Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Can my network be compromised if I just bought a new computer?

  • Please log in to reply
1 reply to this topic

#1 GreasySpot


  • Members
  • 7 posts
  • Local time:11:41 PM

Posted 09 April 2012 - 07:56 AM

Alright, my Dad's office has about 10 computers and they have all been locked down via securities to not have internet access; however one computer is open that receives the company email.

The other day some x-popups were on the screen when only one person was supposed to be in the office. This person denied it so any investigation was under way. A log was pulled of the last couple of months showing sites visited and the times they were visited. Some of the times were like 3 or 4 am. So logs where checked at the bldg security company to see when people were logged into the bldg, which no one was at the times involved. The computer has been slow for a very long time so my dad had already ordered another one before this happened so just replaced the computer in question.

So now we have a brand new computer added to the same network where it is the only computer online and it still shows visits to x-sites at 3 and 4 in the morning.

Can anyone explain what might be going on?


BC AdBot (Login to Remove)


#2 boopme


    To Insanity and Beyond

  • Global Moderator
  • 73,537 posts
  • Gender:Male
  • Location:NJ USA
  • Local time:10:41 PM

Posted 09 April 2012 - 12:10 PM

I am suspecting of a night crew some how..Cleaning,,night shift.

Are thet on a router?

What is the Antivirus?
Lets run 2 sans on the PC that connectd..

Please download TDSSKiller.zip and and extract it.
  • Run TDSSKiller.exe.
  • Click Start scan.
  • When it is finished the utility outputs a list of detected objects with description.
    The utility automatically selects an action (Cure or Delete) for malicious objects.
    The utility prompts the user to select an action to apply to suspicious objects (Skip, by default). Let the options as it is and click Continue
  • Let reboot if needed and tell me if the tool needed a reboot.
  • Click on Report and post the contents of the text file that will open.

    Note: By default, the utility outputs the log into system disk (it is usually the disk with installed operating system, C:\) root folder. The Log has a name like: TDSSKiller.Version_Date_Time_log.txt.

I'd like us to scan your machine with ESET OnlineScan
  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push Posted Image
  • Push Posted Image, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the Posted Image button.
  • Push Posted Image

NOTE: In some instances if no malware is found there will be no log produced.
How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users