John Higginbotham

September 6, 2022

Are Dreams a Glimpse into a Parallel Universe?

I know it’s morbid, but do you ever wonder what the world will be like when you are not around? What happens to you when you go to sleep or cease to exist? Is there a hidden world that exists parallel to our own? Maybe dreams give us a glimpse into this parallel universe. Think about it; we experience dreams every night, regardless of our age or state of health. Are they merely random images conjured up by...

Read More
August 26, 2022

Domain Hijacking – Why You Should Be Concerned

Have you heard of domain hijacking? If not, don’t feel left behind. A lot of Internet users might not know that domain hijacking is a real threat to the virtual world. But this kind of cyber attack has been around for quite some time. It basically refers to the unauthorized takeover of a website and its related services like email, social media accounts, and other similar platforms. What is DOMAIN HIJACKING? Domain hijacking is an attack on your...

Read More
June 30, 2022

Can your smart tv be hacked?

I recently bought a smart tv for my office. I don’t all the time, but occasionally I also sleep in there. For the longest time, I used one of my laptops, desktop or just my phone to watch whatever I wanted to watch. It was never important to me to have a huge screen staring back at me…. It got to the point though, for whatever reason, that the sound coming from my non-tv equipment was just not...

Read More
June 16, 2022

The Scary Reality of Surveillance Capitalism

The internet and digital technologies have transformed almost every aspect of our lives. Through innovations like smartphones, social media, and online services, we can access information, communicate with people around the world, and perform tasks faster and more conveniently than ever before. However, these same digital technologies are being used to monitor our behavior in increasingly intrusive ways that threaten privacy and have negative implications for human society I’m going to highlight and discuss the monitoring techniques known...

Read More
June 15, 2022

IBM’s Fall From Grace: The Rise and Fall of IBM in the Digital Age

In the mid-2000s, Big Blue was king of the tech world. The company’s stock price hit an all-time high in 2001, and its earnings that year were higher than they had been in 25 years.The company ranked third place on the Fortune 500 list, behind only ExxonMobil and General Motors. And then it all came crashing down.By the end of 2014, IBM no longer made the Fortune 500 list at all––a stunning drop from 33rd place just five...

Read More
June 3, 2022

I Just Watched “A Look At The British Families Below The Poverty Line In 1975 | Our History”

This was from 1975. I’ve watched a lot of documentaries, primarily American and British, about the struggles people living in poverty must endure. It’s heart breaking…. Hearing about people going to bed hungry or not knowing if they’d even have a place to live from day to day really tugs on your heart. I watched one from Chicago where the presenter asked where they saw themselves in five years… More than one said they would be lucky to...

Read More
May 18, 2022

Update – I was Invited to Monetize Facebook Reels

As you know from a previous post, Facebook is paying content creators to make reels… It’s really pretty neat. I just happened to stumble onto it when I was repurposing content from other projects… I created some of them myself and a lot of them I hire others to do it for me…. It’s great for SEO… I’ve noticed a huge difference in rankings and traffic. But more on that in another post.. Anyway, Facebook gives you “challenges”...

Read More
May 18, 2022

Signs Your Computer Might Be a Zombie and Why You Should Be Concerned

Photo by Concord90 https://pixabay.com/users/Concord90-1694618/ on Pixabay https://pixabay.com/photos/young-woman-computer-work-fatigue-1064658/

Everybody knows that the Internet is home to a plethora of virtual creatures. But it’s not just cat videos, LOLCats and animated rodents that you need to worry about. It’s also home to what are called “zombie computers” — computers that have been hacked and used as unwitting proxies by cyber-attackers. These zombie computers are what we call ‘botnets,’ which operate like an army of remote controlled drones. An attacker can take control of these compromised devices and use them to launch cyber attacks on other people or websites. A computer you own has almost certainly been impacted by one of these botnets. In this post, we’ll explain exactly why that’s concerning, what red flags to look out for if you think your computer might be a zombie, and what you can do about it if you think…

What is a Zombie Computer?
A “zombie computer” is a computer that’s been infected with malware and used to launch attacks on other people or websites. Zombie computers are part of a network of computers that attackers can control remotely — a so-called “botnet.” The ‘botnet’ name comes from the ‘robot network’ that the computers form. Just as robots are programmed to perform specific tasks, a botnet is formed when a computer is programmed to perform certain tasks. A computer infected with malware can be programmed to receive instructions from the attacker who placed the malware on it.

How do you know if your computer has been compromised?
There are some tell-tale signs that point to a computer being infected with malware, though some attacks are more difficult to detect. Here are some red flags that should cause you to take a second look at your computer’s security: – Your device is running slower than usual. Malware infections can use your computer’s resources to carry out illegal activities, which can make your computer slow down significantly. – You’re receiving spam emails from your device. Spammers will often send out bulk emails using computing power from infected devices. – Your device is acting strangely. Malware infections can cause devices to freeze up or crash. They can also result in your device being remotely controlled without your knowledge. – You have an outstanding virus protection subscription. If you’re receiving emails from your device, having performance issues or experiencing other weird behaviors, it may be a sign that you have a virus on your device.

What’s at stake for you?
Hackers can use zombie computers to launch distributed denial of service (DDoS) attacks that overload websites with fake traffic, rendering them unavailable for legitimate users. These attacks are illegal and can be extremely harmful. They can shut down critical systems like 911 call centers, airports and banks, and cause millions of dollars in damages. These types of attacks are the most concerning part of zombie computers because they can impact you, even if you aren’t the intended target.

So, Why Should You Care?
A zombie computer is a computer that is compromised and being used by an attacker to do their bidding — they don’t have any idea what they’re doing. These zombie computers are generally not under the control of the initial user who installed the software on the computer. When a device becomes a zombie computer, it is often used to send spam emails, launch DDoS attacks, or distribute malware to other computers. For example, you might receive a spam email from a friend, who doesn’t even know that their computer has been taken over and is being used as a zombie. Once your computer becomes infected with malware, an attacker has remote access to your device and can use it to do their bidding.

3 Steps to Know for Sure If Your Computer’s a Zombie
Now that you know the signs there could be something wrong with your computer, the next step is to figure out what. You can start by installing a security software program. These types of computer security programs will scan your computer for viruses, and let you know if your computer is infected. If you have a security software program, you can use it to scan your computer for malware. If it finds something, it will let you know what type of malware is on your computer and where it is located. If you don’t have a security software program installed, we recommend downloading one as soon as possible. From here, you can follow these three steps to know for sure if your computer is a zombie: – Identify what’s causing the issues. Once you know that your computer is infected, the next step is to figure out what type of malware it is.

Conclusion
Zombie computers pose a significant risk to Internet users worldwide, and there are a number of ways to tell if your computer has been compromised. Luckily, there are also simple ways to protect yourself and your device from becoming a zombie computer in the first place. To ensure that your computer doesn’t fall victim to a zombie attack, make sure you’re using up-to-date device operating systems and antivirus software. If you’re concerned that your device has been compromised, act quickly to clean up the infection. Overall, you should be actively monitoring your computer’s security to ensure that it’s protected from a zombie attack.

Read More