everyone how to setup crowdsec engine on their devices.

  • @lapasorsa9022
    @lapasorsa9022 3 місяці тому

    Lovely! Only suspicious thing leaking information here is Windows. Malware is working fine.

  • @petervan7372
    @petervan7372 9 місяців тому +3

    Some processes can't be seen in any monitoring tools, it's made this way by Windows or any OS on purpose, like when the three letter agencies remote into your PC, you won't be able to see it

    • @joebailey5607
      @joebailey5607 6 місяців тому

      My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?

  • @ipadize
    @ipadize Рік тому +3

    if you watch this video and the tab suddenly disappears, you know someone is remotely accessing your computer :P

  • @markcorrigan293
    @markcorrigan293 6 місяців тому

    I am able to fully reinstall windows (refresh it) in about 20 minutes. Another 20 to reinstall favourite apps. I suggest this approach if pc starts misbehaving as you will spend hours trying to fix / remove bugs where 40 minutes for a fresh start is best.

  • @deciodasilva3960
    @deciodasilva3960 Рік тому +2

    This is very very very helpful and important information man thank you...

  • @spazoq
    @spazoq Рік тому +2

    Kaspersky? Really? For those that don't know Kaspersky is based in Russia. Make up your own mind, but there's that information.

    • @zilverman7820
      @zilverman7820 Рік тому

      Nah kaspersky is fine and the best av out of all the others.

  • @opsvixen
    @opsvixen 8 місяців тому

    Accidentally, I was cleaning my computer, and curious, I went into security, Blocked/allowed, I was surprised HOW MANY ticked boxes, Private AND public, saying different versions of Remote Access.
    Needless to say, I unblocked ALL of them. Probably, when I HAD allowed Remote Access to a Tech. Well, apparently they don't always disable the permissions; or, can't disable ALL of them.
    If I allow remote access in the future, I will be sure to keep those tics unticked.☺🤔

  • @nmbdy4732
    @nmbdy4732 Рік тому +1

    Thanks so much for your great work with load of knowledges and details!
    When I click on Whois it said : Failed to get Whois information. Any suggest?

  • @İlindsaycaruso
    @İlindsaycaruso 29 днів тому

    These comments 👎🏼 I can tell from spotlight search then activity I’m infected but removing the right things is what’s giving me a hard time knowing where to start and if I should download something to remove the malicious activity

  • @michalwiktorow2188
    @michalwiktorow2188 Рік тому

    Hi, this was great educational video. Considering how corporations are forced to work with gov. that are not always non-totalitarian, which of the software provider is most independent and has robust antivirus? Thanks.

    • @flashwashington2735
      @flashwashington2735 Рік тому

      That are not totalitarian, but want to be badly, and have formed a multi national coalition like Five Eyes. She's an ugly date that Five Eyes. 🤔🤔🤣🤣🤣😘😘🙏🙏

  • @dnwatts55
    @dnwatts55 Рік тому +5

    Nope, I use Linux.

  • @allanpatterson7653
    @allanpatterson7653 11 місяців тому

    Sign in as a guest with no privilides, Admin use only to make changes. Use Linux Mint. Thats a basic the other stuff is a little tedious

  • @B3-R
    @B3-R Рік тому

    If using any exterior virus check with for example Kaspersky, before shutting down Windows,the Hibernation should also be cleared, otherwise won't work.

  • @ThinqK
    @ThinqK Рік тому

    if someone is remote accessing my computer and sees what i do and say, will become enlightened

  • @babumohan4549
    @babumohan4549 Рік тому +1

    expected video sir😊thank you❤love from India ❤😊

    • @Britec09
      @Britec09  Рік тому +4

      Hope you enjoyed it!

  • @jamegumb7298
    @jamegumb7298 Рік тому +1

    Just Wireshark it.
    Or use intrusion detection.

  • @d1m18
    @d1m18 Рік тому +1

    Still recommending Kaspersky rescue disk? I thought that does not exist and has not been updated. I loved it, but their support says it no longer exists...
    Correct?
    Can you recommend many virus rescue / boot disks to use, that are still updated?

  • @inigoacha1166
    @inigoacha1166 5 місяців тому

    1. Move to Windows 11 x64 Core isolation mode.
    2. Cypher the DISK
    2.1 Backups ?
    3. Pay The Kaspersky license with pre secured VPN servers.
    VPN services are the door for the botnets
    Greetings from Bilbao and ty for the video !

  • @Pancajayna
    @Pancajayna Рік тому

    EVERYONE should find this useful and those that don't can continue to live with their head in the sand... you literally have no idea how impactful this bit of information is...

  • @shawnkeys4963
    @shawnkeys4963 Рік тому +4

    You keep saying "weird stuff" how are we ( the people who don't know) supposed to know what is "weird stuff " from stuff that is normal or ok?

