5 Ways to Make Sure No One is Monitoring Your Computer

A friend recently was over and asked me if there was a way to tell if someone was monitoring their computer or not. She had a feeling that her computer-savvy boyfriend installed something on her computer to monitor what she was doing.

Several years ago, I wrote an article about detecting computer and email monitoring by checking open ports in the firewall and by seeing if everything is being routed through a proxy server. However, that’s a pretty old article and there are so many programs that are really impossible to detect nowadays. Not only that, a lot of times you don’t even have to install software to monitor someone’s computer.

For example, if a person can access your wireless router, then they can monitor your activity without having to touch the computer. Read my previous post on how you can block websites from your router to understand the principle. So if I relative or family member or significant other has access to your router, they can monitor you.

Also, Windows has a feature called Group Policy or Local Policy that basically lets administrators change settings across the computer and because it’s a built-in feature of Windows, it won’t ever be caught by virus scanners or show up anywhere else on the system.

In this article, I’m going to tell you a couple of things that you can do to make sure no one is monitoring your computer without trying to teach you how to find it on your computer or network. Sometimes it’s just not going to be possible, but since you have control over the hardware, you can still stop it. Here’s how.

Method 1 – Virus and Malware Scan

If something has been installed and even if it’s very hidden in the system, scanning your computer with multiple virus and anti-malware programs could possibly find it. Check out my previous post on different ways to find and remove viruses. Also, read my post on the top 10 best anti-virus programs out there and use them to scan your computer.

virus scan

If the program installed is really sneaky, it may even have certain ways to add itself to the exception list in your anti-virus program. A better way to scan is to perform an offline scan of Windows. This basically means you scan for viruses before Windows even loads up. Check out my post on performing an offline virus scan.

If you find absolutely nothing performing all these scans, then your next step is to really ensure Windows has not been comprised in other ways.

Method 2 – Clean/Repair Install Windows

As I  mentioned above, there are ways to monitor a computer without necessarily installing a program that is considered a virus. In these types of cases, unless you are really technically-savvy, you won’t be able to figure out if you’re being monitoring or not.

install windows

However, you can still do something about it. In Windows, you can perform a clean install or a repair install. Clean install will wipe the operating system and all data and start you from scratch. A repair install is another option that basically resets Windows, but maintains all your data and programs.

I recommend doing a clean install if you really think someone is monitoring you. Everything is gone and therefore your system will be absolutely clean with no chance of being monitoring from the computer itself. There are lots of guides online on performing a clean install, which might not be a bad idea anyway if you have never done it before.

Check out my posts on clean installing Windows 7 and clean installing Windows 8. This is by far the most guaranteed way to ensure no one is monitoring your computer.

Method 3 – Reset and Secure Wireless Router

The other weak point when it comes to being monitored is the wireless router. Most people don’t worry about that too much, but it’s one of the easiest things to hack into and a lot of times someone can gain access to it without even needing to perform a hack.

wireless router

For example, a lot of people secure their wireless networks and think that the network is highly secure. Yes, it’s true that the network cannot be instantly accessed by anyone trying to connect, but did you remember to set a password on your router web admin page? If you didn’t set a password for the admin web page for your router, anyone could just plugin their computer directly to the router and change all the settings to what they desire.

I’ve also learned that the people most likely to monitor you are the people who are fairly close and have access to things like your computer or your router. So what can you do? Go ahead and reset the wireless router completely. Usually there is a reset button on the back of the router that you can hold for 10 to 15 seconds that will reset it. Any configured settings will be lost and everything will be back to the factory default. So if someone managed to change the DNS server or something else, it’ll all be gone.

At this point, you want to do two things: first, secure the wireless network using WPA2 with AES or TKIP and then set a password for your router. All routers come with default usernames and passwords, which should be changed immediately.

Method 4 – Use a Different Network

A lot of times when someone is monitoring your computer, it usually is dependent on the network you are connected too. For example, someone may have installed a key logger program that uploads data to another computer on the same network. Or their may be a program running on another computer that listens and waits for data to be sent to it from the monitored computer.

In these types of cases, you can try using a different network. For example, if you’re using the wireless network at your home, maybe you can try connecting your laptop or computer to the Internet using a tethered phone connection. I know at my office, they had a corporate network spying tool and I used to bypass it by disconnecting my computer from the corporate network and then using my smartphone, connecting it to my computer via USB and accessing the Internet that way.

This won’t ensure you are not being monitored in all cases, but it does help prevent some types of monitoring depending on how the person set it up.

Method 5 – Unplug or Disconnect

Lastly, you can always just unplug your computer or disconnect your machine from the network. Not the ideal solution obviously, but it will ensure that no one is monitoring you. Basically, it’s good to unplug and then follow the other methods mentioned above. In case someone has a program where they can see your desktop or computer remotely, then disconnecting will obviously prevent them from seeing what’s going on.

Overall, I have learned that trying to figure out the source of monitoring is too hard unless you really are a computer geek. The best thing to do if you feel you’re being monitored is just to reset all your current systems. The computer and wireless network are the main avenues to access your computer, so if you reset those, you can be pretty happy knowing you’re not being monitored anymore.

What are your thoughts? Do you feel you are being monitored? Are you having trouble performing any of the steps mentioned above? Feel free to post your comments and I’ll help out. Enjoy!

More posts from the Featured Posts Category

Easily Change the New Ubuntu Oneiric Login Screen Background

Easily Secure Your Data Without Administrative Privileges Using SafeHouse Explorer – Part I

Install and Setup a Website in IIS 8 on Windows 8

Try out ChromeOS/ChromiumOS Without Installing It

Popular Posts This Month

runas command

5 Windows Alternatives to the Linux sudo Command

5 Utilities for Changing DNS Servers in Windows Reviewed

windows defender

Windows Defender vs. Security Essentials vs Safety Scanner

youtube ie11 freezing

How To Fix Flash Crashes in Internet Explorer 11

Comments [2]

  1. streetsmart says:

    ….here you are publishing an article on computer security and I am confronted with annoying pop up windows blocking my view or trying to sell something!!

  2. farhat mahmood says:

    Thank you so much. I am 100% sure that someone is monitoring/watching my computer. Please tell me what to do now?

Leave a Reply