June 3, 2022

I Just Watched “A Look At The British Families Below The Poverty Line In 1975 | Our History”

This was from 1975. I’ve watched a lot of documentaries, primarily American and British, about the struggles people living in poverty must endure. It’s heart breaking…. Hearing about people going to bed hungry or not knowing if they’d even have a place to live from day to day really tugs on your heart. I watched one from Chicago where the presenter asked where they saw themselves in five years… More than one said they would be lucky to...

Read More
May 18, 2022

Update – I was Invited to Monetize Facebook Reels

As you know from a previous post, Facebook is paying content creators to make reels… It’s really pretty neat. I just happened to stumble onto it when I was repurposing content from other projects… I created some of them myself and a lot of them I hire others to do it for me…. It’s great for SEO… I’ve noticed a huge difference in rankings and traffic. But more on that in another post.. Anyway, Facebook gives you “challenges”...

Read More
May 18, 2022

Signs Your Computer Might Be a Zombie and Why You Should Be Concerned

Photo by Concord90 https://pixabay.com/users/Concord90-1694618/ on Pixabay https://pixabay.com/photos/young-woman-computer-work-fatigue-1064658/

Everybody knows that the Internet is home to a plethora of virtual creatures. But it’s not just cat videos, LOLCats and animated rodents that you need to worry about. It’s also home to what are called “zombie computers” — computers that have been hacked and used as unwitting proxies by cyber-attackers. These zombie computers are what we call ‘botnets,’ which operate like an army of remote controlled drones. An attacker can take control of these compromised devices and use them to launch cyber attacks on other people or websites. A computer you own has almost certainly been impacted by one of these botnets. In this post, we’ll explain exactly why that’s concerning, what red flags to look out for if you think your computer might be a zombie, and what you can do about it if you think…

What is a Zombie Computer?
A “zombie computer” is a computer that’s been infected with malware and used to launch attacks on other people or websites. Zombie computers are part of a network of computers that attackers can control remotely — a so-called “botnet.” The ‘botnet’ name comes from the ‘robot network’ that the computers form. Just as robots are programmed to perform specific tasks, a botnet is formed when a computer is programmed to perform certain tasks. A computer infected with malware can be programmed to receive instructions from the attacker who placed the malware on it.

How do you know if your computer has been compromised?
There are some tell-tale signs that point to a computer being infected with malware, though some attacks are more difficult to detect. Here are some red flags that should cause you to take a second look at your computer’s security: – Your device is running slower than usual. Malware infections can use your computer’s resources to carry out illegal activities, which can make your computer slow down significantly. – You’re receiving spam emails from your device. Spammers will often send out bulk emails using computing power from infected devices. – Your device is acting strangely. Malware infections can cause devices to freeze up or crash. They can also result in your device being remotely controlled without your knowledge. – You have an outstanding virus protection subscription. If you’re receiving emails from your device, having performance issues or experiencing other weird behaviors, it may be a sign that you have a virus on your device.

What’s at stake for you?
Hackers can use zombie computers to launch distributed denial of service (DDoS) attacks that overload websites with fake traffic, rendering them unavailable for legitimate users. These attacks are illegal and can be extremely harmful. They can shut down critical systems like 911 call centers, airports and banks, and cause millions of dollars in damages. These types of attacks are the most concerning part of zombie computers because they can impact you, even if you aren’t the intended target.

So, Why Should You Care?
A zombie computer is a computer that is compromised and being used by an attacker to do their bidding — they don’t have any idea what they’re doing. These zombie computers are generally not under the control of the initial user who installed the software on the computer. When a device becomes a zombie computer, it is often used to send spam emails, launch DDoS attacks, or distribute malware to other computers. For example, you might receive a spam email from a friend, who doesn’t even know that their computer has been taken over and is being used as a zombie. Once your computer becomes infected with malware, an attacker has remote access to your device and can use it to do their bidding.

