

Under the Advanced tab > Proxies, click the Change Settings button, and make sure the Proxies page that pops up has no checked boxes (other than “Use passive FTP Mode”). Under the Extensions tab, click the Uninstall button on any extensions that you don’t recognize and specifically chose to use. Make sure the checkboxes under the Security tab are checked, and also on the Privacy tab (maybe not the “block all cookies” checkbox as that will significantly hamper your use of the web pages you visit). Also make sure that the home page (under the General tab) is either the standard () or something you specifically chose. If it’s something different, change it back to Google or your preferred choice. It should be Google, or any other search engine you specifically chose.

You want to make sure that nobody changed your search engine. Open Safari, click Safari > Preferences and go through each of the pages from General through Advanced, and verify that there are no settings changed that you didn’t intend to make.
#QUIT ALL APPS ICON MAC PASSWORD#
Make this new account an Admin account (select the account and click the checkbox “Allow user to administer this computer”), make sure you set a different password for this account, and restart your computer.
#QUIT ALL APPS ICON MAC PLUS#
If you only see your own user account and it is listed as an Admin, create a new User Account (click the plus sign at the bottom of the left-side list, after unlocking the padlock at the bottom-left). My recommendation is that you have two user accounts for yourself, one with Admin privileges, and another that’s a Standard account.

Sometimes a hacker gained access using the macOS’ built-in remote support tool, so to stop this, open System Preferences > Sharing, and uncheck all the options listed, including Screen Sharing, File Sharing, Remote Login, and Remote Management.

RATs come in many flavors, including LogMeIn and TeamViewer, or an odd or unfamiliar name (like AlienSpy). If you have a RAT and you’re not using a tech support person to help you, by all means end that RAT to stop a hacker from controlling your Mac.Įnding the RAT usually means using a 2-finger click on the icon, and then choosing a quit or similar option from the menu. Bona fide support technicians (like ) may use a RAT legitimately, but that’s the only time a RAT could or should be running on your Mac. RATs can take over your computer and the hacker can then do nearly anything to it that they could do if sitting in front of your Mac.
#QUIT ALL APPS ICON MAC INSTALL#
Hackers like to install RATs (e.g., Remote Access Terminals) that give them remote access to your Mac.
