29
votes
Accepted
An unrelated program (Clash for Windows) links to FFmpeg libraries. Can it be spyware?
From the app's overall appearance in its official screenshots as well as the presence of en-US.pak and GPUCache in your DLL list (that is, not just "GPU cache" generally but that specific ...
7
votes
Unable to disable Compatibility Telemetry in Windows 10
I had similar problem in my laptop, the telemetry consumes all disk IOs after I install anything new or updates. Making it unusable for a few hours.
Here how I solved:
Make sure the telemetry is not ...
7
votes
Accepted
Could this well known software be a spyware?
Due to the nature of the question one can't give a definitive "No" answer without very time-consuming reverse engineering, but mine is:
Probably not, and you've agreed for this suspicious behavior ...
3
votes
Accepted
What does "netstat -n -o" mean?
The purpose of the netstat command is usually to show the currently active connections from or to your computer. This list includes all apps – the shown connections may be related to your web browsing,...
3
votes
Accepted
I gave full access to a webmaster (freelance) how do i check for malicious scripts/viruses that he could have left?
I can recall a couple of answers about this on other SE sites. This and this.
tl;dr: It's really, REALLY difficult to be sure. About the website itself, static analysis and installing a known, (code)...
2
votes
Prevent browser addons from "phoning home"
Im not sure, but it would depend on your browser. You could only use open source plugins, which would allow you to check if they phone home. Also, you could use something like Wireshark to look for ...
2
votes
Accepted
Svchost.exe using upload
scvhost is, literally, the Host Process For Services. By itself it is nothing, but, depending on your Windows version, each instance of svchost.exe will be hosting one or more services, and these are ...
2
votes
Entering a random number sequence seed under surveillance
How to enter the seed into the computer without them finding out?
You cannot.
assume my computer is being totally bugged and monitored
The above statement means anything that happens on your ...
2
votes
Accepted
Is this a virus? Hexagonal shaped icon preventing Windows 10 shutdown
That's the icon for a program called Snagit by United Add-ins.
1
vote
What can I do if a spam email claims I'm infected with Pegasus spyware?
Adding my answer as somehow this term hasn't been mentioned - this is known as social engineering - the simpliest to use, yet one of the most effective deception techniques that simply relies on ...
1
vote
What can I do if a spam email claims I'm infected with Pegasus spyware?
I concur with the accepted answer. It is worthwhile adding some other things which are not really conducive to comments, so an answer is warranted -
You likely can't track down who the sender was in ...
1
vote
I bought an open-box laptop. Should I reset Windows?
You mention that:
I'd prefer a surely clean system because I may use this netbook for banking and cryptocurrency operations.
The only way to truly do this is to reflash the BIOS and reinstall the OS....
1
vote
Command Prompt Refreshes all Programs
This behavior does not happen in windows, so there is something or someone that is causing an application to start that shows the command prompt window.
It might be someone installed something just to ...
1
vote
Accepted
Wierd "q" .cmd file starting on startup?
Its malware. Here is the summary:
Recording my laptop booting
Found out it was a dumb virus clone of cmd.exe running on startup trying to delete the full documents folder, but it does not run as a ...
1
vote
If a software on Windows 7 has storage access and network access, what prevent it from sending all the files on the computer to a external server?
If you are interested to see what you PC is sending out, you might want to take a look at Wireshark. Check if you can legally use it in your country and stay within the legal boundaries as you use it.
...
1
vote
How did my computer screen became a camera?
Software can access the screen content by other means than by using an optical device (when making a "screenshot" this becomes obvious). This technology exists some decades now, and as you correctly ...
1
vote
Does Paint add an IP address onto pictures?
The entire bitmap file specification is explained here: https://en.wikipedia.org/wiki/BMP_file_format
Source: https://commons.wikimedia.org/wiki/File:BMPfileFormat.png
As you can see, there isn't ...
1
vote
Accepted
Windows 10 eats up my bandwidth through discrete processes
Windows 10, as you state, continually exchanges information with Microsoft, including your preferences, searches, location and other telemetry. In addition, Windows 10 can download updates to one ...
Only top scored, non community-wiki answers of a minimum length are eligible
Related Tags
spyware × 158malware × 39
virus × 38
windows × 25
windows-7 × 21
security × 16
anti-virus × 16
adware × 15
windows-10 × 11
google-chrome × 10
anti-spyware × 10
macos × 8
trojan × 7
windows-xp × 6
networking × 5
windows-8 × 5
browser × 5
privacy × 5
internet-explorer × 4
uninstall × 4
webcam × 4
bloatware × 3
keylogger × 3
command-line × 2
firefox × 2