top of page
Writer's pictureJuliet

Technical Defenses We Can All Use to Protect our Information from Hackers

Here is a fantastic free program i use on my windows system.

If you have a mac let me know and ill find software for those.


we are always being hacked by numerous companies 24-7. there is a free program called PeerBlock to download and block these hackers’ access to your computer. They come w lists of ip addresses to download and add to the List Manager. Hit Update & then go to main page and hit Disable HTTP and hit Enable on far left at top to begin the program. The above photo i took during a scan using PeerBlock that cleary show Halliburton trying to get into my computer. They are safely blocked. there is no reason for them to be in my computer- at all.

many times the companies might not be named and just give a country of origin. You can click on that section, then right click. At the bottom of the box, select Copy. Then go to top left of Peerblock. Click disable. now open a browser window. Go to Browserleaks.com. Paste that ip address into the search bar on top right of this page. Hit Enter.

the information listed shows what they found about this ip address. Read it carefully. Look for business or organization name. Lower down the page it will give information for you to complain about ip abuse problems. Write that down and make note on the time of day and the date you discovered this happening.

shrink browser window and reopen PeerBlock from the bottom tray. Click Enable on far left to start it again. whenever you Disable PeerBlock take a screenshot of your monitor by pressing the small windows icon image key on bottom left of keyboard, hold it down and find the key on upper right row that reads prt sc and push that key. This will save your screen image proving this business is illegally trying to hack you.


now press Disable on far left of PeerBlock box and reopen your browser. Go to twitter and click on a new post. Right click and paste the image you have now as evidence. Send it with any message you would like to say.


This will be your proof log. The company has no way to lie and say they were never harassing you. Twitter feeds stay up for 7 years.

Its is good to have a public data that can be backed up by another big corporation data logs. We need all the proof we can get. This is a huge was while also being pretty simple to do.

if you need assistance adding the ip lists please let me know i will help you.


36 views0 comments

Recent Posts

See All

Comments


bottom of page