1. Dryson Bennington's Avatar
    One sure fire method of determining whether your phone has been hacked is too listen for combinations of literal word associations that would relate to your password for your phone or websites that you visit.

    Once discovered it is then time to play with your hacker's mind if you cannot shake them.

    Hackers live in a world of layered security and most people don't realize this but your hotspot network SSID can be the first layer of defense in a passive form.

    Take for instance my hotspot SSID danger in you mind. In order for the hacker to gain access to your passwords they first have to know what your network SSID is. Hackers live in a world of frenzied thoughts and emotions so if you put them on edge right away they might think twice about hacking your phone. danger in your mind is a passive node in the brain that will invoke any sense of fear or danger that may linger in the hackers mind. Even if you don't use keywords and advanced keywords to instantiate the node in the brain the process of paranoia will consciously and sub-consciously access the node in the brain where the substance of fear is stored. Once the node has been accessed the hacker who fears being caught will often times try and switch their personality to one that is less invasive at which point you have control over the hacker as they try harder and harder to access your own fear node through using your passwords and sites visited as an attempt to break your node's encryption. This is a basic passive level network SSID security algorithm that works very well.

    The second layer of security is to imbed the same type of keyword instantiation in your Hotspot password. For example after creating the passive layer at the SSID layer which is danger in your mind that the hacker will walk right through at first create another security layer that will bound their fear on the outside of the fear node in their mind. Associate the second layer password with the primary network SSID layer such as Iknow+that+you+are+watching+me. In the hackers mind unless there is proof positive of the hacking taking place then the hacker will feel relatively safe while they continue to advance into your security layers. Once these two layers have been created add the other layers of security to your droid in the same manner creating even more passively invasive passwords like Imsorry6thatyou1feel6thatway, areyou?surethatIdontknow@thatyourhacking?, Icanhearyoureveryhackingattemptwhenyouspeak, etc. until your phone is completely encrypted. By now you have at least four to six layers a security that as the hacker dives in further a new fear node is accessed and activated each time they hack a password. Once you have these layers established create the same type of security layers within your passwords for email, websites etc. Just like a hacker who thinks of the world as nodes that can be broken and then used against you to hack into your own mind to make you fear them you have to be a counter-hacker where you establish the hack protocol for them to break that at the same time allows them to think that they are in control of you but unless they utter your passwords in your presence then their control method is of really no use. Once they utter your passwords in public that you recognize the counter-hack has taken place passively as the literal word association will play havoc with the hackers fear nodes every time they try and use your passwords against you. It's like passing the hacker through two mirrors reflecting their self back on their own mind.

    Remember to have fun with the hackers and keep the black Sabbath holy.
    04-28-2014 09:28 PM
  2. zorak950's Avatar
    The hell?
    Michael Nancarrow likes this.
    04-28-2014 10:15 PM
  3. Almeuit's Avatar

    Sent from my T-Mobile Note 3 using AC Forums.
    04-28-2014 11:28 PM
  4. wizzrah's Avatar
    I have a whole different view on security now. No one will hack me now. Thanks . :/
    04-29-2014 01:21 AM
  5. Golfdriver97's Avatar
    Here is the way I look at this issue: Hackers will hack into my stuff if they want to. I am not competent enough to stop them, but I can slow them down enough for them to reconsider if hacking me is worth it.
    04-29-2014 10:10 AM
  6. SUPER_JERK's Avatar
    I imagine that there's experienced hackers who can and probably will get into your stuff one day. But there's also probably some random kids who don't have much of an idea of what they're doing, whom might one day try to crack your stuff. It's probably a good idea to be protected, even in imaginative ways .
    05-14-2014 12:17 AM
  7. Kilroy13's Avatar
    One of the weirdest posts i have ever read!👀

    Sent from my G-Flex........Life is Good!✌
    Michael Nancarrow likes this.
    05-14-2014 01:27 AM
  8. Crichton333's Avatar
    Nice spam post to raise keywords. Clap, clap, clap.
    05-14-2014 10:27 PM

Similar Threads

  1. Custom os warning and problem with volume key
    By Nicola Stead in forum Samsung Galaxy S4
    Replies: 6
    Last Post: 06-17-2017, 10:38 AM
  2. Odd Problem with SGHi257M
    By mdawdy in forum Samsung Galaxy S4 Mini
    Replies: 20
    Last Post: 07-31-2014, 09:36 PM
  3. Paid Market Research with G2/ GFlex owners-NYC
    By sisintl11 in forum LG G Flex
    Replies: 2
    Last Post: 05-04-2014, 09:15 AM
  4. SD Storage Question with KK
    By monicakm in forum Samsung Galaxy Note 10.1 (2014)
    Replies: 3
    Last Post: 04-30-2014, 11:19 AM
  5. Help with a case for the Note 10.1 2014 edtion
    By Lorepie in forum Samsung Galaxy Note 10.1 (2014)
    Replies: 2
    Last Post: 04-30-2014, 12:16 AM