Donate SIGN UP

computer being hacked

Avatar Image
wolfbaine | 18:46 Tue 19th Oct 2010 | Technology
13 Answers
hello all
i have a friend (honest) just recently left his evil wife
the problem is everytime he logs on to hitmail or messenger she has gotr on before him and sent all his friends emails and even signs herself in on his messenger several times
so he even re joined msn as a new user and with new msn addy as a woman believe it or not within ten min she was there he didnt even have time to tell me his new addy before she was in and trying to ruin things
my question is HOW is she doing it AND HOW DO WE STOP IT i know roughly how to pretend how to be someone else but how would she get instant access to a brand new addy and email??????????? its probably illegal but thewre must be some way to find out what shes using and stop it
Gravatar

Answers

1 to 13 of 13rss feed

Best Answer

No best answer has yet been selected by wolfbaine. Once a best answer has been selected, it will be shown here.

For more on marking an answer as the "Best Answer", please visit our FAQ.
''how would she get instant access to a brand new addy and email?''

Keylogger?

http://en.wikipedia.org/wiki/Keystroke_logging
Does she have access to the machine?

If not check for the obvious legit stuff first, so look in add remove programs and look for anything like logmein, VNC or any other remote access/desktop software (if you don't know google the name and see what it say it is). Also check that the windows remote desktop isn't turned on and reset all passwords on the computer for all user accounts!

a full scan with most antivirus software and also a scan with malwarebytes should pickup any keyloggers that might be installed depending on how clever/good at this she is.

which is another question.... what level of computer user is she?
Either ...
She has a cam installed in his room or ...
She installed spyware on his computer (keylogger) that sends reports.
Change passwords to something she cannot think of. Numbers and letters.
Question Author
keylogger they not even using same computer they not even in the same town i watched last night while he signed up with new msn addy and within min she was into it i just want to know how shes doing it and how to stop her
''they not even using same computer they not even in the same town''

Have you read my posted link above?
Question Author
we did the new addy last night with completly random password and completly diffrent profile and within mins she was online with the new addy taunting him
Try using another PC or laptop and if she is still able to find him then you know that she is able to access the information on his computer.
Question Author
wolf
he is using another computer and another town bur she still gets access to what he does HOW????????
Question Author
could she have his laptops ip address ??????
it seems she knows what hes doing before he does
last night was creepy
he opened new msn addy hotmail and messenger completly diffrent even put himself down as 78 year old woman but within minuetes she emailed him from his new address and was taunting him that he would need to be quicker than that
i know that you can do a forgot password on msn then chaqnge it but she could not have known his new addy but she was right there it was spooky
Read snag's link - it explains how these things can be done.

There are some amazingly clever computer people out there in cyberspace using their talents in an 'evil' way. However I am not clever enough to work out what they are doing or how they do it.

snags, chuck and Albags are the experts - look at their suggestions.

Susan
The answer is in one of the first three posts ... or

She is a ruddy good psychist. Better than Derek Acora even : )
Urgh lost my answer....

Is he entering one of his old email addresses as a contact address when he makes the new accounts? Because there may well be a confirmation email being sent to the email address that the ex has access to, giving her all the details.
A keylogger is as its name suggests - it logs all keystrokes on a computer. These can then very easily be sent to another computer in the form of email or some other transport. At that point, the distance between the two computers is unimportant.

1 to 13 of 13rss feed

Do you know the answer?

computer being hacked

Answer Question >>