Stop Hackers Spying or Stalking you | Hilton Samuel | Skillshare

Stop Hackers Spying or Stalking you

Hilton Samuel

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
15 Lessons (1h 49m)
    • 1. Introduction

      2:39
    • 2. Are you afraid of RAT (Remote Access Trojan)

      6:08
    • 3. The dreadful consequences of being hacked by a RATTER

      10:40
    • 4. Signs you have being hacked

      7:46
    • 5. How to prevention being hacked

      7:10
    • 6. What to do if you are hacked part 1

      7:58
    • 7. What to do if you are hacked part 2

      8:25
    • 8. 1 Free program to prevent webcam spying

      7:24
    • 9. RAT 1 Introduction

      2:39
    • 10. RAT 2 what is RATTING

      6:08
    • 11. RAT 3 What they do

      10:40
    • 12. RAT 4 Signs

      7:46
    • 13. RAT 5 Prevention

      7:10
    • 14. RAT 6 part 1 Remedy

      7:58
    • 15. RAT 6 part 2

      8:25

About This Class

PROTECT YOUR COMPUTER FROM HACKERS AND SPIES

How to stop hackers controlling your computer

  • Imagine being spied on.
  • Imagine people looking at you in your bed room.
  • Worst yet imagine what you do in the privacy of your home being streamed across the internet unknown to you. 

Well believe it or not over 73,000 people's private lives were broadcast over the internet unknown to them. A Russian site was looking at them through their webcam.

Additionally hackers routinely steal people's money and sensitive details by remotely hacking into their computer.

Let me tell you it's a horrible experience to be hacked. It is financially and emotionally frustrating.

Do let it happen to you.

Take this course and learn how not to be hacked and what to if you are a victim of hackers. 

