A Hacker is using my computer?
Sometimes, I get this message when I shut down my computer: "other people are registered on this computer. Close window can cause the loss of data... "No one else using my computer I know... Is it possible that a hacker had access to my computer?
An analysis deep run local tech before I contacted you. Another run through MaCaffe to double check found more wasted software. Except that this is personal computer, but I started to disconnect before closing because there her husband as a user too. Will let you know if the pop message yet :-) Thank you to be so fast! Donna
Multiple users - probably the cause.
Personal opinion: Drop McAfee soon. Get something more reliable and less hungry for resources.
Insofar as the system - maintenance/cleaning, I'd pay more technology:
Search for malware:
Download, install, execute, update and perform analyses complete system with the two following applications:
Remove anything they find. Reboot when necessary. (You can uninstall one or both when finished.)
Search online with eSet Online Scanner.
The less you have to run all the time, most things you want to run will perform:
Use Autoruns to understand this all starts when your computer's / when you log in. Look for whatever it is you do not know usingGoogle (or ask here.) You can hopefully figure out if there are things from when your computer does (or connect) you don't not need and then configure them (through their own built-in mechanisms is the preferred method) so they do not - start using your resources without reason.
You can download and use Process Explorer to see exactly what is taking your time processor/CPU and memory. This can help you to identify applications that you might want to consider alternatives for and get rid of all together.
Do a house cleaning and the dust of this hard drive:
You can free up disk space (will also help get rid of the things that you do not use) through the following steps:
Windows XP should take between 4.5 and 9 GB * with * an Office suite, editing Photo software, alternative Internet browser (s), various Internet plugins and a host of other things installed.
If you are comfortable with the stability of your system, you can delete the uninstall of patches which has installed Windows XP...
http://www3.TELUS.NET/dandemar/spack.htm
(Especially of interest here - #4)
(Variant: http://www.dougknox.com/xp/utils/xp_hotfix_backup.htm )
You can run disk - integrated into Windows XP - cleanup to erase everything except your last restore point and yet more 'free '... files cleaning
How to use disk cleanup
http://support.Microsoft.com/kb/310312
You can disable hibernation if it is enabled and you do not...
When you Hibernate your computer, Windows saves the contents of the system memory in the hiberfil.sys file. As a result, the size of the hiberfil.sys file will always be equal to the amount of physical memory in your system. If you don't use the Hibernate feature and want to reclaim the space used by Windows for the hiberfil.sys file, perform the following steps:
-Start the Control Panel Power Options applet (go to start, settings, Control Panel, and then click Power Options).
-Select the Hibernate tab, uncheck "Activate the hibernation", and then click OK. Although you might think otherwise, selecting never under "Hibernate" option on the power management tab does not delete the hiberfil.sys file.
-Windows remove the "Hibernate" option on the power management tab and delete the hiberfil.sys file.
You can control the amount of space your system restore can use...
1. Click Start, right click my computer and then click Properties.
2. click on the System Restore tab.
3. highlight one of your readers (or C: If you only) and click on the button "settings".
4 change the percentage of disk space you want to allow... I suggest moving the slider until you have about 1 GB (1024 MB or close to that...)
5. click on OK. Then click OK again.
You can control the amount of space used may or may not temporary Internet files...
Empty the temporary Internet files and reduce the size, that it stores a size between 64 MB and 128 MB...
-Open a copy of Microsoft Internet Explorer.
-Select TOOLS - Internet Options.
-On the general tab in the section 'Temporary Internet files', follow these steps:
-Click on 'Delete the Cookies' (click OK)
-Click on "Settings" and change the "amount of disk space to use: ' something between 64 MB and 128 MB. (There may be many more now.)
-Click OK.
-Click on 'Delete files', then select "Delete all offline content" (the box), and then click OK. (If you had a LOT, it can take 2 to 10 minutes or more).
-Once it's done, click OK, close Internet Explorer, open Internet Explorer.
You can use an application that scans your system for the log files and temporary files and use it to get rid of those who:
CCleaner (free!)
http://www.CCleaner.com/
(just disk cleanup - do not play with the part of the registry for the moment)
Other ways to free up space...
