Solved

please help

Posted on 2011-02-20
8
344 Views
Last Modified: 2013-12-06
If I need to remotely access someones computer to delete a video whats the process? I don't know the person and I think they are in another country but they are trying to get money out of me and if I can delete the video then problem solved.
0
Comment
Question by:markanders29
8 Comments
 
LVL 117

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE) earned 167 total points
ID: 34939603
without their authorization it's illegal and called hacking.

Notify local crime enforcement in your area, it's called Blackmail.
0
 
LVL 95

Assisted Solution

by:Lee W, MVP
Lee W, MVP earned 250 total points
ID: 34939610
Agreed, whether or not it's embarrassing is irrelevant.  You cannot hack into someone's computer and delete a file you think they may have without their permission or a court order.  Contact the police if you are being blackmailed.  It worked out for Letterman.
0
 
LVL 95

Assisted Solution

by:Lee W, MVP
Lee W, MVP earned 250 total points
ID: 34939630
If the question was answered and "informed [you] of what [you] needed to know" then you should select that answer or those answers that informed you.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Assisted Solution

by:mad_wog
mad_wog earned 83 total points
ID: 34939669
the best way if they are trying to extort you is to get in contact with local authorities and police
0
 
LVL 95

Assisted Solution

by:Lee W, MVP
Lee W, MVP earned 250 total points
ID: 34939671
In other words - your answer is "It's Illegal" - the expert(s) told you that. How does that fail to answer your question then?
0
 

Author Comment

by:markanders29
ID: 34939676
sry..I tried to accept multiple solutions but now it won't let me ...1st time on this site.
0
 
LVL 117

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE)
Andrew Hancock (VMware vExpert / EE MVE) earned 167 total points
ID: 34939686
Question answered correctly. It's illegal and you need to seek advice from Law Enforcement or Specialists in your country.
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Read about achieving the basic levels of HRIS security in the workplace.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now