This post left anonymously

Some psycho I know has hacked the computer I'm using and figured out what drives me to homicidal rage and is content on consistently doing things over and over again to screw with me that make me want

to murder him. And doing so in a way that is difficult to detect(hacking) and therefore hard to prove. He's smart and I wish I knew how to detect his hacking software. I suspect I know who it is, and have very good reason to believe it's him, but because I'm not as computer smart as he is I can't find the software running to prove it. This seems like some kind of deeply disguised cooperate surveillance or other similar hacked software and drives computer resources to hell. There may be some direct access to input peripheral as well. I've observed cameras activating for no reason and other bizarre behavior from the mouse and keyboard that could only come from this sort of thing. It's to the point it renders the tech useless when trying to use.

Anyone know how to catch a hacker?

This stuff wasn't around when I went to school for networking and they don't teach you how to be a piece of sh*t hacker.

I know who it is just have to prove it.

This open post was written |
Views: 36, Subscribers: 6 |
Leave a reply | Report Post

⇩ Zoom to bottom
Reciprocity (0)
Reciprocity
Since writing this post Anonymous may have helped people, but has not within the last four (4) days.
Post Tags (5)
reason, software, prove, computer, drives
Replies (4)
Anonymous edited this post .

Some psycho I know has hacked the computer I'm using and figured out what drives me to homicidal rage and is content on consistently doing things over and over again to screw with me that make me want to murder him. And doing so in a way that is difficult to detect(hacking) and therefore hard to prove. He's smart and I wish I knew how to detect his hacking software. I suspect I know who it is, and have very good reason to believe it's him, but because I'm not as computer smart as he is I can't find the software running to prove it. This seems like some kind of deeply disguised cooperate surveillance or other similar hacked software and drives computer resources to hell. There may be some direct access to input peripheral as well. I've observed cameras activating for no reason and other bizarre behavior that could only come from this sort of thing. It's to the point it renders the tech useless when trying to use.¬ ¬ Anyone know how to catch a hacker?¬ ¬ I know who it is just have to prove it.

Anonymous edited this post .

Some psycho I know has hacked the computer I'm using and figured out what drives me to homicidal rage and is content on consistently doing things over and over again to screw with me that make me want to murder him. And doing so in a way that is difficult to detect(hacking) and therefore hard to prove. He's smart and I wish I knew how to detect his hacking software. I suspect I know who it is, and have very good reason to believe it's him, but because I'm not as computer smart as he is I can't find the software running to prove it. This seems like some kind of deeply disguised cooperate surveillance or other similar hacked software and drives computer resources to hell. There may be some direct access to input peripheral as well. I've observed cameras activating for no reason and other bizarre behavior from the mouse and keyboard that could only come from this sort of thing. It's to the point it renders the tech useless when trying to use.¬ ¬ Anyone know how to catch a hacker?¬ ¬ I know who it is just have to prove it.

Anonymous edited this post .

Some psycho I know has hacked the computer I'm using and figured out what drives me to homicidal rage and is content on consistently doing things over and over again to screw with me that make me want to murder him. And doing so in a way that is difficult to detect(hacking) and therefore hard to prove. He's smart and I wish I knew how to detect his hacking software. I suspect I know who it is, and have very good reason to believe it's him, but because I'm not as computer smart as he is I can't find the software running to prove it. This seems like some kind of deeply disguised cooperate surveillance or other similar hacked software and drives computer resources to hell. There may be some direct access to input peripheral as well. I've observed cameras activating for no reason and other bizarre behavior from the mouse and keyboard that could only come from this sort of thing. It's to the point it renders the tech useless when trying to use.¬ ¬ Anyone know how to catch a hacker?¬ ¬ This stuff wasn't around when I went to school for networking but they don't teach you how to be a piece of sh*t hacker.¬ ¬ I know who it is just have to prove it.

Anonymous edited this post .

Some psycho I know has hacked the computer I'm using and figured out what drives me to homicidal rage and is content on consistently doing things over and over again to screw with me that make me want to murder him. And doing so in a way that is difficult to detect(hacking) and therefore hard to prove. He's smart and I wish I knew how to detect his hacking software. I suspect I know who it is, and have very good reason to believe it's him, but because I'm not as computer smart as he is I can't find the software running to prove it. This seems like some kind of deeply disguised cooperate surveillance or other similar hacked software and drives computer resources to hell. There may be some direct access to input peripheral as well. I've observed cameras activating for no reason and other bizarre behavior from the mouse and keyboard that could only come from this sort of thing. It's to the point it renders the tech useless when trying to use.¬ ¬ Anyone know how to catch a hacker?¬ ¬ This stuff wasn't around when I went to school for networking butand they don't teach you how to be a piece of sh*t hacker.¬ ¬ I know who it is just have to prove it.

Dr. ralph club zps9ornptsl
(5 hours after post)
Quote this reply Report this reply to moderators

If nothing else put black tape over all the cameras on your computers. I do.

05ad6afe 1f85 4c4a 8680 4f73a3c1f45c
last online: <time class="timeago" datetime="1711664375" title="Mar 28, 2024 22:19">Mar 28, 2024 22:19</time>
Verified User (6 years, 3 weeks)
Long Term User
Shoutout0
#
(10 hours after post)
Quote this reply Report this reply to moderators

I mean, if he is, you may actually need to call the police. I don't know anything about hacking either.

Drawn log viking 19
(13 hours after post)
Quote this reply Report this reply to moderators

Lano wrote:
I mean, if he is, you may actually need to call the police. I don't know anything about hacking either.

Police does nothing against hackers. Hell they barely get off their seats for actual assault...

Does the poster actually know who's behind this? (And I mean be 100% certain) If so I may have some advice, non of it legal however...

For now, get a good anti malware package, good virus scanner, tape off all cameras. Go into your control panel settings and disable access to the microphone for all applications. And if attacks continue, you're better off calling your internet service provider than the police. They may be able to block the hackers current ip (if he's stupid enough not to hide it) or provide you with a new ip, throwing him off for a while at least.

I keep editing this it seems. Also: change your wifi password if you're on wireless as well as any other passwords. Do this AFTER the malware and virus scans. Any decent hacker will have placed a keylogger (application that tracks and sends back all you type) so you want to get rid of that first. Then as stated, change the passwords.

1581744157174 1581744149313 miss bot
last online: 03/19, 3:49
Verified User (6 years, 6 months)
Long Term User
Shoutout0
#
(4 days after post)
Quote this reply Report this reply to moderators

Question poster: Why you?

A
⇧ Zoom to top

Help-QA supports basic Markdown, emoji 😁, and tagging friends with @username!