Buying a used computer can often save you money. However, it can also have hidden dangers.
The victim is 43 years old female, small business owner. While not a computer expert, she has been using computers for 25+ years. Here’s her story about buying a used computer from a popular retailer:
Not being a computer expert, her chosen action was a wise course of action. However, it did require a lot of time investment, first to diagnose the extent of the problem, then to format, reinstall, and re-setup programs and settings, which many people simply don’t have the time to commit to such a lengthy project.
Simply because she didn’t have a virus. While the person that made the changes obviously had ill-intent, nonetheless, the setting changes that were made are considered normal by any anti-virus software as you are allowed to make changes to your computer system settings.
Many malware and virus programmers know how to appear to both the user and the computer as a normal activity so as to not alert the user or anti-virus software.
This is one reason why our Rock Star Technicians look through your system settings to find viruses that can’t be found by traditional anti-virus software scans.
While working with the victim, a Rock Star Technician would:
Without the ability for the hacker to no longer have any remote connection, we would then move to the next level.
When buying a used computer, the steps above are recommend to perform to safe guard your confidential information.
The victim in this story may have chosen to prosecute the retailer. If you choose to seek prosecution of virus writer, it’s imperative that NO changes be performed on the computer without first consulting legal council.
A forensic investigator will often create two full system backups.
Even if there is not a desire to prosecute, you may wish to keep a backup reference copy in the event you discover lost funds, lost identity, etc. and choose to prosecute at a later time. Please note, these backups are full system, bootable backups, not simply a backup of documents.
The victim didn’t have a virus that virus scans would find. However, the intent of the retailer was to spy on the user without her knowing. The retailer can watch video camera, copy pictures, Word files, emails, etc. Consider that the retailer could purposefully give the victim a virus in hopes she would call the retailer for a repair.
Rock Star Technicians take delight in fixing problems as quickly as possible. The total time to resolve this victims virus problem would’ve been about two hours. Two hours versus 70 hours, it’s your choice.
So what does your used computer from Amazon or Ebay or a Retailer or a local computer shop have on it? Even with a virus scan, your computer settings can be altered in a way to allow someone to watch you and control your computer.
Considering it’s a flat rate to fix, it’s time to contact Rock Star Virus Removal today and get virus free!
Original appears here: http://www.makeuseof.com/answers/how-do-i-stop-someone-who-has-control-of-my-desktop-remotely/