New
#11
Welcome, it will produce a log file in your root directory (C:\) or the volume you installed Windows on.
Welcome, it will produce a log file in your root directory (C:\) or the volume you installed Windows on.
I haven't read all this thread.
For someone to have had complete access to your PC I think it would require some physical or wireless connection. If on wireless change the password and don't broadcast your SSID. Use WPA encryption, not WPS connection any time. Have you ISP come to check your incoming cable for a tap on the line.
Thank You Blue Robot!
Britton30: Yes I do change the password and don't broadcast my SSID, and I use WPA-2 encryption. I've also had ISP check for cable and phone taps.
In response to your comment that:
"For someone to have had complete access to your PC I think it would require some physical or wireless connection."
These type programs can be loaded onto my laptop either by accessing my pc, going to the company website and entering a direct code they give to you (this is how such a program was put on my machine back in 2009) or by sending the code through attachment, embedded code or whatever in an email (If there is such a program on here now, it may have been done this way). After the program is on my computer, the other party can access my pc from any device they have just by going to the company website and logging in with their user information. No direct connection to my machine is needed, it only requires that the program be downloaded to my machine by either of the above means.
Thanks for your advice!
Britton 30:
I didn't understand most of it either until I was caught up in it and had no other choice but to research these programs.
I am, in fact, on my 3rd hard drive and just wanting to be sure this one is secure.
Thanks for your input.