Know if Your Computer Has Been Tracked

Revision as of 00:46, 17 October 2016 by Kipkis (Kipkis | contribs) (importing article from wikihow)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

There is no surefire way to know if your computer is being hacked or root kitted by some hacker out there, short of keeping it clean-room by never, ever connecting it to the internet. However, there are many ways to distinctly reduce the chances of it being compromised.

Steps

  1. Disconnect your computer from the internet.
  2. Go into control panel, and choose uninstall a program. Uninstall any anti-virus software you have currently installed (obviously, if you have anti-virus software which you are happy with, then leave it installed). This is to avoid anti-virus clashes which may render your computer unusable.
  3. Secure your computer. If you already have a full anti-virus suite, that is up to date and includes all of the following three components, then skip to step 8. Otherwise, for your computer to be secure you will need to download all of the following which you do not already have;
    • Install an anti-virus scanner with real-time and heuristic scanning; Comodo BoClean and AVG Free work.
    • Install an anti-spyware scanner; HijackThis and Spybot S&D work.
  4. Install a firewall to replace the weak windows firewall; ZoneAlarm works great.
  5. Consider using intrusion detection software.
  6. Install all of the required programs. Connect your computer to the Internet again, and allow them to update fully.
  7. Run the anti-virus scanner and anti-spyware scanners. If anyone has hacked your computer, the malware should be detected, and hopefully the software can remove it. Now your computer should be more secure.
  8. Update your Operating System, Anti-Virus and Anti-Spy Ware software automatically or regularly, at least once a week. You should be able to prevent nearly all attacks on your computer, provided you use your computer in a sensible manner.

Tips

  • Check your current browser for options that allow for little or no tracking, high security settings and privacy.
  • Use an alternative browser. Using Firefox,Google Chrome or Opera as your web browser (or any browser other than Internet Explorer, which is infamously known as "Internet Exploder" because of its common malfunctions and vulnerability to viruses) would result being targeted much less by viruses, as many are directed at Internet Explorer.

Warnings

  • Don't go to dodgy websites. If you search on Google for something, and the description for one of the sites has a lengthy list of irrelevant and unconnected words in it, it's probably a sham site.
  • Never install something you have downloaded without fully reading the license agreement. Many newer malware programs are effectively legal as they are hidden or packaged with the desirable software and have a license agreement detailing their effects. If you see anything dubious in the license agreement, don't install. Pay attention to the "Agree" boxes when installing software. Blindly agreeing to everything presented can make cleaning out "added bonus" applications difficult, when it could have been much easier to "decline" when installing instead.
  • Don't open E-mail "attachments" unless you have spoken to the trusted sender and they have verified that they included the attachment. Just because an E-mail originates from a friend, does not mean his / her computer hasn't been infected. The virus can spread by sending itself to everyone in the E-mail program contact list, often without the owner even knowing it is happening.
  • Don't install ActiveX controls from a site you don't trust.
  • Don't run applications or copy content from disks, thumb drives, CDs, etc. that have been provided by others (including friends); or belong to you if they have previously been connected to another computer, unless scanned with your anti-virus program first. If an infected computer has accessed the data on the media, the data is likely to be infected as well.

Related Articles