Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
I am a target of persistent hacking, and I am looking for advice on how to overcome this
Message
<blockquote data-quote="cybertrapped" data-source="post: 1091164" data-attributes="member: 114264"><p><img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite130" alt="(y)" title="Thumbs up (y)" loading="lazy" data-shortname="(y)" /> on your theatricality</p><p></p><p>I am new comer to this forum, and this argument, added to the tone of your messages seems immature. What makes you think or expect that I am aware of the number and frequency of posts that claim persistent hacking problems? </p><p></p><p>I have no control of how you perceived me, and nothing of what I wrote is intended to portray myself as a noob or an expert. Perhaps your reading comprehension skills are off. In my original post I am asking how I'm the midsts of hacked networks and devices, or lacking a clean machine, can I download a distro and keep it clean. I know how to make bootable media, but I am concerned about the integrity of whatever I create given my environment. I am not contradicting myself; again, you have poor reading comprehension skills.</p><p></p><p>Well, the taking over School District in the city I live happened despite their reliance on the Chromebook ecosystem. And whether a vulnerability is short or long lived, all it takes is one escalation of privileges, one beacon file, etc. This statement is naive. </p><p></p><p>Of course this has happened, and my intention is that I will be discussing incidents as questions and answers are exchanged. But the insulting and immature tone of your input is not very enticing. I actually would prefer you stay away from my posts, please consider this. </p><p></p><p></p><p></p><p>Maybe you rewrite the rules of this forum, and list WHAT YOU REQUIRE FOR POSTS TO APPEAR CREDIBLE TO YOU. That way, I will know which forums to stay away from. Or instead of wasting time trying to discredit the message of people who are desperately looking for help, you could actually help.</p><p></p><p>I have questions like: </p><p></p><p>Do you have any ideas of how I could download the Fedora package and keep it clean so I can run it on a new Windows machine from the get to? </p><p></p><p>If the Fedora package is corrupt, and I have the TPM activated, can the hackers still configure the media to bypass boot checking?</p></blockquote><p></p>
[QUOTE="cybertrapped, post: 1091164, member: 114264"] (y) on your theatricality I am new comer to this forum, and this argument, added to the tone of your messages seems immature. What makes you think or expect that I am aware of the number and frequency of posts that claim persistent hacking problems? I have no control of how you perceived me, and nothing of what I wrote is intended to portray myself as a noob or an expert. Perhaps your reading comprehension skills are off. In my original post I am asking how I'm the midsts of hacked networks and devices, or lacking a clean machine, can I download a distro and keep it clean. I know how to make bootable media, but I am concerned about the integrity of whatever I create given my environment. I am not contradicting myself; again, you have poor reading comprehension skills. Well, the taking over School District in the city I live happened despite their reliance on the Chromebook ecosystem. And whether a vulnerability is short or long lived, all it takes is one escalation of privileges, one beacon file, etc. This statement is naive. Of course this has happened, and my intention is that I will be discussing incidents as questions and answers are exchanged. But the insulting and immature tone of your input is not very enticing. I actually would prefer you stay away from my posts, please consider this. Maybe you rewrite the rules of this forum, and list WHAT YOU REQUIRE FOR POSTS TO APPEAR CREDIBLE TO YOU. That way, I will know which forums to stay away from. Or instead of wasting time trying to discredit the message of people who are desperately looking for help, you could actually help. I have questions like: Do you have any ideas of how I could download the Fedora package and keep it clean so I can run it on a new Windows machine from the get to? If the Fedora package is corrupt, and I have the TPM activated, can the hackers still configure the media to bypass boot checking? [/QUOTE]
Insert quotes…
Verification
Post reply
Top