First, I'm not freaking out, nor am I paranoid. I clearly stated that I believe that the most likely explanation is to be found with the reputable applications I granted access to.
Of course if I suspect an intrusion, I'm going to ensure that proper action is taken to cover all of my bases. I was planning a cleanup of my laptop anyway, so I may as well do it now.
Don't read too much into my changing the password on a wired desktop. It was one of the computers at hand, so I went with the most secure option, however unlikely it may be to make a difference (doing so didn't require any extra effort on my part).
> It's pretty simple to keep someone out of your email, don't give anyone the password.
This will be a moot point when Google will implement OAuth for IMAP.
PS: At this point, I believe it was a legitimate access by Etacts.
Of course if I suspect an intrusion, I'm going to ensure that proper action is taken to cover all of my bases. I was planning a cleanup of my laptop anyway, so I may as well do it now.
Don't read too much into my changing the password on a wired desktop. It was one of the computers at hand, so I went with the most secure option, however unlikely it may be to make a difference (doing so didn't require any extra effort on my part).
> It's pretty simple to keep someone out of your email, don't give anyone the password.
This will be a moot point when Google will implement OAuth for IMAP.
PS: At this point, I believe it was a legitimate access by Etacts.