stalker/spy/hacker

That's right.. Once you are there.. Make sure click on tab "Processes" to see what programs are running..
 
Other option is very easy to show me is called "Hijackthis".. You can grab from http://tomcoyote.org/hjt/hjt199//HijackThis.exe Of course, it's safe. Once you open that program and click on "Scan". It will look up what your system are running and startup.. And save the logfile and post here. So, I can help you if you want.

Let me give you example what mine looks like:

Code:
Logfile of HijackThis v1.99.1
Scan saved at 8:15:22 PM, on 1/15/2006
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\System32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\System32\sstray.exe
C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Valve\Steam\Steam.exe
C:\Program Files\SightSpeed\SightSpeed.exe
C:\Program Files\Got All Media\Components\GTVRec.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\ATI Technologies\ATI.ACE\cli.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\WinRAR\WinRAR.exe
C:\DOCUME~1\Kurt\LOCALS~1\Temp\Rar$EX00.016\HijackThis.exe

O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
O2 - BHO: FlashFXP Helper for Internet Explorer - {E5A1691B-D188-4419-AD02-90002030B8EE} - C:\PROGRA~1\FlashFXP\IEFlash.dll
O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\System32\msdxm.ocx
O4 - HKLM\..\Run: [nForce Tray Options] sstray.exe /r
O4 - HKLM\..\Run: [SunJavaUpdateSched] C:\Program Files\Java\jre1.5.0_05\bin\jusched.exe
O4 - HKLM\..\Run: [hcwPVRReset] C:\PROGRA~1\WinTV\hcwP1Utl.exe -Quiet -ResetHardware -NotifyResetFailure -KeepTrying
O4 - HKLM\..\Run: [RemoteControl] "C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [AnyDVD] C:\Program Files\SlySoft\AnyDVD\AnyDVD.exe
O4 - HKLM\..\Run: [Zone Labs Client] C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\System32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [PinnacleDriverCheck] C:\WINDOWS\System32\PSDrvCheck.exe -CheckReg
O4 - HKLM\..\Run: [ATICCC] "C:\Program Files\ATI Technologies\ATI.ACE\cli.exe" runtime -Delay
O4 - HKCU\..\Run: [Steam] C:\Program Files\Valve\Steam\\Steam.exe -silent
O4 - HKCU\..\Run: [SightSpeed] C:\Program Files\SightSpeed\SightSpeed.exe -minimized
O4 - HKCU\..\Run: [ATI Scheduler] C:\Program Files\ATI Multimedia\main\ATISched.EXE
O4 - Startup: GTVRec.lnk = C:\Program Files\Got All Media\Components\GTVRec.exe
O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_05\bin\npjpi150_05.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: AIM - {AC9E2541-2814-11d5-BC6D-00B0D0A1DE45} - C:\Program Files\AIM\aim.exe
O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - C:\WINDOWS\web\related.htm
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\System32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe
O23 - Service: StarWind iSCSI Service (StarWindService) - Rocket Division Software - C:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindService.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe

So, you see.. it helps me to see if there's anything like spy or monitoring or mischevious software installed, etc.. Once I see something isn't right and I can easily delete without any problems. So, you can show and I can help and tell you which one is bad and you can delete.. After that, you will prolly be worried free from now on. That's up to you.
 
It depends on what kind of AIM you have. I use Trillian. Trillian allows you to choose whether you want to log your conversations or not.
 
VamPyroX said:
It depends on what kind of AIM you have. I use Trillian. Trillian allows you to choose whether you want to log your conversations or not.
trillan??? u mean triton???
 
javapride said:
trillan??? u mean triton???

Both.. Trillian is "3rd party software".. Which you are able to use AIM, MSN, Yahoo Messenger, IRC all-in-one in Trillian.. Of course, it has save conversations same thing with Triton.
 
That is bad ... I am going to have to look into my windows 98 and everything to make sure nobody is hacking my computer. I will have to talk to the computer lady and tell her about:

http://tomcoyote.org/hjt/hjt199//HijackThis.exe

and then talk to one of my family who is in law enforcement about what I can do to stop hacking.


