Someone came to my email
In my opinion, someone accessed my emals in Outlook Express, forwarded to a third party (deletion of the e-mail sent later) and eventually printed some of the emails. It was about two weeks ago. I would like to know what has been transmitted and printed. Is it possible (a) to retrieve the forwarded e-mail messages (deleted) and (b) to know if something has been printed in fact? I'm a home user with Windows XP and a printer (Epson D120) basis.
Thank you very much.
Graham
There is nothing in Outlook Express that allows you to find the deleted messages. You may be able to find a 3rd party product that could help.
It is extremely important, there are 3rd party research companies but they can be very expensive.
Marilyn
Tags: Windows
Similar Questions
-
Someone used my icloud email address to sign up for services such as spotify, pinterest, and ooVoo. I disabled these accounts because the emails received in my email, with the exception of ooVoo which seems to be a video app for iphone and I don't want to download this application so that the account is still active with my email. I changed the password but today I got an email that someone signed up with my Apple ID with a browser Internet Explorer on Windows PC. It is not possible since I am the owner of my account, so I changed my password again, but I'm afraid that my ID Apple is duplicated or someone is hacking my computer, or I don't really know what's going on. I received a phone call from Apple support last time and when they asked for my security questions, the answers does not match but my answers on my apple ID are always the same today I checked, so I don't know what is happening. Someone had the same problem? Help, please.
along with the password you can enable two-factor authentication.
-
Firefox displays two barely legible as the default fonts fonts. These came from an email that I opened. How can I get rid of them?
You can write a check for corrupted fonts and duplicate and other police issues:
- http://www.thexlab.com/faqs/multipleappsquit.html - help book 2.0 fonts: looking for damaged fonts
- http://www.CreativeTechs.com/IQ/garbled_fonts_troubleshooting_guide.html
-
Someone is using my email to send unexpected messages
Someone is using my computer as a slave and is emails anywhere in the world. What are my options to remove this invader.
I ran several different scans, but it is still there.
* original title - computer being used as a slave *.
Hi Waynedeatherage,
1. what email account are facing problems with?
2. have you tried to change the password for your account?
Best way to prevent someone to enter your email account is to choose a strong password.
If you are faced with the question, even after changing the password, then you will need to contact your email provider for assistance.
Hope this information is useful.
-
someone is using my email address to send emais. I tried to reset my password but I am not able to. He says that the answer to my secret question does not. I know I'm getting the correct ansewer. Help, please.
Hi, Catherine.
You'd better post in the Windows Live Solution Center-Hotmail like that is dedicated to Windows Live Hotmail.
If you have not implemented alternative methods to check your Hotmail credentials, I suggest do it after your account is returned. For more information, see Security Hotmail to protect and recover your account .
Good luck!
-
original title: need help
I got hacked and I think someone is using my email, I can't get to my e-mail or contacts,
Hello
If you're dependencies Windows Mail, Windows Live Mail or Outlook follow these steps:
Download update and scan with the free version of malwarebytes anti-malware
http://www.Malwarebytes.org/MBAM.php
You can also download and run rkill to stop the process of problem before you download and scan with malwarebytes
http://www.bleepingcomputer.com/download/anti-virus/rkill
If it does not remove the problem and or work correctly in normal mode do work above in safe mode with networking
Windows Vista
Using the F8 method:
- Restart your computer.
- When the computer starts, you will see your computer hardware are listed. When you see this information begins to tap theF8 key repeatedly until you are presented with theBoot Options Advanced Windows Vista.
- Select the Safe Mode with networking with the arrow keys.
- Then press enter on your keyboard to start mode without failure of Vista.
- To start Windows, you'll be a typical logon screen. Connect to your computer and Vista goes into safe mode.
- Do whatever tasks you need and when you are done, reboot to return to normal mode.
______________________________________________________________________
If you use Hotmail:
I'm sorry, but we cannot help with hotmail problems in these forums in response to vista
Please repost your question in hotmail in the hotmail link below forums
http://windowslivehelp.com/product.aspx?ProductID=1
ForumsConsult with Microsoft Certified Solutions -
How can someone else use my email address?
Original title:
My email address
Someone is using MY email address. In my balls was a * consignment sent from MY eddress. How can someone else use my email address? What can I do about it?
