Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

hacking?


  • This topic is locked This topic is locked

#1
sara999

sara999

    New Member

  • Member
  • Pip
  • 3 posts
hi,


i asked this question in another forum and was told it would perhaps be answered better here so.....
i need some help from any 'hacking' experts please.
i was chatting to my fiance on msn for a few months but then we split up- and i deleted him as a friend on msn. recently i started checking his msn profile- his 'updates' are public , like whos hes added as friends, or his status changes. as i did this he has privatised his account, and im not sure its a coincidence.
when we chatted on msn we sent each other pics,later he said that he could access my files on my laptop beacuse of 'cookies' or somthing to do with the fact that we'd sent each other files/ pictures on msn.
basically my question is this- is he right? can he actually check whats on my laptop from where he is (other side of the world)? also can he see what im doing on my laptop? has he hacked into my computer? can he see that ive been checking his msn profile out?

by the way- computer programming is his speciality- he is a computer geek and his job is to make programmes and software for schools in the country he is in.

i know it sounds pathetic and most of you will think its a waste of time, but im anxious to know the answers to the above questions so please help if you can. Thank you
  • 0

Advertisements


#2
maliprog

maliprog

    Trusted Helper

  • Malware Removal
  • 6,172 posts
Hello sara999 and welcome to G2G! :unsure:

My nick is maliprog and I'll will be your technical support on this issue. Before we start please read my notes carefully:

NOTE:
  • Malware removal is NOT instantaneous, most infections require several courses of action to completely eradicate.
  • Absence of symptoms does not always mean the computer is clean
  • Kindly follow my instructions in the order posted. Order is crucial in cleaning process.
  • Please DO NOT run any scans or fix on your own without my direction.
  • Please read all of my response through at least once before attempting to follow the procedures described.
  • If there's anything you don't understand or isn't totally clear, please come back to me for clarification.
  • Please do not attach any log files to your replies unless I specifically ask you. Instead please copy and paste so as to include the log in your reply.
  • You must reply within 3 days or your topic will be closed

Never had request like this :). Let's see if there is a reason to worry about...

Step 1

Download OTL to your Desktop

  • Double click on the icon to run it (If running Vista or Windows 7, right click on it and select "Run as an Administrator")
    . Make sure all other windows are closed and to let it run uninterrupted.
  • Under the Custom Scan box paste this in

netsvcs
%SYSTEMDRIVE%\*.exe
/md5start
explorer.exe
winlogon.exe
Userinit.exe
svchost.exe
/md5stop
%systemroot%\*. /mp /s
CREATERESTOREPOINT

  • Click the Quick Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
  • When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.
  • Please copy (Edit->Select All, Edit->Copy) the contents of these files, one at a time, and post them if you need to start a new topic.

Step 2

Download GMER from Here. Note the file's name and save it to your root folder, such as C:.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security program drivers will not conflict with this file.
  • Click on this link to see a list of programs that should be disabled.
  • Double-click on the downloaded file to start the program. (If running Vista, right click on it and select "Run as an Administrator")
  • Allow the driver to load if asked.
  • You may be prompted to scan immediately if it detects rootkit activity.
  • If you are prompted to scan your system click "No", save the log and post back the results.
  • If not prompted, click the "Rootkit/Malware" tab.
  • On the right-side, all items to be scanned should be checked by default except for "Show All". Leave that box unchecked.
  • Select all drives that are connected to your system to be scanned.
  • Click the Scan button to begin. (Please be patient as it can take some time to complete)
  • When the scan is finished, click Save to save the scan results to your Desktop.
  • Save the file as Results.log and copy/paste the contents in your next reply.
  • Exit the program and re-enable all active protection when done.

Step 3

Please don't forget to include these items in your reply:

  • OTL log
  • OTL Extras log
  • GMER log
It would be helpful if you could post each log in separate post
  • 0

#3
sara999

sara999

    New Member

  • Topic Starter
  • Member
  • Pip
  • 3 posts
hi,

how do i know i can trust you? i know nothing about computers and dont understand what following your instructions will mean for my laptop/ the potential damage? and so am a bit weary of doing what you asked. does this give you 'remote' access?i.e. will you have access to what is on my laptop from where u are if i follow the instructions?
im not paranoid, but just cautious when it comes to people who know alot about computers- as u can understand, im sure.

thanks
  • 0

#4
maliprog

maliprog

    Trusted Helper

  • Malware Removal
  • 6,172 posts
Hi sara999,

... and so am a bit weary of doing what you asked. does this give you 'remote' access?i.e. will you have access to what is on my laptop from where u are if i follow the instructions?


We DO NOT work like this here. All work on your PC will be executed by you. I'm only consultant here with some malware experience. Beside, why would I won't your PC... Mine is much much better :)

You can see how we offer help on other topics Here
  • 0

#5
maliprog

maliprog

    Trusted Helper

  • Malware Removal
  • 6,172 posts
Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter. Everyone else please begin a New Topic.
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP