How can I report hotmail users who use their account in an attempt to commit fraud?

Hi, how to report Hotmail users that use their account in an attempt to commit fraud? Microsoft may suspend the account of these people so that they can't use it to defraud people more?

Hello

HotMail has its own Forums, so you can ask your questions there.

Windows Live Solution Center - HotMail - HotMail Forums Solutions
http://windowslivehelp.com/

Hotmail - Forums
http://windowslivehelp.com/forums.aspx?ProductID=1

Hotmail - Solutions
http://windowslivehelp.com/solutions.aspx?ProductID=1

How to contact Windows Live Hotmail Support
http://email.about.com/od/hotmailtips/Qt/et_hotmail_supp.htm

Windows Live Hotmail Top issues and Support information
http://support.Microsoft.com/kb/316659/en-us

Compromised account - access unauthorized account - how to recover your account
http://windowslivehelp.com/solution.aspx?SolutionID=6ea0c7b3-1473-4176-b03f-145b951dcb41

Hotmail hacked? Take these steps
http://blogs.msdn.com/b/securitytipstalk/archive/2010/07/07/Hotmail-hacked-take-these-steps.aspx

I hope this helps.

Tags: Windows

Similar Questions

  • How can I report a users AD in IOM dormant

    I want to generate a list of inactive users - users who have not used AD powers for a period of time, say 30 days or more). Is their a report out-of-the-box in IOM for this?

    Thank you
    RUCHI

    You must write a scheduled task that seizes all users associated with IOM and their account AD. Enter their DN do a search in Active Directory to get the logintimestamp of some sort. Write this information to a table in the IOM. Create a report that refers to these tables.

    Not easy unless you are familiar with creating scheduled tasks, using the java LDAP libraries and creating reports.

    -Kevin

  • How can I prevent the user to use a USB card to copy office files?

    How can I disable the use of USB drives on the computer

    Hello

    We have a very good document to http://support.microsoft.com/kb/823732

    I hope this helps.

  • How can I avoid hotmail and restore my msn account?

    My computer crashed so I got a transfer of data to a new computer.  When the transfer has been completed, I got Hotmail, but can't access my MSN.com account.  It is the only account that I use to send and receive e-mails.  The (deleted), (deleted) user name and PW is no longer work the restoration of this account is crucial.  I use for my job and have stored a lot of files associated with each working group, I succeeded.  I need to have this account restored.

    Hi Julie Holzer,.

    This forum is for comments on the Microsoft Answers site.  I suggest to check the page of MSN support for assistance:

    https://support.MSN.com/default.aspx?&St=1&wfxredirect=1

    I hope this helps!

  • How can I report a hacker on my email account and find the IP addresses for both weeks

    My email account and my social network has been hacked. All emails have been deleted, but I was able to retrieve emails and realized my facebook and paypal account had been or tired to be hacked as well. I was wondering how I would make this and it made my microsoft account and hotmail if ip address is bound to an individual? Is it possible to get a copy of the ip address of my e-mail in recent weeks? Thank you

    See this thread on the Windows Live help site:

    http://windowslivehelp.com/thread.aspx?ThreadId=43d4f95c-313d-405e-8099-f0d3aff27a9f

  • I have 30 messages of my Web site users. How can I (1) Replay at ALL using an email. I can't reply to all allows me to respond to each person INDIVIDUALLY.

    I have 30 messages of my Web site users. How can I (1) Replay at ALL using an email. I can't answer all allows me to respond to each person INDIVIDUALLY, and (2) how can I get all the addresses of electronic mail from senders AFTER I FILTER my mails for a list of emails which can only from my site.

    I get tons of mail from my site, and I need an easier way to manage the workflow. each email open and copy the email address for 50 emails would be a lot of work. I just want 'select' all emails, do a right-click and enter all e-mail addresses from senders.

    And, as stated above... Send an email to all by a RESPONSE/option button.

    I found a solution. Updated my Thunderbird, and the app worked. I used v.11.