Transcripts

1. Introduction: how to stop hackers Spine Onda o stalking you Some time ago, there appeared on the internet a picture off the famous Mark Zuckerberg. You may have seen it. I just want to just show it to you and ask you if you notice anything peculiar or interesting about this picture. There we go. There he is on he is holding up a frame. However, what you might not have noticed is that Ah, all right. Here is a tape that has actually hidden his camera. On down here is another piece of tape that is masking his microphone. Why does Mark do this? All right, this is what we want to talk to you about in stopping hackers spying on you. Another famous person does something similar. He was given an interview on. He is the FBI director, The Federal Bureau of Investigation in the US The director James call me himself said I put a piece of tape over my comer. What are these top guys afraid off? They are afraid off the rats, not the animal. But what is known as random access intrusion in the series of videos will be looking at how hackers can install a piece of software they can spy on you. They can steal your information on day. They can do quite a bit of damage they can look at and listen to your every move. If you have your computer on whatever you do in the room, they might be just looking at you. The private thing that goes on in the comfort of your home can be seen by hackers somewhere around the world. Any place around the world with an Internet connection. In the second video in the upcoming video, we will deal with the details of what random access chosen czar, the damage they can do, how you can get rid of them, signs that you probably might have been hacked Onda exactly how to take back control. 2. Are you afraid of RAT (Remote Access Trojan): stopping hackers spying on you. This is Part two. We found out that Mark Zuckerberg is afraid of rats, not physical rats. Isn't afraid of mice. The animal is afraid off writers on the Internet. He's afraid of what they can do, how they could spy on him when he's having his quiet, private moment. How they could take control, Alba his computer and stalk him. And you should be, too. You never know when someone is looking at you through your webcam. On when someone is talking, you limited control of the computer and do all kinds off interested and malicious things. Now what is a rat on? How does it function on Who are these people who are writers now that is an acronym for remote access. Chosen. Now we move is what it is. It's not local. It's not immediate. It can be anywhere. So this person, anywhere in the world, Russia, China, Africa, South America, North America, South Africa or a any police in Africa in the UK in Europe could be watching you there could be controlling your computer. They have access to it. In other words, they can log in at any time. They want any time off their convenience they all night on, they could probably be secretly just looking at what you're doing. What in your face while you're on the Internet watching where you go on the Internet, even looking at the keystrokes and the most movement on your, um, computer Onda Children, I don't know if you remember the story. I think it's a part of Greek mythology. I can't even remember who they are. But the names off the people involved, however, there were two armies fighting on one of them pretended toe, have abandoned the wall and to have gone home. But they left this big, huge wooden horse on the beach. And when the other set off, people, their enemies came out that day on DSO that they entire field has bean deserted. But this big, huge wooden horse was left. They thought, Well, they left this thing here. Let us just take it into the city. So they took it into the city on the left. It clump right in the center of the city, went to sleep that night. On out of that big, huge wooden horse were soldiers. They were they were hiding in that that horse and then night time they simply came open. The latter and the doors came down on destroyed their enemies. So that's that's what's called a Jewish in horse. So a random access to shin is simply a computer software that infects your computer, your laptop, your PC or Macal any even. Sometimes your mobile devices on it sits there hidden. You don't know that it's there. On is silently collected information from your computer on sending it out, um, to someone somewhere in the world. Like I said, it's a model where it is a malicious software. Let's look at some of the things that can happen and can do it can control your computer from anywhere. Just imagine you're sitting here looking at your computer, listening to me on all of a sudden, you move, your computer is taken over by someone that you haven't given permission. You don't know why they're doing it. It can come con control, your computer, Whatcom. So they might be just spying on you. You know, it's kind of eerie and creepy to know that someone might be in your bedroom through your computer, looking at you, doing various activities they can control the computer mike. They can hear the things that you're saying the privacy of your home on. In some instances, they could even speak to you. You compute her majors, activate on start speaking to you. I think in one instance, they took control of somebody's computer and began talking to them through the, um, the speech to Pecs program that was on the computer. It can control your computer's mouse. It can even block your mouse and keyboard, stop you from using them. It can download, delete, upload, rename files that can install other software on presumably other malicious software. It can capture and take pictures of your everything that's on your screen on your keys. Shocks your keyboard shocks. You can steal it. They can steal your details on it Has Bean said, that up to 70% of the malicious software that's out there are Children's. Well, you can't even hide and delete icons on your desktop, and it can edit your registry files, and that's not what you want to happen. You definitely don't want toe have any of those happen? So basically that is overview off. What wrapped is remote access fusion on in the next video, we're going to go into a little bit more detail as how do you know that you've been effect infected? What are some of the signs and symptoms? What to do if you're infected, How to prevent it? So on We will even talk about writers themselves, you know? What do they do? So, in the upcoming video, stay tuned. We will explore more off this. 3. The dreadful consequences of being hacked by a RATTER: This is the third in the series of how to stop hackers spine and stalking you. It's a horrible thing. If you ever got a person who is watching you, who is observing you without your knowledge, you don't know what they're going to do with the information. Things that you do in the privacy of your own home can be spread across the Internet, and that's what we want to expand on today. What do writers do with the information that they gather and Ghana from your system? Well, they do a lot of things. Some records were after money. They can use the information the sensitive details of your bank account on. They can log into your bank account. Andi have themselves so your hard earned cash. So if they get the back details, you can do that. They can't even there some cases where people gather all this information on. They sell the personal detail on, which means that other people can get your sensitive and private details. They can masquerade as you, which would be like a fraud that could impersonate you. Oh, they can again get into devotes the Elektronik vaults off your pan, can steal your money. I don't think that you want that to happen to you. I remember once of great good friend of mine. He went toe the cash point to which or some money plug his card input in his, um, his details, as usual on found out that he has no money to with you. Now. He had several £1000 in our case, Um, in the bank account. So he was a little bit, um not a little bit. He was shocked, and he was wondering what happened. You know, maybe the bank closes account, or maybe the but it is something. So he went up in person to the bank, only to find that that morning, someone in the Philippines help themselves toe the money in his bank. When the checked, it was a withdrawal all the way in the Philippines and he was in London. England. Well, thankfully the bank we invest them. But you don't necessarily want that to happen to you. Neither do you want people selling on your personal data. Not a friend of mine just have to tell you this. Another friend of mine came back for Africa. That where he spent a couple of years to find out as he tried toe establish himself in the system here in the UK again that someone else was masquerading as himself. In fact, somebody even got married with his name on. It was Palavela. It was a saga. It was some kind of drama. Toe rest his personal data back so that he could be himself, you know? You know, the police, the immigration people, the bank people didn't know. Well, who is the genuine person? Is it him or someone else? So it wasn't nice. It wasn't nice. So you don't want the writers to get your information later on? We're gonna tell you that probably you might be. Some of you might think all this may never happen to you, to me. And you may feel very secure, but it can happen at any time. Any place to anyone so big. Beware. Some of these writers do what is called Ran somewhere. What is ransom? Have you ever heard of it? Well, what they do? They steal the information on the blackmail people because they have access to your computer. They could even shut your computer down. They could look the system on demand money from you. So they kind of blackmail people. They can gather personal secrets from you because they have access to your computer. Because I have access to your web cam to me. They may even have access to your microphone on and voila! The things that you think are secret The things that you think being said in private may be broadcast around the world on me. Be Lito via your computer to some guy, some woman, some boy, some girl who's out there gathering this information. It is terrible, particularly if you're a public figure, like a politician. You don't really want your private information being sprawled all over the Internet, all sold toe for newspapers. So that's another thing that so they blackmail people, but only if they've ever heard the case over custody. Wolf Custody Wolf was 18. Um, I think she was a teen, Miss USA or something like that on for one year, one of his, one of her classmates was secretly watching her in her bedroom via the webcam off her computer off her laptop. So he saw everything you know over the course of a year in your bedroom you doing? Sort of things. You dress, you undress you thing, you do. God knows what on this guy recorded all of that on he tried to blackmail her. Fortunately, he was caught and jailed for some time. Um, there's something called sexploitation, which is people spying on you, catching you in the act of doing things that