Just wondering, no more... Question: How can a bad person gain unauthorized access to another computer without having *physical access* to that other computer and knowing the login details? I believe it’s done; haven’t a clue how. And no, I’m not up to any monkey business. If I was, I doubt this would be the place to be. Thanks.