3 Steps to Know for Sure If Your Computer’s a Zombie
Now that you know the signs there could be something wrong with your computer, the next step is to figure out what. You can start by installing a security software program. These types of computer security programs will scan your computer for viruses, and let you know if your computer is infected. If you have a security software program, you can use it to scan your computer for malware. If it finds something, it will let you know what type of malware is on your computer and where it is located. If you don’t have a security software program installed, we recommend downloading one as soon as possible. From here, you can follow these three steps to know for sure if your computer is a zombie: – Identify what’s causing the issues. Once you know that your computer is infected, the next step is to figure out what type of malware it is.

Conclusion
Zombie computers pose a significant risk to Internet users worldwide, and there are a number of ways to tell if your computer has been compromised. Luckily, there are also simple ways to protect yourself and your device from becoming a zombie computer in the first place. To ensure that your computer doesn’t fall victim to a zombie attack, make sure you’re using up-to-date device operating systems and antivirus software. If you’re concerned that your device has been compromised, act quickly to clean up the infection. Overall, you should be actively monitoring your computer’s security to ensure that it’s protected from a zombie attack.

Read More
May 18, 2022

Signs Your Computer Might be a Zombie and Why You Should Be Concerned

Everybody knows that the Internet is home to a plethora of virtual creatures. But it’s not just cat videos, LOLCats and animated rodents that you need to worry about. It’s also home to what are called “zombie computers” — computers that have been hacked and used as unwitting proxies by cyber-attackers. These zombie computers are what we call ‘botnets,’ which operate like an army of remote controlled drones. An attacker can take control of these compromised devices and...

Read More
May 18, 2022

The Pros and Cons of Self Hosting Your Website

The hosting of a website refers to where it is stored and how it can be accessed by visitors. There are two main types of website hosting: self-hosting and web-hosting. Each has their own pros and cons. Self-hosting (or on-premises software) refers to a process in which the software that operates your website is installed on computer hardware owned by your company or organization. It’s often costlier, but there are some benefits that may outweigh the costs. Here...

Read More
May 17, 2022

Phone Slow? A Beginner’s Guide to Uninstalling Carrier/OEM Bloatware Without Root Access

When you buy a new phone, it usually comes with a bunch of pre-installed apps that are either useful or not so useful. In most cases, these apps are referred to as bloatware and they’re often installed by the manufacturers. These pre-installed apps can be anything from games, marketplaces, dictionaries, tutorials or anything else that the OEM deems necessary for its users to have on their device from day one. While some of these apps can be quite...

Read More
May 6, 2022

I was Invited to Monetize Facebook Reels

I’ve been giving new life to old pictures and video I’ve taken on my travels over the past 20 years by uploading them to several diff platforms.. . . So I woke up this am to a message from Facebook offering to monetize the reels I’ve uploaded. It’s by invite only. I would rather it had been on one of my niche fb pages and not on my personal account… But definitely not complaining…I have no idea how...

Read More
April 20, 2022

Thoughts on Canva.com

I  like that Canva has a teams feature… I’m not great at design… but  I can get someone else to do it while using content I’ve already licensed… etc. You have to be super careful about outsourcing design… If they’re using unlicensed media, you could eventually find yourself in hot water.  The copyright owner may come after you ten years later… I’ve seen it happen. It’s happened to me, scary stuff…  Anyway,  It’s easier to collaborate on Canva...

Read More
April 14, 2022

Desert Halo

You had been a part of the group disguised as a merchant, hired to capture a man who is a part of the traveling caravan. With only five days left till reaching Obora and still having no clue as to who the man was, you had begun to feel a hint of frustration. You had only been informed that he was a half-elf sorcerer and a “diplomatic sort”. You had tried to pry more information out of what...

Read More
April 12, 2022

Ordering Takeout is Expensive

Don’t get me wrong, I love the idea of not having to leave the house and just ordering in when you get hungry… It’s easy and convenient BUT, very expensive.. I was bad today and went to McDonald’s and bought a large Big Mac meal, apple pie and an ice cream sundae. Because I used points from the McDonald’s loyalty program, it came to just over $8.. I wanted to see how much it would be if I...

Read More