What is the solution for my German computer being monitored by unknown software?

Updated on healthy 2024-05-05
12 answers
  1. Anonymous users2024-02-09

    The following points should be paid attention to in the process of computer use: First; Try not to use pirated or unknown software. Second; Back up hard drive pilots and master boot sector data, and back up important data frequently.

    Third; Make it a good habit to check your hard drive and every foreign disk with antivirus software. Fourth; Antivirus software should be updated regularly, preferably at intervals of no more than a week. Fifth; Real-time monitoring antivirus software is installed, but it's not a one-and-done solution, as antivirus software doesn't work against all viruses, and viruses update quickly.

    Sixth; Pay attention to all kinds of abnormal phenomena on the computer at any time, and once found, you should immediately check it carefully with antivirus software. Antivirus software is an effective tool to prevent virus infection, and you should try to have as many sets of antivirus software as possible, because each antivirus software has its own characteristics. Seventh; Some viruses are transmitted primarily through e-mail and are known as "mail viruses".

    They are usually spread through the entrainment of "attachments" in emails, and if you run a virus program in that attachment, you can infect your computer. So, don't easily open the attached file in a letter from a stranger. It is recommended that you better kill the virus in safe mode, when restarting the computer, press and hold F8 to enter the safe mode of the computer, the following is the free version, pay attention to upgrade the virus database of the antivirus software in time.

    Defendio adds a large number of new threats to quickly kill Trojan software, Chinese Simplified Green Free Edition. Trojan Killer 2008 build 0801 Trojan Killer Trojan Tool, can detect and kill 8122 kinds of international Trojans, 1053 kinds of password stealing Trojans, guaranteed to kill legendary password stealing Trojans, OICQ parasitic Trojans, glacial file association Trojans, password solving, miracle shooters and other game password mailing Trojans, built-in Trojan firewall, any hacker program trying to send password emails, need iparmor confirmation, not only to kill Trojans, but also to check the hacker password. **Address:

    Security Software Zone

  2. Anonymous users2024-02-08

    Generally, the graphics card is incompatible or the graphics card driver is incomplete.

  3. Anonymous users2024-02-07

    Broilers are more likely.

    Solution: Back up your important files, then repartition and format them, and then reinstall the system.

    Of course, one antivirus software is installed, and one firewall is installed. Hehe.

    Hope it helps.

  4. Anonymous users2024-02-06

    It should be a secret for people to know, reinstall the computer, format all the disks. Then the QQ password was changed. But it doesn't have to be your computer being monitored, or maybe the person you're chatting with is the same person as the person monitoring you.

  5. Anonymous users2024-02-05

    Generally, you can't scan it with the security guard Trojan If it's okay, then it must be your QQ password that others know The chat history of QQ members can roam and can be seen even if it's not on your computer.

  6. Anonymous users2024-02-04

    It's best to uninstall QQ and reinstall it, and if it doesn't work, reinstall the system.

  7. Anonymous users2024-02-03

    Reinstall the system and simply remove QQ is not possible.

    You're already someone else's broiler.

  8. Anonymous users2024-02-02

    First of all, to correct your notion, "He knows what I'm doing" is basically impossible, especially in the case of "I've tried reinstalling the system", why do you say that?

    First of all, there are two types of hacker monitoring, one is to listen to the data transmitted by your computer's network, and then judge your current operation according to the data flow of the interception, and the other is to implant a server on your computer, which constantly monitors the changes in your computer files, screens, processes, keyboard and mouse operations to record your behavior, and then sends the monitored data to his client through the network to view.

    Analysis: The possibility of the second is relatively small, because you said, you reinstalled the system, or useless, I don't know how you judge that you are being monitored, generally speaking, high-tech hackers disdain and will not do this kind of thing, and high-tech will not be discovered by you, low-tech hackers make Trojans and monitoring programs are generally residential, non-killing and concealed are not strong, easy to be killed by antivirus software, and generally reinstall the system is gone.

    The first possibility, you see if your network is connected to the Internet through the LAN, if you are a company or everyone shares the LAN network, and only you are monitored, then the person who monitors you is likely to be in your LAN, because the LAN you are in is a whole for the external network, others through software monitoring is to monitor your entire LAN, only in the LAN can you lock your computer monitoring. This kind of monitoring is generally software, the software cost is low, it may also be hardware, network behavior control and the like, through your connection, data flow, port to judge your behavior, generally through the capture of packets to obtain, you use the ping command to test, see when there is high latency, packet loss and other phenomena to know, this kind of monitoring if it is through IP locking. Then you can change the IP, it has nothing to do with the anti-virus system, if it is locked through the MAC, you can also change the MAC, but if he is the IP range formulated, then you have no way, only to find him himself.

  9. Anonymous users2024-02-01

    He monitors your IP address, you format the computer hard drive, then reinstall the system, and install a firewall.

  10. Anonymous users2024-01-31

    As the saying goes, evil is invincible, you can unplug the network cable, and you can be sad.

  11. Anonymous users2024-01-30

    The board driver is incorrect, or the software version is incorrect, so the software cannot read the data stream on the board, and of course the image cannot be produced.

    Solution, install the driver first, check the hardware properties, and see if there is still a "? No.

  12. Anonymous users2024-01-29

    If the camera is occupied by another program, delete the folder of the original software.

Related questions
8 answers2024-05-05

Replace all account passwords from the system. First of all, when installing the system, click del to enter the DLOS interface. (Click on the first line on the right,I can't remember the specific English name.,It's to restore the DLOS to the original state.,Then press F10 to save.,And then it's okay to install the system) to put all the hard disk grids.,All from the installation.,It's going to be fine.,Supplementally,Your computer is a kind of Trojan.,All programs that can be forcibly opened。

13 answers2024-05-05

For individuals, if you want to avoid computer monitoring, you can check it in the following two ways: >>>More

13 answers2024-05-05

There is no need for you to return a tooth for a tooth, an eye for an eye, and pour urine on the door of the neighbor's house, which will inevitably increase the hatred between the two families, and the conflict will escalate. You can explain the situation to your neighbors and ask them not to pee at your doorstep, because there is ** as evidence, and the neighbors can only admit their mistakes to you, and this situation will not occur in the future. Neighbors should live in harmony with each other, which is the foundation for creating a harmonious society.

3 answers2024-05-05

You can try to kill in safe mode, so that the cleanup is cleaner. >>>More

7 answers2024-05-05

It is because the text encoding of these software conflicts with the text encoding used by the system, so the system cannot display it correctly. >>>More