Question

  • Creator
    Topic
  • #2137880

    How do I COMPLETELY remove all spyware and set strongest security settings?

    Locked

    by papernpen ·

    I have always been “old school” and preferred to avoid computers whenever possible; so let me start with apologizing for my lack of knowledge, my stupidity for not ever signing up for a computer course and for the length of the explanation below.

    Since last November (possibly farther back on an old PC) I have been stalked/harrassed–and I say stalked because I am aware a normal hacker is smart enough to “get in and out” without me knowing—Except for his identity this person has made every attempt to make his presence known leaving dead-end trails of everything he is doing.

    1) I need help removing all Spyware, malware, and viruses from my late 2011 Macbook pro, iPhone, and my daughters toshiba notebook and her All-in-1 Gateway PC.

    2) I need to know how to prevent this Stalker from gaining access again and how to set highest security on all devices.

    I’ve tried the following repeated times and none of them have worked.
    I have re-set all devices to factory setting numerous times.
    I have purchased Norton and MacAudit, web root, along with multiple other “apps”. I have enabled all security settings from the devices user guides, microsoft security essentials, and have set strongest firewall settings on mac book pro, toshiba notebook, and gateway pc. The Norton software kept changing settings and bypassing –not scanning– “trusted” certificates. Then kicked me out stating I didn’t have administrative rights.
    I have taken devices (all bought Nov 2011) back to Apple and Best Buy numerous times. Best Buy has a 14day return policy and the warranty doesn’t cover viruses.
    Apple refused to say there was anything wrong–they would just reset the devices and reset my security settings–even when they re-configured my hard drive and the laptop crashed again that same day–they swore Mac’s don’t get viruses….finally after the 4th time the “genius associate” was nice enough to pass me a note with steps to secure my wifi and he whispered I needed to hire “someone” because I had a “serious” issue—but legally all he could do is reset my computer and say nothing was found wrong–then the manager sent him to the “back” and took over the (re-configuring) –he treated me horribly–and rushed me out of the store.
    I originally had Time Warner wifi–and they constantly said I didn’t have a problem and all security setting were set properly–they just kept pointing the finger back at Apple. Apple pointed finger at Time Warner.
    I hired an IT specialist “house call”. This person basically dismissed me —until he had to fight for control of my laptop (with whoever is stalking me). I could only afford 2hr house call and in that time all that the IT tech was able to find out was that my router was OPEN to the public and he took a log of my laptop and my daughters–but never got back to me with who the person is or how to stop it from continuing–he wanted more money.
    I went to the police; after an hour of trying to find out which department they should direct me to they said they didn’t have the resources and it would be like chasing a ghost. They instructed me to contact the FBI. The FBI said because my identity hadn’t been stolen or a specific threat was not placed on my life–it was out of their jurisdiction and I needed to go back to the police.
    I decided to move–hoping it would help–it didn’t. Oh..and while I was moving my things from my apartment to the moving truck “someone” broke down my front door and broke the lock (I was only gone 20min). Other than the front door being wide open (when I had locked it) and the Lock completely damaged there was no evidence–and nothing was taken so the police were not able to do anything other than direct me to the FBI again. Of course, FBI directed me right back to police and told me I had to “make” the police do their job—it was a local issue.

    Below is a small list of things this person has been doing.

    1. He continually “fights me” for control of my computer screen and iPhone screen by re-sizing the screen, by changing keyboard shortcut commands, by restricting my access “you don’t have administrative rights”–I’m the only user and some of these folders and or files I was the original creator, then by crashing the laptop/iphone as soon as I am able to regain access…etc.
    2. this person went as far to put “his” picture as the owner of one of my email accounts—SO every time I open an email from that account his picture pops up (I doubt its a real pic of him). He repeatedly changes the passwords and recovery info on all of my emails–blocking me from gaining access for weeks at a time)–I’ve had to close and create new accounts multiple times.
    3. I happen to bcc myself on an email (using a new email) and when I selected “show all details” of header–there was TWO emails BCC and I didn’t create one of them. This person created a Spring PM account for me –with password and everything—he was able to receive a copy of all of my texts and pictures–shortly after finding out about this email he changed my password to my main Sprint account and had my text messaging removed along with my cellular data–Sprint security said this was above them and I had to go to the Police.
    4. I have multiple screen-shots of hidden folders/files some that have dates as far back as 2007?? Again my devices are all brand new from November 2011. –Side note–the hidden files/folders are not the ones that are normally hidden for the protection of the system. I also have multiple screen shots of recent history into apps and folders I had not gone into or modified.
    5. He has embedded my ICHAT icons with commands (discovered when I clicked restore to original photo)–I never created a logon for ICHAT and I never tried to use that app—but it was constantly showing up in my recent history.
    6. In the history I could see my photos and files dropped into the public folder thru “airdrop?” –even though I put all my settings as private and DO NOT SHARE…
    7. He crashed and remotely removed my Lion software (or is it a hard drive?) from my new Mac laptop 4 different times. Despite setting all security settings Apple instructed me to do…he has been able to bypass AND change those settings—oh, and prevent me from changing it back.
    8. I continually have to disable the setting for FaceTime and photo booth but keep seeing both apps in my history and files from them being “dropped” into the public folder.

