Skip to main content

HOW TO SEE WHICH WEBSITES YOUR COMPUTER IS SECRETLY CONNECTING TO?

 HOW TO SEE WHICH WEBSITES YOUR COMPUTER IS SECRETLY CONNECTING TO?


Has your Internet connection become slower than it should be?
There may be a chance that you have some malware, spyware,
or adware that is using your Internet connection in the
background without your knowledge. Here’s how to see what’s
 going on under the hood.


It’s worth noting that most third-party firewalls will probably give you
this same type of information as well as block things that are trying to
 connect… unless the applications managed to add an exclusion already.
Better check anyway.
So, how do you find out what the problem is? There is an easy method using the netstat
command from a command prompt window. This works with Windows 10, 8, 7, Vista, and XP.
 If you’re still using XP, make sure you are running at least Service Pack 2,
and just assume that somebody already hacked your computer because your operating
system is now a teenager.

We will use the netstat command to generate a list of everything that has made an
 Internet connection in a specified amount of time. To use the netstat command,
you must run the command prompt window as administrator.

press windows key plus r and type cmd. press enter.(make sure you run it as admin)

At the command prompt, type the following command and press Enter.

    netstat -abf 5 > activity.txt

The –a option shows all connections and listening ports, the –b option
shows you what application is making the connection, and the –f option
displays the full DNS name for each connection option for easier
understanding of where the connections are being made to.
You can also use the –n option if you wish to only display the IP address.
 The 5 option will poll every 5 seconds for connections to make it more easy to track
what is going on, and the results are then piped into the activity.txt file.
Wait about two minutes and then press Ctrl + C to stop the recording of data.
Once you’ve finished recording data, you can simply open the activity.txt file in your
favorite editor to see the results, or you can type activity.txt at the command line to
 open it in Notepad.

The resulting file will list all processes on your computer (browsers, IM clients,
email programs, etc.) that have made an internet connection in the last two minutes,
 or however long you waited before pressing Ctrl + C. It also lists which processes
 connected to which websites.

If you see process names or website addresses with which you are not familiar, you
can search for “what is (name of unknown process)” in Google and see what it is.
It may be a system function you don’t know about or a function of one of your running
programs. However, if it seems like a bad site, you can use Google again to
find out how to get rid of it. 😉

                  Thank You for reading






                         

Comments

  1. Hey Guys !

    USA Fresh & Verified SSN Leads AVAILABLE with best connectivity
    All Leads have genuine & valid information

    **HEADERS IN LEADS**
    First Name | Last Name | SSN | Dob | DL Number |Address | State | City | Zip | Phone Number | Account Number | Bank Name

    *Price for SSN lead $2
    *You can ask for sample before any deal
    *If anyone buy in bulk, we can negotiate
    *Sampling is just for serious buyers

    ==>ACTIVE & FRESH CC FULLZ ALSO AVAILABLE<==
    ->$5 PER EACH

    ->Hope for the long term deal
    ->Interested buyers will be welcome

    **Contact 24/7**
    Whatsapp > +923172721122
    Email > leads.sellers1212@gmail.com
    Telegram > @leadsupplier
    ICQ > 752822040

    ReplyDelete

Post a Comment

Popular posts from this blog

Embed Backdoor in any Android app | Android Hacking | Tricky Hash |

  H OW TO  CREATE A ANDROID TROJAN INTRO Everybody  install and use apps these days. So, the easiest way to hack a android by embed a Backdoor to a normal apk File. Now, install this apk file in your Victim's phone by using some Social Engineering trick.  When it is executed the user will see a normal app but in the same time our Backdoor will be running in the Background. REQUIREMENTS A Legitimate android apk file. Kali Linux  The FATRAT (Linux Tool) PROCEDURE   To embed Backdoor in any legitimate apk, we use fatrat. We have to install Fatrat in out terminal. Fatrat is used to generate local or remote listeners. It can generate payloads in various formats.  To Install Fatrat we'll have to use the following commands:  git clone  https://github.com/Screetsec/TheFatRat.git After cloning into TheFatRat now type: ls (enter) cd TheFatRat (enter) ls (enter) chmod +x setup.sh (enter) ls (enter) ./setup.sh (enter) It will automatically install all the required dependencies please be pa

CARDING!(BASICS,PROCEDURES,PRECAUTIONS,CONSEQUENCES)

part-1  * Why does the bank card number have #16 digits and what do these number s mean? * * 16 digits * on the card contains important information and * 6 digits * The first is the bank identification number and specifies which bank issued the card.  By examining these * 6 digits *, programmers will recognize the card issuing bank. "Brought to you by the Dark Army. * (Bank Identification Number) *   they say.  This number for some banks is as follows: Bank name Bank                       Bank Code      ----                       --------- Chemical Bank                    1263 Marine Midland                   6207 [1207?] Manufacturers Hanover Trust      1033 Citibank                         1035 Huntington                       1226 First Card Gold                  1286   MBNA                             6017 Chase Manhatten                  1665 [ Bank from 5127 ]               1015 Capital Bank.                       6396 Future Bank.                         6362 City Bank.   

Linux for Beginners | Tricky Hash

Linux Operating System is the best known, free and open source operating system. Linux is broadly used in operations of server based machines, security tools and number of such categories. Fedora, Cent OS, Ubuntu, Debian are one of the famous flavours from Linux family. If you are looking to experience Linux Operating System, then it is highly recommended to make yourself aware regarding few important commands.  There are generally two types of user in Linux, Regular User who celebrates limited access and Root User who celebrates complete access. Let's see few master terms and commands every beginners should know in Linux OS: • Root User : Root User in Linux celebrates access on all the commands and files. • man : This "man" command provides complete manual of any command. For example: "man passwd" • locate : This "locate" command helps user to find the files by name. • ls : This "ls" command helps to list the table. • pwd : PWD here stands