A bit like this is not exactly how a colleague winiar2014 writes there or winiar777.
VPN as a virtual network protects you, exactly your computer's IP number before identifying what data you view and download, you connect to sites by a substituted IP address. It will not give much to the current situation. Techniques for hacking on Fb are different: phishing, sniffing, or brute force. If they are already hacking, change the password to Fb, then to OTHERS to the e-mail which is connected to the Fb account. It will give you privacy, but if you do not take care of it, the situation will happen again. Phishin is a type of attack consisting in sending fake e-mails and an offer that will interest you to the extent that you open the file attached to it, eg pdf, it opens the backdoor for another computer with full access. Sniffing is a kind of eavesdropping of data that you send to the router, you can take over your data from this level of hacking, you can avoid this by applying the principle of self-discipline, i.e. I WILL NOT WANT ON THE SITE WITH ENCRYPTED BASIC (eg: HTTP, POP3, IMAP, FTP). Brute force hmmmm, this is a quick method to crack the password with a dictionary. Knowing your e-mail, you can crack a password to it, a simple program for generating passwords and entering them into the loading field: password. If you have a password: stasio11 then you have 8 hours of privacy (for 8 characters it falls out). You must use the new STRONG password with 20 characters (exaggerated). My router password is 18 characters long (roottruewy3malosci). The more characters there are, the more computing for the computer, a good example here is mathematics: the engine. Breaking such a password is a puzzle of all characters in all possible places, how to give a 5-character password, we have 1x2x3x4x5 = 120 different combinations - 5 minutes for a computer (I omit that all numbers of alphabets and numbers from 0-9 are in place of each character) and special characters), but for stasio11 it's 40320 combinations, and give a password of 20 characters (2432902008176640000 combinations *). If they have your phone number, they call you at work and take into account that you wrote a few people on Fb (that is, you suspect them) write them all that you changed your job to some other, how your phones will break you, you have a range of suspects. You can also go to the police, on troublesome phones, check the billing and place of calling and the identity of the person (owner of the sim card). This description is superficial and I turn to the whole post, there are many other methods, I described those that can be done in home conditions and for a fan, and there are more surveillance methods that approach much more serious matters such as ordering blackmail.
If you have any more serious questions, write to me privately.
greetings