English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

I'm a vocational rehab client and as a college student was provided a computer to use in my dorm. How can I tell if they've installed any methods of monitoring my computer? If they have, how can I disable it?

2006-10-08 12:28:35 · 6 answers · asked by Robert E 1 in Computers & Internet Security

6 answers

go to www.download.com and get a keylogger remover...but if you removed or disable this feature you will surely be found out and will probably have the computer confiscated.

2006-10-08 12:31:52 · answer #1 · answered by Anonymous · 1 0

Who Is Monitoring My Computer

2016-12-17 15:50:00 · answer #2 · answered by ditchfield 4 · 0 0

What you are concern about is what is commonly called "keyloggers." Unfortunately, it is hard to explain. You need some background on network security. But, let me give it a try. Download and install AVG Anti-Spyware 7.5 (http://www.ewido.net/en/). Despite its name, AVG anti-spyware is an excellent scanner for finding Trojan horses and kegloggers. First, install it and then update it. When you are done, run a scan on your computer. Quarantine any suspicious files. Now, that is the easy stuff. It gets a little more complicated from here.

In Windows, press Ctrl+Alt+Delete and it will bring up the task manager. A new window will appear, choose the second tab from the left labeled "Processes" tab. You will see a list of all active processes running on your computer. This is the hard part. If you aren't familiar with valid processes then it would be difficult for you to recognize the invalid processes. However, you can use the Process Library (http://www.processlibrary.com/). The Process Library is an online reference guide for all processes. In the search box, enter the name of a process and it will tell you if it is a valid process or if it is malicious. It does a pretty good job of identifying keyloggers and other forms of monitoring.

Someone mentioned reviewing your startup programs and looking at the incoming and outgoing Internet traffic via your firewall. The "msconfig" is a good idea. It will list all the startup programs. You can check these programs against Castlecops' list of startup programs (http://www.castlecops.com/modules.php?name=StartupList). Castlecops is a great resource for checking if a startup program is genuine or malicious. On their website, enter the name of any startup programs on your computer and search the database. Be sure to read the instructions first before searching.

As for monitoring Internet traffic via your firewall, it is very hard to explain. It is a good idea but you need some background. However, if you are a glutton for punishment, you can send me an e-mail and I will try my best at explaining it.

For more info about detecting and stopping unwanted monitoring, go to Eric Howes website: http://www.spywarewarrior.com/uiuc/main.htm

In particular, look over at the "snopping countermeasure" section at:

http://www.spywarewarrior.com/uiuc/soft16a.htm

Eric Howe is a computer security guru. Best of luck.

2006-10-08 13:50:31 · answer #3 · answered by What the...?!? 6 · 9 0

In Windows if someone connects to you remotely, you'll get logged out.

2016-03-18 06:37:38 · answer #4 · answered by Anonymous · 0 0

goto start>run , type in cmd...then type in netstat -a and you'll see who is connected to your pc. you can also goto start> run> and type in msconfig and hit ok, then click on the startup tab at the top and you can see what programs start up when the computer turns on. google the unsure ones and see whats up.also get a firewall to see what applications on computer are trying to access the internet, you can tthen once again google them and see what they are.

2006-10-08 12:59:15 · answer #5 · answered by Anonymous · 2 0

i dont know how you cantell, all i know is that by doing a Full system recovery you can delete everything in your computer. including whatever software he has installed in the computer.

2006-10-08 12:32:58 · answer #6 · answered by Furtive7 1 · 2 0

fedest.com, questions and answers