It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

How To Protect Your Computers From Hackers!!!

page: 2
1
<< 1   >>

log in

join
share:

posted on Nov, 21 2014 @ 11:59 PM
link   
a reply to: CJCrawley

dodgy sites are not my problem dodgy people and the likes sounds about right.



posted on Nov, 22 2014 @ 12:02 AM
link   
a reply to: Wildmanimal

This site is not the problem as far as i can tell but i do get those adobe update things but i do all my updates manually.
sorry to hear that might be a problem for you.



posted on Nov, 22 2014 @ 12:05 AM
link   
a reply to: markovian

you seem like you know a bit about this stuff. how hard is it to tunnel someones network and could the use a different frequency such as radar to try to hide that info?

oh and i forgot its not only something i did its more about what they are tryen to cover up and set my family up for.
edit on 22-11-2014 by SpunGCake because: (no reason given)



posted on Nov, 22 2014 @ 01:01 AM
link   
Seems to be alot of misinformation/mis-informed people in this thread :/

1) Your computer name (aka hostname) has virtually zero impact on your chances of being hacked. In fact, your hostname is largely irrelevant from the aspect of someone trying to break into your machine because pretty much all network based attacks are via your IP address.

2) Most ISPs already allocate dynamic IPs to your system that change at set intervals. There's technical reasons for this and none of them are related to computer security. Changing your IP won't protect you from most of the hacks used these days.

3) A VPN isn't a magic bullet. It only ensures communications between your machine and the VPN endpoint are encrypted. Malicious data/commands can still come down your VPN connection and do as much damage as a non-VPNed machine. It also won't stop malware on your system from dialing home.

4) Hasn't been mentioned yet, but Tor is also not a magic bullet. There's a number of well known security vulnerabilities/weaknesses in it that can and have been exploited to identify individuals, track their location and read their network traffic. It cannot be considered 100% anonymous anymore...

5) Virus scanners and firewalls/security appliances are always at least 48hrs behind in terms of virus definitions for things floating out in the wild. Hacker finds a new exploit, he writes a worm to use the exploit, he uses it for a day, possibly a few months/years before a security specialist notices it, then it takes a few more days to identify it's unique signature to add to the virus definitions used by security software/appliances, and a few more days on top of that to write something that's capable of removing the infection.

6) SSL is also not a silver bullet. In addition to MITM attacks, CAs can and have been breached. During these breaches someone can generate a certificate for microsoft.com, and virtually nothing will detect that something is amiss because the SSL validation check will come back as confirming yes, this certificate is valid for microsoft.com. The certificate will be validated and completely authentic until such times as someone noticed the CA was hacked and ask to have the fraudulent certificate revoked. Additionally the NSA have their own CA that they can use anytime they wish to generate a valid certificate for virtually any domain and you'll be none the wiser.

7) Microsoft, Unix, Linux, FreeBSD, Mac OS, Android and IOS all have security vulnerabilities, some of which are known and have work-arounds/solutions, some of which are known but have no fix, and some of which are as yet unknown. For example, the recent bash vulnerability that allowed remote code execution, was around for the better part of 20years before it was publically discovered and patched. That's 20 years where even the most paranoid security specialist that locked down his machine as tight as humanly possible still could have been hacked, either over a network, or by someone logging into his machine locally.

8) Going to extremes, it's possible to tap into your electrical wiring/communications cables and based on the power fluctuations predict with a fairly high degree of accuracy what you're doing on your computer. The tech to do this is actually pretty complicated so it's probably only alphabet agencies that would use this sort of method.

At the end of the day, your machine is never "secure". Nor is your mobile, nor are any other "Internet of Things" devices. All you can do is make it hard enough to break into your machine that hackers don't bother. Keep your system patches up-to-date, don't open emails from unknown sources, stay away from dodgy sites, keep your antivirus updated and do weekly full system scans, ditto for malware/spyware. Remove any and all software and background services that you don't need, keep off-site backups with periodic test restores to ensure the backup image isn't corrupt and don't make yourself a target.



posted on Nov, 22 2014 @ 02:22 AM
link   
a reply to: LordGoofus

replying to your #8

i know that alot can be done with the electrical aspects. creating frequancys and using other components in the house to amplify thos signals.

not to mention those ethernet through the outlet connectors. i wonder how easily those would be hacked or if having one hooked up to your house would make hacking the power harder?



posted on Nov, 22 2014 @ 02:37 AM
link   
a reply to: SpunGCake

The word "hacked" is a misnomer. The correct term would be "compromised". To that end, there is extant tech, in use, that can use the radiation from your monitor to recreate what you are looking at - and even to tell what you are typing on your keyboard by the vibrations given off.

