How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask mary Your Own Question

mary
mary, Consultant
Category: Computer
Satisfied Customers: 2200
Experience:  MCA (Masters in Computer Application
Type Your Computer Question Here...
mary is online now
A new question is answered every 9 seconds

how do I get rid of a keylock program. this hacker says he

Customer Question

how do I get rid of a keylock program. this hacker says he can see ever key stroke I make
Submitted: 4 years ago.
Category: Computer
Expert:  mary replied 4 years ago.

HiCustomer Thank you for asking your question on JustAnswer.

 

The key logger program has to be stopped from the task manager and then you can go into the addremove program in the control panel to get the software removed.

 

press control alt and delete and select task manager then you will be able to see what are the programs running at the background identfy any fowl softare and remove it.


Thank you again for trusting us with your problem. Please reply as soon as possible so that we can finish answering your question.

Customer: replied 4 years ago.
So Norton virus protector will not help with this keylocker or the hacker
Expert:  mary replied 4 years ago.

some basic precautions to protect against hackers.


Goto windowsupdate.microsoft.com at least once a week and install all critical patches.
Run an antivirus program at least once a week. Update your virus signature files every time you use it.
Use a firewall such as Zone Alarm. (Some firewalls have had major security problems. Be sure you have the latest update)
Check your computer for trojans by clicking on: http://security.symantec.com http://www.trojanscan.com
Don't click on email attachments.
Don't install Napster, Kazaa, ChainCast, or any software from an unknown source. The former will turn your computer into a server and the latter may contain trojans and viruses.
Turn off sharing, especially on your C:\ and D:\ drive. This is very dangerous! If you must share a disk, make sure it requires a password. Otherwise, anyone in the Internet can use your computer to back up their files without your knowledge. Never share any folder without a password.
Put a good password XXXXX your PC. If you have a password XXXXX your PC that is easy to guess, your computer can be easily taken over by hackers.
A bad password XXXXX be things like 'password', '12345', your name, license plate number, or any word that could be found in an English dictionary or a dictionary in your native language.
Report any network slowness or strange computer behavior so it can be checked by me (if it's a network problem) or Brad (if it's a Windows or Mac problem).
Windows PCs with static IP numbers are especially easy targets. You should always set "Obtain an IP address automatically" in Windows unless you are running a server and you are knowledgeable in computer security.

These are some more tips:
Please give your computer a sensible name. If we can't find your computer when it causes a problem, the only way to fix it is by unplugging it from the network.
Don't store files in the /tmp directory on the servers (engram or protein). They are not safe there! If someone else gets a virus, their computer can put copies of the virus on the shared disk, mixed in with your files. The server cannot be infected by these viruses, but your PC could. Keep your backups in your home directory where they are safe and private.
If you use Windows 2000 or NT, activate auditing of all system events, especially failures. This will you help discover how the hacker obtained access. Without this knowledge, it will be difficult to know what to change when you reinstall your operating system. Be sure to scan through the logs occasionally for unusual activity.
Avoid executable content in web pages and email. Disable ActiveX. You can check your Internet Explorer installation for Active X security problems at this web site: http://www.tiac.net/users/smiths/acctroj/axcheck.htm
Disable automatic execution of Macros in Office programs (Word, Excel, etc).
Use SSH in preference to telnet. You can replace it with the freeware TeraTerm client with the SSH plugin.
Unbind the unneeded network settings in Windows. This is easy to do, and will greatly increase your security. Follow the instructions at http://grc.com/su-rebinding9x.htm
If a hacker gets on your computer, or you discover a trojan on your computer and suspect it is being actively exploited, unplug it from the network immediately and ask for assistance. Don't delete any files. We may need to check them to find out how the attacker got into your system.
If your computer has been compromised by a trojan or an intruder, it cannot be repaired by removing the foreign software. There are dozens of different ways for a hacker to regain access, despite our firewall, that are impossible for any scanning software to find. The only way to repair your computer is to reformat your disk and reinstall the operating system. Until you do this, your computer is a threat to every one else's computer.

JustAnswer in the News:

 
 
 
Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.
 
 
 

What Customers are Saying:

 
 
 
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
< Last | Next >
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
  • I am very happy with my very fast response. Eric is very knowledgeable in the subject area. Thank you! RP Austin, TX
  • Hi John, Thank you for your expertise and, more important, for your kindness because they make me, almost, look forward to my next computer problem. After the next problem comes, I'll be delighted to correspond again with you. I'm told that I excel at programing. But system administration has never been one of my talents. So it's great to have an expert to rely on when the computer decides to stump me. God bless, Bill Bill M. Schenectady, New York
  • The Expert answered my Mac question and was patient. He answered in a thorough and timely manner, keeping the response on a level that could understand. Thank you! Frank Canada
  • Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help. Mary C. Freshfield, Liverpool, UK
  • This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!! Alex Los Angeles, CA
  • Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult. GP Hesperia, CA
 
 
 

Meet The Experts:

 
 
 
  • Andy

    Computer Consultant

    Satisfied Customers:

    5311
    11yr exp, Comp Engg, Internet expert, Web developer, SEO
< Last | Next >
  • http://ww2.justanswer.com/uploads/EN/Engineer1010/2012-6-9_132423_jaj12a.64x64.jpg Andy's Avatar

    Andy

    Computer Consultant

    Satisfied Customers:

    5311
    11yr exp, Comp Engg, Internet expert, Web developer, SEO
  • http://ww2.justanswer.com/uploads/BA/barrenrock/2011-10-19_215925_JamesJAFinal.64x64.jpg James's Avatar

    James

    Sr. Computer Support Expert

    Satisfied Customers:

    8376
    20 years of experience building, fixing and servicing PCs and operating systems.
  • http://ww2.justanswer.com/uploads/zeyank/2009-09-26_154244_P8110079.png Ryan H.'s Avatar

    Ryan H.

    Computer Support Specialist

    Satisfied Customers:

    1741
    A+ Certified Technician - 10 Years experience working with all types of computer systems.
  • http://ww2.justanswer.com/uploads/JA/jadedangel57/2011-11-8_193134_janenewsm.64x64.jpg Jane Lefler's Avatar

    Jane Lefler

    Sr Prog Analyst / Technician

    Satisfied Customers:

    0
    Computer Programmer / Technician/ Consultant 16+ years
  • http://ww2.justanswer.com/uploads/RO/robmpreston/2013-9-23_233814_mijiFZm.64x64.jpg RPI Solutions's Avatar

    RPI Solutions

    Support Specialist

    Satisfied Customers:

    3476
    5+ Years in IT, BS in Computer Science
  • http://ww2.justanswer.com/uploads/BA/barunrath/2012-7-5_201954_Profilepic2.64x64.jpg B. Rath's Avatar

    B. Rath

    Computer Support Specialist

    Satisfied Customers:

    8671
    Certified Computer/Networking Support Specialist.
  • http://ww2.justanswer.com/uploads/FS/fszcze/2012-6-18_181848_500test.64x64.jpg Frederick S.'s Avatar

    Frederick S.

    Computer Specialist

    Satisfied Customers:

    7240
    Computer technician and founder of a home PC repair company.