you shouldn't do, especially if you're cheating. Obviously, you shouldn't be doing that. They collect the images and do in private activities. These people are rather what the call voyeuristic, you know, they just simply like to watch people doing on Justin and dressing on. They could collect this information. Onda, um you know, exploit you particularly. This has been done in cases of Children where people try to blackmail young Children or young teenagers by, um, telling them that they are going to publicize some of the images that they ever got gotten . So that's one way the writers operate on. That's a horrible way. That's really it's sinister, awful away. They could actually also take over your computer, use it for illegal purposes. They can use your computer. Eso is almost like a remote desktop. The operating your computer as if it is very a computer. But it is your computer detail that is being logged. Your I P addresses being locked so they can do all car kinds of things they could do is come in. They can hack other people's computer using your computer. They could infiltrate off the machines. He was in you computer. So when the officials, if anything, if if they were to be caught when the officials tracked down which system is was being used , it will be your I p address that you would be the person who who would have to face the police. So that's one other things, and they're interestingly, interestingly, this is another North, their other types of wrapped writers there some people who are just rattles for ratting sick there some people who have malicious intent for ratting you or infiltrating the system with a remote access to ocean. But there is another group off waters that we want to talk to you about briefly on and off all people. Would you like to guess the very government themselves? Government agencies, the FBI? Um, I just remembered some time a go the US National Security Agency was they were exposed for mucking about with a software call. Gum fish, which records people's conversation via the, um, Internet. They can take photos, and I believe they could also take videos. Well, it has been long known that, you know, even there I didn't put this in, but I think we should have put this in. Um, I don't know what the Corlin there. I would call them rat white collar writers. You don't suspect that they're writing on you, but they are think people like our good old Google on Facebook. I was just reading the report. Was it this very week off? A guy in Australia? I think it is. Who requested the information that Facebook held on him on? He got a DVD that was filled with information that the garnered from his computer up to over 1000 pages of information. They sent it to him on a DVD. Onda. Um, you will be surprised. I call these guys white collar rattlers doing the same thing. They're gathering and gunnery information from your system that they hold. You don't know where the holding what service they hold him on. Um, on. We don't know what purposes they use them, Remember? I think Yes, Their data minding on holding your information someplace somewhere, somehow. So that's what writers do. In the next video, we will look at software, some writing software signs. Oh, that you have, bean, that you're being ratted on on on the following episodes, we will look at how to prevent on how to take back control If you have been ratted on talks on 4. Signs you have being hacked : Episode four. We are actually on a rule, talking about how to stop hackers stock in your spying, on your stealing your information and making your life miserable. You could have a very miserable life if you have been hat on ratted on. But now, today we want Oh, in this episode, we want to talk about what are some of the software I won't spend too long on it. That is because we don't want to get into too much detail off the different types of software that I use there, some people who actually code their own software. But many writers actually believe it or not by the software on install it on, um, your system. You know, they use that software. There's some software that there's one called Black Shade. You can get it for a little little as, um, £30 which may be the going rate about maybe $35 or so. You know, I'm not sure exactly what the exchange rate is, and it was created by a guy called Michael Hodge. I think he's jailed. He's jailed because off this software is probably one of the more popular ones. There's one called black orifice on another called sub seven. This is not an exhaustive list off, um, the type of rat software. They have a lot more. I won't really one. I don't really want to spend too much time. I'm dealing with that. I am going to go on to talk about How can you tell your computer has bean hacked? What are some of the signs symptoms that you can look out for because you know your computer will continue work in. You may see there may be some glitches, but you may not really recognize because the charge in is designed the remote access to ocean or all trojans actually designed to silently operate in the background. Unbeknownst to you, on Beyonce is like some kind of civilians. That surveillance camera has been installed and you don't know that it has been installed. So you continue operating as per normal, thinking that you are doing things you know privately or saying things privately, things that you will do in public or you will not say out on the street or to anyone. Um, but yet these things are being recorded on day stored, some place to be used in some way, malicious or otherwise. Well, let's get into the signs right now. Your Web Comey, usually when it's activated, has a little light next to it. Sometimes it does. Sometimes it doesn't, but in with lots of cases, they there's a little. I think it's an led light, which activates when you're using it. Andi, if you notice that it is constantly on or it activates on its own or it's acting up, that's going on and off. That may be because there is someone remotely controlling its No sign that you have bean ratted is your mom's begins to move on its own now. Sometimes that can happen with most of these symptoms that we're talking about Asian really use them in isolation. But if your mouth keep flicking around as if it has a mind of its own than something suspicious is happening to your computer, so you might want to check it out. You may even notice that there's some strange software on your computer, things that you have never installed. If you check the programs that have been installed on your computer, there might be some strange programs that either showing up on your desktop or on the list of programs that have been installed, your monitor meter on, off on its own. Um, there may be some all the start of programs. I'm going to show you how to check the programs in your startup, um, folder. And if there are programs in there that you don't know about, you never saw them. You're not familiar with them. You never install them. Then it might be fishing, so you might have to get them checked out checked out. You may have arm on unusually slow Internet connection again by itself. This doesn't necessarily mean that you are infected with a ah, remote access chosen or virus. However, um, if you normally have a fast Internet connection on, you know relatively fast enough and all of a sudden yours Internet connection simply grinds almost or hold it could be that some Ratta might be uploading or don't Lord in software, um, onto or taking it off your computer. So it's taken up a lot of bandwidth. Okay, you know, you need to check your programs. Check that there No stone strange program install. You can go with this if you see in a later program, I'm going to show you how you can check the running programs that the programs that are actively running on your system on the programs that are stored in your startup computer. If they are on familiar to you, you can just simply copy and paste or type the name of the program and Google. Andi, you may find a lot more details about those programs now. They're also the mission files that would move alone. You know, some rattles move fires around on your system. We mean files, delete files, as I indicated before Andi, Yes. When the writers, some of them get your information, they may attempt toe log into your bank account. Sometimes your bank may call you on, ask you I'm if they notice any strange activity on your count them a call you a taxi about it. So these are some of the signs. So this is some of the symptoms that indications that you ah, in affected with the rat. Let me just say that some of these may be, you know, do toe probably your computer misbehaving. But when we have a cluster off symptoms where you know a constellation of all of these symptoms or many of them mixed together, you could be sure that you might be Raton ratted on in the next video. We're going to talk about how to prevent Raton. What to do if you have bean infected on ratting, so we'll deal with the prevention. Then we will deal with the cure. So please be sure if you haven't seen the former videos toe go through them. Andi, if you have move on to how to prevent Iraq in. 5. How to prevention being hacked: what happens if you have been infected by Rytas or I wrapped a remote access Children actually before we're going to talk about how you can take back control from Ratta. Let's talk about how to prevent it. Prevention is better than cure. Cancer prevention is better than a pound of cure you. The first thing you need to do is ascertained. Make sure that you have an up to date anti virus software, not just a virus software. It must be up to date because every minute, every day there would be new Children's the thrown out on the Internet. And if you're software isn't up to date, well, you can easily become infected or affected by I rat. Oh, some violence. Now please try and avoid avoid what we call on deficient scams. Now, this word you notice it is spelled with pH. It's simply indicates that, um, someone is trying to get sensitive information from you. Using a ploy. They masquerade or pretend that that the genuine organization, like a bank on do you probably would get something in your inbox. Your email box saying, Well, there's something wrong with your on line account. Can you log in on ascertained that everything is all right. So you need to be very careful with this. You need to be aware that, you know, banks don't normally asks you to do such a thing on the banks won't accede for your log in our password details. Sometimes when you click the link in these fishing scummy e mails, it takes you to a site that appears to be the genuine bank site online site. But it is not if you look in the address bar and perhaps we should do something that you could. You look in the address bar. It would be not the bank domain name. So you need to be very careful with that many years ago on it still happens today. There used to be emails floating around the Internet, particularly but not solely originating out of Nigeria, which indicate that there is some person whose husband or relations, um has