Search:

Type: Posts; User: TMM; Keyword(s):

Search: Search took 0.02 seconds.

  1. Tiger, thanks a lot, I'll see if I can get it to...

    Tiger, thanks a lot, I'll see if I can get it to work when I get up tomorrow - have to go out and consume some beer right now :)

    Really appreciate your help on this...
  2. No, from my laptop - which according to...

    No, from my laptop - which according to Spysweeper is clean :) I did of course run that program on my "infected" computer, and spent an hour or so researching the spy software before moving my search...
  3. TigerShark, what equipment would I need to do...

    TigerShark, what equipment would I need to do this?

    Concerning the WLAN, my gut feeling tells me that it's unlikely to be the problem, at least if MAC access control is what it's supposed to be....
  4. Thanks everyone for your insight, I really...

    Thanks everyone for your insight, I really appreciate your help on this!

    Well, to adress some key points: I live alone, no wife and no children. That means that the only ones with direct access to...
  5. Sounds like a good idea :) I'd just like to...

    Sounds like a good idea :)

    I'd just like to know what the intentions were, I'm not sure if this is a out-of-curiousity kind of thing, or if someone's actually trying to f'k with me somehow....
  6. Thanks, guys... I have a second computer,...

    Thanks, guys...

    I have a second computer, connected through a WLAN using an SMC Barricade router. The router also has a buildt-in firewall, I wonder if the logs there would do any good?




    I...
  7. iOpus Starr keylogger/spy - how to investigate this hacking?

    Hi,

    I just found out that someone has installed the iOpus Starr system monitoring tool on my computer. Apparently, this is a fairly advanced software that runs silently and logges everything...
Results 1 to 7 of 7