English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

1 answers

Yes
But alot more info would be needed. Such as
A) Windows?
B) Mac?
C) Linux?

What makes you think they got in? How do you think they got in? Did you click on something on a webpage that let them in? Or did you open an email that let them in?

Are they on your machine now doing something or is it just a program running?

The most common answers would be Windows and let them in by clicking on something in an email. In that case, you would need to look at the hidden headers in the email to see where it came from. Then report it back to the site that sent it so they can kick off that user.

2007-10-15 07:21:15 · answer #1 · answered by Gandalf Parker 7 · 0 0

fedest.com, questions and answers