Welcome to the Marriage Builders® Discussion Forum
This is a community where people come in search of marriage related support, answers, or encouragement. Also, information about the Marriage Builders principles can be found in the books available for sale in the Marriage Builders® Bookstore.
If you would like to join our discussion forum, please read the Announcement Forum for instructions, rules, & guidelines.
The members of this community are peers and not professionals. Professional coaching is available by clicking on the link titled Coaching Center at the top of this page.
We trust that you will find the Marriage Builders® Discussion Forum to be a helpful resource for you. We look forward to your participation.
Once you have reviewed all the FAQ, tech support and announcement information, if you still have problems that are not addressed, please e-mail the administrators at email@example.com
General rule of thumb is that nobody deletes anything unless they have something to hide. So if your husband is deleting messages, he is still contacting her. Spyware is the best because it catches every keystroke.
3 adult children Divorced - he was a serial adulterer Now remarried, thank you MB (formerly lied_to_again)
I allready try this but didnt restore anything. Before that he was texting her and deleted everything. Now he promised that he is not contacting her anymore and it is all over but I just wanna be sure about that. Spyware is good but when i was trying to put this on there was double apple security in his icloud account. i reseted the password when he was sleeping but i needed his phone to enter a code for the double security but i cant get him phone. In a morning he got mail that someone his logged on his icloud.
By the way, based on the info you have in your thread, I'd say the affair isn't over, so snoop carefully and don't get caught. This is not a sprint, this is a marathon. The strategy to finish the marathon is to be well prepared. VAR, GPS and internet monitoring should get you info. If he doesn't suspect being monitored, he will not go underground. If he finds out you can monitor WiFi data, he will use mobile data. So set it up while you are all one. Don't use a shared profile on a shared pc for monitoring. Don't get caught.