Hacking is bad enough but stalking is sick and evil.

Freewoman77 , Please contact the police at once. That is your life you are talking about here.

You will want computer crimes detectives and sex crimes detectives involved because many times those detectives work closely together in that department. You are in my prayers.
 
hey everybody, personally I am ex early stage hacker. I used to hack back in 80's and don't do that anymore however I know several of people that do hacking. Even one of my friend is hacker. Tell you this, any computer is the MOST stupidiest machine in the world. No matter how hard you try there will always be a way to crack in your system. AIM is one of easiest IM messenger to crack in! Believe it or not, I have witness my friend hacked and read all the conversations and able to retrieve password without the user knowledge!!! There isn't much you can do, police won't be able to do so *IF* stalker is outside of the police jurdiscation! meaning if the hacker is outside of the state or country, then police do NOT have much power to do anything! Don't waste your time with police, they will take the report then when you leave they just simply throw in trash bin! Trust me!

Some of you have suggested a way to check wheather person is in your system, the truth is some hackers cleverly used Stealth method, what it means that it was written as if whenever users open the dialog box, the file disappeared. Happens? You can bet on it!

Every day, most hackers work many hours each day trying to find new way to break in the system. That is why it is so important to be viligant and keep your PC update with everything. But it does NOT mean 100% worry-free.

The only time federal marshall can do is when the hacker involves in any kind of thieves like stealing money etc. But Stalking?, nope.
 
diehardbiker65 said:
hey everybody, personally I am ex early stage hacker. I used to hack back in 80's and don't do that anymore however I know several of people that do hacking. Even one of my friend is hacker. Tell you this, any computer is the MOST stupidiest machine in the world. No matter how hard you try there will always be a way to crack in your system. AIM is one of easiest IM messenger to crack in! Believe it or not, I have witness my friend hacked and read all the conversations and able to retrieve password without the user knowledge!!! There isn't much you can do, police won't be able to do so *IF* stalker is outside of the police jurdiscation! meaning if the hacker is outside of the state or country, then police do NOT have much power to do anything! Don't waste your time with police, they will take the report then when you leave they just simply throw in trash bin! Trust me!

Some of you have suggested a way to check wheather person is in your system, the truth is some hackers cleverly used Stealth method, what it means that it was written as if whenever users open the dialog box, the file disappeared. Happens? You can bet on it!

Every day, most hackers work many hours each day trying to find new way to break in the system. That is why it is so important to be viligant and keep your PC update with everything. But it does NOT mean 100% worry-free.

The only time federal marshall can do is when the hacker involves in any kind of thieves like stealing money etc. But Stalking?, nope.

You are wrong on 3 things.

1. The laws are becoming more stricter. Recently Interpol and police agencies as well as in the U.S.A. got together to discuss computer crimes. Pretty soon there will be no jurdiscation feuds when it comes to computer crimes. The criminal's days are numbered now.

2. Hacking is a very serious crime especially when it involves finanical transcations or security matters. Pretty soon hacking will be 100 % illegal on the law books , no matter what even if finance or security is not involved. !!!

3. Women have been maimed & injuried or tragically enough killed from stalking online users. Stalking online computer crimes do happen !!!
My God ...you hear on the tv nightly news of sad news about the worst of all are the ones that target children in a sick & evil way and have been killed by that sick & evil online user. I think there was a case a while back in Florida where the sick and evil man used computers as a means of luring a small innocent girl and killed her then when they caught him. He was sentenced to death. That was about what 2 or 3 months ago? It was all over CNN & Fox etc.

Need I say anymore?
 
Last edited:
Neo said:
Not another.

What the heck are you implying to mean?

kurtcs said:
That would be nice for not having problems with Mac or Linux.. Unfortunately, they do have keystroke logs programs.. :(

Yeah, but if a keylogger does get installed it won't be running as System Administrator (Mac) or root (Linux) because those OSes don't have a b0rked security model. As a result of this, it's very easy to remove. Contrast that with how in Windows once your system is compromised the first time it's compromised forever because you can't remove the rootkit the hacker installs because you use an Administrator account and so when the hacker compromises your account he or she can install a rootkit to keep control over the system.