died. And they have left the whole heap of money that this person wants to get out of the country . And what the ACSI for is toe help them. This is cold. I think that is called, you know, you being a money mule they're using you toe move money from one part of the world to the next on the promise that you will get a nice cut could deal out of it. All you need to do is to send them your details so they can make the transfer. Don't fall for that. That is another type of fishing because you could be sure if you send in your details, money will move out of your account, not in tow. Your count. Eso That's a type off scum. So be careful with attachments and links coming from people that you don't know if they're coming from Strange, um, people, you know, email scams, email, junk mail. That's what they're sometimes referred to. If you don't know this person and they're asking you to download the program, they are seeing toe little toe click on a link. They're asking you to download an attachment at the best thing to do, I suggest, is to delete it, even with people that you know, be very careful that you are not tempted toe open attachments from people that you're familiar with if you're not really expecting it from them because sometimes, as we indicated before random access chosen may take over somebody's computer and take over the email account on begin to send emails mimicking the person. There was another thing that you need to be aware off to prevent you being ratted on is when you are downloading software, particularly free software. Be very, very cautious off the site that you don't load it from. Only download from trusted sites, trusted sites. Well, you know, you know, not to show if I could tell you all the sites that are trusted. But there are some hard core sites like Senate can be fairly certain that they won't let the Hatters control or takeover or infect their servants another way. You can prevent Raton on your system, Hayes to do what Ma Zuckerberg does, which is to cover your Webcam on dure Mike. Remember that picture that I showed you earlier on his laptop? He has a table with Web. Come on a tape over his mike on. If a guy at that level is going to do that, I suggest you do it, too. He is much smarter than any of us on. If he's taking those precautions, why not? You and I? It's a cover your mike. Andi, you're Web become and finally insert a dummy. Jack, plug into your mic, Jack. If you don't cover your mike, just simply get a plug. Just a dummy plug inserted into the mic Jack. And what that would do it would prevent the system the system might from picking up sounds in the room. Right. So there are some six different ways off how you can prevent people rotten on you in the next video we are going to look into if you've been ratted on. If your system has been taken over, how do you rest? Control back. How can you take control back? Eliminate the random access Children on prevent them from Reina. We infected you again. Right? Stay tuned on. Look out for the next part of castle video costs where we will deal with how to take back control 6. What to do if you are hacked part 1: Okay, We are now at the point where we want to talk about how to take that control. If you have bean ratted on, if your computer is, um infected with remote access chosen, then you must get it back. There are ways and means ah, how to do this, and I'm going to talk to you about that right now. The first thing you need to do is to disconnect from the Internet in order for the rattles , the control, your machine. It must be attached to the Internet. It must be connected to the interweb. That's where they live. That's where the play. That's where they do their malicious activities. So if you disconnect, you effectively prevent them from getting into your machine. However, the Children is still on your machine, so we're going to deal with what you should do. Um, when you have disconnected all, obviously you need to take offer your WiFi on. Unplug the Ethernet cable, then you won your anti virus program. Whatever program you're using as anti virus program, you run it to help clean it. But most sometimes these mal aware dodge your antiviral programme. Eso what we suggest that you do you download from another computer? Install it on the USB. Um, some interesting programs are very powerful programs. The some of them are free. We have one that is called mal Aware Bites. Let's just let me just show you the site mile Where? Bites. Okay, this is Malware Bytes site. You would notice, it says, by malware bytes. They have a free version of it. It caused 1995 per year, but you could try. The free version. Crushes malware like anti virus can't. It's a very, very powerful program. This is how it works. It's cancer. Malware. Um, then it removes the malware stops. Pop ups, removes annoying, malicious and unwanted malware. It gives the Internet security real time. Internet security software is a software that protects you from harmful websites and down lords and their lots of benefits. It cleans infections, prevent fresher, and, for the infections blocks malicious websites scans faster on hides from Mali, where okay, and then they give you the difference between the, uh, um Molly, a bite Onda, other antivirus programs and just going to school to their side. You can just simply go on dot a malware bytes dot com on talks about what the malware is that there was. There is what we there is our Children, right? Him. My always a malicious software engineer toe work for its makers are not for the computer user mile. We might still identity installed unwanted programs or encrypt and hold your digital files for ransom. We spoke about this earlier as a term malware covers all sorts of militia software, including Children's by where adware run somewhere and viruses. Malware is often delivered by exploiting floors, which are sometimes called exploits in legitimate programs. Okay, how do I protect against this on? This is the what we've been talking about for this podcast, So don't way approval. Anti malware SCANA like malware bytes with real time protection such as Mali Way of anti Mile away. A premium. Keep your programs updated so cybercriminals can't exploit them. Protect your WiFi with an encrypted password. Never use open WiFi. Use WP A and W p A to encrypting software on your home. WiFi. Do not use W E P ENCRYPTION Backup Important files to your local hard drive. Do not open emails and people cos you don't know, do not click on links sent to you via email, or I am without just hovering your pointer over the link to confirm it is sending you toe a legitimate site. Usually when you hover your pointer over the link it there's a pop up that shows you the domain name toe where the link is pointing. How do I know if I'm infected? Let's just check some of the points that they mentioned here. Look for issues correctly. Six. Off malware infection Does your Web browser freeze or become honor on Responsive? Do you get redirected toe Web pages other than the ones you're trying to visit? Are you bombarded with proper messages? Does your computer one smoove unusual? Do you see new icons on your desktop that you don't recognize on? What do you do? What do you do if you're infected? Um, one. We move cities and DVDs on unplugged drives. For me, a computer. We start in safe mode to download a proven malware scanner such as malware bytes, disconnect from the Internet, run a scan, follow the malware bytes, anti malware instructions to remove animal where you start your computer. Update your operating system. Broza on application if not current Onda. We set all password. Now we have a body. I'm safe now. If you want the free version you want the free version on we need to do is literally go to malware bytes dot com. You have two options you can buy all you can download it, and this will give you the free version. Right? The next program you can download is a program called Prying Vesa. Private, sir, if we just simply go toe privacy dot com This is another very good program to clean your PC . Onda the eyes A free program so you can download the free program. Andi, if you are impressed with it, you can also donate it. I'm not gonna do a demonstration of this at this point in time, I'll just let you download. And also you can look at some of the support videos either on YouTube or on the site. It's fairly easy to use. So go ahead, Andi, download both malware bytes on private. Sir Andi, you will be almost certain to clean your PC. Okay, we will talk a little bit more in upcoming videos on other methods you can use to take back control off your PC. 7. What to do if you are hacked part 2: right. How to stop hackers Spain or stalking you if you have been unfortunate Victim off. Um hacker Oh, by wrapped or better off being, um, held hostage to remote access. True visions. Then it's not a pretty experience is not a good experience. It could be a horrifying, terrifying experience. But what do you do? How do you take back control? And this is pat to or Episode two off How to Take Back Control in Episode one. We spoke about the The fact that you should immediately disconnect from the Internet because it is is the method by which these people hold you. Ransom is how the gain access to your computer. So you turn off all WiFi, unplug the Ethernet cable on Do you effectively stop them from having access to your computer? You run the antivirus program. If you have one, you should have one so that they would clean. You don't clean it out on their their several other programs that we recommend. We recommend that you download and install malware bytes or private private sir um, to do that, obviously, here, off the Internet. So you would probably use at someone else's computer or Internet or I p address toe. Download those on a USB stick, stick it in your computer, run it in what we call the safe mode. If all of that fails, or in connection. Oh, you know, to add to that, were suggesting that you could rule back your system toe what we call an earlier restore point. What does that mean? There was a point when your computer was healthy and happy without any infections without any viruses without any rat installed. What you can do is to restore your computer back toe that last restore point where it was healthy, where it was functioning well, where all words good. Your computer had a clean bill off health. Now, how do you do this? How do you do this? It's fairly simple to do. If your computer has several updates or points that you can restore toe, you use the system restore, and we're going to demonstrate this unfortunately, recording on a Mac on Do you know if you're on a PC? Hopefully we can insert some images, all the video that demonstrate how to do this. But in the absence of that, I would like to take you to Microsoft support site on it gives you instructions on how you can recover and Windows 10. Okay, we're dealing with the restore point. Let's just expand. Um, I think the content of this on it it says that you should write most click or press on hold on the start button, and that is usually located in the