  • How can I change my user name in acrobat? I want to use another name in my comments

    How can I change my user name in acrobat? I want to use another name in my comments

    The real "Login" name cannot be changed, but there is a preference that allows the application to always use the name of 'connection' to the name of the author may not be used.  It is under Edit > Preferences > commenting and in the section "to comment.  Uncheck "always use Log-in name for author name.

  • How to check the total memory used by Oracle and user who use more memo

    Hello

    I use oracle 10.2.0.4 on Windows 2003 server SP2 version.

    1. How can I check the "total memory" used by Oracle

    2. which users use more CPU resources.

    Thanks and greetings
    Amit

    Hello

    Oracle EM is the best to identify the use of the processor and memory used by each session.

    In addition, use after query to calculate the memory used by each session of the.

    SELECT to_char (ssn.sid, '9999') | ' - ' || NVL (ssn.username, nvl (bgp.name, 'background')) |
    NVL (Lower (SSN.machine), ins.host_name) "SESSION."
    TO_CHAR (prc.spid, '999999999') ' PID/THREAD. "
    TO_CHAR ((se1.value/1024) / 1024, '999G999G990D00'). "MO" "SIZE."
    TO_CHAR ((se2.value/1024) / 1024, '999G999G990D00'). "MO" 'MAXIMUM SIZE '.
    V $ sesstat se1, v$ sesstat se2, v$ session ssn, v$ bgprocess bgp, v$ process RPC.
    v$ ins instance, v$ statname stat1, v$ statname stat2
    WHERE se1.statistic # = stat1.statistic # and stat1.name = 'pga session in memory.
    AND se2.statistic # = stat2.statistic # and stat2.name = 'pga memory max session'
    AND se1.sid = ssn.sid
    AND se2.sid = ssn.sid
    AND ssn.paddr = bgp.paddr (+)
    AND ssn.paddr = prc.addr (+);

    Kind regards
    Charrier

  • How can I dob in a company using cracked MS software?

    How can I dob in a company using cracked MS software?

    See you soon!

    If you want people to report or company who use Microsoft Software crack, you might start:

    https://www.Microsoft.com/en-us/howtotell/CFR/report.aspx

    http://www.BSA.org/

  • How can I connect to someone who is hacking my network?

    How can I connect to someone who is hacking my network?

    Hi Frank,.

    What kind of network - your internet connection?  your intranet from home or the office (and it is wireless or wired or both)?  An ad - hoc network or a network based on the domain server (and if the latter, what type of server)?  The network hosts a web site, an exchange server that is accessible by internet, or also allowed incoming connections?  How many computers is on the network and what are the current use operating systems and who do you think are presented?  If you use a router, is protected by a router security identifier unique and a password (no admin / admin or other default standard settings, everyone knows) and a unique key and what type of security type (WPA, WPA2,...) and what type of encryption code?  This can be verified by the computer and others need to be checked or enabled via the router you can reach most likely through your browser by typing 192.168.1.1 where you would normally enter a URL.  If this isn't the correct code, then see below for IPCONFIG and would probably be the address that you want as the gateway by default and possibly the address of the DHCP server or the DNS server address as well and use what is there instead.  What type of method of internet access (DSL, cable, Satellite,...)?

    How do you know if that someone is hacking your system?  What evidence do you have that it happens or happened?  How do you think that piracy happens - happens through your connections in real-time (as if someone used a remote access or remote desktop) or it occurs because you seem to see the proof of it (if so, what evidence)?  I am trying to determine if a person has a path in your system directly or whether you are infected with malware that allows a periodic access or 'appear' as you are being hacked, when you are just infected.

    Do you notice it when it is real or only later after it occurred?  What exactly is the pirate make - information collection, change of information, install programs, remove programs or information, theft of bandwidth, or you are not sure and don't know exactly?  This happens only when you are connected to the internet or does it also occur when you are not connected and just using the computers and devices that are other interconnected?  If it isn't when it is connected to the internet, which helps limit the possibilities.