Heath said:
3. Women have been maimed & injuried or tragically enough killed from stalking online users. Stalking online computer crimes do happen !!!

Hackers generally don't stalk people... Black hat hackers see breaking into a system as an :Owned: and once they've done the damage they intended they're done with that victim. I've never heard of someone hacking into a person's computer with the intent to inflict physical harm on the person. It's certainly possible, but it's very rare if it exists at all.

Also worthy of note is that you usually can't get a person's physical location from their computer. You can get a rough estimate of the location by their IP address sometimes, but not always.
 
Teresh said:
Hackers generally don't stalk people... Black hat hackers see breaking into a system as an :Owned: and once they've done the damage they intended they're done with that victim. I've never heard of someone hacking into a person's computer with the intent to inflict physical harm on the person. It's certainly possible, but it's very rare if it exists at all.

Also worthy of note is that you usually can't get a person's physical location from their computer. You can get a rough estimate of the location by their IP address sometimes, but not always.

Hackers and stalkers are two different individuals but they share alots of similiar things when commiting a crime.

The difference is a hacker will not cross the boundaries that a stalker would.

Hackers are focused on power and stalkers are focused on lust.

Stalkers are sick enough to find out where someone lives through another available means. Hackers usually are not interested in where a person lives.

It is all in how the hacker or the stalker uses the personal information, illegally of course.
 
Heath, please re-read what I posted. You got it opposite. You don't know much about laws and jurdiscation issues! I know them pretty good!

Wanna proof? Show me how many hackers and cyberstalker actually got caught, went to court and found guilty? So far it is rarity, but the hackering and cyberstalking so common these days.
 
I ain't much use standalone aim or yahoo or else...
I'd rather stick w/trillian there have 4 in 1 aim/yahoo/msn/others are combo in 1.. No problem so far.. Hijack cannot access into trillian which high protected even pwd security too. :)
 
Sure! What about the user on other end of your conversation? You think hacker is stupid?

GalaxyAngel said:
I ain't much use standalone aim or yahoo or else...
I'd rather stick w/trillian there have 4 in 1 aim/yahoo/msn/others are combo in 1.. No problem so far.. Hijack cannot access into trillian which high protected even pwd security too. :)
 
Teresh said:
What the heck are you implying to mean?


Get MAC. Get Linux. Get Mac. Blah blah. That is not solve her problem. Well I know you try to get her to buy MAC to avoid from worry about hacker.
 
Hey buddy, soon or later hacker is going after Linux!

If you want 100% hacker free computer, then get IBM AS400! In history not even one hacker had successfully hacked in this computer! Oh no, you can't afford this.... It cost at least a million dollars.

Neo said:
Teresh said:
What the heck are you implying to mean?


Get MAC. Get Linux. Get Mac. Blah blah. That is not solve her problem. Well I know you try to get her to buy MAC to avoid from worry about hacker.
 
GalaxyAngel said:
I ain't much use standalone aim or yahoo or else...
I'd rather stick w/trillian there have 4 in 1 aim/yahoo/msn/others are combo in 1.. No problem so far.. Hijack cannot access into trillian which high protected even pwd security too. :)

not only 4 in 1, an messengers, also my emails stalker can read deleted/trashed my emials :/
 
:jaw: Gee, this must be fakeo! Anyway, this computer isn't practical for home user anyway.

Neo said:
diehardbiker65 said:
Hey buddy, soon or later hacker is going after Linux!

If you want 100% hacker free computer, then get IBM AS400! In history not even one hacker had successfully hacked in this computer! Oh no, you can't afford this.... It cost at least a million dollars.



Who said can't afford?

http://cgi.ebay.com/IBM-AS-400-AS40...851877543QQcategoryZ64029QQrdZ1QQcmdZViewItem
 
Back
Top