Microsoft Legacy OS
--
Questions
--
Followers
Top Experts
On 3.22.2014 she was using her computer as a different user. Â A local user named "John"
I remoted into her computer on Monday night and deleted the user account and the user profile folder. Â After rebooting her computer "John" was back. Â (Had I not seen it with y own eyes I'd not believe it)
I had her bring me the machine and I a have it in my possession now. Â I renamed the account to "Fred" and put a password on it and rebooted several time and all is well. Â Fred is still there.
I then deleted the Fred account and rebooted and viola John is back. Â WTF???
I am about to re-image the machine but I'd like to know how or why this happen. Â
Any thoughts?
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
The odd thing is that we can pinpoint the day that "John" appeared was on 3.22.14. Â Even better it was at 1:44PM PST.
It seems that this is a mystery that will never be solved. Â We ended up re-imaging the machine because we couldn't get it to stop bringing "John" back into her life.
Wonder who was John was ;)






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
In the unfortunate event of John coming for a visit again, could you please create a Virtual Instance of the machine before formatting it so that we can spend more time troubleshooting.
I am very curious to find out what really happened.
We figured out what happen!!! Â I had another customer come in today with a similar issue. Â But, this guy actually knew a wee bit more about his technology. Â
We found out that both of these customers have ESET Smart Security Suite. Â Which has "Anti-Theft" built in. Â
The Anti-Theft feature creates a local account that ESET uses if your laptop is stolen.
It is the Anti-theft feature, it create a "fake account" destined to lure the thief into it, this account has no password, and once in it , he will think he can use your laptop safely, in fact the location is transmitted to your web interface in ESET website where you can stealthily take pictures of the thief via the webcam; then the screenshot is transmitted to your web interface.
Thanks again all!
Cheers!
~~Daeta

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Is that written in the Eset PDF guides?
That's amazing really.
Thank you very much for posting that solution should impress anyone else who has experienced that.
Excellent
Bet Eset Anti-Theft feature is MOIHAHAHAHA -ing!!
Microsoft Legacy OS
--
Questions
--
Followers
Top Experts
The Microsoft Legacy Operating System topic includes legacy versions of Microsoft operating systems prior to Windows 2000: All versions of MS-DOS and other versions developed for specific manufacturers and Windows 3/3.1, Windows 95 and Windows 98, plus any other Windows-related versions, and Windows Mobile.