Having said that, to come under that level of scrutiny - to justify Big Brother utilizing that level of resources? One would have to be a high, high profile target. So unless you are an envoy, head of state, or rogue agent? It's not reasonable to assume that you're dealing with anything more than a simple case of malware.



posted on Nov, 22 2014 @ 03:32 AM
link   
a reply to: Hefficide

when you can have your optic nerve hacked and have images shown to you i think having the monitor hack would be pointless. why would they want to see whats on your monitor if they can see what your looking at while your at walmart.

with that said i think nano bots and frequancys are sending signals and charging devices while we look at ANYTHING!!! I know im not supposed to know this probly but like i said i got assholes after me and i think there running out of preperation H
edit on 22-11-2014 by SpunGCake because: (no reason given)



posted on Nov, 22 2014 @ 03:38 AM
link   
That dont do anything useful. There are however some real operating system security lockdown guides online, this one on YT is for Windows 8 PRO:



-MM



posted on Nov, 22 2014 @ 04:07 AM
link   
a reply to: SpunGCake

I ask this question in earnest and without any judgment at all: Have you discussed these things with a medical professional at all? Occams razor is a useful tool when dealing with logic - one must eliminate the most pedestrian and common theories before moving onto less likely scenarious.

Just so you know, I have eight separate diagnoses and take medication daily.



posted on Nov, 22 2014 @ 05:47 AM
link   
a reply to: Hefficide

yes i have and the doctor called me a philosopher. weather he understands my situation or knows there isnt anything he could do but prescribe me medication. I think i made him see there is more to this story.

that was scary i read what you meant with the razor thing and saw its about a philosopher.
edit on 22-11-2014 by SpunGCake because: (no reason given)



posted on Nov, 22 2014 @ 07:24 AM
link   
I use a free private use Unix based router I built from some old hard ware and 2 network adaptors. I have PFSENSE installed and a package called pfblocker. With pfblocker I can firewall out entire countries. This I feel is a huge chunk of hacking activity blocked. How many times do I really need traffic to and from Africa?



posted on Nov, 22 2014 @ 07:47 AM
link   

originally posted by: SpunGCake
when you can have your optic nerve hacked and have images shown to you i think having the monitor hack would be pointless. why would they want to see whats on your monitor if they can see what your looking at while your at walmart.
with that said i think nano bots and frequancys are sending signals and charging devices while we look at ANYTHING!!!

If such technology existed why did the US government offer a reward of $25 million, then $50 million, for information on the whereabouts of Osama Bin Laden , (and then take years to find him), if they could remotely hack someone's optic-nerve/brain and obtain his whereabouts that way.


originally posted by: SpunGCake
... I know im not supposed to know this probly but like i said i got assholes after me and i think there running out of preperation H

You've got a real bad case of paranoia SpunGCake ...

wikipedia.org/wiki/Paranoia wrote:
Paranoia ... is a thought process believed to be heavily influenced by anxiety or fear, often to the point of irrationality and delusion. Paranoid thinking typically includes persecutory beliefs, or beliefs of conspiracy concerning a perceived threat towards oneself (e.g. "Everyone is out to get me").
en.wikipedia.org...

You'll fit right in here on ATS forums.

[ BTW the next stage is thought broadcasting ].
edit on 22-11-2014 by engvbany because: (no reason given)



posted on Nov, 23 2014 @ 01:26 AM
link   
a reply to: engvbany

first off how long ago did osama get killed? if you dont know his where abouts how can you hack his mind at all let alone place equipment needed to do so. you have to be mapped in order to be read.

thanks for the welcoming ive been a lurker for alot longer than my join date.

just because i dont know how it all works and what is needed to replicate dosent mean its not happening. signatures and spectro anaysis is proof enough for me at this point let alone some other things in my close proximity.



posted on Nov, 23 2014 @ 10:11 AM
link   

originally posted by: SpunGCake
a reply to: engvbany
... you have to be mapped in order to be read.

OK let's run with that unsubstantiated statement for a minute ...
Q. Why does the US torture people for information in Guantanamo Bay , if they had the the technology to read their minds which would be a more reliable , (and politically acceptable), way of obtaining information ?
A. because such technology does not exist.


originally posted by: SpunGCake
thanks for the welcoming ...

That reads like sarcasm. You may not recognise it but I'm doing you a favour pointing out you're suffering from paranoid delusions.
People who humour you are not helping you.


originally posted by: SpunGCake
... signatures and spectro anaysis is proof ...

Do we get to see this "proof" ?
edit on 23-11-2014 by engvbany because: (no reason given)



posted on Nov, 25 2014 @ 12:43 AM
link   
a reply to: engvbany

yes i see it now im glad you pointed this out.

IM DELUSIONAL AND HAVE NO CLUE TO WHAT I AM TALKING ABOUT THANKS FOR SAVING MY LIFE!!!



posted on Nov, 26 2014 @ 01:42 AM
link   
a reply to: engvbany

oh and thank you for editing your post to make me look CRAZY!!!!!



posted on Nov, 26 2014 @ 03:32 AM
link   
a reply to: SpunGCake

Thanks,
Yes it is annoying,
but I am starting to consider that it
is generated by my own ISP.



posted on Nov, 26 2014 @ 08:08 AM
link   

originally posted by: SpunGCake
a reply to: engvbany
oh and thank you for editing your post to make me look CRAZY!!!!!

The date posts are edited are at the bottom of them ,
the dates they are first made are at the top of them.
Evidently I didn't go back and modify my post after you posted your reply to it.
edit on 26-11-2014 by engvbany because: (no reason given)




top topics



 
1
<< 1   >>

log in

join