How to prevent others from spying on their screens with their computers

Updated on technology 2024-02-27
16 answers
  1. Anonymous users2024-02-06

    XP is the last one inside the right click on my computer and the first hook is removed!

  2. Anonymous users2024-02-05

    There are a lot of things to talk about computer security, the most basic thing is to see if there is a Trojan horse, if it is in an Internet café to see if there is a running r server process.

  3. Anonymous users2024-02-04

    Method steps.

    1. The first step is to turn on the setting to not allow others to remotely access your computer.

    2. The second step, if you meet a master, you can also be remote under the premise of not allowing remote, and another trick is to change the remote port number of your computer, and everyone knows that the remote port of the desktop is 3389, and you can change 3389 to as many as you want, so that others will not know your port number, open the registry and enter the corresponding path to change the port.

    4. The fourth step is to turn on the corresponding protection function with the help of third-party software and computer manager.

    5. The fifth step, after turning on a variety of defenses that are difficult for others to attack or monitor, remind that if you don't usually use a camera, you can put a sticker on it. It's still effective.

  4. Anonymous users2024-02-03

    First: Generally, personal computers have less important information, and powerful hackers generally do not patronize them, of course, there is also the possibility of being used by novice hackers to try their hands, or the possibility of being used as a broiler.

    Second: the system security is not high, it is easy to be remotely monitored by hackers, mainly some rookie hackers, because if the really master-level hackers generally do not care about ordinary personal computers. When the computer is hit by a Trojan horse or virus (such as the gray pigeon Trojan), it is equivalent to being opened by the other party.

  5. Anonymous users2024-02-02

    You look at something that she is not interested in, and she likes whoever asks you to watch it!! Wow Kaka!!

  6. Anonymous users2024-02-01

    Computer 1Install a firewall and don't let unfamiliar and non-system software access the network.

    3.Install anti-virus software, upgrade it in time, and ensure that you can use anti-virus software to kill your computer within a certain period of time.

    2.Don't just get on those messy **s***s.

    Broiler chickens are called broiler ...... only because they are controlled by "hackers".

    Do the above points, basically there is no problem Firewall can not be less, the software should also be updated, but I think it is like people who don't understand the computer better not to leave the computer on at night, one is for security can let the computer shut down at night and rest (everyone knows to rest, why torture the computer).

    Second, it is best to set a password when you enter the page (if you don't have a password, people can enter directly, and some firewalls don't work).

    If you don't care about the money, you can turn on the computer for a week, if you go to sleep, even if the computer is connected, you won't have any movement, he is dead, but the person is alive. Don't hang up for a long time just to upgrade, then you're most likely to use hackers as a broiler, and your computer problems will continue to occur over time. I hope to adopt.

  7. Anonymous users2024-01-31

    Learn to prevent others from peeking at your computer and logging into your computer.

  8. Anonymous users2024-01-30

    I don't want people to monitor. I'm afraid it's not easy to see. To put it simply, as long as Microsoft wants to, he can record what you do.

    If you are being monitored by a colleague at work, you can first find out what monitoring software you can use from your computer. An easier way to eliminate surveillance and cut off the network.

  9. Anonymous users2024-01-29

    Disable the guest account and add the password to the existing account! Normally, amateur rookies don't have access to your computer!

  10. Anonymous users2024-01-28

    If someone else installs monitoring software on your computer, they will naturally be able to monitor you, not viruses or anything, such as those Limbo clients and the like.

    If this is the case, you can use the Prayaya V3 virtual system, when you open this v3, the monitoring software will not be able to monitor you, the screen it displays will become completely black, you can try it.

  11. Anonymous users2024-01-27

    The software that monitors others is not called a virus,Another question is,Which type do you want to monitor?,Do you want to see someone else's desktop or see if he is surfing the Internet,Or do you have control over his TV。

    If it's the first and third you can try NSW, and if it's the second you can try the Red Spider.

  12. Anonymous users2024-01-26

    First: Generally, personal computers have less important information, and powerful hackers generally do not patronize them, of course, there is also the possibility of being used by novice hackers to try their hands, or the possibility of being used as a broiler.

    Second: the system security is not high, it is easy to be remotely monitored by hackers, mainly some rookie hackers, because if the really master-level hackers generally do not care about ordinary personal computers.

    When the computer is hit by a Trojan horse or virus (such as the gray pigeon Trojan), it is equivalent to being opened by the other party.

    Third: Prevent hackers from remote monitoring methods:

    1. First for the first two answers: you use the shadow system, it can only be said that the system returns to the state when the shadow system is installed after each restart, if you have been hit by the remote monitoring Trojan when installing the shadow system, it will always be remotely monitored by the other party And there is no guarantee that you will be implanted with a Trojan horse when you use it and there are still a series of problems in the shadow system

    2. How to prevent hacker intrusion:

    Improve system security as much as possible: (1) Install anti-virus software, recommended: McAfee, Kaba, Norton, Kingsoft, etc. (McAfee Enterprise Edition can be upgraded for free), and install a network firewall.

    2) Close the unused ports and minimize the ports commonly used by some common Trojans. If it's a local area network, it's best to turn off system sharing. ~

    3) Upgrade system security patches in a timely manner to reduce system security vulnerabilities.

    4) When installing the software, try to use the green non-plug-in version, you can use some security software such as 360 security guard, Rising card assistant, etc., McAfee has a powerful system monitoring function, and can also defend against some plug-ins

    Security is not absolute, it's relative! ~

  13. Anonymous users2024-01-25

    Disable guest and add the existing password! Normally, amateur rookies don't have access to your computer!

  14. Anonymous users2024-01-24

    Generally, no, although a network cable is used, the system is two independent systems. This is just like Internet cafes, community broadband, campus networks and other users. For personal security, it is recommended to change the name of the administrator account and add a password that should not be cracked.

    Then disable any other accounts; Turn off all sharing and prohibit remote services; Close sensitive ports and install firewalls. Finally, make a backup of your system to restore, and if it doesn't feel very good, restore it directly.

  15. Anonymous users2024-01-23

    You see if your user guest is not disabled.

  16. Anonymous users2024-01-22

    If you're installing WindowsXP, it's much simpler. Bring a fire wall of your own. Remember to turn on automatic upgrade and start on it. That's what I did. It's safe. Rest assured. Frequent updates are fine...

Related questions
5 answers2024-02-27

360TimeProtect time protection tool.

Thanks to MJ0011 for delivery. >>>More

5 answers2024-02-27

I would like to ask, is there any software that can view the password of the computer administrator under the USB flash drive PE system! It's okay to change and clear! I'm just looking for software that doesn't break the password of the computer and can view the password! >>>More

7 answers2024-02-27

DO NOT shut down for too long.

14 answers2024-02-27

Right-click on the online neighbor and select 'Properties', then right-click "Local Connection" with the mouse, select Properties, and check "File and printer sharing on the Microsoft network" in the pop-up dialog box. No one else will be able to see your computer name! "QoS Packet Scheduler"You don't have to tick it, or you won't be able to see someone else's computer. >>>More

13 answers2024-02-27

The motherboard battery is dead, there is no memory function, this is the same as some mobile phones, some mobile phone chips have memory function, even if the electric board is removed, shut down, and the time to turn on again is still accurate, just change the button battery, generally that's it, no problem