Can Third Party Software Monitor Your Computer?

  • Thread starter Thread starter AbsoluteZer0
  • Start date Start date
Click For Summary

Discussion Overview

The discussion centers around the possibility of third-party software being used to monitor a user's computer activity, particularly in the context of a user feeling suspicious about a friend's knowledge of their laptop's contents. Participants explore various scenarios regarding potential unauthorized access and methods to secure the device.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested

Main Points Raised

  • One participant suggests that it is possible, though unlikely, for someone to monitor a computer's activity through third-party software.
  • Another participant proposes that the friend could have installed software on the user's system or guessed the wireless network password.
  • A different viewpoint emphasizes the importance of checking for suspicious background processes and network traffic, particularly for Windows users.
  • One participant mentions that if a machine is infected, the only sure way to eliminate the threat is to format and reinstall the operating system, unless the user has advanced technical skills.
  • There is a suggestion that the friend's behavior might simply be a prank rather than an indication of actual monitoring.

Areas of Agreement / Disagreement

Participants express a range of views on the likelihood of unauthorized access, with some suggesting it is possible while others downplay the concern. There is no consensus on the situation's severity or the friend's intentions.

Contextual Notes

Participants mention various methods for detecting unauthorized access, but there are no specific steps agreed upon, and the discussion includes a mix of technical advice and personal interpretations of the friend's behavior.

Who May Find This Useful

This discussion may be of interest to individuals concerned about computer security, those experiencing similar suspicions regarding unauthorized access, or users seeking advice on securing their devices.

AbsoluteZer0
Messages
124
Reaction score
1
Hi,

Is it possible for somebody to monitor the activity on your computer using third party software?
I have a friend who knows a lot of stuff about what's on my laptop (a macbook) that he has no way of knowing about.

I feel like he's hinting me about it. I showed him a picture once that I took from a guy's website (I sent him the link) and he asked if I got that photo from my desktop (I did have it on my laptop, but I didn't share him the photo through my computer, I sent him a link from a website.) He also once said "my watch is big." He doesn't even own a watch from what I remember. I interpreted "watch" as it relates to sight.

Is it possible that he has access to my files or am I just being insecure and paranoid? If he does have access to my files, are there any ways I can get his nose out of my laptop?

Thanks,
 
Computer science news on Phys.org
Yes, it is quite possible, though unlikely.

He could have installed something on your system when you weren't looking...
He could have guessed the password on your wireless network...

How to stop it depends on how he got access.

But so far, your comments about what he seems to know about your laptop don't really raise any alarm bells for me.
 
If your OS is Windows, then get a firewall and see what traffic is going in and out of your system. Check for system services and make sure there is nothing fishy running in the background. Check for any executables that are running in the background that are suspicious.

If it's a stuxnet type thing, check your device drivers that are running (probably very unlikely of course).

The thing is that computers work on what they are programmed to do. If data is going in and out, your network traffic will indicate that. Turn off all the stuff that could be used in the wrong way, and make sure you know what you are doing if this is the case: don't do it if you don't know what you are doing because you could screw it up.

Also change your password and make sure crap like Remote Control for your PC is off as well. Check for other accounts on your PC besides your own login and get rid of them if they exist: (if a suspicious one exists, you know something is up).
 
I question your definition of friend.

If a machine truly is infected, the only sure way is to format and reinstall, unless you are absolutely sure you know you are doing. Once you get admin access on a machine, you can install anything, even software that can hide from firewalls and security software. Most stuff isn't that good, but you can never tell.

I define "absolutely sure" at minimum that you read memory dumps and stack traces and you can use a disassembler. In other words, if you are asking, then you format and reinstall. Morally, I feel that giving you any other advice would be wrong.

However, he's *probably* just pranking you.
 

Similar threads

  • · Replies 13 ·
Replies
13
Views
1K
  • · Replies 30 ·
2
Replies
30
Views
4K
  • · Replies 15 ·
Replies
15
Views
3K
  • · Replies 13 ·
Replies
13
Views
2K
Replies
2
Views
1K
  • · Replies 12 ·
Replies
12
Views
2K
  • · Replies 20 ·
Replies
20
Views
16K
  • · Replies 36 ·
2
Replies
36
Views
6K
Replies
1
Views
2K
  • · Replies 5 ·
Replies
5
Views
4K