HOW TO FRUSTRATE A HACKER

A person "uses" a computer or computer network when he attempts to cause or causes a computer or computer network to perform or to stop performing computer operations.

A person is "without authority" when he knows or reasonably should know that he has no right or permission or knowingly acts in a manner exceeding such right or permission.

(1984, c. 751; 1999, cc. 886, 904, 905; 2000, c. 627; 2003, cc. 987, 1016; 2005, cc. 761, 812, 827.)

§ 18.2-152.3. Computer fraud; penalty.

Any person who uses a computer or computer network, without authority and:

1. Obtains property or services by false pretenses;

2. Embezzles or commits larceny; or

3. Converts the property of another;

is guilty of the crime of computer fraud.

If the value of the property or services obtained is $200 or more, the crime of computer fraud shall be punishable as a Class 5 felony. Where the value of the property or services obtained is less than $200, the crime of computer fraud shall be punishable as a Class 1 misdemeanor.

(1984, c. 751; 1985, c. 322; 2003, cc. 987, 1016; 2005, cc. 747, 761, 827, 837.)


B. The crime of computer invasion of privacy shall be punishable as a Class 1 misdemeanor.

C. Any person who violates this section after having been previously convicted of a violation of this section or any substantially similar laws of any other state or of the United States is guilty of a Class 6 felony.

D. Any person who violates this section and sells or distributes such information to another is guilty of a Class 6 felony.

E. Any person who violates this section and uses such information in the commission of another crime is guilty of a Class 6 felony.

F. This section shall not apply to any person collecting information that is reasonably needed to (i) protect the security of a computer, computer service, or computer business, or to facilitate diagnostics or repair in connection with such computer, computer service, or computer business or (ii) determine whether the computer user is licensed or authorized to use specific computer software or a specific computer service.

(1984, c. 751; 1985, c. 398; 2001, c. 358; 2005, cc. 747, 761, 827, 837.)

§ 18.2-152.5:1. Using a computer to gather identifying information; penalties.




1. Get or download free cleaning software
2. If you have wifi don't stay online more than
10 minutes at a time, after you sign off clean
your pc with your cleaning software and use
your command prompt and chkdsk for pc errors
Computers differ on using chkdsk
3. Their tactic's on facebook are simple,
they get your url of your facebook page.
they ping the page to get your source IP
than they ping your IP to get an open
port and than they download a virus
of their choice to invade your PC
This is time consuming so eliminate
their time FRUSTRATE THEM KEY
4. Every time you are about to turn your PC
on go into safe mode and clean your pc
5. Use a port monitoring software to catch
them in the act, and for evidence purposes.
6. I use Private Firewall 7.0
And use the port logs for evidence purposes.
tangible and very accurate to stand as evidence.
Date and time of invasion, ip address to help
law enforcement get the source ip of the hacker.
with this evidence and these simple tactics
WE CAN START PUTTING THESE PESTS
IN THEIR PLACE, FINES, PRISON, PROFILES
FOR AWARENESS CAN STOP ALOT OF THIS
ONLINE TERROR WE HAVE TO FACE.
there is no law protecting hackers,
you are free to set up your own stings
to bait them and gather evidence on them.
Do the crime gotta do the time<<<<<<<<<<<

FIGHT BACK
Post Comment

Comments (6)

Goatee,
Does proprietary software or free ware like Microsoft's security essentials check for open ports?
Why the ten minute timeline on a wi-fi? I believe you just curious.
You have gone from preaching religion to preaching protection. Good to see that you have diversity!
Thanks for the tips
@virgosingle

the best comment!!!cheering applause head banger banana thumbs up
Ummm we want our cake and eat it to, I think if someone wants a safe online experience they should be able to.
((((((hackers are pests)))))))))))))))
Post Comment - Let others know what you think about this Blog.