Dumb Sh!t

Home  ❯❯  ComputingInternet

Computing

Common PC issues and helpful listings of specs, do’ and dont’s etc.

What? Phishing?

Phishing

Phishing attacks are more rampant than ever before, rising by more than 162% + over 4 years. The cost worldwide is $4.5 billion every year and over half of internet users get one phishing E-mail per day minimum. The best defense against phishing attacks is to block malicious E-mails before they reach you is using DMARC (Domain-based Message Authentication Reporting and Conformance) standard. Also users (business etc.) that offer E-mail data revealing attacks beyond DMARC (e.g., attacks that fake a brand using domains outside … Read More ❯❯

Published: July 2, 2017

Forgot a Wifi password?

ForgottenPassword

Find Any prior WiFi connection Password on your Windows computer This doesn’t let you go driving around with a laptop, breaking into password encrypted WiFi routers. Not that you need to as in most places. Your computer could pick up an unlocked router or 20 without a problem. This allows you to find ANY password that belongs to a router your PC/Laptop has been connected to in the past. So having (CRS) myself im willing to help others with the affliction. OK now … Read More ❯❯

Published: February 24, 2017

Passwords: Oh My head!

OhMyHead

Back in the day I used to be a so called “Hacker” i so take great offense to the word. Hacker’s create and do the so called impossible basically created all your devices at hand!, Where a “Cracker” destroys and steals etc etc.. The “Cracker” is the one that steals grannys social security checks and your identity Online! Not the “Hacker”. Got it? Good. Ok i’m over that now let’s continue. Most people don’t put a lot of thought into their password. It’s … Read More ❯❯

Published: February 24, 2017

Family Internet Safety

FamilyInternetSafety

Some things I think all of us should know. ┬áDon’t rush your children into social media. Obey the guideline of keeping children under 13 off social media. Once your children have an online profile, they can be tagged in photos, which magnifies their online presence. If you’re going to upload photos of them, don’t identify them and don’t tag them. This way the photo can’t be traced back to them. ┬áMyth: Parental controls are the best way to monitor my childs online activities. … Read More ❯❯

Published: February 22, 2017