Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
I am a target of persistent hacking, and I am looking for advice on how to overcome this
Message
<blockquote data-quote="Trident" data-source="post: 1091158" data-attributes="member: 99014"><p>Well I’m gonna list what doesn’t make sense. For more beautiful presentation, I will even add bullet points.</p><ul> <li data-xf-list-type="ul">This is one of the many threads about “persistent”, terrifying hacking that can’t be dealt with and looks like many posts created before.</li> <li data-xf-list-type="ul">Once you are presenting yourself as a total noob who can’t create bootable Linux media, next moment you appear as an expert, ready to challenge everyone. That by itself brings 2 questions:<ul> <li data-xf-list-type="ul">Why are you contradicting yourself?</li> <li data-xf-list-type="ul">If you are such an expert, then why are you seeking help, support and advise? You know everything, right?</li> </ul></li> <li data-xf-list-type="ul">The instant hacking of a Chrome OS device sounds extremely unrealistic. Everyone knows that Chrome OS has more than 10x less CVEs than Mac (nearest competitor) and they are very short lived.</li> <li data-xf-list-type="ul">You keep going on and on and on, but what is the evidence of the hack?<ul> <li data-xf-list-type="ul">Has Confidentiality, Integrity or Availability of your information been compromised in any way?<ul> <li data-xf-list-type="ul">if yes, then explain in detail what was compromised, where, when and how did you find out it has happened.</li> </ul></li> <li data-xf-list-type="ul">Has any security system alerted you to any sort of intrusion?</li> </ul></li> <li data-xf-list-type="ul">When someone is telling you a story full of unnecessary details, taking way too long to get to the point, this story is most probably made up.</li> </ul></blockquote><p></p>
[QUOTE="Trident, post: 1091158, member: 99014"] Well I’m gonna list what doesn’t make sense. For more beautiful presentation, I will even add bullet points. [LIST] [*]This is one of the many threads about “persistent”, terrifying hacking that can’t be dealt with and looks like many posts created before. [*]Once you are presenting yourself as a total noob who can’t create bootable Linux media, next moment you appear as an expert, ready to challenge everyone. That by itself brings 2 questions: [LIST] [*]Why are you contradicting yourself? [*]If you are such an expert, then why are you seeking help, support and advise? You know everything, right? [/LIST] [*]The instant hacking of a Chrome OS device sounds extremely unrealistic. Everyone knows that Chrome OS has more than 10x less CVEs than Mac (nearest competitor) and they are very short lived. [*]You keep going on and on and on, but what is the evidence of the hack? [LIST] [*]Has Confidentiality, Integrity or Availability of your information been compromised in any way? [LIST] [*]if yes, then explain in detail what was compromised, where, when and how did you find out it has happened. [/LIST] [*]Has any security system alerted you to any sort of intrusion? [/LIST] [*]When someone is telling you a story full of unnecessary details, taking way too long to get to the point, this story is most probably made up. [/LIST] [/QUOTE]
Insert quotes…
Verification
Post reply
Top