How can I block remote access to my computer and webcam?

Mocabenz April 13, 2014
Ads by Google

I am being harassed by my former supervisor and her sidekick, who works in IT. They are remotely accessing my work computer without my permission and sabotaging my work by reading and editing my emails and documents. I have reported their behavior to administration and she was demoted from supervising but nothing else happened because I have no proof. They also stole my personal keys from my purse, copied them, and was entering my home. I’m convinced they are accessing my home computer remotely and have some sort of Internet surveillance/camera installed in my home because of comments being made at work about my home. I even tried reporting their behavior to the police to no avail. How can I detect and stop both the remote access to my computer and the camera?

  1. ncoutlander
    April 19, 2014 at 9:39 am

    On the webcam part I would simply use a bandaide or a picture of my middle finger. Better yet just run Cspan in the background leaving your mic open and the pic of your finger. In other words why not have some fun with them, creating garbage for them to sift through if they are that intent on spying.

  2. Oron J
    April 14, 2014 at 4:07 pm

    If they are working in IT in your organization, then you may not be able to stop them by technological means (since they may have the permissions necessary to get into your PC).

    However, if they interfere with your work then you should be able to demonstrate this. For example, if they mess up your files, you should take offline backups of your files and, when you see that things have been messed up, bring it to the attention of management and show them your copy (on the external drive) vs the one kept on the work machine. And certainly if they have broken into your house you should complain to the police. However, think about this very coldly, and make sure that there is real reason to suspect them. I've seen users complain about IT interfering with their work only to find out, upon lengthy investigation, that the problem was caused by something completely different (e.g. a person saying that they sent a message without actually having sent it).

  3. Kelsey T
    April 13, 2014 at 9:18 pm

    Hmmm...why don't you nip it in the bud? The very first thing I'd do is call the nearest F.B.I. office, since the local police seem to have better things to do. What these people are doing to you is absolutely completely illegal.

  4. Hovsep A
    April 13, 2014 at 8:33 am

    can you see me
    to see if any ports are opened

    1) Right Click on My Computer and choose Properties
    2) Advanced System Settings
    3) Click on Remote Tab
    4) Uncheck Allow Remote Assistance connections to this computer
    5)Uncheck Allow Remote Connections o the computer

    Zemana Antilogger
    Stop malicious programs from stealing your usernames and passwords

    Do scan with Hitman Pro
    there free trial

    How to Detect a Remote Access to My Computer

  5. Ryan Dube
    April 13, 2014 at 4:24 am

    Hi Mocabenz,

    Great question. It's an unfortunate situation, but the fastest, simplest way to block standard remote access to your PC. Easiest way to check your remote access settings is to go to Start -> Right-Click on "Computer" in the menu to the right, then click on Properties. A window will pop up for your System Properties. On the left you'll see "Remote Settings". Click on that link. Another pop-up window will show "Allow Remote Assistance connections to this computer" and make sure the checkbox is unselected.

    Secondly, click on Start -> Go to Control Panel, Click on User Accounts. Change the passwords for all of your Windows accounts.

    Also, another check while you're on your computer, press cntrl-alt-delete, start Task Manager, click the "Processes Tab" and look for things like LogMeIn, TeamViewer, Dameware - Google the actual executable names to see what process name to look for. They could have installed some remote monitoring software, and if it's running silent, the only way to know is to identify the process in the Processes tab - if someone is actively monitoring it would likely be consuming CPU so it'll show up at the top of the list (if you sort by CPU usage).

    It's also worth checking out the expert advice of our security editor, Christian Cawley, in his article What to Do If You Think Your Computer Has Been Hacked Into (//

    Some good advice in there.