InterviewSolution
| 1. |
Solve : Internet activity accessed by flatmates- how?? |
|
Answer» Recently my internet activity has been accessed by a flatmate of mine. Whatever software was used required both my laptop to be on and close proximity to work, as he would enter the room ADJACENT to mine (despite that room not being his) shortly after I entered my own room on several occasions. Therefore my question is what software requires both the target laptop to be on and close proximity? Thank you.? Have you run any virus scans and come up with any troubles ? Do you know of any programs that require proximity? Every program or service that uses bluetooth or wifi has to stay within a proximity/operating range .... that doesnt help MUCH because too many to guess you have installed & list. Have you looked for any programs or services that look questionable. You can run Get-WmiObject -Class Win32_Product | Select-Object -Property Name > C:\Software\PCapps.txt as seen here to gather a list and share it with us to look at: http://www.howtogeek.com/165293/how-to-get-a-list-of-software-installed-on-your-pc-with-a-single-command/ Then attach the txt file for us to look at after running that instruction from command shell. You can also take a screen shot of task manager and sort alphabetically and "show processes from all users" selected so we can look for questionable services. Although the best hackers will hide rogue services under like names of legit services to mask them from easy capture. Your best bet really is to backup your data and wipe it clean back to factory install and start fresh, and keep it secure with password and no physical access by them. A simple thumb drive or disc can bypass computer security with HACKSAW tools that run in Linux that can alter hard drive contents to plant things. When bringing your data back to the computer make sure you have antivirus with realtime protection and latest definitions running and fully scan it before opening any files or running any backed up programs. |
|