  • @spherasidereal
    @spherasidereal Рік тому +2

    Will Malwarebytes installed in my PC prevent or detect any of this?

  • @fubu7942
    @fubu7942 10 місяців тому +1

    If someone is remote viewing your computer then they are a sinner that needs to repent.

  • @UmarO
    @UmarO 11 місяців тому +2

    "look for weird processes" - how can we know!

  • @danielgartin-oh9ik
    @danielgartin-oh9ik Рік тому +1

    That's useful, I'm still torn between the Surface Book and the Surface 3 LTE

  • @theguywithone
    @theguywithone Рік тому +1

    I have successfully avoided this for many many years. Never had to do anything special or buy anything. I just don't own a computer. Simple.

  • @julianciahaconsulting8663
    @julianciahaconsulting8663 Місяць тому

    a little more talk about how to recognize a rogue program would be helpful

  • @brianchandler8727
    @brianchandler8727 9 місяців тому

    Thank you for the information, I try hitman . It seems to work

  • @KTHKUHNKK
    @KTHKUHNKK Рік тому

    Thank you it's nice to be aware of all that

  • @earnestleesaddened3779
    @earnestleesaddened3779 11 місяців тому

    Will regular use of SFC and DISM help to remove remote connections?

  • @paideia-e9u
    @paideia-e9u Рік тому

    Thank you very much for sharing. Help a lot!

  • @Moist_yet_Crispy
    @Moist_yet_Crispy 11 місяців тому +1

    I have some sus processes but when I right click properties is grayed out. How else can I track down the properties address to remove?

  • @Phoenix-kj2fn
    @Phoenix-kj2fn 10 місяців тому

    EXELLANT----EXPLANATION.
    Dear Sir, I have installed AV software- BITDEFENDER TOTAL.
    Do I need to buy additional AntiMalware software?
    Do it necessary to carry out other processes you described above?
    Please reply as many other READERS are waiting for answer of this question.
    Thanks

  • @leecowell8165
    @leecowell8165 11 місяців тому +2

    WHAT "Task Manager"? I don't have one of those and in fact haven't had one for over 20 years. Now just WHY is that? Because I run LINUX, that's why! And so should you because IF you did you would NOT have to be concerned about ANY malware and here's why: Because NTFS partitions are protected by the OS... but ext4 is protected by the partition itself. That means if YOU don't have the PW you are NOT getting IN! This is why I can boot any windows box with a LINUX stick and steal EVERYTHING within that box and there ain't nothing windows can do about it because it hasn't even been booted! But because there's NO PROTECTION at the FILE level guess what I can do? Anything I want. But that is FAR from the case on a linux box. The bottom line here is that to install malware code the bad guy MUST HAVE ACCESS TO THE BOX! It doesn't matter WHAT instrument they're using, see? And on linux you gotta have the PW or trick the STUPID user into giving it up. Well most people that run linux ain't stupid or they probably couldn't even install it.

  • @xavierkreiss8394
    @xavierkreiss8394 11 місяців тому +1

    You might like to change the title of your clip so it mentions "your PC" rather than "your computer". I have a computer but the clip for me is useless - I have an iMac.

  • @woritsez
    @woritsez 9 місяців тому

    heavy heavy renders make the mouse pointer fly off screen, not unholy possession as i once thought, just a precursor to some unsaved project crashing

  • @hvfd5956
    @hvfd5956 Рік тому

    Boy will they be disappointed! There ain't crap here.

  • @nonshatter7
    @nonshatter7 Рік тому

    Will using a firewall/virus protection like Norton be sufficient to combat these things. I ask because you state that running multiple scans with different programs is a good idea (but having more than one antivrus package could create program conflicts.).

  • @digudc
    @digudc Рік тому

    thank you mate.. your videos are everyday informative and helpful.. cheers..💛💙

    • @InstigatorDJ
      @InstigatorDJ Рік тому

      Information you will NEVER FUCKING NEED. But thank you bro. Jesus!!

  • @soiltek2015
    @soiltek2015 11 місяців тому

    Thanks for reminding me why I always buy physical.

  • @bruce8321
    @bruce8321 11 місяців тому +2

    This is way too fast and moving around for the average Joe to understand. I had to leave it.

  • @JackNotJack
    @JackNotJack Рік тому +1

    Great video. Thanks for taking the time to make it.

    • @InstigatorDJ
      @InstigatorDJ Рік тому

      Will help literally NOBODY!! Great VIDEO MAN!!!!!!!!! WOW OMG!!

  • @axq3837
    @axq3837 Рік тому +2

    Why do they specifically install the Opera browser?

