Monitor Hidden Website which uses your Internet

How to Monitor Hidden Website which uses your Internet 

You can be sure that your computer is connected to the Internet and to the server which hosting my website as you read this article, but in addition to the connections to the sites open in your web browser, your computer may be connecting to a whole host of other servers that are not visible.

if you think there is a program on your computer that shouldn’t be there communicating secretly on the Internet, the methods below will help you identify anything unusual.

There are many ways to monitoring the connections that your computer makes to the Internet: In this article, i am going to show you by Resource Monitor.

Resource Monitor –

The easiest way to monitoring the connections that your computer makes to the Internet is to use Resource Monitor. To open it, you have to click on Start and then type in resource monitor. You’ll see several tabs across the top and the one we want to click on is Network

resource-monitor

On this tab, you will see several sections with different types of data: Processes with Network Activity, Network Activity, TCP Connections and Listening Ports.

In the Processes with Network Activity section, the list includes all the processes that have any kind of network activity. You’ll also be able to see the total amount of data sent and received in bytes per second for each process. You’ll notice there is an empty checkbox next to each process, which can be used as a filter for all the other sections.

If you find any unknown process then first google it and get all the detail and if that is any driver update or some type of background process of one of your program then don’t remove it. But if you did not find anything related to that process in your computer then right click on the process and end now.

All of this data is a first step to determining whether something fishy is going on your computer. You’ll have to do a lot of Googling, but it’s the best way to know if someone is snooping on you or if malware is sending data from your computer to some remote server. If you have any questions, feel free to comment, also share it with your friends.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

*
*

This site uses Akismet to reduce spam. Learn how your comment data is processed.