Go Back   Computer Forums > General Computing > Cyber Safety and Computer Security
Join Computer forums Today

Thread Tools Search this Thread Display Modes
Old 07-12-2012, 03:13 PM   #1
Beta Member
Join Date: Jul 2012
Location: United States
Posts: 1
Default Is my computer being remotely accessed? What should I do?

The other day I went to Youtube and noticed an unfamiliar account already logged in. No one in my family recognized it, so I tried looking at the channel to see if I could find any more information on who the user was (through history, comments, etc). I found out that it wasn't a full-fledged youtube account; apparently google has this policy where gmail users are automatcially signed into youtube with limited access to the features associated with actual youtube accounts.

The information on his channel profile (assuming he's a male) said that he was a 31 years old and from India.

By reading through his comments on various videos I was also able to find out that he's a Muslim.

I have no idea what's going on here. Is this guy actually hacking into my computer? If so, what should I do?

This is the link to his channel, if it's of any importance: https://www.youtube.com/user/incredibler11?feature=plcp

Concerned Computer is offline   Reply With Quote
Old 07-15-2012, 12:13 AM   #2
Baseband Member
Join Date: Feb 2012
Location: aus
Posts: 89
Default Re: Is my computer being remotely accessed? What should I do?

Yes it could be a hacker or a woops from YouTube. To bypass the need for a proxy or a tor network a hacker will use everyday websites to send information to and from computers. They could have infected you with apps to upload encrypted keylogs to an email account and retrieve them from a remote location which bypasses the ip to ip setup. They could also send you commands by sending an email to a remote server and having a pre configured script to check the emails and use the info to run a command script.
It sounds confusing but this is how it works.
I infect your computer with a virus to check emails at adodgyemail@email.com once it receives an email it decrypts it and interprets as a command. I could ask it to extract this attachment which is a keylog virus and record all keystrokes and save to an encrypted file. I then send an email for it to send that file to adodgyemail2@email.com then i decrypt the keylogs to find bank statements chat logs and so on.
To stop this you will need to have virus protection and a good firewall to see what programs are communicating through your computer. you will need to learn what programs are suppose to communicate through the computer and how. This is very advanced hacking and it probably isn’t evan happening in this instance but I thought I would give the forum users an fyi.
threadmark is offline   Reply With Quote

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off

All times are GMT -5. The time now is 12:19 AM.

Powered by vBulletin® Version 3.8.8 Beta 4
Copyright ©2000 - 2016, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.0