  • @MrYossarianuk
    @MrYossarianuk Рік тому +1

    Better to run Linux so you can actually tell what your computer is doing as YOU have full control

  • @rexford9019
    @rexford9019 Рік тому

    Owned a MacBook since 2010 and never had a single virus on it.

  • @marimarmarimar25
    @marimarmarimar25 8 місяців тому

    Thanks!

  • @charleshines2142
    @charleshines2142 Рік тому +1

    Is there a way to add a column to process explorer that shows any remote addresses a process may have? It would make it so you don't really have to go through each one. I can imagine some of those rats having names that sound very similar to process names found in Windows so that you might not see them as easily. It would be similar to the way some websites might have a strange character in the name that looks similar to the one in our 26 letter alphabet (unless you live somewhere the alphabet is different). Also it would not be a bad idea to have a good known clean installation media made for the OS of your choice. This way if it is a computer that will have personal stuff on it that you don't want stolen there is much less of a chance that it would happen. Just don't change your passwords and other stuff on a machine that might still be infected since the malware is likely to just send those to the person who hacked you and then they don't really help. You may even want a separate computer for personal stuff like paying bills and other similar things. It would be a computer that doesn't really have any extra software installed and is also one you never let anyone else really use. For those purposes that one can be a little NUC and then it would take a lot less desk space than a typical PC while having all of the functionality. They are not something that I would game on but they would be good for trying out Linux if you are not ready do install it on all computers. I really have only installed Linux on a spare PC just to get used to it before I ever attempt to switch the other ones over. It is just a spare one that I can use to learn to get used to Linux and has no data on it for me to worry about losing accidentally and nothing sensitive to worry about falling into someone else's hands.

  • @yadiman7295
    @yadiman7295 10 місяців тому

    Uncheck the check-box of "Allow Remote Assistance connection to this computer" in System Properties

  • @MK-fd5pc
    @MK-fd5pc Рік тому +1

    Do not use Kaspersky and opera. Find out why first

  • @RealityCollapseTheory
    @RealityCollapseTheory Рік тому

    There is no security you would have to rebuild everything using new technology making sure it is foolproof

  • @Sand15676
    @Sand15676 Рік тому

    I look at it like this. Whenever you go on line it's like going into a battlefield. I plug my Ethernet cable in, take care of business and then get the hell out by physically removing the Ethernet cable. Even with a VPN.

    • @leecowell8165
      @leecowell8165 11 місяців тому

      Why do you do that the ultimate paranoia attack? Good reason under windows. However I spend hours everyday on the internet. And in 20 years I've never been hacked or had ANY malware or virus installed on my boxes. Why? I run linux. I run ClamAV every quarter or so to see if any windows files have picked anything up in my NTFS formatted partitions or even stick partitions (which are generally formatted FAT32). Those partitions have absolutely NO PROTECTION at the FILE LEVEL thus they get attacked unmercifully. Yep generally something gets picked up by ClamAV but guess what they still need my PW and I rarely run as Admin. BTW ClamAV takes HOURS to run if you gotta big box. I generally just let it run overnight. I only run it on NTFS/FAT32 partitions that are actually physically on the system because it ain't happening on ext4 partitions. yeah I have maybe 40 partitions on my big box (well beyond windows capability as they alphabetize their partitions (and no longer use A or B if you newbies happen to notice that)). Linux is a bit more complex regarding naming convention but there's virtually no limit to the number of partitions on a linux box. You can also install linux anywhere even across many physical drives (while windows always installs to C:)

  • @InstigatorDJ
    @InstigatorDJ Рік тому +1

    The chances someone IS ACCESSING your compuiter is LITERALLY NIL.

  • @myhatmyseat9924
    @myhatmyseat9924 11 місяців тому

    i still check my Hosts file on a regular basis, not sure if it is still relevant but habits be habits

  • @joebailey5607
    @joebailey5607 6 місяців тому

    My company wants us to install hardware monitoring software designed by a local IT support . This is also supposed to be helpful to protect us against viruses and remote IT support. Is there a chance that they could use it to monitor us in order ways?

  • @terrylast7034
    @terrylast7034 Рік тому +1

    As an electronics teacher of thirty years your teaching method is vague and ham fisted. It serves only to have most people visit their tech nerd. Itis not worth the carbon footprint.

  • @MGKing-888
    @MGKing-888 8 місяців тому +1

    Please do a video on how to check if someone is remotely accessing my UA-cam and Gmail accounts. From where is my UA-cam and Gmail being accessed from?

    • @jjann54321
      @jjann54321 6 місяців тому

      First, change your passwords. Second, enable 2FA/MFA. Require all active/current sessions to log back in. Whomever was logged in (if any) will be kicked out and can only reconnect if they have access to your 2FA/MFA solution. To answer your question specifically, usually you can go to Profile > Security and you'll see "session logs" and you can see when/where your most recent logons occurred.

