|
Post by Chuck on Dec 1, 2019 10:20:21 GMT -5
We it finally happened, even thought I watch what web pages I go to an don't open emails that I don't know who is sending me such my face book got hacked Ugh !!!
I don't even use my I phone to log into the internet or get emails, but I have a feeling that one of the emails
I got from a friend was the problem an opened the door Ugh !!!
So as careful as I have been they still got me
Safe Travels
Chuck
|
|
|
Post by nvguy on Dec 1, 2019 17:57:16 GMT -5
Well that stinks. You are probably right, they got in thru an E mail. Good luck with rooting them out.
|
|
|
Post by laknox on Dec 2, 2019 0:12:29 GMT -5
Hacking should be subject to public flogging...
Lyle
|
|
|
Post by capemayal on Dec 2, 2019 7:12:46 GMT -5
Ubuntu Linux.
|
|
|
Post by Edd505 on Dec 2, 2019 21:09:04 GMT -5
Played with Ubuntu several years ago and it worked well then.
|
|
|
Post by capemayal on Dec 2, 2019 23:04:35 GMT -5
I've used it last several years. It leaves the other guy in the dust
|
|
k0vwa
Newbie RV’er
Posts: 47
|
Post by k0vwa on Dec 3, 2019 15:35:51 GMT -5
With all due respect to Ubuntu or other large attack surface OS's (Windows, OS-X, IOS, Android, I'm looking at you), it may be time to consider browsing/email via something like DSL "danged small linux" www.damnsmalllinux.org/wiki/installing_to_a_usb_flash_drive.html. Also works nicely as a VM if you use RAM for the VM's persistent storage so it can't store anything past a reboot. Super easy to spin a new VM, surf, and then dump the VM and wipe the space used by the local storage. Even with those steps, nothing is "secure" on the internet. I promise. Don't even have to be a TLA today to get nearly anything from anyone. If you do go for Ubuntu/CentOS/RHEL/etc, consider installing only the functionality you need - ie, don't install image preview, video, music and office-capable applications if all you will do is browse. If all you will do is browse, don't even install printer software. Reducing your attack surface is all about installing only what you have to have to do the job. Install to a CD/flash drive and boot/run from there. Last and most important - acquire, install and consistently use a good password manager. Strongly consider 2FA via something like YubiKey - SMS is not sufficient. SS7 is still too vulnerable to trust anything from a telco. Don't get me started.. oh wait. Happy holidays and Merry Christmas everyone. Hope you all had good turkey day. I gained 7 lbs.
|
|
|
Post by wazkaren on Dec 4, 2019 8:51:52 GMT -5
I'm just curious, what did they do when they hacked in (how do you know they hacked your account)? I always wondered why someone would want to hack a Facebook account. I don't think there's any money to made is there?
Greg
|
|
|
Post by johnr on Dec 5, 2019 8:57:42 GMT -5
Sorry, I'm getting on my soapbox. A lot of the time these days, hacking doesn't mean what it used to mean. It used to only mean that your physical machine(s) had been compromised and your data accessed. Today, it can mean that some nefarious agent spoofed your email, facebook, etc. account and made it look like you were sending stuff to other people. It can mean that someone duplicated your name and started friend requesting your friends. While the emails may be used as phishing, the facebook stuff I don't understand. What are they going to get from it? A true facebook hack to me would be someone who took all of your photos, videos, posts, etc. and deleted them from your account, promising to return them if you paid in bitcoin. Strangely, hacking can also mean that you left your device unlocked and a "funny" friend or family member posted some humorous statements to your accounts. You're truly much more at risk from Social Engineering than from true hacking. The weakest link in system security is the person sitting in front of the keyboard. Don't click on hyperlinks in your email that seem fishy. Are there a bunch of typos and strange wording that the person you're getting the email from wouldn't normally use? Are there attachments that you're not expecting? Does it say there are negative consequences, something to gain, embarassing pictures of you or something else that you have to click on a link to resolve? If there are, then stop! Yes, we want to believe that Mary Jane is sending us a cute photo of her cat, that George is sending a funny video. It's in our nature to trust our "friends" and distrust anyone else. That's what a lot of spoofers are counting on. If you get something a bit off from a "friend", then send them a separate message and ask if they sent you anything. Don't just reply to the message. If they did, then open the cat photo and laugh at the funny video. If not, then permanently delete that message. No, friend Bob is not sending me a link for me to collect my Publishers Clearinghouse winnings. You are the first line of defense in the war against phishing and spoofing.
