Recent Posts

Pages: 1 2 3 4 5 6 7 8 9 10
1
Bar & Grill [Public] / Re: Silly Spammers
« Last post by TimothyEllis on Today at 02:07:46 AM »
Also, I am tempted (again) to put up a fake WordPress login page on my site (which does not use WordPress) just to keep the less sophisticated would-be hackers busy trying to login to a page that wouldn't actually log them into anything.

Why not let them log in, and redirect them to a porn site.

They might enjoy that?

Maybe I could redirect them to a phishing site.  :icon_rofl:  Let the scammers scam each other for a bit.

 :tup3b :clap: :banana:
2
Bar & Grill [Public] / Re: Silly Spammers
« Last post by Post-Crisis D on Today at 02:04:05 AM »
Also, I am tempted (again) to put up a fake WordPress login page on my site (which does not use WordPress) just to keep the less sophisticated would-be hackers busy trying to login to a page that wouldn't actually log them into anything.

Why not let them log in, and redirect them to a porn site.

They might enjoy that?

Maybe I could redirect them to a phishing site.  :icon_rofl:  Let the scammers scam each other for a bit.
3
Bar & Grill [Public] / Re: Silly Spammers
« Last post by TimothyEllis on Today at 01:50:07 AM »
Also, I am tempted (again) to put up a fake WordPress login page on my site (which does not use WordPress) just to keep the less sophisticated would-be hackers busy trying to login to a page that wouldn't actually log them into anything.

Why not let them log in, and redirect them to a porn site.
4
Bar & Grill [Public] / Re: Silly Spammers
« Last post by Post-Crisis D on Today at 01:41:46 AM »
As a minor update, submissions from the comment form on my website remains mostly spam-free.  The one exception is the occasional submission from some janitorial service.  Either they have a real person submitting spam or their bot is able to figure out the obstacles on my form.  I need to edit the code to block them too regardless of whether they pass the challenges.

Also, I am tempted (again) to put up a fake WordPress login page on my site (which does not use WordPress) just to keep the less sophisticated would-be hackers busy trying to login to a page that wouldn't actually log them into anything.
5
And someone or "somebot" keeps trying to get into my Facebook account, too.

Someone tried to use the reset password feature on my Facebook account the other day.  There was a link in the eMail from Facebook where you can report that you didn't request the reset, so I did that.

But, it probably wouldn't matter anyway since I can't even get into Facebook with my current password.  A while back, Facebook forced me into two-factor authentication and demanded my phone number.  I'm not giving Facebook my phone number, so my Facebook account is pretty much dead to me now.

And, yes, there are plenty of attempts at getting into my websites.  On the plus side, most of my websites don't use WordPress so that tends to stymie most attempts since the majority of attempts seem to be targeted at the wp-login.php page which does not exist.
6
I'd have to go through a tedious process to temporarily unlock if I needed to open a bank account, get a credit card, move, or take out a loan. All of those are at best unlikely. I would have thought twice if any of those were things I needed to do frequently, but that isn't the case.
Freezing credit is an easy step for mitigating identity theft. I think since the big breaches in the US, freezing must now be free at all bureaus.

I will note I had a bit of a hiccup when I discovered trying to sign up for a new internet provider required a hard credit pull, and despite unfreezing and giving it two days, the internet provider didn't see it as unfrozen. So if you have to unfreeze, I would recommend doing so for 1-2 weeks at a time so everything can percolate.
7
I'm seeing the same pattern with Microsoft. And a lot of bots try to breach my author site every single day.

With proper precautions, these threats can probably be kept at bay.

After a data breach some time ago, I followed Lifelock's instructions on how to make life difficult for identity thieves. Specifically, I got all three credit bureaus to lock my info, so no one can request it. There are also two agencies (can't remember the names) that locked the ability to open a bank account or a utility account in my name. Hackers can still attempt to breach existing accounts, but no one can open new ones.

I'd have to go through a tedious process to temporarily unlock if I needed to open a bank account, get a credit card, move, or take out a loan. All of those are at best unlikely. I would have thought twice if any of those were things I needed to do frequently, but that isn't the case.
8
Marketing Loft [Public] / Re: Website Update Issues
« Last post by Bill Hiatt on April 19, 2024, 11:55:29 PM »
Update: I asked some presale questions of A2 Hosting and got answers back in a very short time. Same with follow-up for clarification.

I was particularly interesting in stuff that might screw up a migration, but they were able to put all my fears to rest.

Not only does switching hosts solve the Cloud Linux update issue (which is now meriting a link directly to the update script at the top of my cpanel dashboard) but it also solves a potential issue with Cloudflare. CF's more flexible packages require that you use their nameservers. Bluehost, while not forbidding the practice, clearly doesn't like it. There's even a request to correct the nameserver discrepancy buried deep in cpanel. Though it hasn't proved problematic yet, it might at some future point.

In contrast, A2 Hosting fully supports this kind of Bluehost arrangement and even explains how to set it up for someone doing it for the first time.

As far as costs are concerned, spending the same amount of money gets me a slightly better setup. I'll lose the money for the rest of my current BH term, but I won't have to risk blowing up my site over the CL update. Also, I'll be in a managed plan, so I'll never have to worry about OS updates again.

9
Recently my identity theft company--the one I have a free sub to because of prior data breaches--told me my name has been found on the Dark Web. Well, okay. My name is public. I asked them about it and they said no biggie. Really?

Of late, there has been an uptick in efforts to get into my Microsoft account--two yesterday alone. What I don't understand is, why bother? Microsoft is not my best buddy. I don't hang out with Microsoft or give it money every month, and I don't believe I have ever bought anything from Microsoft directly, either. I have registered software with Microsoft because I had to in order to use the software, but no credit card info was involved. I'm scratching my head over this one.

And the usual "I saw you..." extortion emails continue, listing so far three legit passwords from things I signed up for years ago. Passwords I never used for anything else, and not involving money, most of which were for sites that now are moribund. So, where's the threat in that? I did scurry around and change one banking password because that bank doesn't have two-factor authentication. (And it's a very big bank, too. Weird.) I'd changed my user name on that a long time ago and now I have such a long, complicated, and nonsensical password that woe betide me should I ever have to get into that account and don't have my cheat sheet handy.

Beyond activating two-factor and changing passwords now and then, I don't think there's anything else I can do. A recent article about someone being hacked said his online password manager had been hacked. Yikes. 

And someone or "somebot" keeps trying to get into my Facebook account, too.

On balance, yes, I do feel under attack, presumably because my name is being sold and resold on the Dark Web. But the bad guys aren't winning so far.
10
That blanket denial by the vendor would be a serious red flag for me.  If they haven't had a breach, then they must have shared or sold your data.  If they did have a breach, then the vendor is either too incompetent to discover it or he's lying about it.  I'd strongly consider severing all dealings with that person.  Surely there's a competitor that can fulfill the same function at a similar price.

They're actually a good-sized company.  I doubt they've sold or shared the data because, even if they shared customer info, there'd be no reason to sell the passwords too.

And I just checked . . .   It was six years ago.  And, they didn't actually say they hadn't been hacked.  The last eMail I got from them was when they asked for copies of the eMail and so they could investigate it.  Never heard a thing after that.

Anyway, no problems since I changed the password.  And they do have stuff I cannot find elsewhere.


Well, that's good to hear.  Hopefully there won't be any further issues.
Pages: 1 2 3 4 5 6 7 8 9 10