bottom right hand corner off your screen. And that from the menu that appears you want to select control panel, you know, you will see at the top off the dialog box. That appears something called the control panel on. Do what we want you to do in the top right hand corner. Off that off, that dialogue box would be a search field search box type in that search box, the word recovery, and it will bring you toe the area that you should be in select recovery on then also goto the option that says open system restore. Want to get the open system restore? You want to select the next button, choose the restore point related to the up the driver up. Did you know, in this case we're talking about last update that you had on then select next and finish and Bravo. It will revert back toe that point in time in the life of your computer, where it was healthy and, well, the next option you can have is toe reset your computer, that is, we set the computer back down to what is known as the default settings that the company sent it to you with. Unfortunately, you may you lose all your fires. So you want to back up files. That's very important that you back up your files and how do you reset your computer again ? You go to the start button in the bottom right hand corner. You click on it, go to the option that says certain on the options. You select the icon that says update and security. Andi, you should be given several options. You want to select the recovery option on in the right pane. You will see the option to reset this computer. You click on get started on you follow the prompts all the way through. This will reset your computer to the factory defaults, settles Onda. That hopefully would wipe your system on give you a virtually brand new as it came from the manufacturer on that would get rid off the Raptors in on every other thing. So that is like a blanket. I think this would really be one off the last option that you should try. But the very, very last thing, the very, very last thing we want you to try if all else fails, is to give your computer a fresh install off the operating system. So if you have DVD the cities that came with it or if you don't know that Windows 10 then you re install it. Be warned, however, it will wipe your computer clean. It will reinstall Andi, erase and replace all your files. So it would be best if you back up. The file is that you have won the computer. Well, that's it. Ladies and gentlemen, my friends on this series that we've been on on how to stop people hacking into your computer, installing a rat, random access Children Onda stalk him and spine on you Stealing your private data are in some way, shape or form wanting to blackmail you. I trust that you never get infected with a rat on if you do, These are the different ways in which you can remedy the situation. I said this once and I'll say to you were getting prevention is better than cure. So please go back and look at how to prevent Raton How to prevent being hacked. Andi, try as much as isin your power not to fall prey to these criminals. 8. 1 Free program to prevent webcam spying: believe it or not. Last year in November 2050 in a story broke on the Internet of a website in Russia, streaming over 73,000 on secured security. Hammers on what happened is that, you know thousands of people's homes were being streamed on the Internet. There is a different pictures off bedrooms, Children's bedrooms, people's private bedrooms. Could you imagine what people looking directly in your bedroom? There's a security camera off someone's by the pool? Um, this again is, ah, seem to be a child's bedroom. Um, baby's bedroom, you know, How do you feel? There's someone sitting in her living room minding on her own business, not realizing that she is being streamed over the Internet. She has bean hat. There are some runs, run wrapped, um, remote access, um, traditions. It's actually just simply streaming her video. Here's a guy or I don't It was a man or woman. Looks like woman relaxing, reading, and yet she's been seen all over the Internet, and these are different cameras that were being streamed on this website. No, how to avoid this? How do you avoid being streamed over the Internet? Um, via your very own Web come or security camera. I give you several way things. Um, in fact, let me give you one. Just one. Today there is a site call sitting certain, um, is a site that gives this tiny little free where is called Web Web cam off on 1.2 on. It actually turns off your web camera when you're not using it. You know what comes? Allow us to stay in touch with friends and family, or perhaps record in stream video for me, your computer to the Internet on your file. When not in use, you may wish to disable the web. Come to ensure that its not making on wanted recordings. My, we can take over webcams. So this so there is a potential for spying hackers. Can you utilize Trojan horse attacks, enabling them to take control of ill webcam, allowing them to record or take pictures off you without your knowledge? That's what we have been going on about for the longest while in this series off videos. If you're a parent, you may also we should disable the webcam for safety reasons. Instant messages, messengers and websites that utilize videos are not always safe for Children, thus disabling your webcam. Maybe the best course of action if the camera is externally can always on pocket and hide it. But this can become tiresome. If you're frequently in, move it on. What if, as on some or most laptops you have built in cameras, guess what they have given you? A very tiny little program that you can install on the computer and turn your web device on on on Onda off at the will. Like a little switch on here is how to use it. You don't load it, you unzip the folder, Onda. Um, you just click on Run Onda that Bob's your uncle on this little program will install on your computer on you can turn it on or off at will. Now, this is the site serfdom dot or dog on. Do you can just put this extension in and you will come to this page? At the bottom of the page is the download button. If you click the download button, you will down Lord is zip file. Once the file is don't know, did you simply go to the phone, know where it's at DoubleClick and you will see Ah, um, What we call a zip folder extract the zip folder open once you extracted t open the folder and there is on application that you can use to run the program. Double click, select Run on It will install the program and not going to install it again because I've already installed it. Um, let me just demonstrate how it works. This is a program Tiny little program was activated. It has to Or three buttons. Simple buttons enable disable web. Come. I am going toe simply click Disable. Is this disabled? So the web come isn't streaming is turned off Literally turned off. When I want it, I click enable on its on again. Hey, disabled enable toe prove that this is working. You can open Skype or any other device that would use your webcam on it will show you what I will tell you that no webcam is detected. Okay, if you're disabled this camera on you're going to the device manager. This little icon will open your device manager on your click on image in devices expanded thistles The HP webcam. If we double click on it, you will see that the device has bean dis able. You can enable the device some here, but this is just proof that your camera, your webcam, is turned off, and this is a very handy tool to turn your camera on or off so that people from all over the world will not be able to peep into your bedroom on stream. It live over the Internet, as was done by this Russian website, by the way, on Ah, just a slightly different note. They were able to do this because the people who installed the camera, whether it's a webcam or security camera, didn't change the default password. So it would be good for all of us. If you change your default password, toe your Web, come all your security camera or just simply profit out. It is an external device, and if you want to do, if you can't be bothered to do either of those, simply get this little Web on off. Um, program on DIT will help you to do that 9. RAT 1 Introduction: how to stop hackers Spine Onda o stalking you Some time ago, there appeared on the internet a picture off the famous Mark Zuckerberg. You may have seen it. I just want to just show it to you and ask you if you notice anything peculiar or interesting about this picture. There we go. There he is on he is holding up a frame. However, what you might not have noticed is that Ah, all right. Here is a tape that has actually hidden his camera. On down here is another piece of tape that is masking his microphone. Why does Mark do this? All right, this is what we want to talk to you about in stopping hackers spying on you. Another famous person does something similar. He was given an interview on. He is the FBI director, the Federal Bureau of Investigation in the US The director James call me himself said I put a piece of tape over my comer. What are these top guys afraid off? They are afraid off the rat, not the animal. But what is known as random access intrusion in the series of videos will be looking at how hackers can install a piece of software they can spy on you. They can steal your information on day. They can do quite a bit of damage they can look at and listen to your every move. If you have your computer on whatever you do in the room, they might be just looking at you. The private thing that goes on in the comfort of your home can be seen by hackers somewhere around the world. Any place around the world with an Internet connection. In the second video in the upcoming video, we will deal with the details of what random access chosen czar, the damage they can do, how you can get rid of them, signs that you probably might have been hacked Onda exactly how to take back control. 