Results 11 to 13 of 13
Enjoy an ad free experience by logging in. Not a member yet? Register.
... at the moment you are doing the equivalent of trying to detect a root kit while you have booted the system by normal means rather than from trusted media ...
That sounds like the best possible advice.
Without a method of restricting physical access, you're going to be fighting an uphill battle.
- Join Date
- Oct 2012
Two months ago, I researched picking padlocks. I was shocked on the abundant tutorials and videos on picking and the ease of purchase and low cost of picks. The small Master combination luggage lock I used on my briefcase and a medium size master combination lock on my storage unit can be picked by using soda can tab. I am switching back to locks with keys. I ceased keeping one set of keys in my purse and the other inside my car. They use a slim jim to break into my car and steal my keys, appointment book, files. Instead, I am keeping the keys inside my money belt and wearing the money belt.
Yet, very hard to keep every thing locked all the time and to remain safe. I relocated, rented an apartment and returned to find my front door open and my brand new Acer Aspire One netbook hacked. I returned it within the fourteen day return policy. Yes, netbooks are cheap but are not easily replaceable as tablets have caused the demise of netbooks.
Therefore, I am trying to ascertain how they have complete remote control of my netbooks even when I am not connected to the internet. I removed the combo wifi/bluetooth card. Diagnostic tools no longer detected a wifi module. Yet, bluetooth is still being detected. Why? If bluetooth was completely removed, Linux would not detect a bluetooth module. Do netbooks have two bluetooths? Where would it be?