Apologies if this thread is considered off topic, however, a tek-tips search for stalking, stalk and stalker proved fruitless.
The friend of a work colleague is the victim of cyber stalking via ICQ. The victim contacted ICQ who determined that the perpetrator was/is based in another country. ICQ for their part gave step-by-step remedial details.
The stalker, as part of their campaign, listed sites that the victim had recently visited.
To the best of my knowledge, the victim is running and maintaining anti-virus software but may not be aware of all the mal/spy-ware that abounds.
My question is, and assuming that the victim does not have a virus, how has the perpetrator managed to achieve this. I’m not asking for specifics that would potentially give ideas or methods.
My initial thoughts are that the perpetrator is: -
1. using some form of key logger,
2. using ICQ or ISP logs to determine usage, or
3. exploiting an open port/backdoor to gain access to usage tracks on the victims PC.
Personally, my first line of attack to solve this problem would be to install a firewall and to block all traffic except trusted applications. Thereafter, I would use Spybot, Ad-Aware and Bazooka.
Any comments and suggestions would be appreciated. Thanks in advance for any replies.
Bear in mind that I do not know or have access to either the victim or their PC.
Thanks,
Tom.
The friend of a work colleague is the victim of cyber stalking via ICQ. The victim contacted ICQ who determined that the perpetrator was/is based in another country. ICQ for their part gave step-by-step remedial details.
The stalker, as part of their campaign, listed sites that the victim had recently visited.
To the best of my knowledge, the victim is running and maintaining anti-virus software but may not be aware of all the mal/spy-ware that abounds.
My question is, and assuming that the victim does not have a virus, how has the perpetrator managed to achieve this. I’m not asking for specifics that would potentially give ideas or methods.
My initial thoughts are that the perpetrator is: -
1. using some form of key logger,
2. using ICQ or ISP logs to determine usage, or
3. exploiting an open port/backdoor to gain access to usage tracks on the victims PC.
Personally, my first line of attack to solve this problem would be to install a firewall and to block all traffic except trusted applications. Thereafter, I would use Spybot, Ad-Aware and Bazooka.
Any comments and suggestions would be appreciated. Thanks in advance for any replies.
Bear in mind that I do not know or have access to either the victim or their PC.
Thanks,
Tom.