Does this apply to the person sending a remote access,
the person actually doing the remote access, or both?
That is, who is vulnerable?
Someone hijacked an email my wife was typing while she
was typing it...told her (by typing on her email) he/she
was in the house with her; also typed a bunch of
jibberish but clearly was watching her type real-time..
No evidence anything else touched on computer. I have
used remote access to help with my mom's PC. All of the
online hack-testing programs find no open ports or report
any access problems on my system, though I only have XP
Pro Firewall running on my DSL connection. This is rather
frightening as this person might be watching me type
right now without my knowledge---any ideas, help,
suggestions?