Looks like my computer has one. Most likely person is a network administrator who's been stalking me. Should I contact the police immediately or try to remove my personal data off the machine first? Haven't had to deal with this before. I really don't want to have to reinstall Windows 7 and everything else.
I should add that my computer always has anything related to remote access disabled immediately after the installation of the OS.
>I should add that my computer always has anything related to remote access disabled immediately after the installation of the OS.
What OP is saying, is that someone has a back door into his computer which is shown by all the permission stuff.
He's been monitoring me for a while and the last time the police told him to leave me alone--and he hasn't stopped.
If you can suggest another solution, whitehat or blackhat or otherwise, share your knowledge.
What got a network administrator to stalk you? Is all your personal information on that machine? Like others said, if you indeed have a rootkit, it's already compromised. Boot from another media with a live USB or whatever, copy what's important somewhere, making sure not to grab executable files, then perform a clean install.
What I don't get is that rootkits are SERIOUSLY rare on Windows systems after Vista. Almost impossible to pull off without very advanced, NSA level trickery. If their only evidence is permissions on a file changing then that's not... much
It's still a reason to believe his system is compromised. If something changed a [I think it's a system file] file's permissions to "Everyone", it sure wanted free access to it from elsewhere.
You could boot an Linux life cd and use that to back up all your data (that way they can't continue to contact your PC) and then call the police if they might have stolen anything harmfull. Otherwise backup your data, change all your passwords and reinstall Windows (maybe clone the hdd as evidence)
he hardware is most likely not impacted. theoretically it may be possible, but there are so many different types of hardware. the common malware just runs on win32, maybe win64, that's it.
I'm a femanon who rejected his much older married-ass's attempts to fuck me.
He didn't listen when I said no the last time we saw each other so I told his wife that he was cheating on her. Abusing the permissions he has due to his netadmin status at the company where we both worked he then monitored me for a couple months, read my emails, etc (and the company does not monitor their employees online as part of their SOP) and mailed a disturbing, threatening letter to me to home.
This all happened was over three years ago and the guy is still watching me. It's really creepy.
Sorry to hear that. That type of thing is depressingly common enough that there are specific laws against it in some countries now. If you're not in one of those countries, you know what to do.
What they say above is legit. He's very very probably not good enough to infect hardware: outside of proofs of concept that is literally NSA tier.
Win 10 is actually safer there, bizarrely enough. It makes a rootkit's job fucking hard. But first thing to do is grab a known clean, pressed, CD-ROM boot disc. Linux or Windows. Clean install that shit. Don't back up any executables. That includes MS Office files that may have macros, or PDFs. And pull the LAN plug before you do it.
Any other machines on your network should also be suspect, as should your router, and your phone. Serious talk: check for cameras.
Stay safe, hun. I've been stalked, I know how it feels. You can fight this. - fellow femanon
Just to clarify. When you say my computer do you mean a company computer that you use or a your home computer? I'm asking because how did a system administrator even get access to your computer.
Few simple ways, potentially?: figure someone might work from home, an attacker could feed them a trojaned VPN client? Know their name? An attacker could try to find their Failbook/etc, guess email, spear phish from there?
So that's the kind of thing you need to be looking out for, I guess.
I'm in Canada.
The whole home network has been off--unplugged and disconnected--for a while. My Windows tower I built without a wireless card on purpose. My Linux machine has the wireless disabled isn't online via Ethernet since everything is down atm because the modem is offline. My phone uses a different ISP entirely and is never used on any wireless networks.
I appreciate your reply and advice. Thank you.
The computer being discussed is a:
a) work issued computer
b) personal computer that you purchased yourself or received as a non-work related gift
Your dodging of the question makes tells me think this is a work issued computer.
you sound like a bikeshedding retard op.
no you dont call the police, you call your IT department. and you read/agreed to the terms of service. if you don't like it, you can just quit, and not have a job for a while.
ahh, ok. so instead of coming up with a rational explaination, like this could be a blanket corporate policy, you want to be treated differently because you have two X chromosomes?
nobody cares about your ugly ass enough to monitor what you do, unless, of course, you have given the business probable cause to monitor you because you committed something related to fraud
The first incident involving the email and letter occurred on a work computer (mine and his).
The most-recently discovered stalking (he clicked on an IP-logging link I'd posted to FB) was just involving him on his work computer--it's to the same government-owned static IP address from a few years ago. This possible rootkit issue would be on my home computer.
bitch, dose the business own the computer or do you own the computer, its a simple fucking question.
you already answered it by dodging it though, the business owns the computer, and they can do whatever the fuck they want to it
a home computer meaning a work computer that was brought into your home? because that's still a work computer, and they can still do whateer the fuck they want with it.
you, on the other hand, cannot do whatever the fuck you want to do with a work computer. that's why you're supposed to not be a cheap bitch, and buy your own personal macbook pro.
how did you even get this job, you seem pretty stupid right now
Scan it with some bootcd before and unplug it while reinstalling just in case. Rootkit shouldn't be on it but check if it didn't pull in any other crap. Be sure to format the os drive properly.
