[SOLVED] STALKERS/HACKE

Dec 15, 2021
2
0
10
0
Does anyone know how a hacker or whoever is running my device? They manipulate the screen big time. I have over 90,000 screenshots they 7se to edit my stuff with and they constantly fill my storage with completely empty files...etc the list goes on and on...they clone my apps that they run. They lock my emails my Facebook and messenger. Take passwords from me trying to rest . Its absolutely ridiculous. SOMEONE PLEASE HELP
 
Does anyone know how a hacker or whoever is running my device? They manipulate the screen big time. I have over 90,000 screenshots they 7se to edit my stuff with and they constantly fill my storage with completely empty files...etc the list goes on and on...they clone my apps that they run. They lock my emails my Facebook and messenger. Take passwords from me trying to rest . Its absolutely ridiculous. SOMEONE PLEASE HELP
Stop using PC NOW !!! There are many ways to take over somebody's device, unless you are security specialist you can never find out who and which way..
Secure erase al affected disks, reinstall OS and don't access any sites and e-mail until you change passwords.
 
Last edited:
Dec 15, 2021
2
0
10
0
Info Hacking
Does anyone know how a hacker or whoever is running my device? They manipulate the screen big time. I have over 90,000 screenshots they use to edit my stuff with and they constantly fill my storage with completely empty files...etc the list goes on and on...they clone my apps that they run. They. Clone apps to edit just like they're doing to this one..
 
Does anyone know how a hacker or whoever is running my device? They manipulate the screen big time. I have over 90,000 screenshots they 7se to edit my stuff with and they constantly fill my storage with completely empty files...etc the list goes on and on...they clone my apps that they run. They lock my emails my Facebook and messenger. Take passwords from me trying to rest . Its absolutely ridiculous. SOMEONE PLEASE HELP
Stop using PC NOW !!! There are many ways to take over somebody's device, unless you are security specialist you can never find out who and which way..
Secure erase al affected disks, reinstall OS and don't access any sites and e-mail until you change passwords.
 
Last edited:

ASK THE COMMUNITY