    This person has invaded my privacy, harassed me, stolen my pictures, my info–all through my mac laptop and my iPhone — I gave up and quit using both devices for awhile hoping this person would get bored and leave me alone—he got worse– when he couldn’t access me through my devices…he went after my daughters toshiba notebook and all in one gateway PC.

    I was a quality manager during the day and I Bartend at night so you can imagine the amount of people I come in contact with on a daily basis. I have no idea who is doing this or why; I just want him to leave me and my daughters alone. I’ve learned a lot on my own (online) since this has started but I am still a beginner and just need a credible Step by Step guide on what to do and how to completely remove this person out of all of my devices and keep him out. I do not have the funds to hire another IT Tech or buy new computers. One thing I am doing is….looking into IT classes–Ignorance is definitely NOT BLISS.

    I want to thank you for just taking time out of your day to read this HOT mess and I appreciate any help or advice you can give me.

All Answers

  • Author
    Replies
    • #2883904

      Clarifications

      by papernpen ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      Clarifications

    • #2883899

      Start off by resetting the WiFi Access Point to Factory Defaults

      by oh smeg ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      Then enter the Setup Routine of it and disable the WiFi and change the User Name if Possible and most defiantly the Password from the Default.

      Then reset every computer type device that is used to connect through this Modem to Factory Defaults by using the Recovery Media that came with them and making sure that you format the HDD’s in them.

      That is the starting point and just disabling the WiFi and Changing the Routers Password will be the best way to start here though that is only a start.

      Col

      • #2883890

        Reponse To Answer

        by papernpen ·

        In reply to Start off by resetting the WiFi Access Point to Factory Defaults

        Thank you for your help. I have actually changed the username and password of the router a number of times and I also changed my service provider. I have reset every single device in the house while the wifi was off and that did help—for maybe a week. I’m not sure if I have formatted the HD correctly. With Mac and IPHONe they do not supply any disks that restore to factory (hard reset)..but there is a process to set to factory by pressing command and 8 at the same time on boot. I believe thats called a “soft reset” and I’ve been told (of course after the fact) that process doesn’t remove all root issues but makes them worse. I appreciate your response and I will definitely try the process again–couldn’t hurt..Thank you!

    • #2885665

      Secure your router

      by n_kahnman ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      I’m sorry but the only suggestion (and probably most effective one) I can make here in this limited space/time is to secure your wireless router/modem. You will need to do some research on the manufacturer/model of the router/modem your internet service provider supplied you with (for example is it a d-link, smc, netgear, cisco). Most router/modems will have a page you can log into to setup/customize/secure the device. For a novice these settings can be very confusing and honestly you would be better to get someone experienced to do it for you (I know myself I charge $20-40 to secure a wireless router/modem and it takes less then an hour to do but not sure what you would have to pay where you are). There are alot of different settings (router password, lan settings, wifi security and settings, mac address filtering…) that need to be changed to truly secure your internal network (lan) and unfortunately I don’t have the time at the moment to type it all in here. Once the router is secure you would be wise to save all your data (pics, documents…) from all of your pc’s and reload them to the original factory received setting. There are also settings on your phone/s that could be allowing the intruder to gain access (bluetooth, mobile network settings…) and to be honest I have ‘zero’ experience on apple products so I can’t offer any help there but maybe someone on here who works with apple products can. Also once your router/network is secured and all of your pc’s are reloaded go and change ALL of your passwords to all of your mail accounts, social network, banking, ebay, websites you visit… etc. Sorry I couldn’t offer more detailed instructions but hopefully this will give you an idea of some of the steps required and good luck.

      • #2885659

        Reponse To Answer

        by a.portman ·

        In reply to Secure your router

        From the looks of your description you seem knowledgeable and have been doing the right things. Start at the router. Secure the router including hiding the SID and limiting the number of DHCP connections. Use the ACL and code the access point to only accept the mac addresses of your devices. Then pull the plug on all of the devices, reset to factory and start slowly.