10. RAT 2 what is RATTING: stopping hackers spying on you. This is Part two. We found out that Mark Zuckerberg is afraid of rats, not physical rats. Isn't afraid of mice. The animal is afraid off writers on the Internet. He's afraid of what they can do, how they could spy on him when he's having his quiet, private moment. How they could take control, Alba his computer and stalk him. And you should be, too. You never know when someone is looking at you through your webcam. On when someone is talking, you limited control of the computer and do all kinds off interested and malicious things. Now what is a rat on? How does it function on Who are these people who are writers now that is an acronym for remote access. Chosen. Now we move is what it is. It's not local. It's not immediate. It can be anywhere. So this person, anywhere in the world, Russia, China, Africa, South America, North America, South Africa or a any police in Africa in the UK in Europe could be watching you there could be controlling your computer. They have access to it. In other words, they can log in at any time. They want any time off their convenience they all night on, they could probably be secretly just looking at what you're doing. What in your face while you're on the Internet watching where you go on the Internet, even looking at the keystrokes and the most movement on your, um, computer Onda Children, I don't know if you remember the story. I think it's a part of Greek mythology. I can't even remember who they are. But the names off the people involved, however, there were two armies fighting on one of them pretended toe, have abandoned the wall and to have gone home. But they left this big, huge wooden horse on the beach. And when the other set off, people, their enemies came out that day on DSO that they entire field has bean deserted. But this big, huge wooden horse was left. They thought, Well, they left this thing here. Let us just take it into the city. So they took it into the city on the left. It clump right in the center of the city, went to sleep that night. On out of that big, huge wooden horse were soldiers. They were they were hiding in that that horse and then night time they simply came open. The latter and the doors came down on destroyed their enemies. So that's that's what's called a Trojan horse. So a random access to shin is simply a computer software that infects your computer, your laptop, your PC or Macal any even. Sometimes your mobile devices on it sits there, hidden. You don't know that it's there. On is silently collected information from your computer on sending it out to someone somewhere in the world. Like I said, is a malware. It is a malicious software. Let's look at some of the things that can happen and can do it can control your computer from anywhere. Just imagine you're sitting here looking at your computer, listening to me on all of a sudden you move, your computer is taken over by someone that you haven't given permission. You don't know why they're doing it. It can come con control your computer Web com. So they might be just spying on you. You know, it's kind of eerie and creepy to know that someone might be in your bedroom through your computer, looking at you doing various activities they can control the computer mike. They can hear the things that you're saying the privacy of your home on. In some instances, they could even speak to you. Your computer may just activate on stocks. Speaking to you, I think in one instance, they took control of somebody's computer and began talking to them through the the speech to Pecs program that was on the computer. It can control your computer's mouse. It can even block your mouse and keyboard, stop you from using them. It can download, delete, upload, rename files that can install other software on presumably other malicious software. It can capture and take pictures of your everything that's on your screen on your keys shocks your keyboard shocks. You can steal it. They can steal your details on it Has Bean said, that up to 70% of the malicious software that's out there are Children's. Well, you can't even hide and delete icons on your desktop, and it can edit your registry files, and that's not what you want to happen. You definitely don't want toe have any of those happen? So basically that is overview off. What wrapped is remote access fusion on in the next video, We're going to go into a little bit more detail as how do you know that you've been effect infected? What are some of the signs and symptoms? What to do if you're infected? How to prevent it? So on We will even talk about writers themselves, you know? What do they do? So, in the upcoming video, stay tuned. We will explore more off this. 11. RAT 3 What they do: This is the third in the series of how to stop hackers spying and stalking you. It's a horrible thing. If you ever got a person who is watching you, who is observing you without your knowledge, you don't know what they're going to do with the information. Things that you do in the privacy of your own home can be spread across the Internet, and that's what we want to expand on today. What do writers do with the information that they gather and Ghana from You're system? Well, they do a lot of things there. Some records were after money. They can use the information the sensitive details of your bank account on. They can log into your bank account. Andi have themselves so your hard earned cash. So if they get the back details, you can do that. They can't even there some cases where people gather all this information on. They sell the personal detail on, which means that other people can get your sensitive and private details. They can masquerade as you, which would be like a fraud that could impersonate you. Oh, they can again get into devotes the Elektronik vaults off your pan can steal your money. I don't think that you want that to happen to you. I remember once of great good friend of mine. He went toe the cash point to which or some money plug his card input in his, um, his details, as usual on found out that he has no money to with you. Now. He had several £1000 in our case, Um, in the bank account. So he was a little bit, um not a little bit. He was shocked, and he was wondering what happened. You know, maybe the bank closes account, or maybe the but it is something. So he went up in person to the bank, only to find that that morning, someone in the Philippines help themselves toe the money in his bank. When the checked, it was a withdrawal all the way in the Philippines and he was in London. England. Well, thankfully the bank reimburse them. But you don't necessarily want that to happen to you. Neither do you want people selling on your personal data. Not a friend of mine just have to tell you this. Another friend of mine, um, came back for Africa. That where he spent a couple of years to find out as he tried toe establish himself in the system here in the UK again that someone else was masquerading as himself. In fact, somebody even got married with his name on. It was Palavela. It was a saga. It was some kind of drama. Toe rest his personal data back so that he could be himself, you know? You know, the police, the immigration people, the bank people didn't know. Well, who is the genuine person? Is it him or someone else? So it wasn't nice. It wasn't nice. So you don't want the writers to get your information later on? We're gonna tell you that probably you might be. Some of you might think all this may never happen to you, to me. And you may feel very secure, but it can happen at any time. Any place to anyone so big. Beware. Some of these rattles do what is called Ran somewhere. What is Ransomware? Have you ever heard of it? Well, what they do? They steal the information on the blackmail people because they have access to your computer. They could even shut your computer down. They could look the system on demand money from you. So they kind of blackmail people. They can gather personal secrets from you because they have access to your computer. Because I have access to your web cam to me. They may even have access to your microphone on and voila! The things that you think are secret The things that you think being said in private may be broadcast around the world on me, the Lito via your computer to some guy, some woman, some boy, some girl who's out there gathering this information. It is terrible, particularly if you're a public figure, like a politician. You don't really want your private information being sprawled all over the Internet, all sold toe for newspapers. So that's another thing that so they blackmail people, but only if they've ever heard the case over custody. Wolf Custody. Wolf was 18. Um, I think she was a teen, Miss USA or something like that on for one year, one of his, one of her classmates was secretly watching her in her bedroom via the webcam off her computer off her laptop. So he saw everything you know over the course of a year in your bedroom. You doing sort of things. You dress, you undress you thing, you do. God knows what on this guy recorded all of that on. He tried to blackmail her. Fortunately, he was caught and jailed for some time. Um, there's something called sexploitation, which is people spying on you, catching you in the act of doing things that you shouldn't do, especially if you're cheating. Obviously, you shouldn't be doing that. They collect the images and do in private activities. These people are rather what the call voyeuristic, you know, they just simply like to watch people doing on Justin and dressing on. They could collect this information on dumb, you know, exploit you particularly. This has been done in cases of Children where people try to blackmail young Children or young teenagers by, um, telling them that they are going to publicize some of the images that they ever got gotten . So that's one way the writers operate on. That's a horrible way. That's really it's sinister, awful away. They could actually also take over your computer, use it for illegal purposes. They can use your computer. Eso is almost like a remote desktop. The operating your computer as if it is very a computer. But it is your computer detail that is being logged. Your I P addresses being locked so they can do all car kinds of things they could do is come in. They can hack other people's computer using your computer. They could infiltrate off the machines. He was in you computer. So when the officials, if anything, if they were to be caught with the officials truck down which system is was being used, it will be your I p address that you would be the person who who would have to face the police. So that's one other things, and they're interestingly, interestingly, this is another North, their other types of wrapped writers there some people who are just rattles for ratting sick there some people who have malicious intent for ratting you or infiltrating the system with a remote access to ocean. But there is another group off waters that we want to talk to you about briefly on and off all people. Would you like to guess the very government themselves? Government agencies, the FBI? Um, I just remembered some time a go the US National Security Agency was they were exposed for mucking about with a software call. Gum fish, which records people's conversation via the, um, Internet. They can take photos, and I believe they could also take videos. Well, it has been long known that, you know, even there I didn't put this in, but I think we should have put this in. Um, I don't know what to call them there. I would call them rat white collar writers. You don't suspect that they're writing on you, but they are think people like our good old Google on Facebook. I was just reading a report. Was it this very week off? A guy in Australia? I think it is. Who requested the information that Facebook held on him on? He got a DVD that was filled with information that the garnered from his computer up to over 1000 pages of information. They sent it to him on a DVD. Onda. Um, you will be surprised. I call these guys white collar rattlers doing the same thing. They're gathering and gunnery information from your system that they hold. You don't know where the holding what service they hold them on. Um, on. We don't