I have been dealing with my hacker on my own, now I need some help.

Viewing 23 reply threads
  • Author
    • #5084


      My iMac with Tiger 10.4 has been hacked for about a year now.  I think it is just one guy doing it.  I was hacked for a couple of years once before, and I got all upset and sought justice and reported it, and demanded answers, and found out nobody really gave a crap.  So this time I decided to save myself the aggravation and just try to live with it.  I am a full-time freelance writer and I have to have a computer.  I live mostly on disability and can’t run out and buy a new one. 

      The hacker and I had some bad moments and even some good ones.  Lately it is all bad.  He hacked my little 17-incher because Tiger 10.4 make good servers and that’s what he does.  He was using so much CPU’s my whole desk was shaking and reverberating.  I make a habit of going to activity monitor and killing the worst processes, but I can’t do it all day every day.  I told him he was killing the computer, and now he finally has.  There is a whisper of memory left.  He spent this week tossing overboard every application and all my files.  His, he mostly kept. 

      I have gone literally nuts trying to get this box back from him.  I studied Unix but he made sure that my shells on the BSD are all read-only.  I can’t erase and re-install because he damaged my installation disk and I haven’t gotten a new one yet, although he would do the same thing again.  Disk utility says it can’t fix it.  I am writing this on a Linux CD I am able to use because as of yesterday he has locked me out of my own computer.  I tried to download password crackers, but the instructions are just too complicated for me.  I must say though, I have learned plenty about computers since this started.  I catch him at a lot of his tricks.

      This man is very, very clever and he is bright.  For a while there when we lived under a peace treaty, my idea, I almost thought we could be friends.  But now he has gone nuts.  How long does he think he can keep me out of a computer that is sitting on my desk?

      The worst part of it all is that I have lost the respect of my children, ages 20 and 23.  They carted me off to the psych ward because they say my computer is not hacked, I just don’t know anything about computers.  Everything, says my son, is exactly the way Apple sent it from the factory.  Sure, with 11 compressed Tiger 09 classic operating systems.  They put those in every single computer, don’t they?  He took over my printer for his workgroup and doesn’t let me use it.  But that’s a moot point now that he has tossed it overboard too.

      He writes me these very strange ranting notes that make almost no sense.  He snoops on every single thing I do.  I recently found his files of all my contacts with their e-mail and street addresses.  I hate to think what he’s planning to do with those.  He even hacks my place of employment and posts business correspondence on the desktop.  He reads every single e-mail I get, and posts some of those up.  He is obsessed with my every movement.

      I told him I wouldn’t try to turn him in and I have kept my promise.  He has now cost me a career I can no longer do without dependable access to a computer, and a computer that I paid over a grand for.  He also cost me several lucrative writing deals, one was several books. 

      Where do I go from here?  How do I get in my computer?  How do I erase all the crap he’s stocked up in their and wipe him out so he’ll get the hell out and leave me alone?  I think I did have a bit of a breakdown when I went to the hospital, and I may be about to have another.  All I do every day is obsess about getting my computer back.  I live alone and don’t socialize much.  My computer was my whole world. 

      Thanks for listening. 


    • #32272

      Based on what you have said that he/she could even access your pc when your at work?! maybe he/she knows you well. try to observe everyone around you or you really have virus/trojan on your pc.

      my suggestion is if no one gives crap about you:
      Change your nick
      Do not reveal any info regarding you when signing up
      Do not go online,  work offline
      Check your usb maybe he/she installed a usb key-logger
      Are you sure that it was restored into factory settings?!
      – go to mac let them do it for you.
      – if problem still persist buy a new hd
      – install a firewall
      – My best advice switch to Fedora Core and secure your box. 😛

      Oh well hope it would help you. The only thing we could advice is prevention not counter hacking them.


    • #32273

      That’s a pretty heavy story.

      As rvs said, counter-hacking seems pretty futile.
      I would re-install, I don’t see how he could immediately get you back. It sounds like he has some client-side progs calling stuff out to him. Once that’s gone, and you change IP’s and what not, I don’t see how he can easily get back?
      Ofcourse, after such an install, lock your box up as hard as you can before plugging it back into Ethernet 🙂

      For the install: you still have physical access to the computer, and in my mind that can conquer any remote access. Usage of a live CD with install option seems the thing to do?