If you'd read my posts you'd know that when the stalking started he and I worked for the same company and he was and is the netadmin there.
Telling his boss and my boss did absolutely nothing. I'd even warned them I was worried about this right after the rape happened and still they did nothing. I also said that my workplace did not monitor that staff's computer activities--there was nothing signed agreeing to surveillance.
But all of that was years ago and I don't work there anymore. However the static IP address he's stalking me on social media with these days is the same government-owned one that he used before.
>get a virus from her horse porn website and pirated software
>le consiracy, it must be the person at work who hates me because i'm this important
illusions of grandeur
do you have children? do they use the computer?
did you get a virus? really? are you sure?
do you know what the advanced persistent threat is? do you know what a botnet is?
Home computer meaning computer in my house that I built myself that uses the home network I have set up via a residential Internet plan.
Do you understand now that the computer referenced in my post has nothing to do with any workplace?
Run a kamikaze linux USB, backup important stuff, dont backup useless stuff, reformat.
Get rid of USB.
Want to go full paranoid? get rid of your HDD, firmware rootkits are a thing.
why are you fucking idiots replying to this thread as if its real? i mean holy shit normal windows installs dont even have those options to view.
if anything this is simply a work computer, end of fucking discussion and you are all fucking tools
>if anything this is simply all made up
somewhere on /b/ there is a troll thread
>you roll dubs go to /g/ and pretend to be rootkitted
>if it's trips pretend to be a gurl while doing it
Upload the rest of what's left of your data and we will tell what has gone missing.
oh jeez oh jeez oh jeezz
well, for one, if you can manage to use kali, you should probably be working for the CIA or the NSA or MI5, because that means you're the most 1337 hacker of all time
of course its made up, and all of the fucking high school kids flock to retarded geeksquad threads like this to try and act smart.
op at least took a picture of the screen and posted it instead of taking a screenshot, so i will give him credit for playing the role well.
Logic (from the Ancient Greek: λογιkή, logike) is the branch of philosophy concerned with the use and study of valid reasoning. The study of logic also features prominently in mathematics and computer science.
Logic was studied in several ancient civilizations, including Greece, India, and China. In the West, logic was established as a formal discipline by Aristotle, who gave it a fundamental place in philosophy. The study of logic was part of the classical trivium, which also included grammar and rhetoric. Logic was further extended by Al-Farabi who categorized it into two separate groups (idea and proof). Later, Avicenna revived the study of logic and developed relationship between temporalis and the implication. In the East, logic was developed by Hindus, Buddhists and Jains.
Logic is often divided into three parts: inductive reasoning, abductive reasoning, and deductive reasoning, none of which, the OP seems to have.
damn anon, you had one job
>Telling his boss and my boss did absolutely nothing. I'd even warned them I was worried about this right after the rape happened and still they did nothing
Isn't he in jail then?
ask anonymous for help
they'll start a tweetstorm and ddos his boxes
>I'm a femanon
>so I told his wife that he was cheating on her
inb4 victim blaming but why didn't you talk this through with someone trustable like a friend or a fucking lawyer?
If you haven't done that yet do it right the fuck now.
If that's a computer owned by the company you work for, fuck right off. Doing any personal business or having personal data on your work machine is unbelievably stupid and will in your case probably get you fired.
he wasn't cheating on his wife. he perhaps wanted to cheat on his wife, but he did not.
someone who's studying law, supposedly, would know that.
nice troll attempt, but your entire story is unraveling
Anonymous login is used by the system and for services. Things such as Kerberos, attempts to reach a DC, expiring passwords, and service accounts doing their job will trigger an anonymous login. If you check your logs this will usually be filtered under 0xo, 0xe, 0x18
For rootkits and general botners you need to be more worried about your network traffic.
what a fucking tech illiterate faggot you are, OP. I've been sysadmin for 10 years and you must be one of the biggest faggots lately I've witnessed.
Number of things can change windows permissions, namely winshit's updates.
By all means, go to the police. You'll end up getting charged yourself because of your stupidness. I'm really sorry for your coworkers that they have to put up with you.
This has to be a bait. Ugh I hope so.
does GMER turn up anything? can't remember if that's what i used to use or if there's something better out now, but otherwise you might want to chalk it up to windows updates not giving a shit.
alternatively, set up a bridge with a packet sniffer?
>and the company does not monitor their employees online as part of their SOP