Replies: 2 comments
-
Here are some recommended steps to address the situation:
|
Beta Was this translation helpful? Give feedback.
-
Thank you a lot for your reply.
Moh
…On Fri, 15 Nov 2024 at 5:53 AM Jeksen ***@***.***> wrote:
Here are some recommended steps to address the situation:
1.
*Secure Accounts*: Immediately change the passwords for all accounts
you believe may have been compromised. Use strong, unique passwords and
consider enabling two-factor authentication (2FA) for added security.
2.
*Check Devices*: Scan all devices you use (computers, smartphones,
tablets) with trusted antivirus or anti-malware software to ensure they are
not compromised.
3.
*Contact Authorities*: If you believe illegal activity has occurred,
such as unauthorized access to your accounts, consider contacting local
authorities or law enforcement. They can provide guidance on how to proceed
legally.
4.
*Contact Service Providers*: Reach out to your email and service
providers (e.g., Google, Microsoft) for assistance. They may be able to
help you regain control of your accounts and provide logs or evidence if
needed.
5.
*Legal Advice*: Consult a legal professional for advice tailored to
your specific circumstances, especially if you suspect malicious intent or
illegal actions.
—
Reply to this email directly, view it on GitHub
<#144579 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/BMIP4JU3LAJRNAHCEEN5R5D2AVO2XAVCNFSM6AAAAABRZ6PJFSVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTCMRWGIYTCMY>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
Select Topic Area
Question
Body
My X she been using my email accounts for long with out my notice WifeUsing my email by unlegal way
learned that she using LINUX TO ACCESS TO MY email ACCOUNTS to create workspaces groups and connect them to her own company systems, utilizing software usingWindows Defender Active Controls, windows registry , Smart Screen, Active Directory Domain Services, and Windows Deployment Services, cost management billing , and she uses a lot of index on my all browsers , and hiring peoples for job like C+ and ( IPython pdb) domains and ALIT PYTHON users for accessing my devices and my family and friends and them emails , just want to you to know because just let you know this’s Illegal
Beta Was this translation helpful? Give feedback.
All reactions