Questions

How was someone else able to control a library computer?

+
3 Votes
Locked

How was someone else able to control a library computer?

birchswinger
I broke off a romance with a tech geek who turned out to have unsavory connections. Initially he stalked me solo (I think), but somehow eventually got others to participate. Sounds implausible, but it happened and I have witnesses. QUESTION: During 2006 I repeatedly had this experience: I'd go to the library and begin to use a computer. All would be fine, but after a short time one of these proxy stalkers would show up, plant himself behind me, and start texting. Very quickly I'd lose control and/or access on that computer. I learned to beat the game, sort of, by suddenly running to a random computer, typing in an address I'd copied, and printing immediately. This was the only way to get any information on anything that might help me. A couple of times the thing I was reading disappeared,the screen and text changed color, and I was suddenly reading hostile messages like, "There's nothing for you here. Move along". (This when I'd found an article on rootkits in a journal for librarians.) Generally I don't share this bizarre story with people, because I know they'll be at least skeptical. But this stuff ACTUALLY HAPPENED, and I'd be grateful if you could help me understand HOW. Thanks in advance.
+
6 Votes
Collapse -

TR members do not assist in password recovery or removal.
Do not respond to this thread.

We, the members of TechRepublic - A Resource for IT Professionals, will not assist anyone in the recovery/removal of lost passwords. You may have a legitimate reason to recover/remove a password. However, we cannot verify your motives and will therefore not assist anyone in what may be an attempt at gaining unauthorized access to a computer system. Due to the open nature of this forum, any assistance given to help circumvent security measures, even for legitimate purposes, would be available for unscrupulous individuals to use for illegitimate purposes. This is a risk that we, the members of TechRepublic, will not take. Please do not ask questions of this nature on TechRepublic.

If you have a legitimate need to circumvent a password scheme, please contact the vendor for the software / hardware and request their assistance. E.g. Windows XP password recovery/removal issues should be taken up with Microsoft's technical support, Phoenix BIOS password recovery/removal issues should be taken up with Phoenix Technologies, hard drive password recovery/removal should be taken up with the manufacturer of the hard drive, etc...

To those viewing this post: Please DO NOT respond any further to this thread.

This template has been released under the GNU public license and you are encouraged to use it as a standard reply for questions of similar nature, provided that you make any modifications available to other users.

+
0 Votes
gechurch
Collapse -

Perhaps the OP changed her question before I read it, but as it stands now there is no mention of passwords at all - the OP just wants to know how this has been happening.

Can I suggest you now remove your reply so other potential helpers are not dissuaded?

+
0 Votes
Collapse -

No, gechurch, my reply will stand...the OP is asking how to break the
security at the library's computer system...not "password" specifically,
but system security none the less. If the OP cannot or will not use a
search engine, of which there are several, to find the information then
it is not upon TR members to show them how to crack system security.
The other issue I have, they asked this same basic question twice.
Even ignoring the paranoid delusional aspects of this "question", it
has a smell of the darkside of system cracking. That is something that
the majority of TR members have decided NOT to assist.
Wizard57M
TR Moderator

+
0 Votes
Charles Bundy
Collapse -

Siding with wizard on this one. I have no idea what this is about but the profile for the OP is suspect both temporally and personally.

+
0 Votes
RSmiedy
Collapse -

Wizard if you would like to bring down the whip on suggestions to hack, than go after Slayer. He made a post that says word for word "Since it was originally posted on TR, it should be ok. If the Library has open wireless. Download firesheep for firefox and use it to monitor the network. Then steal your stalkers login credentials and mess with them for a bit." and a comment saying word for word "This whole thread is getting funny. Hack that library computer. Just like that girl in school, everyone has already done it at least once".
Ps: Please remember I am not attempting to engage in a flame war with any one.

+
0 Votes
Slayer_
Collapse -

LOL, I am not saying anything that couldn't have been figured out through google.

+
2 Votes
Slayer_
Collapse -

it is possible that there was remote control software on that computer in the library.
Something like vnc could have been used.

+
1 Votes
demotricus
Collapse -

If you`re the Moderator then just lock the thread....

+
0 Votes
PurpleSkys Moderator
Collapse -

As Moderator's, we still do not have the ability to lock a discussion; that is passed on to higher powers. We have to ability to flag and delete a discussion is need be; some discussions are flagged and passed onto others that make the decision on whether or not to lock it down.

Purpleskys
TR Moderator

+
0 Votes
demotricus
Collapse -

I did not know that,...thought you guys were "all powerful"!....:-)