Over 16,535,468 people are on fubar.
What are you waiting for?

Sapphire's blog: "Sip for days"

created on 11/29/2018  |  http://fubar.com/sip-for-days/b371079

How They. Hack You.

It ever so often starts off with people trying to gloat about how brilliant and bright and intelligent they are, you and I probably heard it before I have a computer science degree it’s bullshit! Not to say that some people actually did go to school for computer science and studied it but for the most part the people who are hacking you most of them have not what they have done is gone and took their asses onto YouTube and learn how to hack for free. There they obtained the ability to to fuck over other peoples lives, using YouTube to get free information from real hackers. The real hacker is the ones with the actual computer science degrees who is on there to EARN MONEY and they can get checks from YouTube for teaching you how to do something that is illegal And punishable under the law. it could be a hefty fine and I huge price to pay they recently had one of these well-known hackers kill himself if he was sentenced for hacking into people’s personal property and company’s business is that you and I frequent every day so my whole suggestion is you’re not willing to pay the price and don’t do the crime but in case you’re wondering how they go about doing it keep on reading that info is below. Because you and I will go on there and so are these lowlife bastard‘s and everyone will continue to like share and click YouTube , YouTube is a numbers game for advertising and if younhave got big numbers you can get rich. Outside of showing and telling you which types of software you need purchase and how to use them to hack into someones computer or phone or other devices they get numbers and they get checks from it , and unfortunately you and I have to suffer from some idiot that is too lazy to get a job who wants to steal your bank account information and use it for themselves along with your credit card information and anything else they need. All too often this can be someone who is close to you who just wants to see if it works because most people test this type of thing out on their friends and family and they just have those who just search his room difficult angry people who want to steal your information and use if I don’t sell those people all of them whether they find a file need to be in jail and you on the other hand need to read this article. As I told you in the prior posts I have been a victim of identity theft , so I know what it feels like I had a house purchased in my name and a car , it?s annoying it?s costly, and Uobnoxious as it is absolutely ridiculous and most importantly against the law. Personally Congress Trump or someone needs to start putting these people in their place and holding them accountable for their actions. By placing them in jail and giving them a Hefty fine in a long jail timeTo sit in jail and think about what the have done not only that they need to repay you all the money that they stole iand pay your legal fees for getting you out of the mess that they created in the first place which can cost Hundreds of thousands to millions of dollars to get out of and lastly they need to replace your device that they fucked up in the first place. We are saying technology is supposed to help and advance people but whenever there is good we get bad people exploiting, And suddenly every damn iPhone or android user with some expensive software suddenly thinks that they are hackers ....nsmh. Lmfao anyway below you?ll find an article I hope you enjoy it may it help you out and Put you in the know for the NewYear. It will teach some of you some things that you didnot know, others it will be kind of scary when you read it if you do not know , I will say it opened my eyes and it certainly scared the shit out of me when I first learned about it 10 years ago but anyway this is my Christmas gift to most of you enjoy! Love, sapphire How to tell if your phone has been hacked ? There are Options Out There: 1. Spy Apps - Ways to know if your phone is hacked Before specifically discussing how to know if your phone is hacked, it makes sense to get into the different ways that this is even possible There are several different applications out there, known as spy apps, they give a person the ability to see virtually everything you do on your phone, including: Reading your text messages Hearing your phone calls Knowing your exact location. And more... This is why it is essential that you understand what you need to do. Spy apps are available in all of the different app stores, which makes it extremely easy for them to get on your phone There are ways to protect yourself: 1You should never let someone physically have possession of your phone. 2The primary way for a person to get a spy app onto your phone is through them installing the program on your device. 3Keep your phone with you at all times and choose a code that makes it difficult for people to get into your phone. It is also important that you regularly go through the applications on your phone. While some of these can be hidden, most are visible either through the processes or by viewing the application list itself. It is a good idea if you have an android device that you get of mobile security app that will detect malicious programs like this. If you have an iPhone, don?t allow it to be jailbroken. This will help you to find this as well. 2. Phishing Using Messages Another major way that people are able to try to get into your phone is by using phishing programs. This is done by sending you some kind of message that automatically downloads a malicious app onto your phone so that they are able to determine what you are doing on your phone, view your information, and gain access to things you clearly don?t want them to know. To stop this from occurring: It is always a good idea to recognize, and to never open attachments from people you don?t know. If you are receiving something from someone that you know and don?t expect something from them, check with them first before opening the message. Sometimes people have their accounts hacked and so it pays to check and make sure with them first. 3. SS7 Phone Vulnerabilities It was discovered about two years ago that there is a vulnerability in mobile networks throughout the world, referred to as SS7 That allows hackers to be able to look at your: Phone calls ( call logs, contact list, and recording calls) Read your text messages Track GPS locations without you knowing And some additional kinds of information and all they need is your mobile phone number. This may not seem like a big deal if you are a person who hasn?t given your phone number out to a large number of people, but there are those who may try to access into your phone by trying to bypass this protocol. 4. Open Wi-Fi Networks and Charging Stations There are those who have gone to the extra measure to protect their phone, and they dare people saying there is no way that someone can hack my phone. The truth is that some of the most innocuous situations can open the door to hacking occurring. You actually are putting yourself in this kind of situation by connecting into strange Wi-Fi networks or even using a charging station at a home or business you are potentially opening the door for someone to gain access into your phone. All you?re trying to do is get on the Internet or to charge her phone and before you know it somebody?s got your information. This means that you should never charge your phone or use the Internet connectivity in a location unless you are absolutely sure that you can trust them. This is an important factor for everyone, because it does not take much for someone to be able to use an application once your phone is plugged into their system to be able to get your information. 5. And If I Am Hacked So what do you do if you want to know how to unhack your phone? You may look at this and say that you?re sure that someone has gotten into your phone, so what do you do now? First, shut off all applications that look suspicious to you and run some kind of application that removes malicious software from your phone This may require a little expense on your part, but it will help to eliminate any kind of virus. You may also want to consult a professional that handles virus or malicious software removal, because this is a device you simply can?t afford for others to be able to access. T

The SCAMMER

(BTE before the technology era) We’ll see this every day particularly if you’re on social media you know there’s always a possibility if there’s a scammer lurking. And what are they looking for they’re searching for you they’re looking for the hurt; the lonely the ambitious , the outcast. No my friiend that was how this shit worked back in the dam 1980’s when my life was good moms and pops was still alive and very young. And all I had to worry about was being a good girl , chores for allowance and halfway decent grades. As my dad would call it ( GOD rest his soul). The yester years.... Now that I have taken you back in time let’s move ahead to current date ( [(AT )after technology ]) Technology has allowed the local NEIGHBORHOOD SCAMMERS and CON ARTIST to up their game. They now have access to the information highway better know as the WORLD WIDE WEB, AND THEY UTLIZE IT WELL. The connections they are able to make was once only reserved for the well traveled and those attaché types. The scammer now seeks out its victims buy exploiting a social networking aka social media or some other large web companies data base.Looking for victims. Most times they have already been on the system using bots and spyware introducing some kind of computer code to find you . While they explore the systems looking for those of us whom buy or use our credit or debit cards they are stealing money from the company including its intellectual property and platform so you will eventually see a company similar pop up somewhere. As they are stealing from the company they are Simultaneously running applications seeking out you and I because they now know that you used your credit card or debit card so they know how much money you have in your bank account weeks and months before An actual perso will engage with first contact.,now this is where the fun starts. Or should I say this is where it gets good for them and really bad for you. Yes Today’s scammer isn’t working alone they are normally memebers of large organized crime families meaning hundreds of scum bags by the thousands are employed by them with even larger connections whos main way of life is to exploit people’s information for personal gain. If your lucky enough and rich enough to stop the damage that’s really good but some of the MARKS become real crime victims outside of losing money you can lose your llively hood your security , your family and friends and maybe even your life or the life of someone you love. These people have no care in the world but taking what is not their own and using it for what ever they see fit. So you must be careful who you are adding and being friendly with Sometimes they are looking for popularity A types thees people get them where they need to go a pretty or handsome face plenty of potential friends they can victimize they are happy to meet you because you are popular. This is the difference between being a mark and the victim not that you can’t be both. Because today more than likely you are . That’s another perk that comes with popularity on social media. And don’t worry , this is not to scare you but to make you aware. I personally was used abused and took to the poor house by these types of people , the come in all colors , shapes and sizes and many walks of life. They are like the Russian mafia very diverse , meaning they don’t care who joins as long as you are willing to steal you can do business and reap the fruits of your lazy labor. These people steal shit from drawers if you tell him is worth money! The will invade your privacy, and leave you broke and homeless I know about this personally I was left broke and homeless by someone like that but I was lucky I walked away with my life and have been rebuilding what I lost.. Some people are dead because of these types of people. So don’t make the mistake of thinking because she or he is handsome or pretty and seems to be a nice person to younonline your ass cant be a victim , that is Just what they want you think. Mine was a former naval officer who worked for homeland security and the others , yes I’ve had this bullshit happen twice was by my own long term friend for life. In these instances they both was the perfect candidate one was broke broke and had a need for greed in her to get fancy shit she couldn’t afford any other way, Rather than work she needed what she wanted right away and was too fat to earn a honest living stripping and to good to sell her pussy. And way to lazy to get a job so that was an opportunity for her. As for him he had his hurt broken and was going in red from financial burdens and over extended credit on loans and was desperately seeking money way before he met me , but there I was young stupid bright eyed and bushy tailed as the old people say. Before I new it I was living in a life time movie! So everyone they came in contact with was some way exploited and used , people lost friends family homes cars and jobs to name a few things that life changed. These two instances occurred a few years apart from the other. For me my kids could no