technolmka.blogg.se

Tcpview
Tcpview













Once the remote user is connected they will have full access to your computer and be able to access files, programs, screen shots, and possibly your web cam. This trojan will listen on a TCP or UDP port and wait for connections from the remote user. When your computer is hacked, a hacker will typically install a Remote Access Trojan, or RAT, that will allow them to gain access to it again in the future. At these times instead of panicking, this tutorial will show what to do and how to potentially help you track down the hacker and report them to the authorities. Then you start feeling anger tinged with a bit of fear, because someone is violating your personal space without your permission and potentially accessing your private data. Have you ever been connected to your computer when something strange happens? A CD drive opens on its own, your mouse moves by itself, programs close without any errors, or your printer starts printing out of nowhere? When this happens, one of the first thoughts that may pop into your head is that someone has hacked your computer and is playing around with you. What you should do once you know you have been hacked.

tcpview

Using our clues to track down the hacker.Using TCPView in Windows to see who is connected to your computer.















Tcpview