Question about PC Desktops

1 Answer

Yesterday some hacker got into my email, and stole my identity, and now is using my contacts and my email, and i do have some important information on my emails,please please help me to recover my email,so i can reset my password,the email in question is this one please contact me as soon as you have some information...

Posted by on

1 Answer

  • Level 1:

    An expert who has achieved level 1.


    An expert who has answered 20 questions.


    An expert that hasĀ over 10 points.


    An expert whose answer gotĀ voted for 2 times.

  • Contributor
  • 34 Answers

If you are using an msn premium account, you can call msn tech support and have you password reset. otherwise if its a free account, the email is pretty much gone.

Posted on Oct 16, 2008

Add Your Answer

Uploading: 0%


Complete. Click "Add" to insert your video. Add



Related Questions:

1 Answer

How do i get my contacts in facebook

Anonymous, How do I import my contacts from other accounts? You can import your contacts from other accounts (ex: email, Skype) from the friend requests page. Once you've imported your contacts, you'll have the option to add each contact as a friend.
To import your contacts:
  1. Go to the friend requests page
  2. Below Add Personal Contacts, select the type of account you'd like to import contacts from
  3. Enter the required information, then click Find Friends
You can also import your contacts from your mobile phone
Thank You,
Dell-Jesse L
Dell Social Media and Communities

Feb 08, 2016 | Dell PC Desktops




I have heard a lot of reports lately about people camera's being hacked, but the information being reported is incorrect!!!! no hacker can just magically turn on your camera ,, it doesnt work like that. This letter serves to inform you on how its done, the methods involved , what can be done to stop it, how to detect it and how to catch that person.

Laptops and Web Camera's. (Wired and Inbuilt)

This is the safest type to have for personal use. A Hacker cant just turn it on ,, it doesnt work like that. In order for this to happen the hacker must have the victims computer "Zombiefied" , in other words hijacked. This simply means that there must be a program in the computer which allows the hacker backdoor access. This type of software is called a TROJAN. There are different ways for this to transmit this software to the victim, 1.) A Dropper in an infected email attachment e.g. "HARD ENCRYPTED IN A PHOTO (merging) , 2.) Hidden in a piece of software e.g, freeware or sharware 3.) As a TROJAN in Pirated Software, 4.) Via A flashdrive 5.) In an Active X Control or Plugin for Websites and Web Browsers, 6.) Email BOMB e.g auto redirect to an infected url containing the dropper.
Now the Virus (Trojan) isnt transmitted directly to the system, what happens is that firstly a dropper is installed, this dropper is small , can be installed at the blink of an eye, and deletes it self so quickly coders of antivirus identities will see hell to find it. Now the dropper then can take its precious time, disable your security measures (anti virus, firewall etc) and download and install the Trojan then delete itself. Now this means that once the hacker gets your IP address he can use that to access the Trojan on the specified port which he/she can then execute remote arbitrary code , like get access to the display drivers of the webcam, open your drives, shut down the system etc. basically anything he or she designed it to do.

How To Catch the hacker or tell if your infected.
Now if your computer is being hijacked there must be a connection to it! Basically data must flow from your pc to your hackers and the commands from your hackers pc to yours. So basically all you need to do is find out who your computer is connected to.

For Windows.
1.) click start
2.) In the run box type cmd and hit enter
3.) type netstat -n in the command prompt that appears and hit enter

now you will see 4 columns Proto , Local Address , Foreign Address , State

ok crash course,
Proto is the type of protocol
Local Address is your Ip address on the network, is a loop back, next to it is the open port of your system
Foreign Address is the Ip your connected to
State is bacically the state of the connection.

ok so you see a lot of foreign IP's with an established connection, start from the top.
1.) open a browser window and go to a whois webserver e.g
2.) do a whois search on the IP, e.g in the type the foreign ip in the box and hit enter .. e.g

this shows me this

OrgName: Yahoo!
Address: 701 First Ave
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US
ok so thats yahoo's Ip thats safe..

do this too all the Ips you have. once you find one that appears to be your hacker simply do a reverse DNS on thaty IP to get your hackers location or report it to the authorities (NO I AINT WALKING YOU THROUGH A REVERSE DNS).. So what if your hacker is using a proxy ?? chances are no, for one thing the connecting bandwidth needed will be to slow on a proxy server so he's using his own IP..

Wireless Web Cams, IP CAMERAS, AND Wireless Networks,

1.) All of these operate with an inbuilt server that allows the person access once he has the appropriate IP address. Hell a quick port scan on that Ip and i will have all your open ports, then simply log in to that Ip on that port , If prompted for a username and password try the default, if that dont work try sql, or js injection or other exploits and walla I have access. no need for a trojan.

2.) Wireless routers can be exploited by basically capturing wireless packets sent, from this i will have your ssid and and encryption type. Simply use Cain and Abel or other brtue enforcer or a jacker which will get me your encryption key, to make the process faster use the captured packets to limit the characters to generate the key. now I can connect to your router and if you have a home network I can join it or search all the computers to get to all your shared documents and files etc..

Ok what to do??
1.) firstly in your router settings use a really strong (character , number and sysmbol) password
2.) use a WPSK2 or stronger encryption system and use a really stron key (13 + characters, numbers and symbols) this will make cracking the key harder
3.) turn off transmist SSID ,, basically I cant crack what i dont know about
4.) limit your antenna transmit power so its only connectible within your house, I cant hack what I cant connect too can I ??

Now some point of information..

1.) your IP address Dynamic. meaning it will change everytime your router resets, do this at least once every week

2.) All antivirus / spyware / malware programs can only remove what it knows about regular updates are necessary. In order for it to function.

