-
Look at the switch for anyone other than you's fingerprints.
-
Look at the process, if there is an illegal process, if there is, it may be invaded.
-
Hit the horse. Input: Run: Enter cmd
Then enter netstatbv
The name of the program corresponding to the port will be automatically listed, that is, what program opens the port.
If it is a port opened by the software installed in the program folder directory, it is generally safe, if it is a port opened by the programs in the windows directory, system32 directory, some temporary directories and other directories, and it is not a port opened by the system program such as the windows upgrade program, it is a suspicious port.
-
Look inside the process. Looks at malware. No one else should get into your computer. Killing the poison should be no problem.
-
You may have a problem with your keyboard.
There's a short circuit inside.
The shortcut keys are connected.
-
Generally, what enters your computer is, your administrator user, the password of this user is empty, and it is the administrator permission, he can log in with the administrator as long as he enters the security mode, and look at it casually!
If you don't want him to enter, then you should set a password for the administrator user.
Start - Settings - Control Panel - User Accounts. Then you set the password yourself. Add letters to numbers as much as possible.
Hope mine is helpful to you.
-
You can use 360 to check the Trojan horse.
-
How to view your computer usage history. 1. Sometimes, in order to prevent others from using their computers, we will set passwords.
However, sometimes when the computer does not have a password and wants to know whether someone has used our computer, then we can distinguish whether someone has been to our computer by the time period.
First of all, right-click on "My Computer" and you can see that there is an "Administration" and we click to enter it.
2. After entering another interface, we can see that there is an "Event Viewer", click to enter it, and then you can see the "Windows Log", click to enter and you can see the "System", according to this step, we find a ID for 6005 and 6006 numbers, that 6005 is the boot information and 6006 is the shutdown information.
-
Here are some signs that might indicate that your computer has been used:
Changes to files and folders: You may find that some files or folders have been moved, renamed, or deleted.
Installers: You may find that you have installed new apps or drivers that you may have never seen before.
Network connections: You may find that there are new network connections or devices connected to your computer.
System Logs: Check the Windows Event Viewer or other system logs to see if there is any suspicious activity.
If you suspect that your computer has been used, immediately change all sensitive information (such as passwords, bank accounts, etc.) and run antivirus software to scan your computer.
-
You can view it by looking at the power on and off records.
1. Open "My Computer", there are a lot of files in the windows directory of the C drive, and find a Schedlgu txt. It is a log of "scheduled tasks", which records the execution status of the computer's scheduled tasks, as well as the information of each boot of the Windows system.
2. Check the documentation.
Start My Recent Documents, you can see what documents you have watched recently, what movies you have watched, **.
3. Check your Internet records.
As long as you browse any** with IE browser, a record will be automatically kept in the Windows History folder, and the latest 99 days can record all the operation process, including what you have been to**, what you have seen**, what files you have opened, and other information.
-
Just install a camera in the back of your computer.
There are several signs that your electro-finger script is being controlled remotely: >>>More
Hello friends, you want to know that others see you, so what about you find that others like you? Well, what about leaving you a message, isn't this all about you who can be seen? Because your circle of friends must be good friends, as soon as you send it out, all the people in your circle of friends should be able to see it, I have to give you likes and speak, some of them don't comment well, but they can see it.
Hello!! First love is the best!! I feel like he wouldn't be able to avoid it if you asked him something about the girl he had his first love. >>>More
**It's not to see if you have talent, it's to see if you're willing to work hard, there are generally two kinds of people, one is a normal person, the other is a sound idiot, the sound idiot is the lack of DNA or the loss of the tone of this part, so how to sing can not be sung, generally normal people can hum the tune after listening to the song once or several times, but some people have not mastered the method of singing. Take your time! But the music idiot can't sing it himself.,If you're not sure.,You can ask a friend to help you listen.。。。
The passive deceleration of the road has:
Ice Eye (Extreme Magic Ball x2 + Poison Orb + Essence Orb) uses the slow effect for 5 seconds in melee combat, and uses the slow effect for 3 seconds in range, all of which reduce the enemy's movement speed by 30%. >>>More