Answer the question
In order to leave comments, you need to log in
Remote substitution of system files, what to do?
Hello everyone, just learning to be a system administrator, but already faced a problem in the family: competitors first hacked mail (Yandex), and later established a remote connection on a PC.
It seems that all connections were banned through the Windows system services, so now they send files under the guise of Windows updates and the computer gives constant errors, writes about file substitution, problems with libraries, hives and the file system. The remote procedure call service, as I understand it, cannot be disabled. Where else could there be a loophole? There is already a ban on updates, background activity, remote control of windows, but still unknown game is loaded, constantly requests from remote servers. Hide PC name and change it along with IP?
Answer the question
In order to leave comments, you need to log in
Remember the rule - a compromised computer should not be cleaned. If you want to understand the details - remove a copy from the disk, then a complete cleaning and installation again. Plus other measures to prevent the repetition of history - complex passwords, anti-virus protection, firewall, etc. etc.
and already faced with a problem in the family:There are no family issues here.
competitors first hacked mail (Yandex)Set the password a little more difficult than 12345, for example, at least 1234567, but rather more difficult. Link your phone.
what to do?
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question