Author:
Mark Sanchez
Date Of Creation:
28 January 2021
Update Date:
1 July 2024
![Check if someone has used your computer, or you are being monitored while working remotely.](https://i.ytimg.com/vi/4k0nsXYfhI8/hqdefault.jpg)
Content
1 Disconnect your computer from the internet. Do this if you think someone else has access to it. Disconnect Ethernet cables and Wi-Fi connection.- The most obvious signs of active unauthorized access are moving the cursor, launching programs, or deleting files without your participation. However, not all pop-ups should alarm you - they also appear during the automatic update process of many programs.
- Slow internet connections or unfamiliar programs are not necessarily the result of unauthorized access.
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
- Windows: To see which files have recently been opened, press Windows + E to open File Explorer. At the bottom of the main panel, check "Recent Files" to see if there is anything among them that you did not open yourself. You can also see a list of recent documents at the top of the Start menu.
- Mac: Click the Apple menu in the upper left corner of your screen and select Recent. Then click Applications (for a list of recently used programs), Documents (for a list of files), or Servers (for a list of deleted outgoing connections).
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
- On Windows, press Ctrl + Shift + Esc.
- On Mac OS, open the Applications folder, double-click Utilities, and then double-click System Monitor.
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
- VNC, RealVNC, TightVNC, UltraVNC, LogMeIn, GoToMyPC, TeamViewer.
- Also look for unfamiliar or suspicious programs. If you do not know the purpose of this or that active process, find information about it on the Internet.
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
- If your computer does not have antivirus software, download the installer to another computer and copy it to your computer using a USB drive. Install antivirus and scan your system.
- One of the free and easy-to-use malware scanners for both Windows and Mac is Malwarebytes Anti-Malware. It can be downloaded from https://www.malwarebytes.com.
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
![](https://a.vvvvvv.in.ua/society/kak-sdelat-dekupazh.webp)
- When backing up your data, scan each file, because there is a risk that old files will lead to infection of the reinstalled system.
- Read this article for more information on how to reinstall your Windows or Mac OS system.
Part 2 of 2: Preventing Unauthorized Access
1 Configure automatic updates for your antivirus software. Modern antivirus detects malware before it gets on your computer. Windows comes with Windows Defender, which is a pretty good antivirus that runs and updates in the background. You can also download an excellent and free antivirus such as BitDefender, Avast! or AVG. Remember that only one anti-virus program can be installed on a computer.
- Read this article for more information on how to enable Windows Defender.
- Read this article for more information on how to install your antivirus software (in which case Windows Defender will turn off automatically).
2 Configure your firewall. Unless you own the server or run a remote access program, there is no need to keep ports open. Most programs that need open ports use UPnP, which means that ports are opened and closed as needed. Permanently open ports are the main vulnerability of the system.
- Read this article and then check if all ports are closed (unless you own the server).
3 Be careful with email attachments. They are the most popular way of spreading viruses and malware. Open attachments to letters from people you know, and even in this case, it is better to contact the sender and clarify whether he sent any attachments. If the sender's computer is infected, malware will be sent out without his knowledge.
4 Set strong passwords. Every secure account or program must have a unique and strong password. In this case, an attacker will not be able to use the password for one account to hack into another. Find information on the internet on how to use a password manager.
5 Do not use free Wi-Fi hotspots. Such networks are insecure because you cannot know if someone is monitoring your inbound and outbound traffic. By monitoring traffic, an attacker can gain access to the browser or more important processes. To keep your system safe while connected to the free wireless network, use a VPN service that encrypts traffic.
- Read this article for information on how to connect to a VPN service.
6 Be careful with programs downloaded from the Internet. Many free programs that can be found on the Internet include additional and often unnecessary software. Therefore, during the installation of any program, choose a custom installation to discard unnecessary software. Also, do not download "pirated" (unlicensed) software, because it may contain malicious code.
Tips
- Be aware that sometimes the computer may wake up itself to install updates. Many modern computers are set to automatically install updates, usually at night when the computer is not in use. If the computer seems to turn on by itself when you are not touching it, it is likely waking up to download updates.
- The likelihood that someone has gained remote access to your computer is there, but very small. You can take steps to prevent an invasion.