    If you are present and it's ongoing, click on start / all programs / accessories / right-click on command prompt and click Run as administrator.  Then type IPCONFIG/all and enter.  Which should display all connections to your computer, and if anyone is connected, this connection must appear, as well as login information and include information such as address TCP/IP (which may be useful to know).  Create a capture image or printscreen of the information.

    If you use Vista or Windows 7, go to start / Control Panel / Network and sharing Center / discover computers and devices.  Is there a link that doesn't seem right or that you don't recognize?  Come back and click on manage network connections.  Are there connections that you don't recognize?  If so, click on them and learn what you can about the properties and other information - create a capture of information or save a printscreen image.

    You use the Windows Firewall and is it activated and functioning?  Open and check exceptions and remove the items that you do not use or do not need - by default adds a lot of things that most people do not use. and everyone is a path in your system.  The less open ports, the better.  Do not remove everything you really need, but uncheck everything you don't need (you can always add it back later if the need ever happens).

    It's just a start on what to do to gather information.  I need the results and answers to give additional advice on what to do next - depending on what you have to say.

    Most likely, we will be able to best prevent access or possibly with the help of your ISP and the ISP of the hacker TCP/IP address (if we find the it), be able to identify who it is and stop it or help you gather enough information take legal or security action against the person or persons responsible.  Ago probably pirates out there that can do what you're tempted, but also provides methods of hacking (and that is basically what YOU want to do) is not something we support or help someone to do here.  To help you protect your system is one thing and we'll do what we can to help here - teach you how to hack the somone who is hacking you is quite another and we will not be involved in this.

    ***********************************************************

    In the meantime, in case there is an infection as opposed to a direct hacking, update and run a full scan with any security software you use.

    If you do not have because they can help, try the following programs. I recommend you download, install, update and run full scans with Malwarebytes:http://www.malwarebytes.org/ and SuperAntiSpyware:http://superantispyware.com/ and then run a full scan of Microsoft Security:http://www.microsoft.com/security/default.aspx.

    Check the following compliments from Stephen Boots - MVP:

    S ' ensure that the Windows Firewall is enabled.

    S ' ensure that all critical updates or important, including service packs for the operating system and programs are installed from Microsoft Update (Windows Update).

    -Make sure that Internet Explorer is version 8 or 9 and implemented to date with all patches.

    -In Internet Explorer 8 or 9, use the SmartScreen filter.

    -Make sure that the Internet IE security settings are at least put to fire medium-high (default).

    -Turn on the pop-up blocker in Internet Explorer.

    -On Vista and Windows 7 make sure that User Account Control (UAC) and doesn't work with elevated privileges.

    -Make sure that automatic updates of Windows are set to notify at least, but the preferred setting is to download and install automatically. If you update manually, be sure to update as soon as possible after being informed of updates available.

    -Make sure that installed applications, including Adobe Acrobat, Adobe Flash and Java are at their latest versions. Many vendors are regularly updated and fixes security vulnerabilities.

    -Never click through links from unknown sources and be careful, even if they are from a "reliable".

    -Do not open attachments in unsolicited e-mail.

    -Practice safe web surfing.

    To ensure that you are not infected (or remove the suspicion that you are infected which is often the case in such situations and is done either by hackers or may appear as the pirates are active when it is just a system infected - or if more than one, you have several computers connected), please follow these compliments of recommendations of JimR1 - MVP :

    You are running Microsoft Security Essentials?

    If Yes: start here - https://support.microsoftsecurityessentials.com/ and select the link that says - I think my computer is infected - and support and select the option for phone, chat or email (options vary depending on the region)

    If you are in North America, you can call 866-727-2338 for a free Microsoft Help for infections of virus and spyware.

    Otherwise:

    You can start here: https://consumersecuritysupport.Microsoft.com/ or here: http://support.Microsoft.com/contactus/cu_sc_virsec_master?WS=support#TAB0 for the help and support for malware infections.

