HACKERS

Today I am going to write about hackers. There are two kinds of hackers, computer hackers and Bible hackers. Computer hackers operate their businesses from behind closed doors, in homes, offices, classes in universities, and other hidden places; Bible hackers run their businesses from churches, TV, radio, and other open and closed places.
I have written hundreds of articles on my blogs and website about Bible hackers. But I have not written much about computer hackers. So, today I am going to write my latest theory about fighting hackers not from your computer’s main drive, C drive, but from your USB drive, or thumb (flask) drive. In other words, your browser is launched from your USB drive, and not from your Windows computer. That limits the damage to your computer when the attacks from hackers go to your browser, and not to your computer’s main C drive. I have found that most of the attacks on my USB drive (browser) come in the form of pop-up windows, small or big. Don’t rush and click on the pop-up window to make it disappear before you do this, turn off your router, and then you can safely click on the pop-up window to make it disappear. If you don't have easy access to your router to turn it on and off, buy a power strip with 2 or 3 outlets from Walmart and connect the power cord from your router to one of the outlets from your power strip. And use your power strip as a switch to turn your router on and off at night, or when you are not using your computer. Remember, and d
o not forget to always disconnect your computer from your WiFi network when you are not using your computer. Never leave your router on when you are not active on the computer.
Have you heard about free software that you can download, install your application(s) on your USB drive, and launch it from there? 
It’s called Portable Apps. You need an external USB drive, number one. Download the Portable Apps to your USB drive, and follow the instructions on how to install it. You can password-protect your USB drive if you have a SANS-brand USB drive. Or, if you have Windows 11 or 10 you can right click your D drive and start BitLocker to lock the USB disk with encrypted password.
I have McAfee installed on my Windows computer for extra protection. You may not need the extra protection. But make sure that your AV can scan your USB drive for malware since you will now be mostly using it to browse the Internet. If you see a sudden pop-up window to update your browser, just cancel it as I did. Portable Apps will automatically update their software. But you need to update your knowledge on how to resist hackers when they show up on your computer screen.
AV, power strip, VPN, Portable Apps, Router, and other tools at your disposal are the weapons that you can use to protect your computer. But you must know how to use them. Practice with the tools that you have.
Google offers free bloggers that you can sign up for. Start your blogger, and share your experience with victims of computer hackers. If they have a group fighting hackers, join their group right now. When you have a VPN installed on your computer, make sure that it works.
The goal is to make computer hackers and Bible hackers obsolete.
Portable Apps offer a few browsers, such as Opera, Firefox, and Google Chrome. I have tried all of them and I like Google the best in terms of its vulnerability against malware attacks. Chrome is more resistant to manipulation by hackers. Having said that, be aware that things can change overnight. Computer hackers are high-energy people. I don't know what they eat, drink, or smoke. They rarely sleep.
Malwarebytes and McAfee offer free browser protection. Be aware, however, that hackers can delete them from your browser if they know that you have them. What do you do? Reinstall them! CCleaner or crap-cleaner is not a bad investment, particularly for Windows users. But you cannot depend solely on them for protection. Hackers will sometimes download craps automatically to your computer when you start your computer. When you see something is being downloaded that you did not ask for it, turn the router off immediately!
Block all unsolicited email. Or mark them as junk.
Do not chat after business hours with State/Federal government offices on your PC. Hackers are there waiting for you to get your private info, and demolish your computer.
Do you know how to access your Control Panel? It is very important that you access your Control Panel regularly since hackers can download and install Applications such as Remote Connection to spy on you without you knowing it. Anything that you see on your Control Panel that should not be there, delete them! Anything that you see there that you did not download or look suspicious, delete them. Make sure, however, to write down what is it that you delete and know where you can download it from in case you need it later.
2/12/24 A strategy that works really well against hackers is this - make it hard for them to find you. The cheapest way is to browse incognito. Google has a good incognito browser. I don't now if Edge has an incognito browser or not. VPN is also a good choice. McAfee is good. I started browsing incognito a week or so ago, and I can tell that these cyberpunks are mad. They sent me fake invoices from fake companies showing that I have ordered $600.00 of merchandise that they have charged to my credit card. Now I want to talk about passwords. Nearly all of my passwords are at least 120 characters long. How can I remember them? I cannot. I hide them in one of my apps incognito, and when I want to use them I copy and paste them also incognito. I am staying away from Edge because I believe that hackers can beat Edge.
6/6/24. My latest discovery is this. If you have a Windows computer, you are in luck. Sign in to your Microsoft account. Click the link to find your device/computer. If you find the location of your device is anywhere other than where you are now, a hacker is following your PC from that place. Rejoice, don't panic. All that you must do now is lock your computer. No one other the Administrator, you, can login to your computer after you lock it. Your Administrator account must be active when you are using the computer, otherwise sign off promptly!
Check back on this article because I may add some more information on this page later.

 

Comments

Popular Posts

LEGAL OFFER FROM JESUS

PASTOR-ATTORNEY

CONFUSED?

LET YOUR LIGHT SHINE

JUDAISM vs. CHRISTIANITY

KNOW YOUR HACKERS

SABBATH

ALL ABOUT THE HEART

THE TRIAD OF SALVATION