About 117,000,000 results (0.52 seconds) Almost every day I get messages telling me my computer address has been cloned. I thought
I would help my readers to understand how someone might do this to their computer too. The software to do this
is similar to how to clone a PC to a laptop. In this case someone wants to duplicate everything on two devices and
this is possible to do. However, nefarious uses of these same methods are also used to do criminal things as well.
I haven't figured out myself whether it is one of my Ipads being used remotely against me or whether this is an
actual computer nearby somehow logging onto my wifi network while using my computer address. There are
so many things that are possible that I know exist that I might not know how to fix because I am at core not
a hacker even though I have been studying programming and computers since the 1960s. So, I know a lot about
maybe 20 generations of computers and software going back to the 1960s on IBM hardware and software but
less about things newer than about 2010 because at a certain point I was tired of learning things that would be
obsolete within 6 months to a year. NOW I learn exactly what I need to know to survive online year to year and
so I have become a minimalist in that I try to learn the minimum I need to know to survive online the next 6
months to a year while everything changes once again to something new and different regarding software and
hardware.
Search Results
Web results
Lately I've been getting all sorts of weird shit happening on my computer. Gmail telling me that there have been login attempts from old tech and letting me know.
No comments:
Post a Comment