    • #2885658

      Several Things to Try

      by sogorman74 ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      Backup your data to memory stick, external hard drive etc.
      Use a strong password to secure your router.
      Set up MAC address filtering
      Hide the SSID
      Format PC’s/Laptops and reinstall Operating System and Applications (Maybe consider an opensource O/S such as Ubuntu or Linux Mint..)
      Install Antivirus Software/Firewall/Spyware Cleaning software or a security suite e.g. Avast, Zonealarm, Norton, Comodo, Spybot etc.
      Install and run Malwarebytes software and upload a log post reinstallation
      Change all your passwords for web based apps facebook, banking etc.
      Ensure that your kids aren’t trying to drive you insane!

      • #2885545

        Reponse To Answer

        by papernpen ·

        In reply to Several Things to Try

        lol, my kids are always trying to make me crazy. Thank you for your advice; I do have a couple follow up questions. How can I be sure that I won’t re-infect my devices when I re-load backed up photos and documents? There are only a few documents I would need to save but I have a million and one photos. I’ve seen this idiot steal my photos and have also seen IChAt Icons being accessed when I don’t use ICHAT. Is it possible for him to hide viruses or spyware in one of my photos?

    • #2885622

      Good answers here but…

      by ultimitloozer ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      I would do things the other way around by disconnecting the broadband modem, access point, and/or router(s) first (unplug ’em all), then start with fresh rebuilds of all computers first because if one or more of these devices are compromised, they may still be able to start with changing your username/passwords and other settings on your routers, APs, and modems before you do those rebuilds. Once all of those are done, then start powering up the other devices and securing those moving outward from your network toward the internet (access point/routers before broadband modem).

    • #2885617

      Email Security Reminder Questions…

      by dom19 ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      perhaps change your email security questions for all accounts. I had to get my sisters hotmail account back the same way. I helped her change her security reminder questions, as someone must have guessed the answers to (her easy) questions and got in that way.

      • #2885546

        Reponse To Answer

        by papernpen ·

        In reply to Email Security Reminder Questions…

        Thank you. 🙂 I have tried changing and completely deleting all accounts that I have…multiple times. I even pick completely wrong answers to security questions that would make it impossible for someone that knows me to guess. Apple swears I don’t have a key logger (I don’t think they even checked) I don’t know how else my passwords and accounts keep getting compromised.

    • #2885613

      And opt out of the multitude of Internet applications that…

      by smartacew0lf ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      ask you for your email password or allow you to login with an account from another site. Change EVERY internet logon password for every single application you use on the internet working one to the other without stopping, using strong passwords on each. Do not stop until you are done with any/all login sites that work in conjunction with each other. If you own a facebook account start there, then email. Remember that with access to one, this individual may easily acquire the others. All of the above should also include new challenge responses (security questions) from every site. Avoid using the default questions and opt to create your own when possible. This is going to continue to plague you until you follow virtually every procedure mentioned in every post so far and do it dogmatically. With your limited experience you might consider hiring someone who can come to your place and work with you to close all of these doors. Should you elect that route, the tech will probably work quicker and cost you less money if you simply explain to him what is going on and then allow him to do his job without distracting him, yet be within earshot at any point in time he may have a question.

      • #2885543

        Reponse To Answer

        by papernpen ·

        In reply to And opt out of the multitude of Internet applications that…

        Thank you. I would love to pass this off and have someone just fix it for me but it looks like this person has no intention of leaving me alone. I can’t keep asking for help and not learn to fix and avoid the problem on my own. I would also LOVE to never use Facebook again but it is a social medium that has become mandatory for bartenders; owners even ask how many friends or followers you have…it’s free advertising for them. I do keep my Private life Private and completely separate from anything thats public. I have changed all user names and passwords and deleted accounts. It does literally take me all day every time I make changes; it’s always a race with this person. Having to go through password recovery because he has changed my passwords then quickly moving to the next account. I’m not the type of person who likes loosing so I will keep it up…hopefully he gets bored and just goes away…OR I figure out who the H** he is. Thank you for your help.

    • #2885604

      Scan Hard Drives

      by rayman99 ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      Appart from securing the network internet access as mentioned already, my way of cleaning up malware or virus infestations is to remove all hard drives, Connect them one at a time to a trusted PC via usb adaptor, run anti malware anti root kit software available free from the web. Get someone else to download this software to the trusted pc – ie friends pc, or buy it on a cdrom, dont use your suspect pc to download.

      You then run scans to fix the bugs on the suspect hard drives. I have found that root kits that have been integrated into your system files cannot be removed by running software of any kind on the infected system. The method I described found and removed the root kit that had hijacked my pc quickly and efficiently. Try the free Kaspersky TDSS Killer anti root kit program – and malwarebytes free scanner.

      good luck.:)
      ps it aint rocket science.

