The FBI should stop making accusations that suit political goals and rather provide facts so that people who actually know what their doing can make positive change using software and security.
You are a fool and know not of with you speak Benjamin Dover. Unfortunately, there is nothing that you can do with your software and security programs to make your firewall, or networks more secure.
They are phishing (basically) gaining access to multiple computers that were involved in the hack to watch for activity that is conducive to that of a hacker, or of course for other hacking activity. Unfortunately these hackers have backers and will not be getting back on the same computer/server/network that they used as proxies for the original hack. Making it very difficult to trace where or more importantly who they are.
For the layman it’s like asking you to go on a scavenger hunt to find a million dollars at the end, but Clue 3 has disappeared.
The FBI should stop making accusations that suit political goals and rather provide facts so that people who actually know what their doing can make positive change using software and security.
You are a fool and know not of with you speak Benjamin Dover. Unfortunately, there is nothing that you can do with your software and security programs to make your firewall, or networks more secure.
They are phishing (basically) gaining access to multiple computers that were involved in the hack to watch for activity that is conducive to that of a hacker, or of course for other hacking activity. Unfortunately these hackers have backers and will not be getting back on the same computer/server/network that they used as proxies for the original hack. Making it very difficult to trace where or more importantly who they are.
For the layman it’s like asking you to go on a scavenger hunt to find a million dollars at the end, but Clue 3 has disappeared.
Nearly impossible.