Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


shelford

115 posts

Master Geek
+1 received by user: 11


#177632 10-Aug-2015 07:01
Send private message

So basically what the subject says. On Friday night I was woken up at 3:30am from music coming from my laptop, which was closed and under my bed. I hadn't used itunes since about 11am Friday morning. I quickly turned it off then shutdown my laptop, not thinking much of it when I was still half asleep.

Then at about 4am this morning I was woken by a noise, it was like a charms bell, again coming from under the bed. I checked the laptop, opened it up and somehow Word, excel, and two folders had opened, while the laptop was shut, and the screen had also rotated it self into portrait mode.

Now either there are ghosts living in my house or something is up with Windows 10. Anyone have any ideas?

View this topic in a long page with up to 500 replies per page Create new topic

This is a filtered page: currently showing replies marked as answers. Click here to see full discussion.

nathan
5695 posts

Uber Geek
+1 received by user: 1630
Inactive user


  #1378116 2-Sep-2015 11:17
Send private message

your computer is not yours anymore and the only way you can be sure its yours is to flatten and reinstall

https://technet.microsoft.com/en-us/library/hh278941.aspx

Ten Immutable Laws Of Security

Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore

 


It's an unfortunate fact of computer science: when a computer program runs, it will do what it's programmed to do, even if it's programmed to be harmful. When you choose to run a program, you are making a decision to turn over a certain level of control of your computer to it -- often  anything up to the limits of what you yourself can do on the computer (and sometimes beyond). It could monitor your keystrokes and send them to criminals eager for the information. It could open every document on the computer, and change the word "will" to "won't" in all of them. It could send rude emails to all your friends. It could install a virus. It could create a "back door" that lets someone remotely control your computer. It could relay a bad guy’s attack on someone else’s computers. Or it could just reformat your hard drive.

 


That's why it's important never to run a program from an untrusted source, and to limit the ability of others to make that decision for you on your computer. There's a nice analogy between running a program and eating a sandwich. If a stranger walked up to you and handed you a sandwich, would you eat it? Probably not. How about if your best friend gave you a sandwich? Maybe you would, maybe you wouldn't—it depends on whether she made it or found it lying in the street. Apply the same critical thought to a program that you would to a sandwich, and you'll usually be safe.

View this topic in a long page with up to 500 replies per page Create new topic








Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.