    • #2885591

      Seem like you have a jealous evil person coming at you-a professional too

      by kmdennis ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      It appears as though this person has created and hidden administrative accounts on all of your devices and installed a keylogger, so it does not matter what you do, they will see and log everything you see and do on your computers. SO other that taking it to a forensic expert, which is what you could do, if you had the money and really wanted to find out who it is. It can be done. So here are my suggestions. It will be a little costly but doable.
      1- You will need to purchase a USB drive at least 2TB.
      2- You will need to run an application that will take an inventory of all your installed applications including the serial numbers on all your computers. http://www.belarc.com/free_download.html
      2- Turn off the internet. Disable your network card and wireless connections.
      3- Make an image of you computer, using something like Ubuntu Live or any imaging software you can get.
      4-Then copy over your personal files (pictures, music etc) . Once you have backed your personal files and have the serial numbers of your operating systems and applications, format the devices-
      5-Wipe them clean and wipe them maybe 2 to three times to make sure.
      Reinstall your operating system. Install antivirus and antispyware from reputable companies.
      6-Reset the router to factory defaults- (blow away all the configs and accounts. Then log back in, and use a very strong password and encryption – NOT WEP!!! Use ( use a password that is not found in any dictionary in any language – mix of upper and lower cases, numbers and so forth)
      7-Once that is secured, you can now connect your computer to the internet and update the antivirus and antispyware, scan the computer first. Then take if offline again.
      8-Install all your applications- connect the USB drive and scan for virus and spyware before copying your files back onto your device.
      After you have installed all the applications, create a regular user account and make sure your admin or root passwords are very complex. Log on with you regular non admin account and use it. Now create a brand new email address (gmail or whaterver you use.) You can contact each of your people one at a time form your new email address.
      9- DO not access the old mails on your new computer. Instead get a UBUNTU live or any Linux live CD and boot fro this one when you access the old email. You should be safe from that person now. DO the same thing with your phone. It is hard to get your contacts back but you can export them and then reimport tnem into your new account.
      If you see email from people you dont know or are not expecting email from just delete it. Don’t click to see what it is or click links from emails that you are not sure about. Instead copy the whole thing and past it in notepad and read from there if you don’t trust the source.
      All the best.

    • #2885578

      there is rudeness amuck here

      by databaseben ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      everyone is missing the point of the question. so i wonder why my post / suggestion was deleted a couple of days ago. seems to me a bit rude.

      to reiterate the question:

      “How do I COMPLETELY remove all spyware and set strongest security settings?”

      the answer are:

      1)The hard drive has to be reformatted (preferably re-partitioned first) before reinstalling the o.s.

      2) Toss the wifi router out the window and use network cables instead

      3) Learn the many concepts behind infections and the variety of tools available to attack them.

      • #2885548

        Reponse To Answer

        by papernpen ·

        In reply to there is rudeness amuck here

        I didn’t delete anyone’s post and I am truly thankful for everyone that has given me advice. I haven’t been able to log onto my computer for a few days…idiot has been causing problems more aggressively and I have been locked out of most devices. I am going to print out everyones suggestions and just start all over and try everyones suggestions. I have tried some of what everyone has suggested but maybe not in the right order so I think I just keep re-infecting my devices. I will update with my hopeful success or bug you for more help 🙂 — Side note, I have hired a tech to help me with this issue. Unfortunately he wasn’t as proficient with Mac as he previously stated to me and MAC “experts” swear it’s impossible for me to have any virus or spyware.

      • #2885505

        Reponse To Answer

        by kmdennis ·

        In reply to there is rudeness amuck here

        Your suggestions are probably what will happen, however tossing out the router will not solve the problem. In fact that is the least of the problem. There are many companies with corporate firewalls, I don’t have to name any here, that have been hacked. Wire or wired, practically any vulnerable system can be breached. If there are exploitable applications or operating system, as long as that computer can visit a webpage, it is possible to be infected. At this time “paper” just need real practical suggestion to resolve the issue by himself, because the paid experts have not been able to fix it. I don’t understand why they did not back up his files, save his serial numbers on all computers and simply blow them away, reinstall and install AV and go on from there. However, I think he should be able to get it resolved finally.

    • #2885572

      Excellent answers Ben. However,…

      by smartacew0lf ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      you missed the bonus points regarding the abounding rudeness. (I think). :-] Seriously though, I have experienced similar glitches in this new website many times. Enough times such that I am hesitant to direct my suspicion to particular persons. After all, your comment or answer can in no way be perceived as anything other than an answer to the question just as it was framed. WHile rudeness abound exponentially on a good many of these types of forums, I think it safe to say that TR probably has more balance than most, especially if one considers the number of users and volumes of contributing posts. Good day my friend.

    • #2885530

      PaperNPen

      by smartacew0lf ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      “Unfortunately he wasn’t as proficient with Mac as he previously stated to me and MAC “experts” swear it’s impossible for me to have any virus or spyware.”

      impossible to have any spyware or viruses on a Mac? Well, in all honesty, I believe a statement like that simply lends more evidence in defining the difference between genius and stupidity. Genius has its limitations.

