SlideShare a Scribd company logo
1 of 19
University of Duhok
Faculty Of Science
Computer Department
Submitted by: Dler Omer
Ahmad Mamand
 start
 run
 regedit
 HKEY_LOCAL_MACHINE
 Software
 Microsoft
 window
 current Version
 run
1. First make sure that how many users’
accounts are there in your computer
2. Find out if there are any unknown accounts
with higher privileges.
3. Someone may create a user account without
your knowledge and can use that account to
access your system from a remote location.
4. Go to the control panel
5. open the user accounts and check if the
user is turned off and if there is any other
account that you did not create.
6. Delete any unknown account except
known account
 Go to the the run
 Write cmd
 Write netstate –ano
 watch state established and pid number
 Go to the task manager
 Go to process
 look the pid number
 Right click to the pid open file location and
delete this server or vires
 Process Red color : finish the work
 Process green color :is hacked and continue
 Process Yellow color : hacked and changed
port and server
How to know your computer has been attacked
How to know your computer has been attacked

More Related Content

What's hot

Ambient back scatter
Ambient back scatterAmbient back scatter
Ambient back scatter
Che Tna
 
Voice based web browser
Voice based web browserVoice based web browser
Voice based web browser
Gowsalyasri
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
Anjana Shivangi
 

What's hot (20)

Body Area Networks (BANs) - PPT (By Study PPT)
Body Area Networks (BANs) - PPT (By Study PPT)Body Area Networks (BANs) - PPT (By Study PPT)
Body Area Networks (BANs) - PPT (By Study PPT)
 
Ambient back scatter
Ambient back scatterAmbient back scatter
Ambient back scatter
 
Networking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network BasicsNetworking Fundamentals: Computer Network Basics
Networking Fundamentals: Computer Network Basics
 
Voice based web browser
Voice based web browserVoice based web browser
Voice based web browser
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Handoff or Handover and Types
Handoff or Handover and Types Handoff or Handover and Types
Handoff or Handover and Types
 
Ethics_Internet of Things
Ethics_Internet of ThingsEthics_Internet of Things
Ethics_Internet of Things
 
IT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit IIIT6601 Mobile Computing Unit II
IT6601 Mobile Computing Unit II
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Silverlight
SilverlightSilverlight
Silverlight
 
4 pillers of iot
4 pillers of iot4 pillers of iot
4 pillers of iot
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Darwin OS
Darwin OSDarwin OS
Darwin OS
 
IDTechEx Research: Printed Electronics for the Automotive Industry
IDTechEx Research: Printed Electronics for the Automotive IndustryIDTechEx Research: Printed Electronics for the Automotive Industry
IDTechEx Research: Printed Electronics for the Automotive Industry
 
Airborne Internet
Airborne InternetAirborne Internet
Airborne Internet
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 

Viewers also liked

Build up skills_spain_hoja_ruta_final
Build up skills_spain_hoja_ruta_finalBuild up skills_spain_hoja_ruta_final
Build up skills_spain_hoja_ruta_final
Urbaniza.com
 
Ciclo de vida de los sistemas
Ciclo de vida de los sistemasCiclo de vida de los sistemas
Ciclo de vida de los sistemas
wilensanz
 
Kbdh lop10 bai4_tiết 1,2
Kbdh lop10 bai4_tiết 1,2Kbdh lop10 bai4_tiết 1,2
Kbdh lop10 bai4_tiết 1,2
tin_k36
 

Viewers also liked (8)

Build up skills_spain_hoja_ruta_final
Build up skills_spain_hoja_ruta_finalBuild up skills_spain_hoja_ruta_final
Build up skills_spain_hoja_ruta_final
 
Ciclo de vida de los sistemas
Ciclo de vida de los sistemasCiclo de vida de los sistemas
Ciclo de vida de los sistemas
 
Métodos de encuestas
Métodos de encuestasMétodos de encuestas
Métodos de encuestas
 
Kbdh lop10 bai4_tiết 1,2
Kbdh lop10 bai4_tiết 1,2Kbdh lop10 bai4_tiết 1,2
Kbdh lop10 bai4_tiết 1,2
 
Una solución pensada para cada necesidad
Una solución pensada para cada necesidadUna solución pensada para cada necesidad
Una solución pensada para cada necesidad
 
Spatial Justice and the Irish Crisis: Migration - Mary Gilmartin
Spatial Justice and the Irish Crisis: Migration - Mary GilmartinSpatial Justice and the Irish Crisis: Migration - Mary Gilmartin
Spatial Justice and the Irish Crisis: Migration - Mary Gilmartin
 
Analgetik – narkotik
Analgetik – narkotikAnalgetik – narkotik
Analgetik – narkotik
 
Χρήση νέων Τεχνολογιών στην Γεωργία, Συστήματα Υδροπονίας & Στρατηγικές Διαφ...
Χρήση νέων Τεχνολογιών στην Γεωργία, Συστήματα Υδροπονίας &  Στρατηγικές Διαφ...Χρήση νέων Τεχνολογιών στην Γεωργία, Συστήματα Υδροπονίας &  Στρατηγικές Διαφ...
Χρήση νέων Τεχνολογιών στην Γεωργία, Συστήματα Υδροπονίας & Στρατηγικές Διαφ...
 

