What to do if my Computer got hacked

Isolate Your Computer:

In order to cut the connection that the hacker is utilizing to “pull the strings” on your PC, you have to isolate it so it can’t impact on a system. Isolation will keep it from being utilized to assault different PCs just as keeping the hacker from proceeding to have the option to get records and other data.


Pull the network cable out of your Computer and turn off your  Wi-Fi connection. In the event that you have a laptop, there is regularly a chance to turn the Wi-Fi off Try not to depend on doing this through software, as the hacker’s malware may disclose to you something is turned off when it is truly still associated.


Shutdown and Remove the Hard Drive:

If your PC is compromised you have to close it down to prevent further harm to your records. After you have powered it down, you should pull the hard drive out and interface it to another PC as an optional non-bootable drive. Ensure the other PC has exceptional up-to-date anti-virus and anti-spyware. You ought to most likely likewise download a free spyware removal tool or a free rootkit identification scanner from a respectable source like Sophos.

To make things somewhat simpler, consider acquiring a USB drive caddy to put your hard drive in to make it simpler to interface with another PC. If you don’t utilize a USB caddy and opt to connect the drive internally instead, ensure the plunge switches on the back of your drive are set as a secondary “slave” drive. If it is set to “master” it might try to boot the other PC to your working system and all hell could hit the fan once more.

If you don’t feel great removing a hard drive yourself or you don’t have an extra PC then you might need to take your PC to a legitimate nearby PC repair shop.

Scan Your Drive for Infection and Malware:

Utilize the other host PC’s anti-virus, anti-spyware, and against rootkit scanners to guarantee recognition and removal of any infection from the document framework on your hard drive.

Create a Backup Your Important Files from the Previously Infected Drive:

You’ll need to get all your own information off of the recently infected drive. Duplicate your photographs, documents, media, and other individual documents to DVD, CD, or another clean hard drive.

Move Your Drive Back to Your PC:

When you have checked that your document backup has succeeded, you can move the drive back to your old PC and get ready for the following piece of the recuperation procedure. Set your drive’s plunge changes back to “Ace” also.

Totally Wipe Your Old Hard Drive:

Regardless of whether virus and spyware scanning uncovers the danger is gone, you should in any case not believe that your PC is malware free. The best way to guarantee that the drive is totally perfect is to utilize a hard drive wipe utility to totally clear the drive and after that reload your operating system from trusted media.

After you have upheld up to the entirety of your information and put the hard drive back in your PC, utilize a safe circle delete utility to totally wipe the drive. There are many free and business disk delete utilities accessible. The circle wipe utilities may take a few hours to totally wipe a drive since they overwrite each segment of the hard drive, even the vacant ones, and they regularly make a few goes to guarantee they didn’t miss anything. It might appear time-consuming however it guarantees that no stone is left unturned and it’s the best way to make sure that you have eliminated the threat.

Scan Your Data Backup Disks for Viruses:

Despite the fact that you are genuinely sure that everything is perfect, dependable filter your information documents prior to reintroducing them once more into your system.

Make a Complete Backup of Your System:

Once everything is in the pristine condition you ought to complete a total backup so that if this ever happens again you won’t invest as much energy reloading your system. Utilizing a backup tool that makes a bootable hard drive image as a backup will help accelerate future recoveries immensely.

Reinstall Anti-Virus, Anti-Spyware, and Other Security Software:

Prior to stacking some other applications, you should load and fix all your security related software. You have to ensure your antivirus software is up-to-date is exceptional preceding stacking different applications in the event that those applications are harboring malware that may go undetected if your infection marks aren’t present.

Great Tech Support Free Diagnostics 24/7 Expert Assistance For Any Issue. Dial 1-800-998-3143