      My friend it would appear that you are on the fast track in educating yourself about these things. Stay cool. Limit any direct conversation with this individual. Yet maintain vigilance in gleaning all you can about him. As rayman99 said, “It isnt Rocket Science” and indeed that is true. I wish you luck in a quick resolution.

      Chances are, you are giving this guy far too much credit for skills or education. That is easy to do in the elementary stages of anything one deigns to learn. Keep us posted with your efforts. Commentary on your experiences is where the real meat is. 😉

    • #2885690

      OMG!

      by jayj200 ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      good luck!

      • #2885489

        Reponse To Answer

        by smartacew0lf ·

        In reply to OMG!

        so this is the sum total of wit or technical skill you could muster for your first words within this community having nearly four years of involvement with TR?
        Not holding my breath for the next bit of profound enlightenment you care to illuminate us with.

    • #2885687

      Security

      by pcrx_greg ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      The strongest security is only as good as its weakest link. I once told a client that his daughter’s PC was infected because she never met a download that she didn’t like. His response was that he bought the computer for her and she could do anything with it that whe wanted. Needless to say I quit trying to clean all the crap off her PC. I digress. All of the advice above is great and you need to write down all the suggestions and go through them making a list of the things you will try. As far as Apple computers are concerned, yes they do get virus infections. I read an article today, saying that there is a virus setting up a botnet on Macs. The virus experts estimate%www.techrepublic.com,000 Macs currently infected. Of the 600K, almost half are in North America. Apple would like everybody to think that they are immune but their arrogance will only attract the virus authors to target them even more. Here is a link to one of the many articles on the Mac infection: http://arstechnica.com/apple/news/2012/04/new-analysis-backs-half-million-mac-infection-estimate.ars

    • #2885675

      A comprehensive approach is needed here.

      by abcu ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      I am very sorry that you and your daughter are going through this.
      I have signed up just to answer your questions (as best that I can)
      I know exactly what your going through as I am dealing with a very similar situation right now.

      “How do I COMPLETELY remove all spyware and set strongest security settings?”

      It really is up to you how seriously you take this whole affair. The combination of strategies that you could use to make yourself as secure as possible would likely be to much for one person to manage so a compromise needs to be reached. Unfortunately there’s not certain security software that you can buy then set/forget and just expect to be secure.

      b Security consists of multiple defensive layers combined with constant vigilance especially when your a target. /b

      The methods I will go through although seemingly thorough are by no means exhaustive so you will need to exercise your judgement as to whether the below steps are a ???step to far??? or not enough.

      My first advice to you is to (as much as possible) try and relax as whoever this is wants you to be in disarray not only to hurt you and your daughter, but in order to disrupt your ability to respond.
      Please bear in mind that the psychological effects of a situation like this if prolonged can be horrific and last long after the danger has passed (C-PTSD, BPD etc) so dealing with it now and in the best way possible is imperative especially as a minor is involved and not to mention that it could also escalate. I am not saying these things to scare you but to try and make you aware of where a situation like this can very easily go so that you can be properly motivated to do whats necessary as it’s a natural human reaction to go into denial to some degree, which also lessens the effectiveness of your responses.
      Be ready mentally and physically to do ANYTHING as this guy by the sounds of it is not playing, so neither should you, so if you haven’t already arm yourself and make sure that both you and you daughter are proficient in its use.

      Secondly keep a (paper) diary of events along with photos, video etc. Keep all of this in a fire resistant/proof safe which is secured to a wall or floor preferably in your basement.
      Once you build a cumulative argument regarding the threat this guy poses to your family you can then drag the police (lazy, inbred C*^~s that they tend to be) kicking and screaming into the situation, till then keep your gun close to hand.

      In short “get your mind right” by any means as you have a lot to do (unless you want to not use the web….like ever again) to get yourself in a position not only where this situation will become manageable but also where you will have a chance of getting whoever this is, depending on his skill of course.

      This is going to be a long post and an even longer process for you to implement which as far as I can tel is going to consist of 5 stages:

      1. Physical security – All other security is derived from this.

      2. Preparation – Auditing the various OS versions, software, drivers, firmware, website usernames and passwords as well as identifying the data you want to backup in order to securely rebuild your various systems.

      3. Implementation – Rebuilding your systems in a physically secure environment using trusted software sources as well as securing (changing then using a good password manager) your various emails and passwords for your online services.

      4. Vigilance & Maintenance – Install and configure Antivirus, Antimalware, Firewall software, Encryption for both your network and HDD’s along with a Monitoring solution. Although these measures are by no means a bullet proof vest they will form part of a strategy designed to frustrate this guys attempts to harass you whilst giving you a sense of control which is of course what this guy trying to take away in order to intimidate you.