|
|
|
Post by laknox on Dec 5, 2019 15:11:45 GMT -5
Johnr, in the first computer class I ever took, back when my "screen" was green bar paper, when the instructor started talking about security, he said that the first line of defense was to LOCK THE DAMN DOOR! Literally; lock the door to the computer/server room.
Lyle
|
|
|
Post by rvdude on Dec 8, 2019 23:49:13 GMT -5
A couple of years ago I got a message from my cousin's wife on FB asking if I had sent some strange message to her. I said no and figured that somebody had somehow gotten into my account and did that. I simply changed my password and have not had any other problems since then. I would not have known it is she hadn't messaged me about it.
|
|
|
Post by johnr on Dec 9, 2019 7:57:37 GMT -5
Johnr, in the first computer class I ever took, back when my "screen" was green bar paper, when the instructor started talking about security, he said that the first line of defense was to LOCK THE DAMN DOOR! Literally; lock the door to the computer/server room. Lyle Man, I miss line printers!
|
|
|
Post by laknox on Dec 9, 2019 10:33:49 GMT -5
Johnr, in the first computer class I ever took, back when my "screen" was green bar paper, when the instructor started talking about security, he said that the first line of defense was to LOCK THE DAMN DOOR! Literally; lock the door to the computer/server room. Lyle Man, I miss line printers! I wish I owned stock on paper companies back then! :-) Lyle
|
|
|
Post by Edd505 on Dec 10, 2019 21:27:59 GMT -5
Yep I was do good with computers back then I printed a letter that came out backwards. The letterhead was at the bottom and signature line at the top. One of my guys salved it and framed it as computer literacy award with ribbon. IT said it was impossible, I showed them and said if you think I typed it this was you been smoking something.
|
|
|
Post by capemayal on Dec 10, 2019 21:32:56 GMT -5
Johnr, in the first computer class I ever took, back when my "screen" was green bar paper, when the instructor started talking about security, he said that the first line of defense was to LOCK THE DAMN DOOR! Literally; lock the door to the computer/server room. Lyle
|
|
|
Post by capemayal on Dec 10, 2019 21:33:51 GMT -5
Do you remember the Trash 80?
|
|
|
Post by Edd505 on Dec 10, 2019 21:51:25 GMT -5
TRS-80 Radio Shack
|
|
|
Post by capemayal on Dec 10, 2019 21:56:50 GMT -5
You got it. And you think today's computers are expensive.....LOL
|
|
|
Post by johnr on Dec 11, 2019 8:00:23 GMT -5
Do you remember the Trash 80? I never had one of those. My firsts were the Commodore64 and then a Tandy 1000. I bet that Commodore cost more than a mid-line laptop today.
|
|
|
Post by laknox on Dec 11, 2019 10:48:30 GMT -5
You got it. And you think today's computers are expensive.....LOL Our first computer, well, Dad's (for business), was a true-blue IBM PC, 86 processor with 640kb RAM, 2 5.25" floppy drives, NO hdd but we had a 2 x 10mb Bernoulli box. All told, about $4k. Oh, had a wide carriage Okidata printer. MY first system was an IBM clone with "turbo mode". :-) 1mb RAM and a 20mb hdd. 2 3.5" floppies. I could go on... :-) Lyle
|
|