<HTML><BODY style="word-wrap: break-word; -khtml-nbsp-mode: space; -khtml-line-break: after-white-space; ">Jane,<DIV><BR class="khtml-block-placeholder"></DIV><DIV>If you leave your computer on all the time and connected to the internet thru a phone line, than a friend can check your computer address while at your home.<DIV>They can then connect to your computer from a remote site.</DIV><DIV>This happened to my neighbor just after I sold him a used Mac.</DIV><DIV>He blamed it on the Mac instead of his so-called friend who screwed his system up.</DIV><DIV>I had to fix it twice before he finally stopped his friend from using Mac.</DIV><DIV><BR class="khtml-block-placeholder"></DIV><DIV>Gil</DIV><DIV>_______________________________________<BR><DIV><DIV>On Dec 7, 2005, at 18:10, Jane Sprando wrote:</DIV><DIV><DIV><DIV><BR class="Apple-interchange-newline"><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><FONT class="Apple-style-span" color="#0000FF">How can you tell if your computer has been invaded or hacked into?</FONT></DIV><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; min-height: 14px; "><FONT class="Apple-style-span" color="#0000FF"><BR></FONT></DIV><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><FONT class="Apple-style-span" color="#0000FF">Jane</FONT></DIV></DIV></DIV></DIV><BR><BR></DIV></DIV></DIV></BODY></HTML>