watchingfromafar
Gold Member
- Aug 6, 2017
- 5,445
- 1,311
- 140
I found a new computer threat that I think you should be aware of
I have a computer in my home that is connected to my internet.
Over time I have had a glitch or two in my internet experience.
In both cases the fixer told me that he needed to take over my mouse.
In both instances the fixer loaded a temporary file that gave the fixer control of my mouse.
I watched the mouse icon move across the screen. As the mouse icon moved across my windows screen the fixer can click the mouse as if I pressed the enter button on my mouse.
I gave the fixers access to my screen pointer.
The fixer was granted permission of overriding my own mouse control.
I watched as my mouse icon moved across the screen.
I learned that a fixer can open files as if you were using your mouse to do the same.
I allowed this in two different occasions.
The agreement between me and the fixer was that the fixer would remove the tool that gave the mouse access. Once the problem was fixed the connection would end.
I just assumed the fixer would remove any controls between the fixer and me and leave.
Now looking back, I know of two occasions when I temporarily gave control on my computer (internet) to another.
The connection should have been broken.
I ask myself; how do I know for sure.
Should this concern me?
I have a computer in my home that is connected to my internet.
Over time I have had a glitch or two in my internet experience.
In both cases the fixer told me that he needed to take over my mouse.
In both instances the fixer loaded a temporary file that gave the fixer control of my mouse.
I watched the mouse icon move across the screen. As the mouse icon moved across my windows screen the fixer can click the mouse as if I pressed the enter button on my mouse.
I gave the fixers access to my screen pointer.
The fixer was granted permission of overriding my own mouse control.
I watched as my mouse icon moved across the screen.
I learned that a fixer can open files as if you were using your mouse to do the same.
I allowed this in two different occasions.
The agreement between me and the fixer was that the fixer would remove the tool that gave the mouse access. Once the problem was fixed the connection would end.
I just assumed the fixer would remove any controls between the fixer and me and leave.
Now looking back, I know of two occasions when I temporarily gave control on my computer (internet) to another.
The connection should have been broken.
I ask myself; how do I know for sure.
Should this concern me?
Last edited: