Solved

suspected facebook caused machine to have security leak

Posted on 2008-10-14
4
225 Views
Last Modified: 2010-04-11
i have a machine suspected of being infected with malware, started from facebook. whenever this person A logs into facebook, another person B seems to know what A is doing. B can access A photos, up to the extent that A can literally see her folder on her desktop being copied over. how can we confirm on whether this is a hacking / security leak issue on the laptop?
 
0
Comment
Question by:grnow
  • 2
4 Comments
 
LVL 7

Assisted Solution

by:willbaclimon
willbaclimon earned 50 total points
ID: 22723867
That seems like a strange security risk...check for listening ports on the workstations
0
 
LVL 6

Expert Comment

by:clearacid
ID: 22746559
Are you using a proxy server?
0
 

Author Comment

by:grnow
ID: 22782695
yes, we are using a proxy server...we replace the user's laptop with a spare harddisk. is there anyway we can scan the old hard disks on any logs to find out more about this?
0
 

Accepted Solution

by:
grnow earned 0 total points
ID: 23210436
no solution would like to close the qn
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Malwarebytes Business Solution 4 80
Assessment for encryption solutions 4 102
Assess risks for an e-Payment system 15 108
IPS Logs NMap Scans 1 99
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
In a recent question (https://www.experts-exchange.com/questions/29004105/Run-AutoHotkey-script-directly-from-Notepad.html) here at Experts Exchange, a member asked how to run an AutoHotkey script (.AHK) directly from Notepad++ (aka NPP). This video…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question