Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.




80 posts

Master Geek


# 177632 10-Aug-2015 07:01
Send private message

So basically what the subject says. On Friday night I was woken up at 3:30am from music coming from my laptop, which was closed and under my bed. I hadn't used itunes since about 11am Friday morning. I quickly turned it off then shutdown my laptop, not thinking much of it when I was still half asleep.

Then at about 4am this morning I was woken by a noise, it was like a charms bell, again coming from under the bed. I checked the laptop, opened it up and somehow Word, excel, and two folders had opened, while the laptop was shut, and the screen had also rotated it self into portrait mode.

Now either there are ghosts living in my house or something is up with Windows 10. Anyone have any ideas?

Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic
 1 | 2
BDFL - Memuneh
64222 posts

Uber Geek

Administrator
Trusted
Geekzone
Lifetime subscriber

3806 posts

Uber Geek

Trusted
Lifetime subscriber

  # 1361834 10-Aug-2015 08:26
Send private message




Information wants to be free. The Net interprets censorship as damage and routes around it.


 
 
 
 




80 posts

Master Geek


  # 1361921 10-Aug-2015 10:25
Send private message

Damn, I liked the idea of ghosts more than someone else controlling it.

Best ones to use? I run the free version of avg but what else should I use? I've used spybot (I think that's what it is) before. Are these ones fine?




80 posts

Master Geek


  # 1362347 10-Aug-2015 19:15
Send private message

Thanks for that! Scanning now!

1678 posts

Uber Geek


  # 1362535 11-Aug-2015 06:48
Send private message

I think the dust bunnies are partying under the bed while you sleep. 🐇🐇



80 posts

Master Geek


  # 1371058 20-Aug-2015 18:55
Send private message

So I did all the scans and had a few questionable items so were removed and since then everything had been fine untill today when I came home from work and had a few files opened on my laptop. I'm running the scans again but is there anything else I can do/should do?

I hate the idea of someone else accessing it.


 
 
 
 


BDFL - Memuneh
64222 posts

Uber Geek

Administrator
Trusted
Geekzone
Lifetime subscriber



80 posts

Master Geek


  # 1371091 20-Aug-2015 20:21
Send private message

Nothing there that shouldn't be. How would I check the port forward in the router? or what would I be looking for?



80 posts

Master Geek


  # 1371101 20-Aug-2015 20:40
Send private message

Managed to log into my router but no port forwarding tab although there is virtual server which is the same thing isn't it? Anyway there are a few things on there, heaps for skype, about 6 of them then a couple for bit torrent and one for my xbox and one for teredo. not sure what one that is. Can I remove any/all/most of these without any major stuff ups?



80 posts

Master Geek


  # 1378075 2-Sep-2015 09:49
Send private message

Sorry to be a pain again. I have done everything above but the problem is still on going. I woke up this am to find they had rotatesdthe screen again and were in the settings trying to set up a vpn. Is there anything else I can try or is a complete reinstall the best thing to do? And if so, how do I go about it?

Thanks.

5136 posts

Uber Geek

Trusted
Microsoft

  # 1378116 2-Sep-2015 11:17
One person supports this post
Send private message

your computer is not yours anymore and the only way you can be sure its yours is to flatten and reinstall

https://technet.microsoft.com/en-us/library/hh278941.aspx

Ten Immutable Laws Of Security

Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore

 


It's an unfortunate fact of computer science: when a computer program runs, it will do what it's programmed to do, even if it's programmed to be harmful. When you choose to run a program, you are making a decision to turn over a certain level of control of your computer to it -- often  anything up to the limits of what you yourself can do on the computer (and sometimes beyond). It could monitor your keystrokes and send them to criminals eager for the information. It could open every document on the computer, and change the word "will" to "won't" in all of them. It could send rude emails to all your friends. It could install a virus. It could create a "back door" that lets someone remotely control your computer. It could relay a bad guy’s attack on someone else’s computers. Or it could just reformat your hard drive.

 


That's why it's important never to run a program from an untrusted source, and to limit the ability of others to make that decision for you on your computer. There's a nice analogy between running a program and eating a sandwich. If a stranger walked up to you and handed you a sandwich, would you eat it? Probably not. How about if your best friend gave you a sandwich? Maybe you would, maybe you wouldn't—it depends on whether she made it or found it lying in the street. Apply the same critical thought to a program that you would to a sandwich, and you'll usually be safe.

