TL;DR
This guide helps you quickly check if your computer or network has been compromised by a hacker. We’ll cover looking for unusual processes, suspicious accounts, and signs of data changes.
1. Scan For Malware
- Run a Full System Scan: Use your existing antivirus software (Windows Defender is good if you don’t have anything else). Make sure it’s up to date *before* scanning.
- For Windows Defender, open ‘Security Centre’, then ‘Virus & threat protection’. Click ‘Scan options’ and choose ‘Full scan’.
- Consider a Second Opinion: Download a free on-demand scanner like Malwarebytes (free version is sufficient for this check). This can catch things your main antivirus might miss.
- Download from Malwarebytes and follow the installation instructions.
2. Check Running Processes
Hackers often run programs in the background. We’ll look for anything unusual.
- Open Task Manager: Press Ctrl+Shift+Esc.
- On Windows, go to the ‘Processes’ tab.
- On macOS, open Activity Monitor (Applications > Utilities).
- Look for Suspicious Names: Pay attention to processes with random characters or names that don’t make sense.
- Sort by ‘Name’ to group similar processes.
- Google any process you don’t recognise!
- Check Resource Usage: Is a process using an unusually high amount of CPU or memory?
- High usage could indicate malicious activity.
- Command Line Check (Advanced): Open Command Prompt as administrator and use this command to list processes:
tasklist /vThis shows detailed information about each process, including its path.
3. Review User Accounts
Hackers often create new accounts to maintain access.
- Windows: Open ‘Settings’ > ‘Accounts’ > ‘Family & other users’. Look for any accounts you didn’t create.
- If you find an unknown account, delete it immediately.
- macOS: Go to ‘System Settings’ > ‘Users & Groups’. Check the list of users and look for unfamiliar names.
- Select the user and click the minus (-) button to remove them.
4. Examine Network Connections
Hackers need network connections to control your computer or steal data.
- Windows: Open Command Prompt and use this command:
netstat -anoThis shows all active network connections. Look for connections to unfamiliar IP addresses.
- The ‘Foreign Address’ column is the remote server your computer is connected to.
- Google any suspicious IP addresses.
- macOS: Open Terminal and use this command:
netstat -an | grep ESTABLISHEDThis shows established network connections.
5. Check For Modified Files
Hackers might change important system files.
- Windows: Use System File Checker (SFC).
sfc /scannowThis scans and repairs corrupted system files.
- macOS: This is harder on macOS without specific tools. Look for recently modified files in important directories like /System/Library or /Applications (using Finder’s ‘Date Modified’ sort).
6. Review Firewall Logs
Your firewall records network traffic. Check it for unusual activity.
- Windows Defender Firewall: Open ‘Security Centre’, then ‘Firewall & network protection’. Click ‘Advanced settings’ and review the logs.
- Look for blocked connections from unfamiliar sources.
Important Notes
- Backups: If you suspect a serious compromise, restore your computer to a recent backup (if available).
- Change Passwords: Change passwords for all important accounts.
- Report the Incident: Consider reporting the incident to your local cyber security authority.

