If important information is stored on the hard disk of your computer, then you need to protect your data from the attacks of hackers. In recent years, there has been an increase in the use of spyware, transmitting to its owner all typed texts, including passwords and bank account details.
It is necessary
- - a computer with antivirus software installed on it;
- - special utilities to counter spyware.
Instructions
Step 1
To check your computer for spyware, go online and download a special utility. There are a lot of similar software on the Internet, but it is worth listening to the opinions of other users and finding out the reputation of the program manufacturer. Unfortunately, there are times when, under the guise of a special utility, a user voluntarily downloaded a spy program to his computer. Fortunately, there are some signs that suggest that the computer has problems that need to be addressed urgently.
Step 2
Launch your browser, a program that is commonly used to access the Internet. Pay attention to the download page. If an unfamiliar page is loaded, which, moreover, cannot be changed, this is a sure sign that a hijacker-class virus has settled on the computer. Usually, he changes the user's home page to a website page, from which more and more portions of virus troubles fall on the computer.
Step 3
Monitor the behavior of your computer's operating system. If it periodically freezes or even crashes, then you need to check the boot files and the activity of unknown processes at startup
Step 4
Check with your ISP or find out for yourself if there is a sharp increase in Internet traffic. The presence of such a jump indicates the operation of a source that is unknown, but at the same time receives and transmits a significant amount of data.
Step 5
Open Task Manager, go to the "Processes" tab. Here, with a probability of 80%, you can detect the activity of extraneous programs. However, this can only be done by a specialist or experienced user. Particularly unpleasant spyware disguises itself as system processes, that is, it looks quite peaceful. Moreover, the computer often refuses to delete malicious files, mistaking them for service or system files.