    If this does not work, or that they can't help, try one of the compliments of forums-remove malware following PA Bear - MVP:

    I can recommend the assistance of experts available in these forums: http://spywarehammer.com/simplemachinesforum/index.php?Board=10.0 http://www.spywarewarrior.com/viewforum.php?f=5 http://www.dslreports.com/Forum/Cleanup http://www.Bluetack.co.uk/forums/index.php and http://Aumha.net/viewforum.php?f=30

    *************************************

    The first section will collect information about your situation so we can get an idea where to look and what to look for (and perhaps even determine if it occurs).

    The second section will verify that your computer or network is not infected (you should do this for all the computers on the network) or clean if they are and which remove the cause of the problem (of least temporarily).

    I hope this helps and await your response with responses, results and information.

    Thanks and good luck!

  • How can I report spam, saying: it's from Mozilla Firefox?

    I have a gmail account and received an email indicating that he was on your part and that I had won a $ 1 million contest.

    I do not of course think that there will have had a contest and I never entered any contest.

    How can I report this to Mozilla Firefox so that you can be aware of someone using your name to scam people?

    Was it a team "Promo price online" email as it is known as a previous similar hoax was mentioned in http://blog.gerv.net/2011/08/hoax_mozilla_firefox_online_promo/

  • How can I report a phishing email claiming to be from Apple?

    I recently received the following:

    Dear Apple customer,

    Your identifier Apple (***@gmail,com) has been used to restore a device of one of your iCloud backups.

    IPhone (iPhone 5) of the device: Kewar

    If you have recently restored this device, you can ignore this message.

    If you have not recently restored a device or you think someone may have accessed your account, we recommend that you visit the link below to verify that you are the rightful owner of the account. Check it out now >
    Apple support

    Given that neither the identifier Apple, nor the name of the iPhone are valid, it's obviously a phishing expedition. How can I report it to Apple?

    You can use the address below to send the suspicious message to Apple.

    [email protected]

  • How can I report email address spam so that it can be blocked from hacking into my account and e-mailing my contacts?

    Original title: How can I report junk e-mail address, so it can be blocked to hack my account & * offshore contacts

    I'm sick & tired of being hacked on & on again by foreign sources, I recently discovered my yahoo account took advantage of Turkey & today that they are now my msn account hacking this is the second time I realized hack & spam there must be an easier way to communicate with someone on msn security represents my friends are pissed at me because it continues to send MSN I changed my the yahoo account password & also my password msn, but nothing seems to stop these predators which is msn do to catch these nut jobs

    Hello

    Sounds like you're being spoofed and not hacked. The emails appear in your sent
    Records showing you sent them?

    Which is called Spoofing and its pretty easy for a spammer to make. Of course, it does
    it look like you or the other person has sent the e-mail. Someone intercepted an email and
    It may not be you who caused him. Account of a friend could have been consulted
    or even someone could have sent an email on your behalf to someone else who has been
    compromise. Your friend can access headers and block the real senders of
    those who will change often.

    How to read the message headers
    http://www.emailaddressmanager.com/tips/header.html

    What Email Headers can tell you about the origin of Spam
    http://email.about.com/cs/spamgeneral/a/spam_headers.htm

    E-mail spoofing
    http://en.Wikipedia.org/wiki/E-mail_spoofing

    E-mail spoofing and Phishing
    http://www.mailsbroadcast.com/email.broadcast.FAQ/46.email.spoofing.htm

    Understanding E-mail Spoofing
    http://www.windowsecurity.com/articles/email-spoofing.html

    Fraudulent emails (false)
    http://pages.eBay.com/education/spooftutorial/

    Google search - email Spoofing
    http://www.Google.com/search?hl=en&EI=FB1nS9DiNo7CsQPNhKGdAw&SA=X&Oi=spell&resnum=0&CT=result&CD=1&ved=0CAgQBSgA&q=email+spoofing&spell=1

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle="" -="" mark="" twain="" said="" it="">

  • How can I remove the user name and the image of Windows XP new Start Menu

    Two questions:

    1. How can I delete the user name and the image of Windows XP new start; and

    2. my computer keeps asking me to press the F1 key to start Windows.  How to skip this part?

    Thank you.