      5. Contingency Planning – Creating a simple system to return your virtual world to the secure state that you will have created using the first 4 steps when something goes wrong.

      OK that’s enough for now as I have to go out and you’ve more than enough to digest for now.
      Also does anyone know if I’m ok to give this guy my Skype details here?

      • #2885481

        Reponse To Answer

        by papernpen ·

        In reply to A comprehensive approach is needed here.

        I want to thank everyone for taking time to respond and offer advice. I began auditing all of my devices and of course my macbook pro now has the never ending spinning wheel. I was not using the administrator account and did not delete anything. I was just starting an observe and record approach..then poof my laptop has yet again crashed. My Iphone is not responding well either…it took me most the evening to just sign on to this site. So I just wanted to give an update. I will continue to sign on when I can…at this point Im at the genius bar mercy…again..At least this time Im armed with some credible information to hopefully put an end to this.

    • #2885672

      Start with your router!

      by draco vulgaris ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      The consumer level routers that you are probably dealing with should reject ANY packets that
      are not responses to requests by devices on your local network! If your router doesn’t work that way, try to get one that does. My home network works in just that way. I’ve never had a problem with it.

      If you are using any sort of wireless connection, consider replacing it with wire! Wireless can
      be “heard” a hundred feet away or more. It may be encrypted but the encryption is NOT unbreakable!

    • #2885494

      Another thought

      by interstellar towel ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      I’m not an expert by any means, but I was wondering whether you have remote management or remote login enabled on your Mac? If so, you’ll want to disable both right away, before you reconnect it to your network, whether wired or wireless. By the way, wired connections, as mentioned above, are capable of being hacked, but they’re still much more secure than wireless, IMO. And it is likely that your stalker is taking paths of least resistance — particularly since you mentioned that at one point your router had no security at all. After your systems are confirmed clean, you might consider (as suggested above) using ONLY a wired network in your home for the time being.

      • #2885480

        Reponse To Answer

        by papernpen ·

        In reply to Another thought

        Please know I have exhaustedly rwmoved all sharing and all remote access to my devices–repeatedly. Everytime I sign off then sign back in..all my sertings have been changed..This person was so bold to fight me for my screen and he continually kept checking the box That I kept unchecking…until Im no longer even given the option to change the setting because its either grayed out or says I do not have permission to access…After I followed everyones advice here…my plan was to definetly get rid of wireless—on top of setting a regular audit and security plan fir all devices—now everything is on hold for the moment because this person has crashed my laptop…one of my daughters phones…and it looks like my Iphone is next on that list. Will update everyone after I bring my devices to Apple tomorrow. Again thank you so much.

    • #2885476

      Get a new harddisk and reinstall the OS by using another trusted CD/Media.

      by kamaruzaman ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      May I know how you rebuild the crash Iphone/MAC?.
      I am not a MAC user so I dont know how to rebuild a crashed MAC.
      Maybe the recovery media/cd/usb/harddisk have been infected by viruses/trojan or scripts.
      May be the backup files also being infected.

      If you have any backup image try to avoid to use them while rebuilding the system

      Try to get a fresh system and new Router.

      Good luck,
      Kzaman

    • #2885470

      WOW…

      by rpollard1 ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      This guy is persistent. Never heard of such.

      I’m no expert but the advice you have been given seems sound.

      The things I would do:

