keystroke spyware/virus?

S

Smed

first, im not too sure if a keystroke spy would be considered a virus or
spyware... i think maybe spyware since it "lives" on its own and doesn't
need to attach to something... but maybe someone in here can help me all the
same..

a friend of mine thinks her computer is being monitored by her
exboyfriend... all the messages on her yahoo messenger are being leaked to
an outsider... (quit using the dang messenger!, but she wont listen to
me)... she has changed her passwords numerous times and still no luck... she
doesn't think he has ever had access to her computer without her knowledge
but isn't too certain...

how can she tell if someone is in her computer?... how can she kill it/shut
it down?... i imagine i'll be the one working on her system since she hasn't
turned her system on since she became suspicious so i dont know what i'll be
expecting as far as if she has a firewall, what type, is it updated, etc...
she doesn't sound very computer literate so it might be a mess and i would
like a head start...

any help would be more than appreciated....

thanks.....

-s
 
P

Phil Weldon

'Smed' wrote, in part:
| a friend of mine thinks her computer is being monitored by her
| exboyfriend... all the messages on her yahoo messenger are being leaked to
| an outsider...
| ... how can she tell if someone is in her computer?...
_____

The size of the system case severely limits who can fit in side.
What can be done depends on your ability to provide detailed data to
newsgroups like this.
And to ask focused questions.
And to write down the step you take.
And whether the contents of the system might be evidence.
And the level of expertise it 'intruder' has.
And whether the 'intruder; has access to the physical computer.

Keep the computer physically secure.
Allow no other users.
Download and use the multi-antivirus scanner 'David H. Lipman' provide.
Use other types of scanners to detect and remove type of malware other than
viruses.
Perhaps an boot a second, uninfected operating system to allow malware to be
detected and deleted with freedom form counterattacks.

Don't connected to the Internet during this time.

Save valuable data to previously uninstalled hard drive
Do a secure erase of the infected hard drive.
Reformat and repartition the targeted drive.
Install a router with NAT between the internet connection and the computer.
Reinstall the operating system, then download and reinstall the updates for
the operating system.
Install necessary malware protection:
Antivirus program with up-date virus definitions
SpyBot Search&Destroy
AdAwareLE
Supper AdBlocker
Physically secure computer.
Allow no one else to use it.

Or seek profession help for these tasks. That decision should be based on
the
the seriousness of the threat; what are the direst possible outcomes?
Should the police involved?
Do you have the expertise and available time
available cash
| first, im not too sure if a keystroke spy would be considered a virus or
| spyware... i think maybe spyware since it "lives" on its own and doesn't
| need to attach to something... but maybe someone in here can help me all
the
| same..
|
| a friend of mine thinks her computer is being monitored by her
| exboyfriend... all the messages on her yahoo messenger are being leaked to
| an outsider... (quit using the dang messenger!, but she wont listen to
| me)... she has changed her passwords numerous times and still no luck...
she
| doesn't think he has ever had access to her computer without her knowledge
| but isn't too certain...
|
how can she kill it/shut
| it down?... i imagine i'll be the one working on her system since she
hasn't
| turned her system on since she became suspicious so i dont know what i'll
be
| expecting as far as if she has a firewall, what type, is it updated,
etc...
| she doesn't sound very computer literate so it might be a mess and i would
| like a head start...
|
| any help would be more than appreciated....
|
| thanks.....
|
| -s
|
|
 
S

Smed

i was afraid you were going to say that........ dang.........

thanks....... much appreciated...

-s


"Phil Weldon" <..
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top