Spammers use other peoples addresses all the time. It's easy. The only thing you could really do is change your address. On the positive side, they usually do this method for a few days and then change the address, then it must stop. -
Someone will see your email Apple ID if you FaceTime them?
I was in the shower and after that I was through, I received notifications in the phone that someone tried to FaceTime audio me three times in the same minute during this period. By mistake I audio FaceTimed their return, after touching their number out of curiosity, due to the fact that it was a local number in the city where I live. In any case, I never use FaceTime and don't know much. However, I was in settings and noticed that, under FaceTime, he said: your phone number and/or e-mail address will be shared with the people you call. Under the CALLER ID only my phone number has been verified. However, as YOU CAN BE MET BY FACETIME to, my phone and e-mail have been verified. My question is has this person able to see my Apple ID address by email, or all simply my phone number? I don't know there is not much to worry, I still would prefer not to give my email however addresses. Also, it's probably completely independent, but shortly after those calls I had problems with Safari gel in Google, then my icon of location services turned solid for one short moment, although I put sites Web Safari never use my location. Sorry, I just thought I'd throw that with my question to see if someone wanted, or that he had all the answers to this. Sorry for the paranoid of poll, I just take my information, including my email more seriously that I probably should. Thanks to a bouquet.
According to the face that you use for outgoing calls will be visible to anyone call you (check the settings app > FaceTime > CALLER ID to what you have selected, you can only select a single address for this; are is not the same thing that YOU CAN BE REACHED at).
Regarding the gel Safari, there is no reason to believe what is bound.
-
Someone has stolen my Hotmail address (* address email is removed from the privacy *). I had this account forever, and one who stole he had access to a large number of personal information. I would like to know how to recover this address (that is to say how to access since the pirate and insert a new password?
Mike
Hello
Answers is a peer group supported and unfortunately has no real influence on Hotmail.
HotMail has its own Forums, so you can ask your questions there.
Windows Live Solution Center - HotMail - HotMail Forums Solutions
http://windowslivehelp.com/Hotmail - Forums
http://windowslivehelp.com/forums.aspx?ProductID=1Hotmail - Solutions
http://windowslivehelp.com/solutions.aspx?ProductID=1How to contact Windows Live Hotmail Support
http://email.about.com/od/hotmailtips/Qt/et_hotmail_supp.htmWindows Live Hotmail Top issues and Support information
http://support.Microsoft.com/kb/316659/en-usCompromised account - access unauthorized account - how to recover your account
http://windowslivehelp.com/solution.aspx?SolutionID=6ea0c7b3-1473-4176-b03f-145b951dcb41Hotmail hacked? Take these steps
http://blogs.msdn.com/b/securitytipstalk/archive/2010/07/07/Hotmail-hacked-take-these-steps.aspxI hope this helps.
Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle="" -="" mark="" twain="" said="" it="">->
-
My email address has been hacked to send spam under my name. I have to close my account or change my password. Help, please.
Hello
HotMail has its own Forums, so you can ask your questions there.
Windows Live Solution Center - HotMail - HotMail Forums Solutions
http://windowslivehelp.com/Hotmail - Forums
http://windowslivehelp.com/forums.aspx?ProductID=1Hotmail - Solutions
http://windowslivehelp.com/solutions.aspx?ProductID=1How to contact Windows Live Hotmail Support
http://email.about.com/od/hotmailtips/Qt/et_hotmail_supp.htmWindows Live Hotmail Top issues and Support information
http://support.Microsoft.com/kb/316659/en-usCompromised account - access unauthorized account - how to recover your account
http://windowslivehelp.com/solution.aspx?SolutionID=6ea0c7b3-1473-4176-b03f-145b951dcb41Hotmail hacked? Take these steps
http://blogs.msdn.com/b/securitytipstalk/archive/2010/07/07/Hotmail-hacked-take-these-steps.aspx===============================================================
Proceed to a very thorough check for malware and then change your password by e-mail.
