Jump to content

Hacker?


ASchultz

Recommended Posts

Does Speccy determine if a system has been compromised and how? We had confirmation of a "full-system hacker"  through hiring 2 techs to check our desk top computer, but i'm wondering if there is a program that can detect what hackers did while in our network? And if they access our new router, server, computer, network ? And I do not know too much of the lingo as I am not tech savvy, but any help would be appreciated. Thanks

Link to comment
Share on other sites

  • Moderators

Who were these "2 techs"?

Did they contact you, maybe by telephone, more likely by an onscreen pop-up warning?

There are a lot of tech-support scammers out there who at best will charge you for something that is not needed, and at worst will hack your machine themselves leaving unwanted malware behind.

I suggest that if you are unsure then you should get a reliable malware check/removal done of your machine.

There are a few different places that will do this for free, you can find a list in section 10 of the forum rules:
https://forum.piriform.com/announcement/15-forum-rules/
The forum rules here prevent us from assisting with malware removal other than pointing to those services.

Personally I would recommend Malwarebytes, but any of the services listed in the rules will do a similar check for you.
https://forums.malwarebytes.com/topic/9573-im-infected-what-do-i-do-now/

 

*** Out of Beer Error ->->-> Recovering Memory ***

Worried about 'Tracking Files'? Worried about why some files come back after cleaning? See this link:
https://community.ccleaner.com/topic/52668-tracking-files/?tab=comments#comment-300043

 

Link to comment
Share on other sites

  • Moderators

to answer your 1st question - No, Speccy will not determine if your PC has been compromised.
it will just interrogate the firmware via the Microsoft WMI service and tell you "what's under the hood".

Backup now & backup often.
It's your digital life - protect it with a backup.
Three things are certain; Birth, Death and loss of data. You control the last.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.