I have played right along and allowed them to do what they want. It was entertaining to watch, but I shut them down after about 40 minutes when I got bored (they worked incredibly slowly). However, it was in a copy of Windows running in a Virtual Machine [VM] within Linux (although it also could be run within MacOS or a host Windows ). They can only access the VM (and cannot tell that it is one), which obviously contains no private info. Afterwards I restored a snapshot of the Windows VM as it was before they started.Raywood said:I have had "we are from Microsoft, your computer is running slowly and we will fix it for you". I just say we have an Apple .... My sister however just regards it as a bit of fun and sees how long she can keep them on line before they rumble they are being duped. I think 25 minutes is her best so far.
Since then, hoping for a next time, I have put a "Password" file in the VM with fake bank account numbers etc, so as to waste more of these guys' time afterwards as they attempt to use them. I have also put some, let's say risque, pictures in there to wind them up :evil: