Remote desktop software ID number and hackers

April 29, 2013 at 13:13:34
Specs: Windows Vista
I received a phone call that I was being hacked. So I was doing what the guy told me to do but was very cautious. He had me install a remote desktop software and I gave him the id number. But when I was prompted to accept the user for remote desktop I declined and realized that it was a scam because they wanted me to pay money. Can they still access my computer with this "ID" number that I gave him. He also has my mailing address.

See More: Remote desktop software ID number and hackers

Report •

April 29, 2013 at 13:19:38
Depends on the remote desktop software.

How To Ask Questions The Smart Way

Report •

April 29, 2013 at 13:26:57
Most likely not, did they ever gain access to your computer? If not, you're most likely ok. If I were you, I would download and run Malwarebytes just in case. Remove anything it finds.

Using any information you have (phone number they called you on, email address or names they used) you should call the police using a NON-EMERGENCY phone number just so it is on record. They will also have good advice for you.

These hackers will most likely continue to pester you so be sure to tell them you've involved the cops. Hopefully that will stop them from pestering you and possibly others.

Law if Logical Argument: Anything is possible if you don't know what you're talking about.

Report •

April 29, 2013 at 13:42:50
I had one of those idiots on the phone for about 10 minutes. Quite early on I suggested they would make more money if they gave up on me and found someone more gullible. Amazingly they still continued for ages - I was only too happy to waste their time.

As often as not they say they are from Microsoft. The very idea that MS are monitoring everyone's computer in the world, then phoning them when they are getting hacked. Unbelievable - MS would be out of business in days.

Always pop back and let us know the outcome - thanks

Report •

Related Solutions

April 29, 2013 at 14:59:37
"Can they still access my computer with this "ID" number that I gave him. He also has my mailing address"

When they can hack into the pentagon etc,etc. YES.

Two things I would do for starters.

1: How to report ID theft, fraud, drive-by installs, hijacking and malware?
Change your router password if it is not strong or still uses the default one.
Hack lets intruders sneak into home routers

Report •

April 29, 2013 at 15:02:38
2: Run ESET Online Scanner, Copy and Paste the contents of the log please. This scan may take a very long while, so please be patient. Maybe start it before going to work or bed.

Configure ESET this way & disable your AV.
How to Temporarily Disable your Anti-virus

Why Would I Ever Need an Online Virus Scanner?
I already have an antivirus program installed, isn't that enough?
Once onto a machine, malware can disable antivirus programs, prevent antimalware programs from downloading updates, or prevent a user from running antivirus scans or installing new antivirus software or malware removal tools. At this point even though you are aware the computer is infected, removal is very difficult.

5: Why does the ESET Online Scanner run slowly on my computer?
If you have other antivirus, antispyware or anti-malware programs running on your computer, they may intercept the scan being performed by the ESET Online Scanner and hinder performance. You may wish to disable the real-time protection components of your other security software before running the ESET Online Scanner. Remember to turn them back on after you are finished.

17: How can I view the log file from ESET Online Scanner?
The ESET Online Scanner saves a log file after running, which can be examined or sent in to ESET for further analysis. The path to the log file is "C:\Program Files\EsetOnlineScanner\log.txt". You can view this file by navigating to the directory and double-clicking on it in Windows Explorer, or by copying and pasting the path specification above (including the quotation marks) into the Start ? Run dialog box from the Start Menu on the desktop.

If no threats are found, you will simply see an information window that no threats were found.

Report •

Ask Question