      In any case: your current situation can not continue. Being unable to work and exposing all your personal information (and that of your contacts), is absurd. Pull the Ethernet cable out of there till you figure out something else to do.

      This is just a newbie’s advice, but I hope it helps.

      EDIT: And yes, definitely change your nick. As Rvs points out, it’s very easy to find information on you.

    • #32274

      I seriously cannot believe that this is really a true story. Being a noob, I can’t believe that somebody can own a computer in such degree.  😮

      It is an amazing read that’s for sure.

      If the story is true, I hope you can get some useful help from the people here. But as you described, the actions you have to do are many! For me, if the hack is so real, do these steps:

      1) try a backup with a LiveCD
      2) format the disk and reinstall OS
      3) ask from your ISP to change your IP address
      4) scan the backup with a good antivirus program
      5) restore

      this way the attacker will not know your IP address and whatever trojan is installed cannot contact him/her back because it will have been wiped out.

      I hope I helped (if this story is real!)

    • #32275

      @JollyJokker wrote:

      I seriously cannot believe that this is really a true story.

      Why? Doesn’t your entire desk shake when you use a high percentage of your CPU?

      Google the OP a bit. There are some other pretty outrageous stories out there…

    • #32276

      Hello MsRefusenik,

      Once a machine is compromise by an attacker, spending time attempting to recover it is a futile approach.

      Take your computer down to a local, well known, Mac store and have them take a backup of your data, then format and reinstall the latest Mac OS operating system.

      Have them complete a full update of all the software on the computer and set it to do regular auto updates of the software. While this is happening, change any online account’s password to new and strong pass-phrases.

      Engage the Mac shop’s help to update the router you have at home and reset its password and for things such as wireless access points you may own as well.

      This will have you at a point where everything is secure and clean.

      To avoid the attacker coming back, don’t open email attachments from people you don’t know or click on links in emails to web sites. There are plenty of on-line basic security guides to give you a better understanding of how to keep your online presence safe.

    • #32277


      I just would never expect a hacker being so obssessed with maintaining access to an ordinary user. and this note exchanging? wow!

    • #32278

      @JollyJokker wrote:

      I just would never expect a hacker being so obssessed with maintaining access to an ordinary user. and this note exchanging? wow!

      I wasn’t giving you a hard time; I have a difficult time believing the story as well. Especially when it comes from a fiction writer 😉

      Several things struck me as odd.

      *Using a high percentage of your CPU doesn’t cause your desk to shake.

      *What processes does she have to kill every day?

      *She studied Unix but can’t reload OSX or simply disconnect the machine from the network/internet?

      *How did he damage the installation disc?

      *Losing the respect of kids over a computer problem seems pretty harsh. It sounds like they would have the savvy to backup files and reload the OS.

      *How did the place of employment also get hacked? Is it the same OS? Using the same credentials password? Are the same applications from the internet being installed?

      *Careers have been ruined and book deals have been lost? Yet she knows how to boot to a live CD. Why not just save the files on a USB stick at that point?

      The whole thing is overly dramatic and doesn’t provide very basic technical details (i.e. how were they communicating?). The fact that this occurred on OSX doesn’t lend a lot of credibility to the story as well. That’s obviously not “hack proof,” but it significantly less likely to get owned than Windows. Were random applications from the internet being install?

      This would take some serious dedication from the attacker, and most people with the time and abilities would go after financial gain, not harass some random woman on the internet.

      I’m not saying this is absolutely fabricated, but it does seem really far-fetched. I just skimmed the other blog posts, but I didn’t see any other mention of this, and the other entries have been pretty open (to say the least). I’m also skeptical of new members with “critical issues” that never bother to follow-up and work through the problem.

      This seems like a great way to start a social engineering attack. The next post may be asking to help move millions of dollars before the hacker can compromise the account information 😉

      Anyway, no offense is intended to the OP. If this is true, please provide more details, so we can get some idea of what’s actually going on. You’ve gotten a lot of good advice for such a scenario. I’d add that you would want to perform a credit check as well; look for any suspicious activity or accounts.

    • #32279

      I’m baffled ??? If you use it for writing mostly then just unplug the Ethernet cable and let someone fix it when you can miss it for a day or so.

      I also don’t understand why someone you don’t know would be so obsessed with owning your computer.

