I think my home computer has been compromised. My question is, does my intruder have access to my computer if I set the firewall to block all traffic? Will editing documents in this mode prevent him from seeing what I'm doing, for the duration of the firewall being set this way?
Also, how is the actual penetration being done? Is it through the IP that you get from your ISP? Would installing a VPN on top of a compromised system prevent the intruder from gaining access, since your IP would change/be masked? Or does it change?
Block All Trafficwill really block all traffic and hasn't been altered in a way to still allow some traffic hidden to usual commands? How do you know that there is not some software hidden somewhere who will temporarily reset the settings just the time to exchange data?... – WhiteWinterWolf Jul 11 '16 at 09:08