      1. Get rid of the router and get a router that has superior security.
      2. ONLY use wired as wireless is much less secure.
      3. Take the PCs back to a minimum installation and don’t put any of your personal files on it until you get this guy/gal locked out for good as you will spend an inordinate amount of time restoring every time you redo your system. And, it may remove infected files. After you’re satisfied they have been locked out I would move a folder in at a time, maybe a folder a day until I was satisfied they are gone for good.
      4. Get a packet sniffer and learn how to use it. They probably make a version of WireShark for the Mac. This may give you a clue as to what is going on. It may require an expert in the end but it sounds like this guy is using a commonly used tool to gain access to screen sharing/control capabilities. The Mac is running Darwin in the background and X with all it’s components may even be installed which may give them the capability of controlling your system.
      5. De-install all applications down to just the bare minimum. Things like web browsing is the only thing I would have on there. I would limit my visits and definitely log where I go and when. Space out the visits to each different location to see if you can find out which one he may be using, if any. I would even go as far as getting an imager that would burn an image of the OS after I de-installed all unnecessary apps, that I could use to reset the Mac every time something goes wrong. Research every process that is running and make sure you absolutely have to have it in order for the system to run.
      6. Write down all processes that run after the initial installation and then monitor the processes to find out when that changes and what has been added. Research anything that gets added. Do this before connecting to the Internet. Then, after connecting to the Internet, continue monitoring to find the added processes.
      7. I would not install Malware and Antivirus products since they have been useless so far. I would only do this once the problem has been resolved. Doesn’t sound like he’s using a known Malware/Antivirus signature that is being recognized anyway. Like I said MINIMAL, bare bones installation.
      8. As another poster pointed out, when you set up the wireless connection use MAC filtering on the router so that it filters out anything that doesn’t involve your MAC address on your Mac. Sounds a bit confusing but the MAC address is assigned by the manufacturer and is unique to each computer built. I would set up the wireless connection only after I ran pest free on the wired connection.
      9. Do not use the wireless connection on your iPhone. Turn off wireless and use 3G only until you get this resolved. And, don’t let your daughter connect to your local network at all either with her PC or phone. turn off networking on her system until this is resolved. He/she may be using the PC as a back door.
      10. If you still want to employ a Mac expert, you already know the things to ask at this point but I will re-iterate:
      1. First question to the candidate is, do you believe Macs can get viruses/malware/root kits, etc.
      2. Secondly, have you any experience removing any viruses/malware, etc. on a Mac.
      3. Do you have any experience securing wireless routers.
      4. Do you have any Unix experience
      5. Do you have any experience with packet sniffers.
      6. Outline to me what your basic approach to security is.
      7. Do you have any experience with non-technical security breaches (social, etc.)
      8. Are you willing to work on a per problem basis and only get paid if you’re successful after a cool down period like a week or a month (at your discretion). If they know what they’re doing and are very confident they may not only agree to that but may even help you out just for the challenge rather than the money.
      I may have missed something in this list but you should get the idea.

      This list is not in the correct order but you shouldn’t have any trouble figuring out the order. If you need any more advice I’ll get the email as I have selected the Email me any responses checkbox. Like I said, I’m not a security expert but I might be able to contribute a small portion to the ultimate solution with everyone else here.

    • #2885448

      Paper n Pen

      by jpnagle59 ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      I can understand your problem, and it sounds like a huge one! I would like to send you a private message, but I can not do so unless you choose to follow me. You can click my TR name, jpnagle59, at the bottom of the post and it will take you to my little old page, click the ‘Follow Button’ and that will allow us to have a private message. You can always ‘Un-Follow’ me after that. Just want to discuss some items with you…respectfully, jpnagle59.

      • #2885417

        Reponse To Answer

        by smartacew0lf ·

        In reply to Paper n Pen

        I too had the same desire. That said, choose a person and stick with them. Too many chefs spoil the broth.

      • #2887457

        Reponse To Answer

        by jpnagle59 ·

        In reply to Paper n Pen

        …agreed…it is comforting to know that there are good people here who DO want to help…

    • #2885438

      How do I COMPLETELY remove all spyware and set strongest security settings?

      by nebuchadnezzer ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      Someone is messing up your life – of course. If you have reset all passwords and carried out all forms of security changes, then the answer must lie elsewhere.
      One thing at a time. Just secure one computer – yours. It is important that YOU control everything. Sorry to say this, but keep your daughter out.
      See what happens.
      Come on back and we will go from there.

