How do computer/ network criminals manage to have remote illegal access to my e-mail account and workspace, to send illicit messages to others, without my knowledge?
![]() |
How do computer/ network criminals manage to have remote illegal access to my e-mail account and workspace, to send illicit messages to others, without my knowledge?
There are a couple of things that you should do immediately:
Get an administrator to search for a keylogger on your computer.
Change your logon/email passwords.
And in the future:
Don't download/install/run anything that you Don't know what it REALLY is.
All times are GMT -7. The time now is 07:09 AM. |