Post date: Mar 6, 2010 5:48:00 PM
Wednesday, October 05, 2011
Hello [Name],
Yes, I did get that false email, I listed it as spam and deleted it, with my not sure whom it was from.
This has not happen to me; however it is prevalent, see http://news.cnet.com/8301-1009_3-10372523-83.html
In that article is a mentioned reason for email address theft/abuse, reason mentioned is use of a key logger. To aid your key logger understanding, see more of one free key logger here: http://download.cnet.com/Free-KGB-Key-Logger/3000-2162_4-10357898.html
More in-depth reading is found here http://en.wikipedia.org/wiki/Keystroke_logging
Concerned with my pc-clients peace of mind, i.e., their having similar experience as you are, I read up long ago and please do understand [Name], this might create an atmosphere of distrust, this is not my intent, but here goes:
1. A key logger can take place as easy as a “Key logging software”, explained is
a. installed onto a USB flash drive,
b. is plugged into a computer,
i. can instantly install undetectable Key logging software onto said computer,
ii. To where this time or another time plugging in this said USB flash drive will record all of computer’s (person’s) key strokes, i.e., email passwords, etc…
iii. The USB flash drive is then use at another location to hack into the person’s email…
c. REMEDY No. 1: For Domestic threats, use USB pc protection, the following is one I use, is free and safe, personally I made two USB drives with the same key, in I should lose one, might clone one drive, burn on a disk for my file cabinet:
i. USB System Lock (USL) is the solution to lock your system by a USB drive. USL can work on MP3 Player (with USB port), thumb-size USB storage, card reader...etc. A computer that locked by USL can unlock by the USB drive which contain the correct key only.
2. This might not be in your case [Name]; there is more sophisticated Key logging software that can invade a person’s computer, via internet access.
a. If your computer is being hacked, via internet access, then take measures to cut off this access, turn off remote access, much on this subject is found here, you will have to be specific of the operating system you are using.
b. However, once a more sophisticated Key logging software invades a person’s computer, the only sure way of being rid of it (invasion/hacking) is to bring the computer back to a state it was prior to any chance of said invasion/hacking.
c. I don’t know what you currently use; maybe you have this implemented already, i.e., a system cloning software implemented.
i. I always suggest using what I use, Acronis True Image Home, it will clone your system, so in any emergency will bring your system safely back to what it was, unlike generic Microsoft Windows System Restore.
ii. Microsoft Windows System Restore will save a virus that your antivirus is supposed to have rid you of, once you use Microsoft Windows System Restore, the virus is back from a saved restore point.
iii. With Acronis True Image Home you become in charge of the what, when and how often you save an image of your system. You should make, backup, burn onto DVD a clean original Acronis image of your system safely hidden of system built new, prior to any possible bug(s), Then you can schedule increment cloning from there, but never changing the said original Acronis image of your system.
3. Last suggestion is:
a. Change your email password and or email account, on a secure computer. I use Gmail for email, it has wonderful uses, way beyond anticipations imagined, i.e., calendar(s) for appointments, instant messenger (chat/voice/video), can send 20MB attachments, etc… Gmail makes email easy, secure and efficient. And maybe even fun.
b. Use Dropbox for secure storage/access/use of KeePass Password Safe.
Sincerely,
Jerry Cantu, PC Internet IT Technician/Instructor
PS: Am hoping this has been of some help to your peace of mind [Name].