Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and beginning April 20th, 2021 (Eastern Time) the Yahoo Answers website will be in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.

To catch a wanna be Hacker?

If your roommate has used a pen to download info from your system to get in, once they are in, will a Icon show up on my computer to notify me that he is in?

Everytime I get home from work I turn on my computer, he runs upstairs to turn his on, today I noticed an icon down on the right corner, slightly above the original icons and clock, to the left of them, also on the same bar as the DONE signal is on.

Several people have told me of spy ware to purchase which I will, but for now I am doing my homework on this bastard to catch him.

I posted a simular question earlier, left out and it was deleted, I did not delete it. Someone else did.

Update:

"why don't you just setup logon password to computer find it in accounts that way know one but you can use the computer"

this is what a answerer wrote to me. I have done this.

See this person told me he wanted to use my printer, he pulled out this pen thing, plugged it in, I left the room, I had know idea that he would pull this type of thing. Well since then, I have been getting unwanted emails, and things have been deleted from my system. If I need to elaborate more I will, thanks guys/gals.peace

Update 2:

another answer

"He could possibly be using remote desktop which would allow him to access your pc while you are using it without you knowing it. You just need to disable this service."

what service does one disable, were to locate it,?

6 Answers

Relevance
  • 1 decade ago
    Favorite Answer

    Sorry its so long. I'm bored and would like to see this bastard exposed as well.

    DONE signal? bar, to the left? slightly above? this is all very confusing.

    I don't think the pen actually did much. it was probably only a hard drive. he MIGHT have stored: drivers, tools and hacking tools on it and loaded one on your computer.

    lets check it out.

    you've got to look around for its program name

    click the icon.... if a window pops up, see if it is labeled with the name of the program. If nothing happens, right click on it. and see if now you get some options.

    if you find a name, write it down.

    try some more stuff. open task manager.

    by pressing control alt and delete

    (just to kind of check it out, click the "networking" tab. you might notice some spikes in the graph that don't belong (you should be aware of ALL/MOST of your connections first, though)

    Get ready to buckle down. (this can be tedious)

    Click the "processes" tab and note the names listed in the rows. Then check to find what the process does.

    pick one. (mine was winamp.exe)

    then go to

    http://www.google.com/

    and search for

    "what is winamp.exe"

    the first result tells me what it does and has a rating system to show if its a threat or not.

    more than likely, one of yours will probably show as a risk. its up to you to research it and decide if you want to kill it.

    (sometimes you might want to run a risky program for what ever reason so don't delete every risk you find unless you know you absolutely don't want it running)

    to kill it, click it once and then click "end process"

    this is only a temp fix. and if it works, email me and I'll help you set it up so it's deactived on every startup

    or even better.

    get wireshark

    http://www.wireshark.org/

    it should tell you QUITE a bit about EVERYTHING connecting to your computer

    ip addresses, port #s, protocols, contents, headers, procedures, requests, and whatever else you could ever want.

    p.s.

    Its good practice to run some firewall software when on a network. (routers work as firewalls but usually only with connecting OUTSIDE the network)

    I use http://www.sunbelt-software.com/Home-Home-Office/S...

    you can use it for free for a while.

    I like it.

    its interface is a bit odd, but poke around and you'll see mucho

    hmmm. you guys have a router don't you? .... or is that bastard the one with access to the router?

    if you can, go into the router, block, most the ports to your computer and then change the router password.

    Now if the emails are the only big problem and the icon is nothing..... then he probably didn't do anything. Spam is a pain in the **** and you need to stop using your "real" email address on forms or registrations on-line.

    OH, and to finish,

    to deactivate remote assistance go to control panel > administrator tools > services

    double click the service labeled "remote desktop help session manager" , then select "startup type" and choose disable and restart the computer

    (I doubt he's using remote assistance, since he would have complete control of your computer including mouse and pointer)

  • Anonymous
    1 decade ago

    Hey, I've heard of a program that did something similar to what you were explaining. This is the info. about the application and what its suposed to do.

    " USB Thief Steals Pc Passwords

    Tweaked USB that steals every passwords including licences.

    Instructions

    1.Decompress the archive and put all the files located in the folder "USBThief"into a USB. (You MUST put all from USBThief directory in main directory of usb, no folders no anything, just simply c/p ...)

    2.Insert the USB in your victim's computer.

    3.View folder "dump" to see the passwords.

    It also makes a second dump folder in the batexe folder. "

    And you said that the guy who messed with you comp was messing with a "Pen". Was it a USB pen? If so, then he might of ran the program that I just gave you the info about. Maybe its something different though, I'm not really sure. But, my advice to you is to confront the person about it. See how he reacts to you questioning him about it and then just take it from there. If worst comes to worst, then I guess you should re-format your hard drive and re-create new accounts/passwords to whatever you think he was messing with.

    One last thing, is it possible that you guys are on a wireless network and your sharing files over it? Because with Windows XP you can connect to other computers on the network (It doesn't hafto be wireless either).

    Good luck though, hope you get sh&% sorted out.

    Source(s): Google.com
  • Anonymous
    1 decade ago

    ok mabey you should make it more into a quistion then it won't be deleted.

    anyways if your noticing new icons that did not use to be there.

    check what they say double click them and see what it brings up.

    google the stuff and find out what it is.

    or if you don't want them running anymore

    open up task manager go to process and end process of the name of icons

    they could be spyware they also could be keyloggers from you friend/roomate or whoever.

  • 1 decade ago

    He could possibly be using remote desktop which would allow him to access your pc while you are using it without you knowing it. You just need to disable this service.

  • How do you think about the answers? You can sign in to vote the answer.
  • House
    Lv 6
    1 decade ago

    why don't you just setup logon password to computer find it in accounts that way know one but you can use the computer

  • Anonymous
    1 decade ago

    Theres only one solution..

    get a new roomate haha!

    that one sounds like a creep.

Still have questions? Get your answers by asking now.