Is it possible for someone to access my system from remote location and operate in the background without detection? If so, how do I shut them down or know when they are in my system? Going thru a divorce and my laptop was accessed (opened and screws glued
when replaced) while I was away, by my ex. I noted a lot of activity (directories and files dated while I was away)
↧
Detecting background hijack
↧