Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: jsanders2001

Oh, that is a different story, much more like what I experienced. When my problem first started, we were using Comcast and then when the problems escalated we had Hughes net, but with the same computer. They already had the all the numbers and information that they needed.


69 posted on 06/21/2013 11:47:08 PM PDT by Eva
[ Post Reply | Private Reply | To 63 | View Replies ]


To: Eva

> Oh, that is a different story, much more like what I experienced. When my problem first started, we were using Comcast and then when the problems escalated we had Hughes net, but with the same computer. They already had the all the numbers and information that they needed.

Like I said before, I do know how it old be done but it would require having access to the account from within the telco. It doesnt really threaten me because I know the mindset if it is a hacker and what little good it would do them because I’m not doing anything illegal and have nothing to worry about. Fear of of the unknown (to the target) is their main weapon.

I just wondered why two pages that I accessed on my work computer suddenly opened up on Safari on my cellphone. Mind you these were not web pages you could accidentally key in. They were long web page addresses that pertaiined to data sources I use to do research. I’m going to look into this using some inside contacts to see if they’ve heard anything.


70 posted on 06/22/2013 3:23:24 AM PDT by jsanders2001
[ Post Reply | Private Reply | To 69 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson