In the realm of open source tools, it seems that everyone assumes that the more complex a tool is, the better it must be.
If you suspect that someone is accessing and using your computer without permission, you can apply some of the tricks below ...