I was going to say the same thing. Seems like that post is setting up the spam post that is coming, no doubt.
Although... they did join a year ago almost to the day.
Like sitting on the porch, watching the bug zapper on a hot summer night.....
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
I was going to say the same thing. Seems like that post is setting up the spam post that is coming, no doubt.
Although... they did join a year ago almost to the day.
Started with Mickeysoft, later embraced and enhanced by Apple and then Google. All of it shit. But they all "won in the marketplace !"I'm rapidly approaching a pure hatred of wifi and anything computer related....
IMO, what lies at the bottom of it is not so much hackers but the 'greed and stupid' that is the core of every ISP and otherwise 'internet' related company. They have a 50% interest in providing a service/product and a 50% interest in being sneaky. If they weren't spending half their time being sneaky, they'd have a lot more time to provide a product that works well.
Hey, So, this is my first post here. I have been visting this site for quite a time now, but have never posted here. I am asking this question here because the community is very engaging, empathetic and wants to genuinely help others. So, the issue is we recently faced hacking attempts in our home network. We faced damages in terms of data loss, hijack our usernames and passwords, ruin credits, make purchases etc. I am not a techy savvy person, now we are trying taking to safety precautions but still I want to implement some sort of application or system which can secure our home network and minimize hacking attempts and stop intruders. Is there a way, technique or method to secure my network being a non technical person,
TIA
...
Additionally, as you say you aren't a tech savvy person, I highly recommend hiring an IT security consultant to asses your needs regarding network security. These are things that are often overlooked as a business owner or proprietor, but I would argue that they are literally one of the most important facets of a business in the modern era.
Face facts, your password does not gain security from being complex..... It's all just numbers, the cracking systems do not even know what makes sense to a human.
Euro 1,000/day, portal-to-portal, first class air & limo, five star meals and lodging. Or so were our published rates as-of the early 1990's.How much does a good IT security consultant cost?
Which leaves you out of the manufacturing world because there is no other practical choice for cadcam.And we did NOT "do Windows". Then, now, nor "ever".
Which leaves you out of the manufacturing world because there is no other choice for cadcam.
I did just that the other day. I was having a battle with the system trying to access some online account.
In the end, after much gnashing of teeth and tantrum throwing...after being forced to change a password I'd had forever and didn't want to change.. I used "Ihatechanginepasswords"
So now everyone who knows your e-mail address can try logging into various different websites using said e-mail address and "Ihatechanginepasswords" until they find a server that lets them in.
Mine is not visible and only allows specific MAC addresses on.
There's also a guest network.
I nearly got hit by lighting at school in 1963.... getting hit by lighting...
All good expect for one small detail. How to Change(Spoof) Your MAC Address : 3 Steps - InstructablesMine is not visible and only allows specific MAC addresses on.
.
Notice
This website or its third-party tools process personal data (e.g. browsing data or IP addresses) and use cookies or other identifiers, which are necessary for its functioning and required to achieve the purposes illustrated in the cookie policy. To learn more, please refer to the cookie policy. In case of sale of your personal information, you may opt out by sending us an email via our Contact Us page. To find out more about the categories of personal information collected and the purposes for which such information will be used, please refer to our privacy policy. You accept the use of cookies or other identifiers by closing or dismissing this notice, by scrolling this page, by clicking a link or button or by continuing to browse otherwise.