How to detect suspicious or malicious network activity in your computer

 In this era of Information Technology keeping ones computer and data are one of the main concern of all of us. To detect suspicious and malicious activity in computer on must at first decide what kind of activity he wants to look for. Some of them you might look for are as follows,

1. Software that corrupts systems or files.

2. Suspicious network activity.

3. Malicious software that gather information.


1. Software that corrupts systems  or files: One can easily detect softwares that corrupts system or change files or file type by simply scanning system or files using well known anti-virus softwares already installed or by installing them (which sometimes doesnot works, as system is already corrupted by the software). 


2. Suspicious network activity: Some of the suspicious network activities includes flashing unwanted adds, unknowingly gathering logs of ones system, trying to control system remotely etc by already installed genuine software such as browser. To detect these kind of activity one take help of anti virus or network monitors such as NMAP, Wireshark etc. By installing NMAP or Wireshark one can detect network activity of his LAN card or WIFI card. after installing Wireshark you can simply start sniffing data that passes through your network card and store them as a PCAP file. Those saved files then can be uploaded to many available online PCAP file analysers such as "https://apackets.com/", "https://packettotal.com/", "https://pcap.honeynet.org.my/" and detect any malicious activity.


3. Malicious software that gather information:  Process of detecting malicious software is same as process of detecting suspicious network activity. The only difference is in this type software installed directly in system does all suspicious activity.