know what purposes. They use them, remember? I think yes, their data mined in on holding your information someplace somewhere, somehow. So that's what writers do. In the next video, we will look at software, some writing software signs. Oh, that you have, bean, that you're being ratted on on on the following episodes, we will look at how to prevent on how to take back control If you have been ratted on talks on 12. RAT 4 Signs : Episode four. We are actually on a rule, talking about how to stop hackers stock in your spying, on your stealing your information and making your life miserable. You could have a very miserable life if you have been hat on ratted on. But now, today we want Oh, in this episode, we want to talk about what are some of the software I won't spend too long on it. That is because we don't want to get into too much detail off the different types of software that I use there, some people who actually code their own software. But many writers actually believe it or not by the software on install it on, um, your system. You know, they use that software. There's some software that there's one called Black Shade. You can get it for a little little as, um, £30 which may be the going rate about maybe $35 or so. You know, I'm not sure exactly what the exchange rate is, and it was created by a guy called Michael Hodge. I think he's jailed. He's jailed because off this software is probably one of the more popular ones. There's one called black orifice on another called sub seven. This is not an exhaustive list off, um, the type of rat software. They have a lot more. I won't really one. I don't really want to spend too much time. I'm dealing with that. I am going to go on to talk about How can you tell your computer has bean hacked? What are some of the signs symptoms that you can look out for because you know your computer will continue work in. You may see there may be some glitches, but you may not really recognize because the charge in is designed the remote access to ocean or all trojans actually designed to silently operate in the background. Unbeknownst to you, on Beyonce is like some kind of civilians. That surveillance camera has been installed and you don't know that it has been installed. So you continue operating as per normal, thinking that you are doing things you know privately or saying things privately, things that you will do in public or you will not say out on the street or to anyone. Um, but yet these things are being recorded on day stored, some place to be used in some way, malicious or otherwise. Well, let's get into the signs right now. Your Web Comey, usually when it's activated, has a little light next to it. Sometimes it does. Sometimes it doesn't, but in with lots of cases, they there's a little. I think it's an led light, which activates when you're using it. Andi, if you notice that it is constantly on or it activates on its own or it's acting up, that's going on and off. That may be because there is someone remotely controlling its No sign that you have bean ratted is your mom's begins to move on its own now. Sometimes that can happen with most of these symptoms that we're talking about Asian really use them in isolation. But if your mouth keep flicking around as if it has a mind of its own than something suspicious is happening to your computer, so you might want to check it out. You may even notice that there's some strange software on your computer, things that you have never installed. If you check the programs that have been installed on your computer, there might be some strange programs that either showing up on your desktop or on the list of programs that have been installed, your monitor meter on, off on its own. Um, there may be some all the start of programs. I'm going to show you how to check the programs in your startup, um, folder. And if there are programs in there that you don't know about, you never saw them. You're not familiar with them. You never install them. Then it might be fishing, so you might have to get them checked out checked out. You may have arm on unusually slow Internet connection again by itself. This doesn't necessarily mean that you are infected with a ah, remote access chosen or virus. However, um, if you normally have a fast Internet connection on, you know relatively fast enough and all of a sudden yours Internet connection simply grinds almost or hold it could be that some Ratta might be uploading or don't Lord in software, um, onto or taking it off your computer. So it's taken up a lot of bandwidth. Okay, you know, you need to check your programs. Check that there No stone strange program install. You can go with this if you see in a later program, I'm going to show you how you can check the running programs that the programs that are actively running on your system on the programs that are stored in your startup computer. If they are on familiar to you, you can just simply copy and paste or type the name of the program and Google. Andi, you may find a lot more details about those programs now. They're also the mission files that would move alone. You know, some rattles move fires around on your system. We mean files, delete files, as I indicated before Andi, Yes. When the writers, some of them get your information, they may attempt toe log into your bank account. Sometimes your bank may call you on, ask you I'm if they notice any strange activity on your count them a call you a taxi about it. So these are some of the signs. So this is some of the symptoms that indications that you ah, in affected with the rat. Let me just say that some of these may be, you know, do toe probably your computer misbehaving. But when we have a cluster off symptoms where you know a constellation of all of these symptoms or many of them mixed together, you could be sure that you might be Raton ratted on in the next video. We're going to talk about how to prevent Raton. What to do if you have bean infected on ratting, so we'll deal with the prevention. Then we will deal with the cure. So please be sure if you haven't seen the former videos toe go through them. Andi, if you have move on to how to prevent Iraq in. 13. RAT 5 Prevention: what happens if you have been infected by Rytas or I wrapped a remote access Children actually before we're going to talk about how you can take back control from Ratta. Let's talk about how to prevent it. Prevention is better than cure. Cancer prevention is better than a pound of cure you. The first thing you need to do is ascertained. Make sure that you have an up to date anti virus software, not just a virus software. It must be up to date because every minute, every day there would be new Children's the thrown out on the Internet. And if you're software isn't up to date, well, you can easily become infected or affected by I rat. Oh, some violence. Now please try and avoid avoid what we call on deficient scams. Now, this word you notice it is spelled with pH. It's simply indicates that, um, someone is trying to get sensitive information from you. Using a ploy. They masquerade or pretend that that the genuine organization, like a bank on do you probably would get something in your inbox. Your email box saying, Well, there's something wrong with your on line account. Can you log in on ascertained that everything is all right. So you need to be very careful with this. You need to be aware that, you know, banks don't normally asks you to do such a thing on the banks won't accede for your log in our password details. Sometimes when you click the link in these fishing scummy e mails, it takes you to a site that appears to be the genuine bank site online site. But it is not if you look in the address bar and perhaps we should do something that you could. You look in the address bar. It would be not the bank domain name. So you need to be very careful with that many years ago on it still happens today. There used to be emails floating around the Internet, particularly but not solely originating out of Nigeria, which indicate that there is some person whose husband or relations, um has died. And they have left the whole heap of money that this person wants to get out of the country . And what the ACSI for is toe help them. This is cold. I think that is called, you know, you being a money mule they're using you toe move money from one part of the world to the next on the promise that you will get a nice cut could deal out of it. All you need to do is to send them your details so they can make the transfer. Don't fall for that. That is another type of fishing because you could be sure if you send in your details, money will move out of your account, not in tow. Your count. Eso That's a type off scum. So be careful with attachments and links coming from people that you don't know if they're coming from Strange, um, people, you know, email scams, email, junk mail. That's what they're sometimes referred to. If you don't know this person and they're asking you to download the program, they are seeing toe little toe click on a link. They're asking you to download an attachment at the best thing to do, I suggest, is to delete it, even with people that you know, be very careful that you are not tempted toe open attachments from people that you're familiar with if you're not really expecting it from them because sometimes, as we indicated before random access chosen may take over somebody's computer and take over the email account on begin to send emails mimicking the person. There was another thing that you need to be aware off to prevent you being ratted on is when you are downloading software, particularly free software. Be very, very cautious off the site that you don't load it from. Only download from trusted sites, trusted sites. Well, you know, you know, not to show if I could tell you all the sites that are trusted. But there are some hard core sites like Senate can be fairly certain that they won't let the Hatters control or takeover or infect their servants another way. You can prevent Raton on your system, Hayes to do what Ma Zuckerberg does, which is to cover your Webcam on dure Mike. Remember that picture that I showed you earlier on his laptop? He has a table with Web. Come on a tape over his mike on. If a guy at that level is going to do that, I suggest you do it, too. He is much smarter than any of us on. If he's taking those precautions, why not? You and I? It's a cover your mike. Andi, you're Web become and finally insert a dummy. Jack, plug into your mic, Jack. If you don't cover your mike, just simply get a plug. Just a dummy plug inserted into the mic Jack. And what that would do it would prevent the system the system might from picking up sounds in the room. Right. So there are some six different ways off how you can prevent people rotten on you in the next video we are going to look into if you've been ratted on. If your system has been taken over, how do you rest? Control back. How can you take control back? Eliminate the random access Children on prevent them from Reina. We infected you again. Right? Stay tuned on. Look out for the next part of castle video costs where we will deal with how to take back control 14. RAT 6 part 1 Remedy: Okay, We are now at the point where we want to talk about how to take that control. If you have bean ratted on, if your computer is, um, infected with remote access chosen, then you must get it back. There are ways and means ah, how to do this, and I'm going to talk to you about that right now. The first thing you need to do is to disconnect from the Internet in order for the rattles , the control, your machine. It must be attached to the Internet. It must be connected to the interweb. That's where they live. That's where the play. That's where they do their malicious activities. So if you disconnect, you effectively prevent them from getting into your machine. However, the Children is still on your machine, so we're going to deal with what you should do. Um, when you have disconnected all, obviously you need to take offer your WiFi on. Unplug the Ethernet cable, then you won your anti virus program. Whatever program you're using as anti virus program, you run it to help clean it. But most sometimes these malware dodge your antiviral programme. Eso what we suggest that you do you download from another computer, install it on the USB. Um, some interesting programs are very powerful programs. The some of them are free. We have one that is called mal Aware Bites. Let's just let me just show you the site mile Where Bites. Okay, this is Malware Bytes site. You would notice, it says, by malware bytes. They have a free version of it. It caused 1995 per year, but you could try. The free version. Crushes malware like anti virus can't. It's a very, very powerful program. This is how it works. It's cancer. Malware. Um, then it removes the malware stops. Pop ups, removes annoying, malicious and unwanted malware. It gives the Internet security real time. Internet security software is a software that protects you from harmful websites and down lords and their lots of benefits. It cleans infections, prevent fresher and, for the infections blocks malicious websites scans faster on hides from Mali, where okay, and then they give you the difference between the, uh, um, Molly, a bite Onda, other antivirus programs and just going to school to their site. You can just simply go on dot a malware bytes dot com on talks about what the malware is that there was. There is what we there is our Children, right? Him. My always a malicious software engineer toe work for its makers are not for the computer user Mile. We might still identity installed unwanted programs or encrypt and hold your digital files for ransom. We spoke about this earlier as a term malware covers all sorts of militia software, including Children's by where adware run somewhere and viruses. Malware is often delivered by exploiting floors, which are sometimes called exploits in legitimate programs. Okay, how do I protect against this on? This is the what we we've been talking about for this podcast, So don't way approval. Anti malware SCANA like malware bytes with real time protection such as Mali Way of anti Mile Away. A premium. Keep your programs updated so cybercriminals can't exploit them. Protect your WiFi with an encrypted password. Never use open WiFi. Use WP A and W p A to encrypting software on your home. WiFi. Do not use W E P ENCRYPTION Backup Important files to your local hard drive. Do not open emails and people cos you don't know, do not click on links sent to you via email, or I am without just hovering your pointer over the link to confirm it is sending you toe a legitimate site. Usually when you hover your pointer over the link it there's a pop up that shows you the domain name toe where the link is pointing. How do I know if I'm infected less? Just check some of the points that they mentioned here. Look for issues correctly. Six. Off malware infection Does your Web browser freeze or become honor on Responsive? Do you get redirected toe Web pages other than the ones you're trying to visit? Are you bombarded with proper messages? Does your computer one slow of unusual? Do you see new icons on your desktop that you don't recognize on? What do you do? What do you do if you're infected? Um, one. We move cities and DVDs on unplugged drives. For me, a computer. We start in safe mode to download a proven malware scanner such as malware bytes, disconnect from the Internet, run a scan, follow the malware bytes, anti malware instructions to remove animal where you start your computer. Update your operating system. Broza on application. If not current. Onda, we set all passwords. Now we have a bi I'm safe now. If you want the free version you want the free version on we need to do is literally go to malware bytes dot com. You have two options you can buy all you can download it, and this will give you the free version. Right? The next program you can download is a program called Prying Vesa. Private, sir, if we just simply go toe privacy dot com This is another very good program to clean your PC . Onda the eyes A free program so you can download the free program. Andi, if you are impressed with it, you can also donate it. I'm not gonna do a demonstration of this at this point in time, I'll just let you download. And also you can look at some of the support videos either on YouTube or on the site. It's fairly easy to use. So go ahead, Andi, download both malware bytes on private. Sir Andi, you will be almost certain to clean your PC. Okay, we will talk a little bit more in upcoming videos on other methods you can use to take back control off your PC. 15. RAT 6 part 2: right. How to stop hackers Spain or stalking you if you have been unfortunate Victim off hacker Oh , by wrapped or better off being, um, held hostage to remote access. True visions. Then it's not a pretty experience is not a good experience. It could be a horrifying, terrifying experience. But what do you do? How do you take back control? And this is pat to or Episode two off How to Take Back Control in Episode one. We spoke about the The fact that you should immediately disconnect from the Internet because it is is the method by which these people hold you. Ransom is how the gain access to your computer. So you turn off all WiFi, unplug the Ethernet cable on Do you effectively stop them from having access to your computer? You run the antivirus program. If you have one, you should have one on so that they would clean it out, clean it out on their their several other programs that we recommend. We recommend that you download and install malware bytes or private private sir um, to do that, obviously, here, off the Internet. So you would probably use at someone else's computer or Internet or I p address toe. Download those on a USB stick, stick it in your computer, run it in what we call the safe mode. If all of that fails, or in connection. Oh, you know, to add to that, were suggesting that you could rule back your system toe what we call an earlier restore point. What does that mean? There was a point when your computer was healthy and happy without any infections without any viruses without any rat installed. What you can do is to restore your computer back toe that last restore point where it was healthy, where it was functioning well, where all words good. Your computer had a clean bill off health. Now, how do you do this? How do you do this? It's fairly simple to do. If your computer has several updates or points that you can restore toe, you use the system restore, and we're going to demonstrate this unfortunately, recording on a Mac on Do you know if you're on a PC? Hopefully we can insert some images, all the video that demonstrate how to do this. But in the absence of that, I would like to take you to Microsoft support site on it gives you instructions on how you can recover and Windows 10. Okay, we're dealing with the restore point. Let's just expand. Um, I think the content of this on it it says that you should write most click or press and hold on the start button, and that is usually located in the bottom right hand corner off your screen. And from the menu that appears. You want to select control panel, you will see at the top off the dialog box. That appears something called the control panel on. Do what we want you to do in the top right hand corner. Off that off, that dialogue box would be a search field search box type in that search box the word recovery, and it will bring you toe the area that you should be in select recovery on then also goto the option that says open system restore. Want to get the open system restore? You want to select the next button, choose the restore point related to the up the driver up. Did you know, in this case we're talking about last update that you had on then select next and finish and Bravo, It will revert back toe that point in time in the life of your computer where it was healthy and well, the next option you can have is to reset your computer. That is, we set the computer back down to what is known as the default settings that the company sent it to you with. Unfortunately, you may you lose all your fires. So you want to back up files. That's very important that you back up your files and how do you reset your computer again ? You go to the start button in the bottom right hand corner. You click on it, go to the option that says certain on the options. You select the icon that says update and security. Andi, you should be given several options. You want to select the recovery option on in the right pane. You will see the option to reset this computer. You click on get started on you follow the prompts all the way through. This will reset your computer to the factory defaults, settles Onda. That hopefully would wipe your system on give you a virtually brand new as it came from the manufacturer on that would get rid off the Raptors in on every other thing. So that is like a blanket. I think this would really be one off the last option that you should try. But the very, very last thing, the very, very last thing we want you to try if all else fails, is to give your computer a fresh install off the operating system. So if you have DVD the cities that came with it or if you don't know that Windows 10 then you re install it. Be warned, however, it will wipe your computer clean. It will reinstall Andi, erase and replace all your files. So it would be best if you back up. The file is that you have won the computer. Well, that's it. Ladies and gentlemen, my friends on this series that we've been on how to stop people hacking into your computer , installing a rat, random access Children Onda stalk him and spine on you. Stealing your private data are in some way, shape or form wanting to blackmail you. I trust that you never get infected with a rat on if you do, These are the different ways in which you can remedy the situation. I said this once and I'll say to you were getting prevention is better than cure. So please go back and look at how to prevent Raton How to prevent being hacked. Andi, try as much as isin your power not to fall prey to these criminals.