Does Speccy determine if a system has been compromised and how? We had confirmation of a "full-system hacker" through hiring 2 techs to check our desk top computer, but i'm wondering if there is a program that can detect what hackers did while in our network? And if they access our new router, server, computer, network ? And I do not know too much of the lingo as I am not tech savvy, but any help would be appreciated. Thanks