Available Files

No files uploaded.

Related discussions

Network Admin Discussion started by Network Admin 4 years ago
Computer Software and Hardware Advice and Discussions - this section will host information and advice from some our members in the computer business. Post your computer queries here and get advice from other members or IT experts. Also feel free to share any useful information you feel would benefit the group.

Disclaimer - Advice given in this discussion is general in nature and the authors of this discussion and the owners of nakoo.net will not be held liable for any information provided herein.


Replies
Network Admin
Network Admin Crypto-jacking occurs when a hacker takes over a user’s device, without their permission to mine for crypto-currencies. The frequency of this type of attack seems to be accelerating 4 years ago
loader
loader
Attachment
Network Admin
Network Admin You should keep all programs and operating systems updated and run daily security scans.
A good trick is to monitor your computer usage through Task Manager. If your device has been exploited for crypto-mining purposes, you will see the web browser using a large amount of resources within Task Manager. To access Task Manager, hold down the Ctrl+Alt+Delete keys, then select Task Manager.
4 years ago
loader
loader
Attachment
Network Admin
Network Admin If you ever wonder if any of your online accounts have been compromised, a site called haveibeenpwned can help - search to see if your email address or account names have shown up in these data breaches. If you haven't used it before, it's worth checking out and setting up notifications so you'll get an email if your accounts show up in a future data breach 4 years ago
loader
loader
Attachment
loader
loader
Attachment