Hello! I have two questions! Most of my submitted urls shows the “awaiting account verification” status. What does it mean? I dont really have access to any of the email accounts. Also Im trying to set up 2captchas as my second captcha breaker but is not not working! Could anyone explain me how to do it? I just added it my api key into SER.
don’t really know where to post these questions. I’ll give it a shot here. 3 days ago, Google asked me to verify the login. The login location was exactly where I am, so I clicked on yes. Several hours later, I started to get messages that my Robinhood account, which I only use on my phone had a bank transfer. Then my google play account tried to send some1 money. Then my autofill started to show up with other people’s addresses and emails and passwords that I don’t know. Then I realized the login attempt was a hacker. My system was reinstalled about 2 weeks ago, and I have windows defense, Malwarebytes installed. No malware found. There are two things that really disturbed and confused me. I will list them below.
I started to check my google account activity, and I found something strange. The device I am using, a desktop, logged in with several different IP addresses, The first one is mine, and it belongs to spectrum. So does the 3rd and 5th ip addresses. The 2nd and 4th both belongs to the same ISP. But what confuses me is that how can my Desktop device log in to chrome with so many different IP addresses which clearly isn’t mine, since I never used VPNs.
Simultaneously, the same day, my mother’s bank account was hacked. It might have been thru my google chromes autofill or a data breach since she uses the same email/password everywhere. The hacker tried to threaten my mom via text messages with her personal information, like addresses where she used to live. And interestingly enough, the attacked texted her a company name with a truck tracking number(this is a pdf file that’s only my Desktop, which was downloaded a few days ago using Chrome). The file has the tracking number in its title, but the company name is only in the file.
Now, I am really concerned about how compromised I am. I dont understand how the hacker who tried to threaten my mom knows something thats only on my PC, and this same desktop of mine has logged in chrome via different ip addresses which dont belong to me.
My assumption is that the attacker got my google password from a data breach, then tried to get all the information from my account, then switched to logging in to my mother’s bank account thru google autofill, then also found out about that pdf file in my download history(I am not sure about this part because the download history is only device-specific.) But this doenst explain why my PC logged in to chrome using so many different IP addresses. Could it be that my machine has some kind of virus that provides a backdoor to the attacker? Please help.
How much is a 1 m tiktok account it ?
do you think friends ?
I have a Microsoft Account linked to a Microsoft Authenticator app for 2FA purposes. Every time I log in, it first sends me the Authentificator request, but I can always click "Other ways to sign in" and then choose "Use my password instead", which then prompts me for the good old password, and logs me in successfully.
But doesn’t that negate the point of having the 2FA at all?
I wouldn’t expect this mix of a cargo cult meets security theater from a major corporation. Or did I misunderstand something?
While reading articles regarding improving WiFi security, I saw quite a few of them recommend starting Guest WiFi networks.
For instance, see point 4 in the following article:
One of the commonly cited benefits is that enabling Guest WiFi limits the number of people having access to your regular network. The idea being, only the members of the household will use the regular network and the guests will be isolated to the guest network.
Are there any downsides to this approach? Are there any overlaps between the Guest network and the regular network that an ordinary user should be aware of?
My concern stems from my general lack of education on this matter. To me it seems like creating two doors to the same house. Now I have to worry about securing an additional door, and I haven’t properly understood the benefit of having added an extra door.
I use a
firebase database to store users locations in it (by using
Except for this parameter, everything else in the database does not include any information.
My problem is that I cannot encrypt the coordinates since the GeoFire won’t manage to query the data.
My question is more general than how to encrypt data.
Firebase is basically connected to my google account which means that if someone hacks my google account he has access to my database.
Yes, I use 2 auth steps for my google account however I’m wondering what are the steps that I need to do in order to maximize the security before I publish my app.
I changed all of the security rules in my database but it all worth nothing if someone just hacks my google account and changes everything.
So I’m asking how I can secure this firebase account that I will only be able to sign in to the database from my computer for example or to make sure that even if someone hacks my google account he won’t be able to get into the firebase database.
Today as a DM I ran into my first player casting the augury spell.
By casting gem-inlaid sticks, rolling dragon bones, laying out ornate cards, or employing some other divining tool, you receive an omen from an otherworldly entity about the results of a specific course of action that you plan to take within the next 30 minutes. The DM chooses from the following possible omens:
Weal, for good results
Woe, for bad results
Weal and woe, for both good and bad results
Nothing, for results that aren’t especially good or bad
The spell doesn’t take into account any possible circumstances that might change the outcome, such as the casting of additional spells or the loss or gain of a companion.
The player asked if the best course of action was to camp in a proposed location, as opposed to pushing on for a few hours. Camping would allow them a safe night, the road would have led to a semi-dangerous encounter.
Normally that would be weal, because avoiding the encounter is good!
However, in avoiding that encounter, they missed the opportunity to rescue a group of people, and since I had written the outcome of that encounter to depend on the party, those people died off camera.
I haven’t had time yet to get to know the character and their motivations, but they are neutral good, so I assumed that having people die through inaction would be a bad result for them. I therefore went for option 3: Weal and woe.
Question: Does the spell take this kind of thing into account? Is maybe feeling bad a negative result?
If it helps: I plan to show this to the party because they will pass the scene, so the player will hopefully understand why I said what I did.
Hi, setting up a new business and want myself and another user to manage the Instagram content. Is this possible? We're both set up as admins on Facebook Business Manager, the Facebook page is linked to the Instagram page but only one of us is able to access the Instagram account to post / see analytics etc.
Any guidance? I'm going round in circles.
I logged into my school-based Microsoft account on my personal laptop. But is it possible that somehow my school is monitoring my Google searches and other browsing history through the school Microsoft account? If my activity is being monitored by my school with the aid of the Microsoft account, does a VPN prevent it from happening?
I have a serious problem about unlocking root account in kali linux 2020.2 Gnome. First of all, I installed the kali linux 2020.1 vbox version and I was able to successfully use the root account there. The processes I did there after the installation were:
sudo passwd root (setting new password) sudo passwd -u root (for unlocking root acc)
After that, I can login and use the root account without any problems. However, when I install kali linux 2020.2 installer instead of the vbox version of kali linux, that is, when I install a real OS version instead of the virtual machine version, I am having trouble logging in to the root account while changing the user. Although I entered the correct password, I cannot log into my account, but when I check it from my default account, there is an account that matches the information I entered.
Maybe I thought it was caused by the virtual machine, downloaded the iso file again and installed kali linux 2020.2 gnome edition directly on my computer, but the result did not change. What is the reason that I cannot access the root account when I install it as the main operating system while I can access the root account in the virtual machine version? Help me pls…