How Do I know if My Computer Has Been hacked ?? Let's Know

in cellphone •  7 years ago 

ransomware-2321665_960_720.png
source

If you tell me, there is a special chip attached to your computer that has the power to control all the hardware on your computer and it can be accessed remotely and there is no way to discharge it. What is weird to hear? Although strange, the matter is completely true and horrible. Today's article will discuss topics that you have never heard before.

Processor Risk ??

Today most of the computers are used as the life of Intel and AMD processors. If you are using an Intel processor computer, you must have heard the Intel Management Engine name or watched while installing the driver. If you are an AMD user then you will hear the name of the platform security processor. But you know what has been done for the past ten years, computers with Intel and AMD processors, these two types of chips have been installed - and these chips work as a backdoor for all computers. Although Intel and MD promise that these backdoors are used only by their legitimate work, there are some reasons why it is permissible for you to worry.

cooler-933691_960_720.jpg
source

Intel Management Engine

What is the main thing in Intel M-Engine? It can basically say a different and collaborative processor chip, which is physically sticky with the Intel chipset. Simply put, Intel Management Engine can tell you another computer in your original computer. But the worst thing is that we almost do not know what it used to be. It basically works on Intel-owned code and never releases Intel's source code. However, there are valid features in it that Intel uses to improve their service standards.

Cellphone ??

"Well, brother, I got it! My computer has a secret backdoor and I can not even dispose it, but my cell phone is safe from this matter? Korna Cellphone does not have Intel or AMD processors installed! So at least safe from this direction, right? " Have you ever heard about baseband processors? Of course not, but every cellphone has this processor installed, it mainly converts the radio signals and digital signals from the phone's antenna. Of course, there is a need for this chip to work properly on your phone and of course yes, this chip has low level access to control all the data on your phone.

mother-board-581597_960_720.jpg
source

Points ??

"I understand everything, what is the point of discussion for the bat? Intel and AMD will not hack our PC, is not it? Again the code has huge encapsulation, then what is the result of this discussion? "-Yes brother, of course Intel or AMD will not monitor or hack your computer using this secret backdoor. But here only Intel or AMD is not the reason of fear. It is a matter of fear that if a hacker group crashes ** or if a government tries to access it then it can definitely be horrific. Yes, this chip has many hardcore encodings installed, but I have already said no encryption will give you 100% security. Cray ** is difficult or hard to do, but it is not that it will not be crayed.

It may be that a hacker will find some vulnerabilities in this chip with very cleverness, and if it is possible, then he can take control of almost any computer in the world that runs in Intel or AMD processor. And since this chip works bypassing the main processor of the computer, it is almost impossible not to save your PC from a hack attack, but completely impossible. Since this chip can work directly connected to the PC's network interface and can receive traffic receipts and send, hackers can easily inject any malware onto your computer. If the operating system blocks the malware on the firewall, then this chip can easily bypass the block.

motherboard-232515_960_720.jpg
source

Last word

Whatever the probability of hacking, however, it can be estimated that such a hack attack can happen. If the processor gets hacked, what can we do? nothing! I can not do anything at all. It does not matter what operating system you are using or how strong password you are using. In fact, many strong passwords can not even provide you security. Suppose you have set up a 50-character password, but if someone asks you a password on your head, give it a try!

Would you like to add some points?

Then comment And also Follow Me

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

If the operating system blocks the malware on the firewall, then this chip can easily bypass the block and this is fact

oh you got me.... thanks ....... stay wait us

I think you are right!

exactly you are right

Very Important Article. I Learned More Important Things About Hacking. Your Article will help me to get rid from hacking. Thanks for sharing.

Very useful information.Thank you so much for that.

Thanks for this awesome post, i have learned very importance things from this post . i will follow these tips :D

  ·  7 years ago Reveal Comment

every will proy for me

vaia ai rokom coto coto commne t korben na.,,,,, nije e somossay porben

plz vote & comment me

Very helpfull information.Thank you so much bro

I read your post. I learned a lot. Thanks so much for posting so much! Waiting for something new!

useful information. Thank You.

You're a nice writer. You have give me an important information. thank you very much.
You'rea nice man on steemit. 👌✌

This is very useful important and Awesome post . Thank you FXsajol for this creative writing. Best of luck and thank you .

wow you are ?.... thanks man,,,,, keep in touch