SequoiaView
http://www.win.Tue.nl/SequoiaView/
JDiskReport
http://www.jgoodies.com/freeware/JDiskReport/
Those who can help you discover visually where all space is used. Then, you can determine what to do.
After that - you want to check any physical errors and fix everything for efficient access"
CHKDSK
How to scan your disks for errors* will take time and a reboot.
Defragment
How to defragment your hard drives* will take time
Cleaning the components of update on your Windows XP computer
It is a good idea at this time to ensure that you continue to get the updates you need. This will help you ensure that your system update is ready to do it for you.
Download and run the MSRT tool manually:
http://www.Microsoft.com/security/malwareremove/default.mspx
(Ignore the details and download the tool to download and save to your desktop, run it.)
Reset.
Download/install the latest program Windows installation (for your operating system):
(Windows XP 32-bit: WindowsXP-KB942288-v3 - x 86 .exe )
(Download and save it to your desktop, run it.)
Reset.
and...
Download the latest version of Windows Update (x 86) agent here:
http://go.Microsoft.com/fwlink/?LinkId=91237
... and save it to the root of your C:\ drive. After you register on theroot of the C:\ drive, follow these steps:
Close all Internet Explorer Windows and other applications.
AutoScan--> RUN and type:
%SystemDrive%\windowsupdateagent30-x86.exe /WUFORCE
--> Click OK.
(If asked, select 'Run'). --> Click on NEXT--> select 'I agree' and click NEXT--> where he completed the installation, click "Finish"...
Reset.
Now reset your Windows with this FixIt components update (you * NOT * use the version aggressive, if requested):
How to reset the Windows Update components?
Reset.
Now that your system is generally free of malicious software (assuming you have an AntiVirus application), you've cleaned the "additional applications" that could be running and picking up your precious memory and the processor, you have authorized out of valuable and makes disk space as there are no problems with the drive itself and your Windows Update components are updates and should work fine - it is only only one other thing youpouvez wish to make:
Get and install the hardware device last drivers for your system hardware/system manufacturers support and/or download web site.
If you want, come back and let us know a bit more information on your system - particularly the brand / model of the system, you have - and maybe someone here can guide you to the place s x of law to this end. This isn't 100% necessary - but I'd be willing to bet that you would gain some performance and features in making this part.
Tags: Windows
Similar Questions
-
I COULDN'T HAVE MY IMPORTANT EMAILS. THIS PERSON HAS CHANGED SOME OF MY PASSWORDS ON SOME PROGRAMS. I HAD TO GET NEW PASSWORDS FOR MY BANK, FACEBOOK AND SOME OTHER ACCOUNTS.
Original title: I discovered that someone from another computer hacking or using the information available to me. THEIR IP ADDRESS IS 200.1.27.75. HOW CAN I REPORT THEM?
Hi Johnny,
. What operating system is installed on your computer?
What version of the operating system Windows am I running? :
Many computers users be prey to pirates and the crimes they commit on companies and unsuspecting individuals. In the case of crime in your home or business, it is not difficult to report the hacker.
a. determine which agency has jurisdiction over the crime. It depends on if the crime was committed at home or at your company and the address of that particular place. If you live within the city limits, the appropriate agency will usually be your city police service. If you live outside the city, in the County limits, contact your local sheriff's office.
b. call the non-emergency number for your local police department or the Sheriff's Office to report the crime. Ask to speak to someone in the division of the detective into a crime of Internet.
c. a hacker report online through the Internet Crime Complaint Center (IC3). Strive to work directly with your local agency before declaring online.
d. to request the opinion of the Agency where you reported the crime. Ask what are the procedures they recommend to protect your computer from future attempts of hacking. Ask the Agency studying your crime to provide documentation in support of your case.
I hope this helps.
-
Can I charge my iPod Shuffle 4th Gen with a wall charger or do I need to use a computer?
Can I charge my iPod Shuffle 4th Gen with a wall charger or do I need to use a computer?