1823 posts

Uber Geek


  # 1378139 2-Sep-2015 11:37
Send private message

nathan: your computer is not yours anymore and the only way you can be sure its yours is to flatten and reinstall

.


Yep . There is no way to tell what other changes the hacker has made to your system.
Wipe & reload

If you used it for banking, get your bank pass changed. Do this now.
Change ALL passwords (email, facebook etc etc ), they are all now compromised

Chances are there is some remote controll software running on the laptop, if so, AV wont detect it as remote control software is often a legit app.
I recently saw crapware that had installed Teamveiwer on one machine

523 posts

Ultimate Geek
Inactive user


  # 1378146 2-Sep-2015 11:45
Send private message

Had a similar problem on mine.

Turned out it was my wireless mouse which I never switch off. 
Gremlins use your mouse when you not looking!!!! 



80 posts

Master Geek


  # 1378160 2-Sep-2015 12:03
Send private message

nathan: your computer is not yours anymore and the only way you can be sure its yours is to flatten and reinstall

https://technet.microsoft.com/en-us/library/hh278941.aspx

Ten Immutable Laws Of Security

Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore

It's an unfortunate fact of computer science: when a computer program runs, it will do what it's programmed to do, even if it's programmed to be harmful. When you choose to run a program, you are making a decision to turn over a certain level of control of your computer to it -- often  anything up to the limits of what you yourself can do on the computer (and sometimes beyond). It could monitor your keystrokes and send them to criminals eager for the information. It could open every document on the computer, and change the word "will" to "won't" in all of them. It could send rude emails to all your friends. It could install a virus. It could create a "back door" that lets someone remotely control your computer. It could relay a bad guy’s attack on someone else’s computers. Or it could just reformat your hard drive.

That's why it's important never to run a program from an untrusted source, and to limit the ability of others to make that decision for you on your computer. There's a nice analogy between running a program and eating a sandwich. If a stranger walked up to you and handed you a sandwich, would you eat it? Probably not. How about if your best friend gave you a sandwich? Maybe you would, maybe you wouldn't—it depends on whether she made it or found it lying in the street. Apply the same critical thought to a program that you would to a sandwich, and you'll usually be safe.


Thanks for the info. Can you tell me the best way to reinstall windows? I run windows 10 and have no disc drive. Isn't there an easy way to do it without discs now?

 1 | 2
Filter this topic showing only the reply marked as answer View this topic in a long page with up to 500 replies per page Create new topic



Twitter and LinkedIn »



Follow us to receive Twitter updates when new discussions are posted in our forums:



Follow us to receive Twitter updates when news items and blogs are posted in our frontpage:



Follow us to receive Twitter updates when tech item prices are listed in our price comparison site:





News »

New AI legaltech product launched in New Zealand
Posted 21-Aug-2019 17:01


Yubico launches first Lightning-compatible security key, the YubiKey 5Ci
Posted 21-Aug-2019 16:46


Disney+ streaming service confirmed launch in New Zealand
Posted 20-Aug-2019 09:29


Industry plan could create a billion dollar interactive games sector
Posted 19-Aug-2019 20:41


Personal cyber insurance a New Zealand first
Posted 19-Aug-2019 20:26


University of Waikato launches space for esports
Posted 19-Aug-2019 20:20


D-Link ANZ expands mydlink ecosystem with new mydlink Mini Wi-Fi Smart Plug
Posted 19-Aug-2019 20:14


Kiwi workers still falling victim to old cyber tricks
Posted 12-Aug-2019 20:47


Lightning Lab GovTech launches 2019 programme
Posted 12-Aug-2019 20:41


Epson launches portable laser projector
Posted 12-Aug-2019 20:27


Huawei launches new distributed HarmonyOS
Posted 12-Aug-2019 20:20


Lenovo introduces single-socket servers for edge and data-intensive workloads
Posted 9-Aug-2019 21:26


The Document Foundation announces LibreOffice 6.3
Posted 9-Aug-2019 16:57


Symantec sell enterprise security assets for US$ 10.7 billion to Broadcom
Posted 9-Aug-2019 16:43


Artificial tongue can distinguish whisky and identify counterfeits
Posted 8-Aug-2019 20:20



Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.


Support Geekzone »

Our community of supporters help make Geekzone possible. Click the button below to join them.

Support Geezone on PressPatron



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.

Alternatively, you can receive a daily email with Geekzone updates.