    Hello

    The image of user account can be removed by disabling the Welcome screen. Or, by opting for the classic Windows theme. Follow the method described in this article, if you want to remove the user name and the picture in the Start Menu, without disabling the Welcome screen and Windows XP theme.

    For those who want to delete the user name and the image of user account from the Start Menu, in order to have a blue white Panel at the top, try this:

    Registry warning
    Important: This section, method, or task contains steps that tell you how to modify the registry. However, serious problems can occur if you modify the registry incorrectly. Therefore, make sure that you proceed with caution. For added protection, back up the registry before you edit it. Then you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click on the number below to view the article in the Microsoft Knowledge Base:

    How to back up and restore the registry in Windows
    http://support.Microsoft.com/kb/322756/

    Step 1:

    a. start Windows Explorer and go to this folder:
     
    C:\Documents and Settings\All Users\Application Data\Microsoft account images

    b. in this folder, rename the BMP file that corresponds to your user account.
     
    (For example, if your user name is Robert, rename Robert.bmp to old_Robert.bmp)

    c. then rename the following folder:

    C:\Documents and Settings\All Users\Application Data\Microsoft account Pictures\Default pictures
     
    to something else, for example,.
     
    C:\Documents and Settings\All Users\Application Data\Microsoft account Pictures\No_Default images.

    Step 2:
     
    To remove the user name, follow these steps

    a. Click Start, click "RUN" and type "regedit.exe" and navigate to this key:
     
    HKEY_CURRENT_USER-Software-Windows Microsoft\------CurrentVersion-policies-Explorer

    b. in the right pane, the value NoUserNameInStartMenu-value data 1.

    c. close Regedit.exe and restart Windows.

    You'll find yourself with a blue area at the top of the Start Menu.

    Regarding the pressing 'F1' to start Windows, you have made no changes or was there a system crash after which the problem started?

    You may need to change the boot sequence in the BIOS to the default settings. I recommend you contact your PC vendor for this.

    Warning of the BIOS:
    BIOS change / semiconductor (CMOS) to complementary metal oxide settings can cause serious problems that may prevent your computer from starting properly. Microsoft cannot guarantee that problems resulting from the configuration of the BIOS/CMOS settings can be solved. Changes to settings are at your own risk.

  • How can I report an inactive email address?

    I wrote an e-mail to a friend, and after that I then clicked 'send', Hotmail sent a status report of the "undeliverable mail". How can I report to Microsoft, Hotmail or MSN, the State of the non-working of my friend's e-mail address, and locate the e-mail address of my friend?

    This post please in the Windows Live Solution Center Forum Hotmail
    http://windowslivehelp.com/product.aspx?ProductID=1
    Bruce Hagen
    MS - MVP October 1, 2004 ~ September 30, 2010
    Imperial Beach, CA

Maybe you are looking for

  • Why is there not a substitution for the following?

    Websites prohibit password saving Some sites do not saved for security reasons passwords. If you have followed the steps above, but are still not prompted to save a password by logging into a Web site, this site may have disabled password saving.

  • Dv3-2007TX - no bluetooth

    Hello I would like to install the Bluetooth Module (483113-001) and cable (531811-001) according to page 4-43 Maintenance and Service of Guide (Document part number: 512424-001). Be reluctant (shy) to take my laptop out to see if there is a port of t

  • My computer does not detect the hard drive or show

    Hey Microsoft, So, I have a Windows Vista laptop and earlier this year, my computer suddenly won't detect or display my CD player. And when I go to disk management, there is no assignment of letter or anything, just an empty space. Please help me! Th

  • Lexmark printer s605 all-in-one cannot connect with my computer toshiba laptop with windows 7

    Message printer cannot communicate with the computer.  How can I fix?  Unable to print my lexmark all in one single s605 printer off computer toshiba laptop to windows 7.

  • How to find the Id of component using java script

    Hi all.I use Jdev 11.1.6I need get the id of the component in javascript code?I used this but its coming nullvar exportCmd = AdfPage.PAGE.findComponentByAbsoluteId ('HiddenBtn');Alert ("exportCmd" + exportCmd);< af:commandButton text = "commandButton