It is possible for a person to send the email that 'seems' to be of your
account but that is not really - called "Spoofing." That means its 'Possible' emails
were not really you, although they may have your contact list. Have someone
who receives the e-mails to check the header to see where he is actually sent by and
NOT only the answer to the address.How to read the message headers
http://www.high-speed-Internet-Access-Guide.com/articles/email-headers.htmlE-mail spoofing
http://en.Wikipedia.org/wiki/E-mail_spoofingE-mail spoofing and Phishing
http://www.mailsbroadcast.com/email.broadcast.FAQ/46.email.spoofing.htmUnderstanding E-mail Spoofing
http://www.windowsecurity.com/articles/email-spoofing.htmlFraudulent emails (false)
http://pages.eBay.com/education/spooftutorial/Google search - email Spoofing
http://www.Google.com/search?hl=en&EI=FB1nS9DiNo7CsQPNhKGdAw&SA=X&Oi=spell&resnum=0&CT=result&CD=1&ved=0CAgQBSgA&q=email+spoofing&spell=1=============================================
If you need search malware here's my recommendations - they will allow you to
scrutiny and the withdrawal without ending up with a load of spyware programs running
resident who can cause as many questions as the malware and may be more difficult to detect as the
cause.No one program cannot be used to detect and remove any malware. Added that often easy
to detect malicious software often comes with a much harder to detect and remove the payload. Then
its best to be thorough than paying the high price later now too. Check with them to one
extreme overkill point and then run the cleaning only when you are sure that the system is clean.It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
the regular windows when you can.Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
(If Rootkits run UnHackMe)Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
Malwarebytes - free
http://www.Malwarebytes.org/Run the malware removal tool from Microsoft
Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.
You should get this tool and its updates via Windows updates - if necessary, you can
Download it here.Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
(Then run MRT as shown above.)Microsoft Malicious - 32-bit removal tool
http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=enMicrosoft Malicious removal tool - 64 bit
http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=enalso install Prevx to be sure that it is all gone.
Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
here or use Google to see how to remove.
http://www.prevx.com/ <-->-->
http://info.prevx.com/downloadcsi.asp <-->-->Choice of PCmag editor - Prevx-
http://www.PCMag.com/Article2/0, 2817,2346862,00.aspTry the demo version of Hitman Pro:
Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
(viruses, Trojans, rootkits, etc.). who infected your computer despite safe
what you have done (such as antivirus, firewall, etc.).
http://www.SurfRight.nl/en/hitmanpro--------------------------------------------------------
If necessary here are some free online scanners to help the
http://www.eset.com/onlinescan/
New Vista and Windows 7 version
http://OneCare.live.com/site/en-us/Center/whatsnew.htmOriginal version
http://OneCare.live.com/site/en-us/default.htmhttp://www.Kaspersky.com/virusscanner
Other tests free online
http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1--------------------------------------------------------
Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
system files.Run DiskCleanup - start - all programs - Accessories - System Tools - Disk Cleanup
Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
RUN AS ADMINEnter this at the command prompt - sfc/scannow
How to analyze the log file entries that the Microsoft Windows Resource Checker
(SFC.exe) program generates in Windows Vista cbs.log
http://support.Microsoft.com/kb/928228Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.
How to run the check disk at startup in Vista
http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html-----------------------------------------------------------------------
If we find Rootkits use this thread and other suggestions. (Run UnHackMe)
I hope this helps.
-
someone has stolen my email address
I think someone stole my e-mail because I keep getting emails from myself and so do my friends when I do not have their Envoy all please can anyone help
Change your e-mail password immediately and give it a password: -.
http://www.Microsoft.com/en-GB/security/online-privacy/passwords-create.aspx
If my comments have helped please vote as helpful.
Thank you.
-
I have a virus or something, where some use my email address to send spam, how do I get this deleted?
Hi kellylauer,
Check out the links below that addresses this issue
Compromised account - unauthorized account access
http://windowslivehelp.com/solution.aspx?SolutionID=6ea0c7b3-1473-4176-b03f-145b951dcb41
Windows Live Hotmail Top issues and Support information
http://support.Microsoft.com/kb/316659/en-us
For more specialist on this question help, post your query on the Windows Live Forum.
Windows Live Forum - http://windowslivehelp.com/
Thank you, and in what concerns:
Ajay K
Microsoft Answers Support Engineer
*************************************************************************** -
Spam is sent from my email account. I ran Norton 360 and windows of scanning. Norton detected 45 threats and windows none, which tells me that my system is now clean. But the problem persists. What can I do next?
