Skip to main content

HOW TO SEE WHICH WEBSITES YOUR COMPUTER IS SECRETLY CONNECTING TO?

 HOW TO SEE WHICH WEBSITES YOUR COMPUTER IS SECRETLY CONNECTING TO?


Has your Internet connection become slower than it should be?
There may be a chance that you have some malware, spyware,
or adware that is using your Internet connection in the
background without your knowledge. Here’s how to see what’s
 going on under the hood.


It’s worth noting that most third-party firewalls will probably give you
this same type of information as well as block things that are trying to
 connect… unless the applications managed to add an exclusion already.
Better check anyway.
So, how do you find out what the problem is? There is an easy method using the netstat
command from a command prompt window. This works with Windows 10, 8, 7, Vista, and XP.
 If you’re still using XP, make sure you are running at least Service Pack 2,
and just assume that somebody already hacked your computer because your operating
system is now a teenager.

We will use the netstat command to generate a list of everything that has made an
 Internet connection in a specified amount of time. To use the netstat command,
you must run the command prompt window as administrator.

press windows key plus r and type cmd. press enter.(make sure you run it as admin)

At the command prompt, type the following command and press Enter.

    netstat -abf 5 > activity.txt

The –a option shows all connections and listening ports, the –b option
shows you what application is making the connection, and the –f option
displays the full DNS name for each connection option for easier
understanding of where the connections are being made to.
You can also use the –n option if you wish to only display the IP address.
 The 5 option will poll every 5 seconds for connections to make it more easy to track
what is going on, and the results are then piped into the activity.txt file.
Wait about two minutes and then press Ctrl + C to stop the recording of data.
Once you’ve finished recording data, you can simply open the activity.txt file in your
favorite editor to see the results, or you can type activity.txt at the command line to
 open it in Notepad.

The resulting file will list all processes on your computer (browsers, IM clients,
email programs, etc.) that have made an internet connection in the last two minutes,
 or however long you waited before pressing Ctrl + C. It also lists which processes
 connected to which websites.

If you see process names or website addresses with which you are not familiar, you
can search for “what is (name of unknown process)” in Google and see what it is.
It may be a system function you don’t know about or a function of one of your running
programs. However, if it seems like a bad site, you can use Google again to
find out how to get rid of it. 😉

                  Thank You for reading






                         

Comments

  1. Hey Guys !

    USA Fresh & Verified SSN Leads AVAILABLE with best connectivity
    All Leads have genuine & valid information

    **HEADERS IN LEADS**
    First Name | Last Name | SSN | Dob | DL Number |Address | State | City | Zip | Phone Number | Account Number | Bank Name

    *Price for SSN lead $2
    *You can ask for sample before any deal
    *If anyone buy in bulk, we can negotiate
    *Sampling is just for serious buyers

    ==>ACTIVE & FRESH CC FULLZ ALSO AVAILABLE<==
    ->$5 PER EACH

    ->Hope for the long term deal
    ->Interested buyers will be welcome

    **Contact 24/7**
    Whatsapp > +923172721122
    Email > leads.sellers1212@gmail.com
    Telegram > @leadsupplier
    ICQ > 752822040

    ReplyDelete

Post a Comment

Popular posts from this blog

Embed Backdoor in any Android app | Android Hacking | Tricky Hash |

  H OW TO  CREATE A ANDROID TROJAN INTRO Everybody  install and use apps these days. So, the easiest way to hack a android by embed a Backdoor to a normal apk File. Now, install this apk file in your Victim's phone by using some Social Engineering trick.  When it is executed the user will see a normal app but in the same time our Backdoor will be running in the Background. REQUIREMENTS A Legitimate android apk file. Kali Linux  The FATRAT (Linux Tool) PROCEDURE   To embed Backdoor in any legitimate apk, we use fatrat. We have to install Fatrat in out terminal. Fatrat is used to generate local or remote listeners. It can generate payloads in various formats.  To Install Fatrat we'll have to use the following commands:  git clone  https://github.com/Screetsec/TheFatRat.git After cloning into TheFatRat now type: ls (enter) cd TheFatRat (enter) ls (enter) chmod +x setup.sh (enter) ls (enter) ./setup.sh (enter) It will automatically install all th...

CARDING!(BASICS,PROCEDURES,PRECAUTIONS,CONSEQUENCES)

part-1  * Why does the bank card number have #16 digits and what do these number s mean? * * 16 digits * on the card contains important information and * 6 digits * The first is the bank identification number and specifies which bank issued the card.  By examining these * 6 digits *, programmers will recognize the card issuing bank. "Brought to you by the Dark Army. * (Bank Identification Number) *   they say.  This number for some banks is as follows: Bank name Bank                       Bank Code      ----                       --------- Chemical Bank                    1263 Marine Midland                   6207 [1207?] Manufacturers Hanover Trust      1033 Citibank               ...

How to Guess any Password like Hackers Do | Password Cracking | Ethical Hacking |

In this article, I am going to tell you how Hackers and Crackers crack the password by Guessing. After reading this, you will be able to start think like a hacker. They use some methodologies while guessing and cracking passwords. So let's dive into it:  1. Guess the most common passwords At the end of every year, a list of the 25 most common passwords is released. These passwords are the easiest to guess and thus the most commonly hacked. Though you should avoid picking any of these passwords for yourself, try guessing from this list of passwords: 123456@  12345678  abc123  qwerty  monkey  letmein  dragon  baseball iloveyou  trustno1 1234567  sunshine  master  123123  welcome  shadow  Ashley  football  Jesus  Michael  ninja  mypassword  password1 2. Use some common password tricks  Other than guessing the most obvious passwords, there are a some tricks that are used by hackers....