How To Tell If Your System Has Been hacked

Probably one of the scariest scenarios you can run across with your computer is if you are typing or browsing the web and suddenly your curser decides to start moving aroundhackers your screen without your interaction. Often times this is due to lag on your computer possibly due to Malware or running programs or in rarer cases it is because somebody has taken control of your system without your knowledge. In order to cure the first reason, a complete computer clean up and tune up will almost always fix the problem. If you have reason to believe that you have been hacked, you need to call a pro immediately.

 

In order for someone to gain control of your system, software that allows this type of behavior needs to be installed. Sometimes this can be done by opening an e-mail attachment or in some cases by simply visiting an infected website. Another sure-fire way to have your system compromised is to fall for the Microsoft phone scam. In this case, you get a phone call from a random person who claims to be from Microsoft and you allow him into your computer, you are likely going to be hacked. We had a client who fell for the scam and the scammer changed her computer log on password so she could not get back into her computer. This hacker would now likely have full rein of the controls. Do not fall prey to this malicious scam.

 

There are a couple of things you can do to minimize this type of infiltration to your system. Start by going to your Control Panel. Next, click on System. If you have an XP computer, click on the Advanced Tab if you are running a newer version of Windows click on the Advanced System Settings link on the left side of the screen. This will open System Properties. Click on the tab that says Remote. Uncheck the option to allow remote assistance invitations. Also you will want to uncheck the Remote Desktop option if it is available. By completing this task, you have taken the first step in stopping hackers in their tracks. This will help to prevent many of the hacking attempts that are made by malicious users that are trying to connect to your machine without your knowledge.

 

Of course, there are times when you will want to allow technicians to access your machine. For example, when you call Ring A Geek for computer support, we use one of the most advanced systems to connect to your computer in order to make the repairs causing your machine not to function properly. Making the changes described above will not block these valid companies; it will only block those who are trying to access your system without your knowledge.

 

There is one other scenario I would like to talk about and it involves somebody that you know planting remote connection software on your system without your knowledge. In this case, someone you know puts the software on your computer locally at your location. We have come across this a few times and it is usually somebody who is trying to “spy” on the person involved. In a case such as this, software such as Log Me In is likely installed on the computer. These programs can be easily found by looking through the list of installed programs and removing the offending app.

 

In short, if you think you have been compromised by an unknown source, call a professional technician to check the system to be sure it is safe to use. If you have a friend or family member that might be trying to do some spying, simply go through your list of programs and remove any apps that are related to remote connections such as Log Me In. If you are not sure, call a professional to check your system. As always, keep good backups and be sure your anti-virus is updated and working properly. With all the excellent free anti-virus programs on the market, there is no reason to go without protection.

Article by, Ross and Tech Joe DO NOT COPY!
Copyscape

 

 

Posted in Security

Leave a Reply

Your email address will not be published. Required fields are marked *

*



Some of our Happy Customers we have provided service for...