You can use a wall charger. The following, for example, shows in the section compatibility as being compatible with the iPod Shuffle 4th generation: http://www.apple.com/shop/product/MD810LL/A/apple-5w-usb-power-adapter?fnode=0a8 96cef6682809aaf80e8c3741f09ed6d7df9585e7fc21bb39381e2a99a7f56b6f149e5ab72d8416a9 bfa670e36cc43168558b8b8c033b881948c1230b7156cbe51af44f7fd2b9ab533d7cb453e844ccd1 80b8e71aa7359ff2698b40de39b3b
The foregoing generally comes with iPhones, but if you have a charger which comes with an iPad, which can also be used with the Shuffle: http://www.apple.com/shop/product/MD836LL/A/apple-12w-usb-power-adapter?fnode=0a 896cef6682809aaf80e8c3741f09ed6d7df9585e7fc21bb39381e2a99a7f56b6f149e5ab72d8416a 9bfa670e36cc43168558b8b8c033b881948c1230b7156cbe51af44f7fd2b9ab533d7cb453e844ccd 180b8e71aa7359ff2698b40de39b3b
-
My email has been hacked and used to send Spam. I have to perform a virus check, or simply change the password?
Do not install or run an anti virus app.
How do you know that your email has been "hacked"? It is a common practice for spammers to forge an envoy from the e-mail address. It may be that your email address has been misused. There's nothing to do if this is the case for you. The spammer will soon pass and usurp another email address.
It's a good idea to immediately change your password by email if someone would actually managed to access your e-mail account.
-
At the launch of Thunderbird, how can I set a password that prevents viewing of my emails if someone uses my computer?
100% this addons can help you
https://addons.Mozilla.org/en-us/Thunderbird/addon/master-password/Look at my Thunderbird when I open
-
Is it possible to erase a paired since your iPhone device using a computer?
I broke my iPhone 5 c a couple of weeks - the damage was so great that I am more able to access anything whatsoever on this device. I bought a new phone (iPhone OS) shortly after. Unfortunately, my wireless headset is always connected to the 5 c. For this reason, the headset will not connect to my self. Still, there is no way to use my old phone - the internal display is completely damaged. I would like to avoid contracting the fixed 5 c in order to access the parameters that make it possible to disconnect myself from my helmet. I have a macbook. Is it possible that I can use my computer to unplug the headphones wireless from my old phone?
I don't see why you can pair the headset with the new SE while leaving the 5 c as it is. The helmet must be able to pair at a time. Try this pairing to the SE: Set to install and to use the third-party Bluetooth - Apple Support Accessories
-
I don't remember set up sync ACCT. But am not computer savvy (can get). Check Sync and discovered an acct is set, but not with my email. My friend used my computer and I don't know if she wanted to do, but now ACCT. is his email, and I would like to change this, but am afraid to delete all data and make a slurry of something already messed up.
Use: Tools > Options > synchronization > ungroup this device
-
I received this error "your account is configured to prevent you from using this computer. Please try another computer.
My question is what would cause the Security Protocol to get there? Also, what would cause the computer to think another network cable was plugged into it, despite nothing being connected to the computer.
Very confused...
Moved from the community involvement Center
Hello Aiden,
This error message can occur when the computer has been infected by the virus or if the user account is damaged. Or when your device is recognized is not like the device of 'trust '.
To resolve this problem, check the steps described in this article on: setting up your account
You can also view the responses provided by Diana D on the same concern at this link
So now this work, please provide us with the following information:
- When you try to access your account, PC or on a mobile device?
- Have you put in place your account on a particular computer and device security settings and tried to connect on another?
- Are you trying to connect to Outlook.com or on the Outlook Application?
This will identify the cause of this scenario.
Visit us for your answer.
-
I can't let other user clients use my computer, it starts and then they disconnect. The only access is administration account thecomputeris a toshiba satellite laptop computer
Hi Charles,
To help you better, more details on the issue:
1 is connected to the domain of the computer?
2. what type of network you set up?
Please post back with more details, so that we could provide assistance on the issue.
