RSS iconTwitter iconFacebook icon

The Trek BBS title image

The Trek BBS statistics

Threads: 149,545
Posts: 5,944,903
Members: 26,482
Currently online: 345
Newest member: Rofflcopter

TrekToday headlines

Greenwood To Receive Award
By: T'Bonz on Nov 26

Shatner In Hallmark Christmas Movie
By: T'Bonz on Nov 26

Abrams On Star Trek Into Darkness Flaws
By: T'Bonz on Nov 25

Star Trek Beyond In IMAX
By: T'Bonz on Nov 25

Red Shirt Diaries: The Return of The Archons
By: T'Bonz on Nov 23

Abrams Loves His Lens Flares
By: T'Bonz on Nov 23

Elba Star Trek Beyond Character Speculation
By: T'Bonz on Nov 23

Retro Review: Meld
By: Michelle Erica Green on Nov 20

Borg Cube Paper Lantern
By: T'Bonz on Nov 20

Takei Responds To Internment Comments
By: T'Bonz on Nov 19

Welcome! The Trek BBS is the number one place to chat about Star Trek with like-minded fans. Please login to see our full range of forums as well as the ability to send and receive private messages, track your favourite topics and of course join in the discussions.

If you are a new visitor, join us for free. If you are an existing member please login below. Note: for members who joined under our old messageboard system, please login with your display name not your login name.

Go Back   The Trek BBS > Entertainment & Interests > Science and Technology

Science and Technology "Somewhere, something incredible is waiting to be known." - Carl Sagan.

Closed Thread
Thread Tools
Old April 29 2014, 04:07 AM   #1
Fighting Back Against Hackers...while having fun at the same time

Fight back against the Heartbleed Trojan - A free method for encrypting your passwords and stuff - The next generation of Neophites have been born - You cannot stop us. Don't let them break your Code - - Welcome to the world of the real --

One sure fire method of determining whether your phone has been hacked is too listen for combinations of literal word associations that would relate to your password for your phone or websites that you visit.
Once discovered it is then time to play with your hacker's mind if you cannot shake them.
Hackers live in a world of layered security and most people don't realize this but your hotspot network SSID can be the first layer of defense in a passive form.
Take for instance my hotspot SSID danger in you mind. In order for the hacker to gain access to your passwords they first have to know what your network SSID is. Hackers live in a world of frenzied thoughts and emotions so if you put them on edge right away they might think twice about hacking your phone. danger in your mind is a passive node in the brain that will invoke any sense of fear or danger that may linger in the hackers mind. Even if you don't use keywords and advanced keywords to instantiate the node in the brain the process of paranoia will consciously and sub-consciously access the node in the brain where the substance of fear is stored. Once the node has been accessed the hacker who fears being caught will often times try and switch their personality to one that is less invasive at which point you have control over the hacker as they try harder and harder to access your own fear node through using your passwords and sites visited as an attempt to break your node's encryption. This is a basic passive level network SSID security algorithm that works very well.
The second layer of security is to imbed the same type of keyword instantiation in your Hotspot password. For example after creating the passive layer at the SSID layer which is danger in your mind that the hacker will walk right through at first create another security layer that will bound their fear on the outside of the fear node in their mind. Associate the second layer password with the primary network SSID layer such as Iknow+that+you+are+watching+me . In the hackers mind unless there is proof positive of the hacking taking place then the hacker will feel relatively safe while they continue to advance into your security layers. Once these two layers have been created add the other layers of security to your droid in the same manner creating even more passively invasive passwords like Imsorry6thatyou1feel6thatway, areyou?surethatIdontknow@thatyourhacking?, Icanhearyoureveryhackingattemptwhenyouspeak, etc. until your phone is completely encrypted. By now you have at least four to six layers a security that as the hacker dives in further a new fear node is accessed and activated each time they hack a password. Once you have these layers established create the same type of security layers within your passwords for email, websites etc. Just like a hacker who thinks of the world as nodes that can be broken and then used against you to hack into your own mind to make you fear them you have to be a counter-hacker where you establish the hack protocol for them to break that at the same time allows them to think that they are in control of you but unless they utter your passwords in your presence then their control method is of really no use. Once they utter your passwords in public that you recognize the counter-hack has taken place passively as the literal word association will play havoc with the hackers fear nodes every time they try and use your passwords against you. It's like passing the hacker through two mirrors reflecting their self back on their own mind.
Remember to have fun with the hackers and keep the black Sabbath holy.
Dryson is offline  
Closed Thread


Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

All times are GMT +1. The time now is 01:09 PM.

Powered by vBulletin® Version 3.8.6
Copyright ©2000 - 2015, Jelsoft Enterprises Ltd.
FireFox 2+ or Internet Explorer 7+ highly recommended.