•  

    Answers Categories

      < ?php wp_list_categories('show_count=1&title_li=&exclude=341'); ?>
     
  •  
     
  •  

    Questions Categories

      < ?php wp_list_categories('show_count=1&title_li=&child_of=341'); ?>
     
 

How do I make sure my computer is setup correctly and is secure? 

by on August 10, 2012

Q: I am a recruiter.
I work with the management team to fill open positions for technical employees and all other employees across the board. One of the main keys to the success of this is a PC with the correct disk drives and the correct software in it.

MY PC IS BELIEVED TO BE HACKED, (files copies & email forwarded), AND RE-ROUTED via possibly a number of means such as, wireless devices, remote control, networking / shared devices, the incorrect SOFTWARE and/or DRIVERS & ensure that there is NO MALWARE, SPYWARE, etc.?

I have RESUMES / CONTACT INFO. / PHONE NUMBERS on my PC gained through recruiting.

Plus great number phone NUMBERS / PERSONAL CONTACT INFO. gained from doing MISSIONARY WORK For the reasons above, I AM SEEKING ADVICE / ASSISTANT in identifying and correcting these issues.
I have seen strange programs, files and folders in windows and system 32.

EVERY FILE OR DOCUMENT I CREATE, I have found copied and is in a folder; (a browser icon is by it). Lots of REMOTE programs & files, TCIP PORT SHARING, RPC End Point Mapper, RPC locator, RPC Procedure (CALL) locator, RPC Procedure (CALL) Mapper, remote registry, quality windows audio video, view desktop will automatically appear at times and an imagines of someone or some process coping but very quickly almost un-noticeable! Google in
Both email and MS Word documents are always triple spaced (No matter how often I set the correct format).

When email goes out, everything is triple spaced .. when the receiver sees it.

If I copy anything to MS Word, it is always triple spaced too. Then I have to manually correct it. Email format is very seldom (to none) correct.

Control Panel\\Network and Internet\\NETWORK AND SHARING CENTER: Is always set to sharing files and folders. If I change the setting, it will go right back after a re-boot.

In C:\\Users\\Owner(Lots of these): NTUSER.DAT{6cced2f1-6e01-11de-8bed-001e0bcd1824}.TMContainer00000000000000000001.regtrans-ms

Beside whatever else it is doing, it also eats up space.

QUESTION:

How do I check to ensure that I have the correct DRIVERS, SOFTWARE, INTERNET CONNECTIONS, etc?

 
 

What is the difference between share level security and user level security? 

by on March 22, 2012

Q: what is the difference between share level security and user level security?

 
 

Can giving someone remote access to my computer to help me fix an issue open me up to security threats? 

by on February 13, 2012

Q: Hi, I had a computer problem and my co-worker tried to help me fix it by remote access. She had control of my computer for about 4 mins and I watched everything she did on my monitor. Afterwards she returned control back to me and i restarted the computer immediately.

In hindsight, i realize i probably shouldnt allow this to happen.

I’m wondering if its possible for her to download any information from my computer, upload any trojans to my computer, or accessed my files during the time she had access.

And will she be able to view what i do in the future or access my computer remotely again without my permission?

Please help!

 
 

What does MMC and MMS environments mean in the security and analysis world? 

by on June 24, 2011

Q: What does someone mean if they say “will administer both MMC\\MMS environments”

I don’t know what MMC\\MMS stands for. It’s in the realm of security and analysis.

 
 

Does JumiTech have any security features? 

by on October 19, 2010

Q: Does JumiTech have any security features?

 
 

Should I use Web of Trust or Browser Guard? 

by on September 14, 2010

Q: Is Web of Trust a good browser security program? Or is Browser Guard 2010 from Trend Micro a better program?

 
 

Is there a way to check if someone did enter my computer and deleted information? 

by on July 28, 2010

Q: I believe my computer has been compromised and notice some saved information is missing. Is there a way to check if someone did enter my computer and deleted information?

 
 

How can I restore security permissions to the default settings? 

by on June 5, 2010

Q: I have tried changing security permissions on folders and drives on Windows 7 so that other users cannot use it but messed up everything. How can I restore those settings to default?

 
 

How can I find out if my PC has been hacked into? 

by on February 27, 2010

Q: How can I find out if my PC has been hacked into and if it has how can I stop it?

 
 

Recommendations between AVG and Kaspersky? 

by on February 11, 2010

Q: I am buying a refurbished Dell desktop and am looking for good security software. Between AVG, and Kaspersky which would you recommend?