laptop pinged and ex/stlker may have had access to download other software to keep track of me

Posted on 2008-11-14
Last Modified: 2012-05-05
He is able to tell when an email is coming from my laptop - no matter who is logged on using it.. (it- not from my email accounts) How do i find if he installed something and get rid of it-  and also not allow my laptop to be pinged- whatever that means...?
Question by:exmarinegirl
    LVL 42

    Accepted Solution

    Best thing to do is wipe the laptop and restore the operating system from scratch.  Otherwise you spend alot of time and/or money to figure this out.  

    The way to find out is to put a sniffer on the machine and/or run antivirus software.  If he had access to the computer he could have hid it well so it's best to save your files to a CD or usb drive and wipe the system.

    My $.02
    LVL 8

    Assisted Solution

    I agree with Paulsolov.  It is always best to  reinstall from scratch.  However, if you cannot do this then you might consider using a program called HijackThis.  Download it. Run it. And post the output file  here.  We will be able to decipher the log file to tell you exactly what is running on your computer and how to remove it.

    Good Luck.

    Assisted Solution

    Check your email program for automatic forwards and Carbon Copies.  Check that he hasn't setup remote messaging and remote logging/administrative alerts.  You don't say what his expertise level is. This would help focus your anxiety.  If he is pinging your computer, that in and of itself is harmless.  But it can be stopped by disabling ping inside your firewall program or your router.  Also review your Installed Programs list and look for anything that says Citrix or other remote access program.  If your own expertise is low, then perhaps "97idegliade" and "Paulsolov" are right in that you can rebuild, backup, and restore in about 3 hours depending.  Otherwise, more info including the Hijack this logs would help.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    Introduction: I have always been a big fan of Windows but my liking towards it is slowly being eroded by the variety of other Applications that I encounter, when I browse the Web. Most of the software available is free and maybe Open Source too. …
    The password reset disk is often mentioned as the best solution to deal with the lost Windows password problem. In Windows 2008, 7, Vista and XP, a password reset disk can be easily created. But besides Windows 7/Vista/XP, Windows Server 2008 and ot…
    This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
    With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now