How to remove an hacker from a computer When a computer has been broken into, the hackers leave behind software called a rootkit. A rootkit is used by hackers to gain administrative privileges on the computer as well as put in additional security holes to regain access if the rootkit has been discovered. Rootkits are also designed to hide themselves from the real administrators of the computer, as well as disable any anti-virus programs that might discover them. As soon as hackers gain administrative access, it is almost impossible to remove all traces of the intrusion since they may have added many extra security holes on top of what's included in the rootkit. Turn off the computer suspected of having hackers. This step will prevent the hackers from breaking into other computers on the local network. Power up the computer. Follow the on-screen instructions during the boot up to enter BIOS setup and configure boot-up order to boot up from the CD-...