-
A cleaner PC interrupts my programs whenever I use my computer
Original title: network adapter wireless network Ethernet NIC device
PC cleaners interrupted my programs whenever I use my computer... they are not wanted, nor have they been invited to. How can that I get RID of them?
Please advice Me.
Hello
PC Cleaner and PC Cleaner Pro are malicious software and must be eliminated.
How to remove PC Cleaner<- check="" the="" removal="" methods="" here="" however="" be="" aware="">->
malicious software can turn so it's maybe not accurate.
http://www.ehow.com/how_5003975_remove-PC-cleaner.htmlPCclean - also check the methods of hair removal here
http://www.Symantec.com/security_response/writeup.jsp?docid=2008-032714-2234-99&tabid=2--------------------------------------------------------------------------------------------------------------------------
This tool troubleshooting for Windows 7 - Vista is very similar - use XP RUN instead of start.
SearchIf you need search malware here's my recommendations - they will allow you to
scrutiny and the withdrawal without ending up with a load of spyware programs running
resident who can cause as many questions as the malware and may be harder to detect as
the cause.No one program cannot be used to detect and remove any malware. Added that often easy
to detect malicious software often comes with a much harder to detect and remove the payload. Then
its best to be thorough than paying the high price later now too. Check with them to one
extreme overkill point and then run the cleaning only when you are sure that the system is clean.It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
the regular windows when you can.TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
It will display all the infections in the report after you run - if it will not run changed the name of
TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
check with the other methods below.
http://support.Kaspersky.com/viruses/solutions?QID=208280684Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
(If Rootkits run UnHackMe)Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
Malwarebytes - free
http://www.Malwarebytes.org/products/malwarebytes_freeSuperAntiSpyware Portable Scanner - free
http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGERun the malware removal tool from Microsoft
Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.
You should get this tool and its updates via Windows updates - if necessary, you can
Download it here.Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
(Then run MRT as shown above.)Microsoft Malicious - 32-bit removal tool
http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=enMicrosoft Malicious removal tool - 64 bit
http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=enalso install Prevx to be sure that it is all gone.
Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
here or use Google to see how to remove.
http://www.prevx.com/ <-->-->
http://info.prevx.com/downloadcsi.asp?prevx=Y <-->-->Choice of PCmag editor - Prevx-
http://www.PCMag.com/Article2/0, 2817,2346862,00.aspTry the demo version of Hitman Pro:
Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
(viruses, Trojans, rootkits, etc.). who infected your computer despite safe
what you have done (such as antivirus, firewall, etc.).
http://www.SurfRight.nl/en/hitmanpro--------------------------------------------------------
If necessary here are some free online scanners to help the
http://www.eset.com/onlinescan/
-----------------------------------
Original version is now replaced by the Microsoft Safety Scanner
http://OneCare.live.com/site/en-us/default.htmMicrosoft safety scanner
http://www.Microsoft.com/security/scanner/en-us/default.aspx----------------------------------
http://www.Kaspersky.com/virusscanner
Other tests free online
http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1--------------------------------------------------------
After the removal of malicious programs:
Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
system files.Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN
Enter this at the command prompt - sfc/scannow
How to fix the system files of Windows 7 with the System File Checker
http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.htmlHow to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
generates in Windows Vista cbs.log
http://support.Microsoft.com/kb/928228Also run CheckDisk, so we cannot exclude as much as possible of the corruption.
How to run check disk in Windows 7
http://www.SevenForums.com/tutorials/433-disk-check.html-----------------------------------------------------------------------
If we find Rootkits use this thread and other suggestions. (Run UnHackMe)
======================================
If necessary AFTER you are sure that the machine is clean of any malware. (DO NOT USE IF)
MALWARE IS STILL PRESENT).How to do a repair installation to repair Windows 7
http://www.SevenForums.com/tutorials/3413-repair-install.html=======================================
For extreme cases:
This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
uses aggressive methods to detect these threats, there is a risk that it can select some
legitimate programs for removal. You should use this tool very carefully and only after
you have exhausted other options.
http://us.Norton.com/support/DIY/index.jsp================================
If you are in North America, you can call 866-727-2338 for virus and spyware help
infections. See http://www.microsoft.com/protect/support/default.mspx for more details. For
international information, see your subsidiary local Support site.Microsoft support - Virus and Security Solution Center
http://support.Microsoft.com/contactus/cu_sc_virsec_master?ws=support#TAB0I hope this helps.
Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle="" -="" mark="" twain="" said="" it="">->
-
I've e-mailed photo now I can't use the computer! What should I do now?
What I've done wrong? Cannot use the computer? Computer says error! What is the future. ?
I turned everything off and re started, seems ok, but I'll try and sent pictures of different e-mail.
Thank you
-
I think someone is using my computer without my permission
original title: anomaly
I think someone used my computer without my permission, how can I check to see what e-mail and facebook accounts were consulted on my machine.
You can check your browser history and cookies folders and look at the changed date / date of consultation: time.
John
-
I am trying to download an application on my cable company, but it won't be over because my computer 'administrator' will not allow him. How to solve this. I'm the only person using the computer.
Start > run > control userpasswords2 > OK
will take you to what you need to access and change permissions for logon not required
On the users tab uncheck users must enter a user name and password to use this computer
other options are available to facilitate access
If a default administrator password has been entered it would probably be adminpass or empty field
In both cases, it would be entered twice or white field, then move the cursor to confirm the blank
as non-existent password then confirm white... you see an empty field is itself a password.
-
With the HUP, you can use your computer as
a fax. but I have a wireless printer? should I still dial if I use my computer as a fax machine.
Hello
Yes, you would need a phone connection to use the fax machine.
Check out these articles:
How to send a fax in Windows XP
http://support.Microsoft.com/kb/306657
Use your computer to print, scan, faxhttp://Windows.Microsoft.com/en-us/Windows-XP/help/Setup/print-scan-fax
-
What are the solutions for remote use unauthorized computer via a virtual private network?
Dell Dimension E310. Windows XP. Professional. "Media Center". 5 years old. Stand alone computer. Unsolicited 'demand' come across the screen for remote access. Wallpaper, next to the clock, someone downloading of graphics file "Accelerator" without authorization. Called internet provider. They claim that they do not deal with the configuration of the virtual private network. Tech said there is more than one device connected to my computer!
I went to "Computer management" and delete all except myself as a user and the administrator. Obviously, too late as a person UNKNOWN has defined itself as "NT Authority\Authenticated Users". Locked computer: would not recognize my password.
Formatted drive / reinstalled windows. Able to use the computer for "allocation of 7 days; my computer then froze again. AT and T Tech indicates that UNKNOWN use of my computer and no recourse. Are there solutions to the unauthorized use?Hello
I suggest you post your question Forums Technet for assistance on this issue.
Windows XP Service Pack 3 (SP3)
http://social.technet.Microsoft.com/forums/en-us/itproxpsp/threads
Maybe you are looking for
-
iBook want to put an internet connection - internet last was microsofts 5.1
I have an iBook G3 Power PC - version 10.0.3 processor build4P13. The last time that I was able to get on Internet Exploer Version 5.1b1 (5502) says that it is compatible with mozilla 4.0... How do I get Mozilla 4.0 on the computer without internet c
-
Need a car for Satellite 1800 adapter
Hello. I live in the Denmark and we hope you excuse that English is not my first language; 0) I have a Satellite 1800 and so far used two batterys. I hope to use a car battery, because I want to use in the car (smalle homebuild AccueilTarifs). Accord
-
Overload CPU display with waveform graph
My sample code (yahoo.vi) presents the 2D DBL in size of 30, 000 * 2 table. Whenever the 2D table was displayed with waveform graph, I found there were big delay (around seconds) by CPU overhead but the time was very short. Once this has happened, th
-
Table of waveform and digital signal 2
Hello I need to see 2 or more digital graphic USB6008 of waveform input signal, but each signal must be different offset, it is possible?
-
Need to install Service pack 3 for Vista to download my Zune player
Just need to install Service pack 3 for Vista to complete my download to my Zune Player... Thank you LEA Shauna Toenniges