Did someone access my computer?

Has My Computer Been Compromised? A Personal Experience

In the digital age, we often take the safety of our devices for granted. Recently, I encountered a troubling situation that has left me questioning the security of my own computer. Here’s what happened.

A few days ago, I downloaded a program, and initially, everything seemed normal. Fast forward to today: while enjoying a YouTube video, I noticed my browser tab unusually moving around. To my surprise, it shifted from my primary monitor to a space between my two screens, subsequently opening a Google tab and typing in random website addresses. Without hesitating, I unplugged my computer to prevent any further anomalies, not even catching a glimpse of what those websites could be.

Once I powered my device back on, I conducted a quick security scan and discovered a suspicious program. After removing it, I was taken aback to see a new program install itself automatically during the scan. Alarmed by this uninvited presence, I deleted it immediately as well. My concerns grew when I checked the Event Viewer, revealing a staggering 33,660 recorded events. Admittedly, I’m not well-versed in the inner workings of this application, and I couldn’t discern whether this number was typical or indicative of a more significant issue.

The majority of these entries flagged an Event ID: 5379, which is noted to occur when a user undertakes a read operation on stored credentials in the Credential Manager. This raised two pivotal questions in my mind:

  1. Has someone gained access to my computer without my knowledge?

  2. If they indeed still have access, what steps do I need to take to ensure my privacy and security are restored?

As I navigate through this unsettling experience, I’m seeking insights from fellow tech enthusiasts and experts. Have you faced similar issues? What measures should I consider for safeguarding my system from potential intrusions? It’s essential to take proactive steps to protect our digital lives in this increasingly connected world.

Share this content:

Leave a Reply

Your email address will not be published. Required fields are marked *