    • #2884817

      RE Malware & Security SetUp

      by shrike49 ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      All the above have Good Suggestions!! There are Many aspects to the whole issue of Security for the Internet and the BEST I’ve Come across is “DON’T GO ON THE INTERNET” Yep I’m Not Kidding You!! The Practicle aspect of that statement is of course is Rediculous!! It’s too valuable a Resource NOT TO GO ON! So Solution’s to Defence while on the Internet are firstly to understand the ins and outs of what and How Hackers and Virus’s, Keylogger’s etc do!
      There are many good article’s at Techrepublic which offer advise and would suggest you read as many of them and follow the Links. This will help you understand (EG How a 15 year old spent 90 days on the Internet and Hacked 269 Companies) what your up against. You must then decide on a good Internet Security Anti-Virus Tool install it and do a FULL Scan of your System.
      I Use Kaspesky Internet Security 2012 and recomend it!! It’s harder to Use from an end User’s point of view, BUT IT DOES THE JOB, so a little effort on the users Side is worth its weight in Gold. I also use the Windows Defender (Microsoft Security Essentials V4..0 is Latest) and MalwareBytes on Win 7 Pro as an added precaution. My Previous (Norton Anti-Virus Let me Down Badly!!).
      Make Use of the Router FIREWALL and YOUR INTERNET SECURITY software’s firewall!! Yep I combine the two of them and My SetUp Works well!! Check with your ISP Provider AND Manufacturer what Security features are provided with the equipment you have.. You may Need to Upgrade!! As for Some Idiot who actually rang me at home and tried to tell me they were from Window’s (Not Microsoft) and that there was a problem with the firewall and ASKED ME WHAT FIREWALL I was using!! I told HER that I Didn’t have a problem with my smoke detector’s and that they all worked fine and didn’t need a firewall! Also asked her What a FIREWALL was? She Hung Up! Unfortunately My Telecommunications Provider wasn’t able to trace the caller in time!! BUT.. I leave that part for the moment, the point is you will need to have a good firewall!!
      After a number of experiences (I’ve been in IT since 1968) I actually have a front end computer purely for the Internet Only! Only after some automated Scanning and antiVirus/Spam checking right down to RootKit level Checking do I Allow a connection and transfer only the Data Content I want!! Once Bitten Twice Shy!!!
      The Front end Computer is a costly way and not practicle for many, But I Suggest that you never keep any personal information on your computer, shy away from Social Media Site’s and be careful where you go on the internet!! Kaspersky and other’s have site filtering and Kaspersky also has a way of checking downloaded file’s. Also keep an eye open for Sites which divert you to another site! If you Place your mouse over a link it will show that link either in the bottem of your browser or a Balloon! If clicking on the link take’s you to a site other than what was displayed, get out of the browser and offline as quickly as possible!!
      Moral of the story is you have to be vigalent and very very wary!! As indicated above there are some out their that have nothing to do all day but try and steal information of your computer or worse still damage/corrupt your system to the point of no return!!
      All in All it’s your decision as to what and how you implement your internet security and there is NO magical fix to stop hackers or virus’s! Maybe the legal system should attack the attackers and put cybercrime in it’s place so that us genuine end users can get on with it!!
      Last but NOT least, SELF Education and SPENDING SOME TIME RESEARCHING IT Security would help you make some informed decisions. A good starter would be to understand the Operating system that you use and find out what it’s weakness’s are and what it’s strengths are as far as Security is Concerned! Then Check out a Good Internet Security System and Spend some Time learning about it!! Free Software can be good, BUT be caredul, you only get what you pay for!! Understand also the communications equipment you are using and it’s strengths and weakness’s!! Wireless is great, BUT…. Personally I won’t touch it with a bar of soap!! ALL my stuff is wired!!
      Bottom line is and without being rude, it sounds like you are in for a high learning curve!! To get you started though, suggest you download and install MalwareBytes and DO A FULL SCAN!! Next learn and implement as much security (Software and Hardware) as posible to meet your requirements!!! Don’t believe everthing Sale’s People, Manufacturers or even what’s on the internet! Verify information from multiple sources!!

    • #2887556

      Add my experience.

      by tã¶ã¶rvalisoospoliisi ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      Hello PaperNpen
      I have read your article and the responses. I do sympathise with you because I have 2 children who have been abducted 7 years ago. In 1998 the Abductor got me into computers , as a way to keep me at home and put all my records on electronic media I was also old school but I do not regret learning about Computers but that person does not use Computers themselves and let my kids get any electronic communication toys so they can not seek me I can not seek them. I can not call and write. I go to the place but the Yaqooza Qeisatsoo put me in detention.

      But I know where they are. Anyway my Computer is under scrutiny by them and they copied my Time machine Disk and I found they were controlling and peeping into my Computer what ever I did trying to get my kids back ,they are actually living near me too. I became a Muslim 6 years ago because of this because only God can help to get my Kids back.

      I do not care about security because there is no real security, all the others are telling you what to do but if you came on line the person already knows.

      You have to be cunning and clever to trap the person into thinking that and you are doing so and so but yo are doing another thing and this and lead the person to you and then strike.

      This is a physical thing not virtual, this person who is tracking ,stalking, hunting you seems to have worked or is working for the for the security police or blackmail or frame you use you something sometime somewhere we have done that is attracting that person.

      They will always be one step ahead if they have the power,it might be someone or God that is trying to get you back to Paper and pen because Computers were a spy thing in the beginning and the US army opened up the internet to spy on the world!

      Even the Teq republic is being watched to see if any enemies are plotting their defence.

      Disclaimer I am not making any moral Judgements about you PaperNPen or that stalker we all have our privacy and only God knows and sees what is in our hearts.

      I am not going to advise your on computer security because you should have gone to an Apple shop and or called and talked to them not show your problem online because the person knows what you are doing ,too late anyway.

      We should have all stuck to our memories and not say anything but what is obvious and true.

      All the best to you and your family pray to God for peace of mind do not listen to me are anyone else take all these comments with a pinch of salt follow your common sense and your heart.

      The most threatening is what we all think and they are trying to know it and contain it.

      This big Brother my Friends.

    • #2887555

      Sorry the text has not rendered.

      by tã¶ã¶rvalisoospoliisi ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      My Teqrepubliq name T

    • #2887554

      Still not rendered

      by tã¶ã¶rvalisoospoliisi ·

      In reply to How do I COMPLETELY remove all spyware and set strongest security settings?

      Tuurvalisoos

Viewing 24 reply threads