ChatterBank38 mins ago
computer being hacked
13 Answers
hello all
i have a friend (honest) just recently left his evil wife
the problem is everytime he logs on to hitmail or messenger she has gotr on before him and sent all his friends emails and even signs herself in on his messenger several times
so he even re joined msn as a new user and with new msn addy as a woman believe it or not within ten min she was there he didnt even have time to tell me his new addy before she was in and trying to ruin things
my question is HOW is she doing it AND HOW DO WE STOP IT i know roughly how to pretend how to be someone else but how would she get instant access to a brand new addy and email??????????? its probably illegal but thewre must be some way to find out what shes using and stop it
i have a friend (honest) just recently left his evil wife
the problem is everytime he logs on to hitmail or messenger she has gotr on before him and sent all his friends emails and even signs herself in on his messenger several times
so he even re joined msn as a new user and with new msn addy as a woman believe it or not within ten min she was there he didnt even have time to tell me his new addy before she was in and trying to ruin things
my question is HOW is she doing it AND HOW DO WE STOP IT i know roughly how to pretend how to be someone else but how would she get instant access to a brand new addy and email??????????? its probably illegal but thewre must be some way to find out what shes using and stop it
Answers
Best Answer
No best answer has yet been selected by wolfbaine. Once a best answer has been selected, it will be shown here.
For more on marking an answer as the "Best Answer", please visit our FAQ.''how would she get instant access to a brand new addy and email?''
Keylogger?
http://en.wikipedia.org/wiki/Keystroke_logging
Keylogger?
http://en.wikipedia.org/wiki/Keystroke_logging
Does she have access to the machine?
If not check for the obvious legit stuff first, so look in add remove programs and look for anything like logmein, VNC or any other remote access/desktop software (if you don't know google the name and see what it say it is). Also check that the windows remote desktop isn't turned on and reset all passwords on the computer for all user accounts!
a full scan with most antivirus software and also a scan with malwarebytes should pickup any keyloggers that might be installed depending on how clever/good at this she is.
which is another question.... what level of computer user is she?
If not check for the obvious legit stuff first, so look in add remove programs and look for anything like logmein, VNC or any other remote access/desktop software (if you don't know google the name and see what it say it is). Also check that the windows remote desktop isn't turned on and reset all passwords on the computer for all user accounts!
a full scan with most antivirus software and also a scan with malwarebytes should pickup any keyloggers that might be installed depending on how clever/good at this she is.
which is another question.... what level of computer user is she?
could she have his laptops ip address ??????
it seems she knows what hes doing before he does
last night was creepy
he opened new msn addy hotmail and messenger completly diffrent even put himself down as 78 year old woman but within minuetes she emailed him from his new address and was taunting him that he would need to be quicker than that
i know that you can do a forgot password on msn then chaqnge it but she could not have known his new addy but she was right there it was spooky
it seems she knows what hes doing before he does
last night was creepy
he opened new msn addy hotmail and messenger completly diffrent even put himself down as 78 year old woman but within minuetes she emailed him from his new address and was taunting him that he would need to be quicker than that
i know that you can do a forgot password on msn then chaqnge it but she could not have known his new addy but she was right there it was spooky
Read snag's link - it explains how these things can be done.
There are some amazingly clever computer people out there in cyberspace using their talents in an 'evil' way. However I am not clever enough to work out what they are doing or how they do it.
snags, chuck and Albags are the experts - look at their suggestions.
Susan
There are some amazingly clever computer people out there in cyberspace using their talents in an 'evil' way. However I am not clever enough to work out what they are doing or how they do it.
snags, chuck and Albags are the experts - look at their suggestions.
Susan