E-mail may not be sent from your machine. Spammers usurp email addresses all the time. Nothing you can do about it.
-
Someone reciving this phishing emails?
Hello...
You receive this e-mail because you have published a Web site using Business Catalyst, part of your creative cloud composition. Due to an update of important infrastructure, Act on your behalf.
We are a week in the transition of the Business Catalyst of our own data center to data center of Amazon Web Services hosted. The migration is targeted to be held end of June, with the necessary modifications in your name by June 20. AWS provides a highly reliable, scalable and affordable infrastructure platform in the cloud that feeds hundreds of thousands of businesses, Government and the start of client companies in 190 countries around the world.
Get a discount on your next sites
Update your DNS settings in the next 7 days and get 15% discount on all sites that push you direct in the next 3 months. The coupon will be sent to all partners who update their DNS settings in the first 2 weeks, have a validity of 3 months and can be used on any plan Business catalyst.
If you have sites that are hosted with BC, no action is necessary on them, because they were automatically transferred by the Business Catalyst team. For all others, please read below.
Action required on your part
We need changes to your DNS settings to keep your site permanently. Below you will find a list of the sitenames, areas and associated data centers. You must change the IP addresses and create TXT records if it is not already created for the following areas:
Changes of SPF (TXT)
* If the domain has no SPF or TXT defined, you must add one with the following value: "v = spf1 mx include:worldsecuresystems.com ~ all the»
* If the field already has a SPF or TXT record, you must include the following value: "include:worldsecuresystems.com".
For detailed instructions, please visit our website dedicated to migration.
IMPORTANT NOTE
If your DNS settings are not changed in the next 30 days, your sites will become unavailable, so we appreciate your collaboration by taking these measures as soon as possible.
Benefits of maintenance
The new data center is built using standard hardware high-end server technology and industry. The main benefits include:
Improved reliability: with integrated hardware and software redundancy for all critical systems, preventing service interruptions caused by the single system failures
Increased performance: generated using later, State of the art materials and technologies server, that offers superior performance and allows Web sites to load faster
Higher capacity: more capacity that currently expansion capabilities available and built-in will cover growing demand for customer traffic and space
Thank you for your cooperation.
Kind regards
The catalyst for the activities team
Hi Ed,
This is not a phishing e-mail. We have sent this email to our customers. Please refer to this post on the forum: http://forums.adobe.com/message/5326195#5326195
Kind regards
Aish
-
On an IMac 27 "OS is El Capitan 10.11.2 Magic Mouse 2, Safari 9.0.2
Seen the episodes while in Safari, it suddenly zoomed in and let even me not to scroll the page. I have to click on the back button to cancel it. It seems to happen spontaneously, but my hand is still physically on the mouse, just I don't do anything with or to the mouse. Seems to be developed after I went to the Magic Mouse 2. Any ideas?
Please, open the mouse in system preferences and uncheck that smart zoom.
Maybe you are looking for
-
What are the features of Mozilla Firefox for Linux?
I found an article about Firefox Desktop features. Linux and Windows have the same characteristics?If this isn't the case, I need to know the characteristics for Linux.
-
Poster works does not as expected with Adobe CS5
I've finally updated to OS X on an early 2009 Mac Pro Quad Core. I have two screens: a 20 "Apple Cinema and a Samsung Syncmaster. Previously, always with Snow Leopard, I had no problem with the implementation of my menus, panels, etc on the Samsung,
-
With the help of a MacBook Pro 13' (mid-2012) El Capitan (Version 10.11.1). running Usually living abroad, came home last night and managed to connect my computer to the internet WiFi and my parents very well. Could access any Web site, ran perfectly
-
error code 8024000, unable to download updates. __
error code 8024000, unable to download updates.I tried the race with your command line does not work so far. I even changed the 32 to 64 since I was the 64-bit operating system, but still no luck. all of the suggestions. I have a Windows 7 operating
-
New Dell Ultrasharp U2417H old Inspiron 580 MT desktop computer monitor
My new monitor has arrived today, but I can't connect it with the included cables. My old Inspiron 580 was purchased in 2010 and my old monitor used the plug VGA. The cables provided with the new monitor are the upstream USB 3.0 cable and a DP for CD