It’s not going to be easy. Only law enforcement has the ability to get full IP address information. The curious thing is, how do you have access to the email?
A web “beacon” or “bug” is simply something in an email that reports back to the sender that you’ve opened the mail.
The problem is that we don’t know what approach hackers are using to break your password. So, to be safe, the best password is both long and complex.
The most important thing is to determine which messaging program the people you want to talk to will use.
If you don’t have a rescue disc, just find another machine and make one. You don’t need to make one every single time you update the software.
When you take a picture, your camera saves “metadata”, or data about the picture. Geodata can be used to place an image in a geographical location.
Some devices, sites and software use passwords that are limited to 8 characters. Today that’s often insufficient, but I’ll look at what steps you can take to increase security.
In this scenario, the real issue is that your C: drive is full. What I recommend you do is clean it up.
What you did in this situation is exactly what I would have done: start by contacting the website and asking to be removed.