Computer Hope

Hardware => Hardware => Topic started by: berzas on July 29, 2018, 09:54:39 AM

Title: How to cleanse from unwanted hardware?
Post by: berzas on July 29, 2018, 09:54:39 AM
I suspect that somebody have attached stuff to my desktop computer.
Every time I turn on computer - somebody can use my rams-cpu remotely.
How these devices is called? How to find out if my motherboard have only default devices, no "extra" attached?
Title: Re: How to cleanse from unwanted hardware?
Post by: patio on July 29, 2018, 12:06:09 PM
I don't understand...how in fact do you know your CPU/RAM is being used by someone else ?
Title: Re: How to cleanse from unwanted hardware?
Post by: EndOfForever on July 29, 2018, 02:01:18 PM
Malicious actors have many ways to compromise one's computer, but the tried and true method is to first get physical access to the computer. 

Do you have a reason to be suspicious of someone accessing your system? You don't have to give us specifics since we don't know what kind of situation you are in... but a few more details from you would be helpful.

In the meantime, physically inspect all external ports on your system, especially USB ports and memory card ports if you have them.  If there's a USB drive you don't recognize, that's a very big problem.  There also could be a wireless device on a USB port that sends and receives data.  These devices can be extremely small and low-profile, designed not to stick out, so look carefully.

Malicious drive can also be place inside your computer, so trace each drive from all your SATA ports as well.
Title: Re: How to cleanse from unwanted hardware?
Post by: skypuppy on August 03, 2018, 05:23:59 PM
You could also try to boot from a different CD/DVD, whether Windows or Linux, and see what the screen reports during boot.  This solution gets very advanced very rapidly, though.
Title: Re: How to cleanse from unwanted hardware?
Post by: patio on August 04, 2018, 07:17:38 AM
HuHH ? ?
Title: Re: How to cleanse from unwanted hardware?
Post by: skypuppy on August 04, 2018, 08:25:51 AM
Patio, is your "Huhh" in response to my suggestion?
Title: Re: How to cleanse from unwanted hardware?
Post by: patio on August 04, 2018, 08:35:23 AM
Yes...
Title: Re: How to cleanse from unwanted hardware?
Post by: skypuppy on August 04, 2018, 08:40:43 AM
Booting from a known good OS removes the possibility of a virus problem, especially if it's a "live" Linux OS, but unsure if OP knows Linux or not.  At least it will give him an idea of where to look for further diags.  If the OP's problem is some funky hardware takeover, then all bets are off, and the OP will just have to remove all hardware and boot from the DVD anyway, then start adding stuff back piece by piece.

OP, can you check and see if you have "remote control/access" turned on or not?
Title: Re: How to cleanse from unwanted hardware?
Post by: OliviaRoss on August 20, 2018, 07:03:15 AM
It might be done remotely by malicious files, trojans or other malware that appear like a common file in Task manager. You should scan your PC using anti-malware or alternative malware removal tool. It is less likely that someone plugged any infected drive on your computer
Title: Re: How to cleanse from unwanted hardware?
Post by: Allan on August 20, 2018, 08:58:15 AM
In spite of all the suggestions, I'm still trying to figure out what the actual issue is.
Title: Re: How to cleanse from unwanted hardware?
Post by: Geek-9pm on August 20, 2018, 09:00:41 AM
berzas,
Some questions.
• Do you leave you computer on all the time?
• Is it always connected to the Internet?
•  Also, do you have a printer that is always on and can get to the Internet?  **
• Do other people go into to your house or office?

If any of the above are true, somebody could use your computer .

** A horrible security leak  in some printers was reported awhile back.
Here is one variation of the story:
https://www.pcmag.com/news/355256/your-printer-can-steal-and-deface-your-documents
Quote
Add the ability to access the printer via USB, local network, or over the internet, and you have the recipe for a devastating attack. In fact, security researchers have warned for years that connected devices like printers, routers, and even VoIP phones could be used as beachheads for an attacker. The phone might not be very useful for an attacker, but perhaps they could use it to pivot to your secure network.
Title: Re: How to cleanse from unwanted hardware?
Post by: CaptainStark on August 20, 2018, 11:29:09 AM
"Every time I turn on computer - somebody can use my rams-cpu remotely."

May I ask how are you able to check this? Or is it still part of your theory? I think we need to clarify the situation first before giving any suggestion.