longer attend private school I am a single mom who worked for herself and lost my car which eventually cost me a job . And a place to live. Luckily moms and pops was around . These people do not give one fuck about you or the after effect. You will eventually run back into them so where like in a court house or social media where they are showcasing the loot, mine I saw shopping at a mall she could never afford. But that’s another story. The guy has now accu,ilatednsudden wealth related to his thievery over the last few years , The difference between low level scammmer and the scam artist who uses technology. So my advice is to be careful who your picking rather who is picking you... once they get in your life they are the equivalent of a roach infestation and very hard to remove because they have your name, social security info a, date of birth and anything else they will needy create bullshit and problems in your life and keep you under their thumb. They move very fast trying to get you to believe they are in love and want to be with you , that’s most times a dead ringer for bullshit. Infatuation or solicitation When you get into this. I can see how folks get caught up, they love the idea of fans that people actually are liking me, and for some people who are depressed and feel unappreciated unloved with those of us who have not always been most popular this place can be full of infatuation. Just keep and open mind that these people do this professionally as a way of life to make a living so they have a well crafted routine and it works in phases chances are right now a few of them have been adding you to their account or Phishing as scammers do on the net with links you click on but on hsocialmmedia it’s a person . Normally a fake profile, Inwillmget into that also. But you will learn over time what to look for and not add everyone who offers you a friendship. Mean while while you and your new social media boo thing are getting to know more about each other, the laybwirk was done earlier on when you started Getting all of those new friend request, there was a few others laying dormant and waiting for an opportunity to emerge once you get rid of the first one there will be a few , particularly if you have something they want . So be cautious. I was one of the people that thought that it would never happen to me and it did. Knowing as much as you can on how they get down will help you become an informed social media user. Here are a few articles to think about and get you stared, Also Inhave provided to you how to search these things on social media GOOGLE The word with the brackets ( SCAMMERS )AND INFORMATION On newest ones will come up. Has had tags (#j the number sign is a great way to look things up on social media, nomallymanythimg associated on social media if it’s done write. ( yes social media has to be done write in order to get the best results so people use hash tags to be found ) now think of all thenpeople who don’t use them or don’t know how they work.? I know right ..... If you are on FACEBOOK OR TWITTER USE HASH TAGS(#) like #scammers into the search and the people caught on social media doing it will come up.mas well as any articles stories or post this great ,most time it will give you these bastards profiles maybe even their victims and show you the pictures of the people they have stolen phots off of tomdomthere business, ( My photos have been used , but I this is reallly me Inam more than happy to get on cameras and chat people who I talk with, that’s another think if they are not willing to get on camera they are lying to you more or less use extreme caution Me I block and delete ! But to each his or her own, Here are a Few infamous scsmmmers that stick in the back of my mind. And Sicken me https://www.tampabay.com/news/From-the-archives-Abraham-Shakespeare-won-the-lottery-then-lost-it-all_164452713 The people I am talking about that I was scammed by my ex bf he briought this woman into my life , he was cheating on me with her lmao He wanted a baby .... anyway she had a husband and well read the article and see how shitnworled out tragic https://pilotonline.com/news/local/crime/article_ccaafddb-b6e9-54d4-8fed-159dea3c91d1.html Here a good article and just a few to get you going ,https://www.consumer.ftc.gov/blog/2015/07/faking-it-scammers-tricks-steal-your-heart-and-money?page=6 I hope you enjoyed my blog , but most importantly be safe on here, and as my moms and pops used to tell my brother . GOD rest their souls ... Don’t let your dick get you into trouble ! Wink and ladies don’t let your loneliness find you broke and bitter! II’m Sapphire and that’s my sip for today 🍵☕️🍷🥃 take care and love your fellow man🍩💋💋
last post
5 years ago
posts
3
views
117
can view
everyone
can comment
everyone
atom/rss
official fubar blogs
 8 years ago
fubar news by babyjesus  
 13 years ago
fubar.com ideas! by babyjesus  
 10 years ago
fubar'd Official Wishli... by SCRAPPER  
 11 years ago
Word of Esix by esixfiddy  

discover blogs on fubar

blog.php' rendered in 0.0427 seconds on machine '195'.