Coming Soon đ At the beginning of April, youâll be
introduced to a brand-new GoComics! See more information here. Subscribers, check your
email for more details.
A hacker called me and said that he had all my passwords. I said, âthank goodness, hold on while I get a pencil so I can write them downâ (yeah, I know, old joke)
We donât answer the phone for numbers we donât recognize. But some years ago and just for fun, I began an online search of phone numbers that rang but left no message. Most were the usual, no record of this number. But once in a while a hunt that lets me find something interesting.
It listed name and address for 3 people. No business name on the phone, left no message, and never called back. Not the way most businesses operate.
Google found a residence, not a listed business, in a small neighborhood. There were 4 land lines and nearly a dozen cell numbers. Suggested they were either operating an unregistered home business or they were trying âsupplementâ their income by other than legal means.
And, as usual at the start of the year, Thu and Friday, before 10 am, we received a half dozen calls from numbers which, when I answered as a test, gave that funny little âbloopâ sound, which told me they were robo calls. The sharks never stop swimming.
One can secure devices and accounts without quite going to that level but it does take more effort than using birthdays, pet names, etc. as passwords. Plus you need to change paswords more than once a decade. Iâm not bragging but none of my personal devices nor accounts have ever been hacked. While a Network Admin, with over 700 computers and many servers, only 3 workstations were ever hacked and that was because someone clicked on a link in an e-mail (in a personal, not a work e-mail, which would have been blocked). Just for fun, I traced one attack back to its origins in one of the eastern European nations.
thevideostoreguy about 1 year ago
A familiar lament of our digital era.
sandpiper about 1 year ago
A tiresome process guaranteed to open your device to ads for almost every product or service ever invented, with political ads thrown in for fun.
PoodleGroomer about 1 year ago
Search YouTube for âPeanut needs WiFiâ
PraiseofFolly about 1 year ago
All that effort in securing his devices is increasing his localized entropy. Thatâs my theory and Iâm stuck with it. :/
Doug K about 1 year ago
Many people need to be protected from themselves.
gammaguy about 1 year ago
âTake that, hackers!â
Oh, they will.
uniquename about 1 year ago
Itâs kind of funny when youâre using two factor authentication for an app youâre opening on your phone and the code is sent there.
[Traveler] Premium Member about 1 year ago
A hacker called me and said that he had all my passwords. I said, âthank goodness, hold on while I get a pencil so I can write them downâ (yeah, I know, old joke)
sandpiper about 1 year ago
We donât answer the phone for numbers we donât recognize. But some years ago and just for fun, I began an online search of phone numbers that rang but left no message. Most were the usual, no record of this number. But once in a while a hunt that lets me find something interesting.
It listed name and address for 3 people. No business name on the phone, left no message, and never called back. Not the way most businesses operate.
Google found a residence, not a listed business, in a small neighborhood. There were 4 land lines and nearly a dozen cell numbers. Suggested they were either operating an unregistered home business or they were trying âsupplementâ their income by other than legal means.
And, as usual at the start of the year, Thu and Friday, before 10 am, we received a half dozen calls from numbers which, when I answered as a test, gave that funny little âbloopâ sound, which told me they were robo calls. The sharks never stop swimming.
Solomon J. Behala Premium Member about 1 year ago
And now numerous companies have all the info advertisers and clone makers are looking for.
InTraining Premium Member about 1 year ago
And software companies keep âImprovisingâ their stuff until you canât use it anymoreâŠ!
StephenHoyt about 1 year ago
Some people program there butt for the facial recognition software
Frank Burns Eats Worms about 1 year ago
Kenny Log-in safely? Letâs hope.
24Wu33/es Premium Member about 1 year ago
So true
cuzinron47 about 1 year ago
The problem is youâre securing the wrong end, you need secure the internet end.
mourdac Premium Member about 1 year ago
One can secure devices and accounts without quite going to that level but it does take more effort than using birthdays, pet names, etc. as passwords. Plus you need to change paswords more than once a decade. Iâm not bragging but none of my personal devices nor accounts have ever been hacked. While a Network Admin, with over 700 computers and many servers, only 3 workstations were ever hacked and that was because someone clicked on a link in an e-mail (in a personal, not a work e-mail, which would have been blocked). Just for fun, I traced one attack back to its origins in one of the eastern European nations.
Jayalexander about 1 year ago
yet the hackers have their ways. Screw your password (thatâs mine).