    • #32280

      I’ve seen a couple of other people posting similar threads here over the last 10 months (the time I’ve been here).

      Much a long the same lines actually. There was one who kept calling the hacker(s) (I think it was a group) whore(s), but I can’t find it with search.

      My first thought when I saw the thread was to laugh, and say “oh you’re back” in my head.

    • #32281

      chris, i was thinking the same thing. 

    • #32282

      @JollyJokker wrote:


      I just would never expect a hacker being so obssessed with maintaining access to an ordinary user. and this note exchanging? wow!

      this is the first thing that came to mind when reading this story. Why is it so important to keep access to that specific computer??? if the story is true, it must be somebody you know, otherwise there is no reason to do what he is doing (then again if the story is true)

    • #32283

      and yet still waiting for an answer/update…

    • #32284

      @Hordakk wrote:

      and yet still waiting for an answer/update…

      Don’t hold your breath.  😉

    • #32285

      @Ketchup wrote:

      chris, i was thinking the same thing.   

      I actually searched to post the other 2 threads I remember, but couldn’t find them.

      But like I said, one was the Whores one, I think the other was the Red X in a Box for images.

    • #32286

      @j0rDy wrote:

      @JollyJokker wrote:


      I just would never expect a hacker being so obssessed with maintaining access to an ordinary user. and this note exchanging? wow!

      this is the first thing that came to mind when reading this story. Why is it so important to keep access to that specific computer??? if the story is true, it must be somebody you know, otherwise there is no reason to do what he is doing (then again if the story is true)

      More or less… Stalker / someone out for vengeance. IF its true, which I highly (read 99.999%) doubt

    • #32287

      Hence, very funny. good points from you guys.  ;D Anyways the OP made a comment on us this forum.

    • #32288

      I hope she doesn’t take this the wrong way…

      After reading what she wrote there, and here. One thing is clear. She doesn’t understand computers. Reading around on websites, and forums doesn’t make you an expert, or mean that you understand it. I don’t mean to sound mean about it. But for her problems I really do think some of the For Dummies books would be a good place to start. Network Security might be worth the read.

      In case the OP is offended, please don’t be. The For Dummies series is  actually well written, just poorly named.

      As for the people that told you to pack it in and reinstall. It’s not that we’re telling you to give up. We’re telling you that once a box is compromised the only way to make sure it is good, is to start from scratch. Otherwise you may think you’ve cleared all the back doors, but in reality they’re is at least 1 still there.

      I’m going to give her the benefit of the doubt, that she is not the person that wrote the other posts.

    • #32289

      I have read all the replies, and I sincerely want to thank those of you who took me seriously and gave good suggestions.  As for the rest of you, I really expected that hackers would understand what I’m going through.  At any rate, you put the kabosh on the book I hoped to write about my ordeal with being hacked.  If you can’t believe it, how will non-hackers?  No wonder my children just believe I don’t know anything about computers–so do hackers! 

      I guess you could say I am giving up for now.  As long as you know I’m stupid now I might as well ask, “Google the OP” ??  Is OP like Tiger 10.4?  I did Google that and did find others that had been hacked into servers like mine. 

      Who is Edsager Dijkstra?  That quote is fascinating.  I want to read more.

      Finally, while I was enjoying my  Knoppix Live CD and was locked out of my OS by the hacker, I returned one day to find he had erased the disk.  Unfortunately the only disks I had to reinstall with were the two he had previously put scripts
      on, believe it or not.  I could not uncheck the boxes where the scripts were and when I tried to install it with the scripts but without the 25 languages, 20 different printer drivers, and all the other crap he added onto the installation, it wouldn’t install saying things were missing in the “Optional packages.”  Desperate to use my own computer again, and hoping against hope that his erasing the disk was a farewell gesture, I let the whole installation go through the way it was, putting certain things in his private/etc. files and all.  I have since attempted to fix this using disk utility repair and verify, and by manually moving files around.

      I looked around and thought he was gone.  Then I noticed the network was locked and once again I didn’t have permission to open any part of it including the library.  When I press the option key while booting, this time I don’t just see his scrawny disk that serves as his network but a big padlock.  Many other things are off limits and locked.  He has also managed to set up computer so that I can no longer get my Live CD’s to boot by pressing C or Shift-Option-Cmd-Del.  Not even the install disk will boot.  I know in Windows this can be changed by resetting the BIOS.  In Mac, I haven’t a clue and can’t find one for how to change this.  Can anyone tell me?