Similar to How to know your computer has been attacked

Laporan Praktikum Keamanan Siber - Tugas 2 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 2 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 2 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 2 -Kelas C - Kelompok 3.pdf
IGedeArieYogantaraSu
 
Obfuscation Methods And Planning
Obfuscation Methods And PlanningObfuscation Methods And Planning
Obfuscation Methods And Planning
tmacuk
 
About_Windows_Update_Verbose_Logs
About_Windows_Update_Verbose_LogsAbout_Windows_Update_Verbose_Logs
About_Windows_Update_Verbose_Logs
Eric Roberson
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
ricagip499
 
Ethi minii - Ethical Hacking
Ethi minii - Ethical HackingEthi minii - Ethical Hacking
Ethi minii - Ethical Hacking
Being Uniq Sonu
 
Start Guide for data based optimization techniques
Start Guide for data based  optimization techniquesStart Guide for data based  optimization techniques
Start Guide for data based optimization techniques
ShatvikMishra1
 
Wcl303 russinovich
Wcl303 russinovichWcl303 russinovich
Wcl303 russinovich
conleyc
 

Similar to How to know your computer has been attacked (20)

configuration ,management and troubleshooting of Group Accounts.
configuration ,management and troubleshooting of Group Accounts.configuration ,management and troubleshooting of Group Accounts.
configuration ,management and troubleshooting of Group Accounts.
 
Laporan Praktikum Keamanan Siber - Tugas 2 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 2 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 2 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 2 -Kelas C - Kelompok 3.pdf
 
Obfuscation Methods And Planning
Obfuscation Methods And PlanningObfuscation Methods And Planning
Obfuscation Methods And Planning
 
About_Windows_Update_Verbose_Logs
About_Windows_Update_Verbose_LogsAbout_Windows_Update_Verbose_Logs
About_Windows_Update_Verbose_Logs
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Ethi minii - Ethical Hacking
Ethi minii - Ethical HackingEthi minii - Ethical Hacking
Ethi minii - Ethical Hacking
 
I Hunt Sys Admins
I Hunt Sys AdminsI Hunt Sys Admins
I Hunt Sys Admins
 
Managing Processes in Unix.pptx
Managing Processes in Unix.pptxManaging Processes in Unix.pptx
Managing Processes in Unix.pptx
 
Managing Processes in Unix.pptx
Managing Processes in Unix.pptxManaging Processes in Unix.pptx
Managing Processes in Unix.pptx
 
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue TeamersGo Hack Yourself - 10 Pen Test Tactics for Blue Teamers
Go Hack Yourself - 10 Pen Test Tactics for Blue Teamers
 
Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)Online Safety, Security, Ethics, and Etiquette (Part 2)
Online Safety, Security, Ethics, and Etiquette (Part 2)
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
 
Win 8 password cracking
Win 8 password crackingWin 8 password cracking
Win 8 password cracking
 
Start Guide for data based optimization techniques
Start Guide for data based  optimization techniquesStart Guide for data based  optimization techniques
Start Guide for data based optimization techniques
 
Mwlug2014 - IBM Connections Security and Migration
Mwlug2014 - IBM Connections Security and MigrationMwlug2014 - IBM Connections Security and Migration
Mwlug2014 - IBM Connections Security and Migration
 
Wcl303 russinovich
Wcl303 russinovichWcl303 russinovich
Wcl303 russinovich
 
MS AD
MS ADMS AD
MS AD
 
Derbycon - Passing the Torch
Derbycon - Passing the TorchDerbycon - Passing the Torch
Derbycon - Passing the Torch
 
Finding attacks with these 6 events
Finding attacks with these 6 eventsFinding attacks with these 6 events
Finding attacks with these 6 events
 
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
GigaSpaces Cloud Computing Framework 4 XAP - Quick Tour - v2
 

Recently uploaded

Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Recently uploaded (20)

WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 

How to know your computer has been attacked

  • 1. University of Duhok Faculty Of Science Computer Department Submitted by: Dler Omer Ahmad Mamand
  • 2.
  • 3.
  • 4.
  • 5.  start  run  regedit  HKEY_LOCAL_MACHINE  Software  Microsoft  window  current Version  run
  • 6.
  • 7.
  • 8. 1. First make sure that how many users’ accounts are there in your computer 2. Find out if there are any unknown accounts with higher privileges. 3. Someone may create a user account without your knowledge and can use that account to access your system from a remote location.
  • 9. 4. Go to the control panel 5. open the user accounts and check if the user is turned off and if there is any other account that you did not create. 6. Delete any unknown account except known account
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.  Go to the the run  Write cmd  Write netstate –ano  watch state established and pid number  Go to the task manager  Go to process  look the pid number  Right click to the pid open file location and delete this server or vires
  • 16.
  • 17.  Process Red color : finish the work  Process green color :is hacked and continue  Process Yellow color : hacked and changed port and server