As I mentioned previously in this post, when one suspects that one's computer system is targeted, the hacker (who is usually equipped with sophisticated malware and hack tools) generally has full access to the victim's system (in my case, all my laptops) right from the moment the lid is open and...