I have added this post to explain all consequences when a backdoor is installed on your computer.

The post explains all things a hacker can do after installing a backdoor on victims computer.

What an outsider can do:

1. Log on to your computer and operate/access it from a remote location.

2. Access your email list and/or use your Internet connection. This is called SMTP hijacking and is hugely popular with email scammers such as Nigerian con artists and email spammers who send out worms, viruses, unsolicited advertising, etc. When you track the email path, it shows that the letter was sent from a corporation in Walla Walla, Washington or from a college in Texas instead of from it's true origin.

3. Find files/documents that are not protected and destroy, copy, email, and alter them. That's why it's so important to install software like Folder Access.

4. Run programs, alter or delete programs.

5. Install hidden programs to watch what you do with your computer and where you go on the Internet. Spyware can keep a record of every web site you visit, every email you write, every chat in a chat room (public or private), every Private Message, every online purchase you make, every bit of online banking you do.

Keyloggers can record every keystroke you make, including passwords, user names, identification numbers, bank account numbers, and credit card numbers. To prevent such attacks, you need to install SecureClean to uncover existing malicious programs and prevent others from being installed.

6. Move from computer to computer within a network, access servers, steal and/or alter passwords, sensitive information, and personnel information.

7. Insert worms, viruses, and spyware into the computer owner or network owner's email programs, web sites or pages, ad banners, and downloads.

8. Crash a single computer or move through a network crashing one computer after the other. SOS Data Protection & Recovery Software is a real life-saver in that situation.

9. Send hundreds of requests to a network server that the server can't respond to (this is can cause a corporate web site to crash if it's the server where the site is stored); send hundreds of large emails to employees causing the email program to overload.

10. Change the path information takes through a network by inserting redirects that can cause the information to loop endlessly until the information transfer is rejected, or the altered path may send the information to a competitor.

The above malice list covers the highlights. Once malicious access has occurred to an individual computer or a network, so much damage is possible that recovery can be prohibitively expensive and public embarrassment overwhelming.