      I also called AT&T and the assholes want $120 to give me a new IP, preferably dynamic, even though the wireless hacker is using my AT&T connection as I write this.  They haven’t the faintest shred of interest in my being hacked on their lines.  They offer no help.  They want another $120 before they will even discuss my problems further.

      Should I just accept that this hacker has a perverted attachment to me and my computer and will be here until the RAM or computer dies?  Apparently he did get more RAM because the memory is fine now.  I am getting ready to revise my novel on it, and I need to add that file and my other writing files from my son’s external drive. 

      I found some old notebooks that showed that this same hacker has been on my case at least since January of 2008.  I only bought the computer that month.  How is that possible if the computer was really new from the Apple Store?

      If you’re sick of my saga, I guess I can’t blame you.  I’m sick of it too.  I just want to write in peace and solitude and manage my own computer.  But I feel wiped out.  If I buy new installation disks, or install a Linux OS, lock up everything, get a router which I don’t have now, pay for a new dynamic IP and get a new IP carrier, etc. who is to say that he won’t come back?  I feel so f**king defeated. 

      Can I get an encouraging word or have I used up my welcome?  Maryellen

    • #32290

      OP has nothing to do with the operating system you are running. It means ‘original poster’ as in you are the op and they googled your name. Second how could someone be hacking you from your wireless and yet you say you have no router? Third at&t isn’t going to charge you for a dynamic ip address you only get charged for a static ip address. Fourth if it’s as bad as you say why don’t you hire someone local to you to come in and format your computer, setup a router and lock it down, and lock down your computer. If you have a static ip address and somehow this hacker knows it then getting a dynamic ip will prevent him from accessing your computer from ip. It will not however stop him if he has control over your computer through a program that doesn’t connect through ip and uses some form of id to find your computer on the internet. If you formatted the computer while off network and had a dynamic ip and had a router setup by a professional which would cost maybe $300-400 you would be rid of this so called hacker. Or you can waste tons of time on here getting nowhere. It’s up to you.

    • #32291

      You really need a professional. If you want this thing to end. It would cost you but problem solve. We really can not help you if keep on mixing up the technical jargons with using other shortcut stuff we are using… Till then MsRefusnik


    • #32292

      Thank you again for your time and attention to this matter.  I copied all of your replies for my own future instructions and made a copy for “Dave” the name I gave to my hacker so I didn’t have to keep calling him “Hacker-Cracker.”  I hope he is decent enough to feel embarrassed about the comments wondering what’s with him hacking the same little old box and the same little old lady for such a long time.  It is a weird and twisted perversion on his part.  If I had money, an interesting love life, or some state secrets or terrorist agendas maybe, but this is pure bizzaro world. 

      I’ll let you know if I hear from the man of few words. 

      Thank you so much, and one last favor.  Could you tell me what kind of professional help to get and where to look for it?  When my Windows was hacked I was duped by everybody from the Geek Squad to independent I.T. guys who just formatted and reinstalled without changing anything and the hackers were back in place the same day. 

      Are you talking about those Network Monitoring  companies for businesses or what?  It still would be cheaper than buying a new computer. 

      And please could someone tell me how to reverse whatever he did to make this Mac not boot CD’s?  I just want to use a Live Linux Knoppix CD for a while I think. 



    • #32293

      Professional help means going an extra mile in meeting security professionals from Security Conferences such as Defcon; Shmoocon; or Bsides Las Vegas. They might help you. Mam  since your boot sequence is in first priority(CD) once you load in a Live CD which is Knoppix it would really boot CDs do not confuse yourself. I am begging you. Ask consulting firms.

    • #32294

      Maryellen, you really caught my attention here!

      The idea of writing a book is excellent. I will disagree with you here though:

      @MsRefusenik wrote:

      If you can’t believe it, how will non-hackers?  No wonder my children just believe I don’t know anything about computers–so do hackers! 

      This is not true. Contrary, I believe that non-hackers can not imagine what can be accomplished by a so-called “hacker”. You shouldn’t worry about that.

      P.S. Edsger Dijkstra was a phenomenal Mathematician/Computer Scientist (also Philosopher to me) who invented important algorithms (Routing) and “writing by hand”.


Viewing 23 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?