  • @sissaboolives2012
    @sissaboolives2012 3 місяці тому

    Hmm wouldn't it be nice if Windows would supply the software that scans the pc for this sort of thing, you know, put the running programs thru queueing algo and warn of any programs it does not recognize so the user can confirm if it is a legit program or not. And, add to the queue any programs the user has approved for installation. This should remove viruses and malware.

  • @chevyyyyyyy
    @chevyyyyyyy 11 місяців тому +1

    This demo. is useful only to you and your friends because it does not explain.

  • @supertrexandroidx
    @supertrexandroidx Рік тому

    Think you meant "suspicion" in the description, not "suspension." ;)

  • @UQRXD
    @UQRXD 11 місяців тому

    Microsoft does it all the time. I am use to it.

  • @notjustforhackers4252
    @notjustforhackers4252 Рік тому +1

    Type "users" in a bash terminal.

    • @Britec09
      @Britec09  Рік тому +1

      not 100% guaranteed to find backdoor

    • @notjustforhackers4252
      @notjustforhackers4252 Рік тому

      @@Britec09 If someone is currently accessing you system 'users' will tell you.
      sudo lynis audit system
      Will find any nasties if they're not currently active.

  • @mean10102
    @mean10102 Місяць тому

    Don't believe computers are private. In order for privacy. You have to put the hardware in a Faraday cage and hope it is sealed.If it is not sealed a near by computer will act as a bridge. There is a peer to peer that is unknown. I observed it talking on 462 mhz .I observed it advertising it's self every so often in the Faraday cage.before I put it in the Faraday it would not stop talking on 462 mhz. I setup a laptop near the computer in the Faraday cage because i need it.long after I put it in the Faraday cage. The next time the computer advertised it's self they both started screaming on 462 mhz. The only reason i know this is because I had a scanner on . Every time I turned on my the mobo I bought for my gpu to run llm's on. It made alot of noise on 462 mhz. So i put in a Faraday cage because I didn't want to lose my hardware to the FCC. I found out all this.

  • @lloydrobertevans
    @lloydrobertevans 3 місяці тому

    All my neighbours next door, including 54 Bower Street, say sagehr and avast sticks of gas back to booby bouncer😅😊
    I think I been moped

  • @richardlong8736
    @richardlong8736 9 місяців тому

    Thanks, cheers

  • @BernhardSchwarz-xs8kp
    @BernhardSchwarz-xs8kp 6 місяців тому

    I hope at least you had fun - rambling down issues that come to your mind on the fly, randomly clicking away, opening windows, and shutting them almost instantly down again. All actions are totally unrelated to anything other than your ego trip.

  • @vicmartinez4532
    @vicmartinez4532 Рік тому

    Windows is super safe because Billy the Kid makes make sure he can shoot you into your computer

  • @truhunk1
    @truhunk1 Рік тому +1

    Too complicated for me to figure out.

  • @benjaminstevens6043
    @benjaminstevens6043 11 місяців тому +1

    sweet merciful jesus, THANK YOU. Just facts and brass tacks. concise disambiguation and walkthrough.
    I love you.

  • @crumblingsanity6455
    @crumblingsanity6455 9 місяців тому

    With the start process around 4:42 mines is pretty much the same as shown on here where the location and everything is the same, so with that in mind from the video, I'd assume that someone has remote access to my computer, right? I'm not really sure how anyone would have been able to do this and I've already run a million scans (mainly full ones of course) and nothing has of course popped up and I haven't seen any weird changes to my computer either signifying that I am being remotely hacked either.

  • @richardmagic101
    @richardmagic101 3 місяці тому

    when you type in you login code type your number and if you type 5 times until it shows you have a key logger on you computer someone is spying and recording every key stroke

  • @dontwasteachance
    @dontwasteachance 7 місяців тому

    It looks like this video is specific to Windows. You might have warned us by putting "Windows" in the title. There is a sizable population that doesn't run Windows.

  • @Technie87
    @Technie87 10 місяців тому

    Pretty sure someone is remote into my computer on chrome - how would I be able to see what they are using to connect?

  • @francishubertovasquez2139
    @francishubertovasquez2139 Місяць тому

    Probably they're shadows and fans of mine designed to serve me.

  • @ShaunBest
    @ShaunBest Місяць тому

    Video title lead me to assume there's actually forensic skills related to Windows 11 but it's just a generic mention that anti-virus programs exist.

  • @tutifruti7488
    @tutifruti7488 Рік тому

    Why check?
    Always assume they are.

  • @İlindsaycaruso
    @İlindsaycaruso 29 днів тому

    Is it weird that cpu numbers are moving around even after force quit everything? It’s like fluctuating and switching places 🙄 MacBook Pro m3 somehow believe I got a virus