3.) Virus, malware, trojans, spyware, worms etc, are all different things , most antivirus will remove viruses , some spyware etc. use multiple software.. e.g AVG Free Anti Virus, Super Anti Spyware , Malware bytes. dont use more than 1 dedicated antivirus.

4.) Be safe!

Depends on the response this gets I will write a few more letters like this or if anyone is interested I'll be happy to get into more details about how these things work. Please send this around to as much people as you can and be safe .. regards Dark_Lord_TnT Ps. If you need any help feel free to ask..

on Oct 13, 2010 | PC Desktops


Phishing "Protect urself" Know What Hackers Do !This is a featured page

Phishing continues to be one of the most significant security threats facing Internet users. During 2007, scammers distributed millions of phishing scam emails that targeted many different entities. Phishing attacks are sure to continue in 2008 and scammers will use such attacks to steal money and identities from many new victims around the world. Armed with a little knowledge about how phishing scams work, however, you can ensure that you do not become one of these victims. phishing-scammer.jpg
Phishing scammers continue to find new victims all around the world

A phishing scam is one in which victims are tricked into providing personal information such as account numbers, passwords and credit card details to what they believe to be a legitimate company or organization. In order to carry out this trick, the scammers often create a "look-a-like" webpage that is designed to resemble the target company's official website. Typically, emails are used as "bait" in order to get the potential victim to visit the bogus website. The emails use various devious ruses to trick readers into clicking on the included links, thereby opening the bogus website. Information submitted on these bogus websites is harvested by the scammers and may then be used to steal funds from the user's accounts and/or steal the victim's identity.

Phishing scam emails are created to give the illusion that they have been sent by a legitimate institution. Emails may arrive in HTML format and include logos, styling, contact and copyright information virtually identical to those used by the targeted institution. To further create the illusion of legitimacy, some of the secondary links in these bogus emails may lead to the institution's genuine website. However, one or more of the hyperlinks featured in the body of the email will point to the fraudulent website.

Links in phishing scam messages are often disguised to make it appear that they lead to the genuine institution site. The sender address of the email may also be disguised in such a way that it appears to have originated from the targeted company. Because they are sent in bulk to many recipients, scam emails use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer". If an institution needed to contact a customer about some aspect of his or her account, the contact email would address the customer by name.

To be Continued

on Jul 16, 2010 | PC Desktops

1 Answer

I never registered with myhealthyvet and yet it says I have an account. It says my user registration info is already being used and won't let me. My identity has been stolen by who and why? I would li

Instead of talking to fixya, who can do nothing to help you, you should be talking to myhealthyvet. You may have registered and forgotten (I've done that) or more likely, someone that has your same name has registered. Stop and think about it.. Identity theft to get on a pet site? not likely.
If, on the other hand, you are talking about the U.S. veterans health site:
then, perhaps you should be concerned. Contact information is here:

May 25, 2014 | PC Desktops

1 Answer

Club penguin email isn't working

Don't use club penguin... It's a hacker site, they will take your information! I did that been there

Apr 13, 2014 | PC Desktops

2 Answers

Where can i find a replacement sytem has been hacked! Someone was able to hack into all four of my email accts, change settings on them, are sending this information to other...

You are not alone! You do have a serious but fixable issue, contact your ISP or email service providers and alert them to the hack. Unless they can assist you with changing the passwords then you will have to abandon those accounts. You providers can make certain the accounts are deactivated. To ensure removal of any residual code from a hacker, you need to slick and restore the current HDD in your system, if you have a recovery media with the system back up all your personal files you want to keep and use it. Then make certain you have all the patches and updates applied to your machine and consider D/L or purchasing of anit virus software immediately. Also make all your passwords complex, Use Upper and Lower case, numbers and symbols with atleast 12 characters. I suggest also purchasing a USB HDD to use as your private file storage and discoonect it from your system when not in use. NEVER share passwords with anyone! Good Luck

Jul 23, 2009 | Acer Aspire M1641-U1521A PC Desktop

2 Answers

Hacker - computer issues

Snail mail? Well good! You have documentation, that will lead right back to this hacker! I'll bet it's a friend playing a joke.

BUT, have you heard of the FBI? Really! They may be interested in your letter. Your local law enforcement probably won't be. City police, county sheriff department, highway patrol, state trooper.

The reason the FBI may be interested, is that this may be a small lead for them. Help them to narrow down a search, for someone/s they're looking for.
How about letting them see if it's worth the time.
This may be part of a large scale cyber crime ring.

Probably better find out if it's a friend, or cyber buddy first. The FBI doesn't play!

Apr 28, 2009 | PC Desktops

1 Answer

Two problems.((1)WHEN I SHUT DOWN I GET A MESSAGE "other people are logged in to your computer do you still wish to shut down"(2)my neighbours seem to know when my computer is in use.

Hi E-Davies, Sounds like your neighbors hacked into your computer, thats what hackers do you know? and if you got sensitive info on your computer, they know that too. Thats how people get their Identity stole. A good Spyware and Anti-Virus Software will take care of that for you. Good Luck.

Nov 04, 2008 | PC Desktops

2 Answers

Hi I'm Fred and i have a hotmail account, and someone has hacked into my e-mail, and i'm not able to get into to it now, i have an alternate e-mail, but it...

To solve this one, you'll need to contact hotmail's support staff via email. Click the link below to try and contact them about suspected email account hijacking:
Account Password Problems or Suspected Account Hijack Windows Live ID Support:

Best of Luck,

Sep 17, 2008 | PC Desktops

Not finding what you are looking for?
PC Desktops Logo

Related Topics:

71 people viewed this question

Ask a Question

Usually answered in minutes!

Top PC Desktops Experts


Level 3 Expert

5660 Answers

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

Les Dickinson
Les Dickinson

Level 3 Expert

18299 Answers

Are you a PC Desktop Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides