paramount for an environment of work and in order to not lose money and information and for security reasons it idealk would be payment or block attachments that might have any kind of virus spyware. However, if you believe that is being guarded and monitored when in reality should not be, for example which monitors the screen can see what you are doing in real time, also should know that there is another method which is called filtering is that you avoid or blocking certain types of files spam before it gets to your mail inbox. If concideras can be spied you reomiendo you do the following if these connected to your XP or Vista computer and in the case that someone connects to your computer using the built-in features of Windows, remote desktop on the monitor screen will stay locked up and te dira who is connected. It is very easy to know who is connected already that if alguiense connects to your computer without you are account should know that they are using another type of software which is much more easy to detect since it does not belong to a normal process in Windows. all programs are listed in the Task Manager, so check all the icons and note which are are ejecutano if it is a process which had not heard previously that I recommend is doing a search in the archivo.es for asi pordes see what really is this proceso.todos programs are listed in the Task Manager, so that review all the icons and note which are are ejecutano if it is a process which had not heard previously that I recommend is to do a search in the porder so see what really is this process. Once you locate it is very easy to etener one you see in the Task Manager but if there is one that is very escurridiso do not appear in, and why should I try another way you can try another way. This is about third-party applications, so they have to connect to the Windows XP or Vista by communication ports. XP and Vista come with a built-in that blocks many of the ports of entry for reasons of safety Firewall.asi should revise all ports lops and identify which is this using to use spyware..