How to save your PC, tablet and\or mobile phone during Cyber-war\E-warfair

The 16 golden rules

 * 1) Always use a password login!
 * 2) Always cover the webcam in a dark bag when not in use in case some one has hacked it and is peeping at you with out your connect!
 * 3) Never tell anyone your password or pin-numbers!
 * 4) Never issue your password or pin-numbers on line except for stuff like site log-in boxes if you are logged out of your account on arrival!
 * 5) Regularly change your password or pin-numbers!
 * 6) Always use a security system like MacAffey, AVG, Microsoft or F-secure!
 * 7) Always back your data up on a memory stick to avoid any loss of stored data!
 * 8) Never visit dodgy, pornographic, terrorist condoning or straight out illegal sites!
 * 9) Always store valuable stuff like CVs and legal documents on a CD or memory stick so no one can tamper with it when your not working on it!
 * 10) Regularly delete your browser history.
 * 11) Never open spam e-mails from people or organizations you have not subscribed to.
 * 12) Never use Chinese or Hong Kong made and\or programmed web-cams, they have a special command code in and can spy on you when in use.
 * 13) Try to use use Portuguese, Dutch or Irish made and\or programmed web-cams, because they (so far) can't spy on you when in use.
 * 14) Turn off the internet in your building at the rooter if things go crazy and engage your computer's security scan and disk cleaning system.
 * 15) Reboot it with the system's restore disk if it crashes too often.
 * 16) Avoid N. Korean web sites.

The attackers plan
A Cyber-attack is any type of offensive maneuver employed by nation-states, individuals, groups, or organizations that targets computer information systems.

They try to take over online devices and either hack, zombiefyed or other wise take them over. Zombiefyed stuff can also be used to spew erroneous messages on line to swamp out and collapse sites and ISPs.

The October 2016 denile of service (DDOS) attack was directed against a major internet host: New Hampshire-based Dyn Inc. badly disrupting traffic to and from major internet services including Twitter, Spotify and Amazon.

Nomx's older 'Absolute security' server boxes
They are crappy for 3 reasons:
 * 1) Older models have poor physical integrity and poor durability.
 * 2) Older models use second rate programming that can be easily hacked.
 * 3) Older models may not work because it uses port 26, not port 25 for e-mailing.

Search engines, web browsers and state hacking
.

National modus operandi

 * 1) Russia- destroy all on-line stuff
 * 2) USA- destroy military and corporate on-line stuff.
 * 3) Israel- Specific targets such as a airbase or factory.
 * 4) Germany- Specific targets such as a airbase or factory.
 * 5) Mexico- Specific targets such as a airbase or factory.
 * 6) Canada- Specific targets such as a airbase or factory.
 * 7) Australia- Specific targets such as a airbase or factory.
 * 8) N.Z.- Specific targets such as a airbase or factory.
 * 9) Ukraine- Specific targets such as a airbase or factory.
 * 10) Iran- Specific targets such as a airbase or factory.
 * 11) Turkey- Specific targets such as a airbase or factory.
 * 12) UK- Specific targets such as a airbase or factory and spying in general.
 * 13) France- Specific targets such as a airbase or factory and spying in general.
 * 14) Italy- Specific targets such as a airbase or factory and spying in general.
 * 15) China- paralyses all of E-space with ddos attacks and steels corporate secrets. Theory holds that all that a Chines and Hong Kong web-cam sees, when swiched on, also gose to the Chinese secret service to be drained of any corporate secrets it films!
 * 16) Organised crime- Ransomwere, steeling data, virusing, DDOS attacks, zombifying computers, locking computers, destroying computers and finding stuff to use for blackmailing.

Handy web sites

 * 1) https://www.yahoo.com/tech/cyberattack-major-cyber-attacks-over-past-10-years-154337949.html
 * 2) https://home.mcafee.com/virusinfo/global-virus-map?ctst=1
 * 3) https://cybermap.kaspersky.com/
 * 4) https://threatmap.checkpoint.com/ThreatPortal/livemap.html
 * 5) http://cyberattack.news/
 * 6) https://cybermap.kaspersky.com/
 * 7) http://gizmodo.com/todays-brutal-ddos-attack-is-the-beginning-of-a-bleak-f-1788071976
 * 8) https://jigsaw.google.com/projects/
 * 9) http://www.digitalattackmap.com/
 * 10) http://map.norsecorp.com/
 * 11) https://www.fireeye.com/cyber-map/threat-map.html
 * 12) https://jigsaw.google.com/projects/
 * 13) http://map.norsecorp.com/#/
 * 14) https://whois.icann.org/en
 * 15) https://www.tenbestvpns.com/category/vpn-ip-changer?utm_source=bing&utm_medium=cpc&utm_campaign=English%20-%20Old&utm_term=change%20my%20ip%20address&utm_content=IP%20Changer
 * 16) http://map.norsecorp.com/#/
 * 17) https://whatismyipaddress.com/
 * 18) http://whatismyipaddress.com/ip-lookup
 * 19) http://whatismyipaddress.com/trace-email
 * 20) http://whatismyipaddress.com/hide-ip
 * 21) http://whatismyipaddress.com/learning
 * 22) http://whatismyipaddress.com/vpn-comparison
 * 23) http://whatismyipaddress.com/blacklist-check
 * 24) http://whatismyipaddress.com/speed-test
 * 25) http://whatismyipaddress.com/ip-tools
 * 26) http://whatismyipaddress.com/ip-tools
 * 27) https://www.techopedia.com/definition/24748/cyberattack
 * 28) https://www2.fireeye.com/PPC-security-predictions-for-2016-threat-research.html?utm_source=google&utm_medium=Security_Predictions_2016&utm_keyword=cyberattacks&utm_campaign=General
 * 29) https://cybermap.kaspersky.com/
 * 30) https://threatmap.checkpoint.com/ThreatPortal/livemap.html
 * 31) http://cyberattack.news/
 * 32) https://en.wikipedia.org/wiki/Control-Alt-Delete
 * 33) https://www.techwalla.com/articles/how-do-i-delete-my-browser-history
 * 34) http://www.pcworld.com/article/246049/how_to_delete_your_browser_history.html
 * 35) http://mentalfloss.com/article/51674/history-ctrl-alt-delete
 * 36) https://twitter.com/DCon_AltHistory
 * 37) https://myactivity.google.com/myactivity
 * 38) http://www.pcworld.com/article/246049/how_to_delete_your_browser_history.html
 * 39) http://www.reuters.com/article/us-usa-cyber-idUSKCN12L1ME
 * 40) http://www4.looksmart.com/search.php?q=cyber%20attacks&sss=ya&look=L7&dev=c
 * 41) http://europe.newsweek.com/real-time-cyber-attack-map-shows-scope-global-cyber-war-330194?rm=eu
 * 42) https://cybermap.kaspersky.com/
 * 43) https://threatmap.checkpoint.com/ThreatPortal/livemap.html
 * 44) http://cyberattack.news/
 * 45) https://www.gov.uk/report-suspicious-emails-websites-phishing
 * 46) http://www.tomsguide.com/forum/id-1626608/wont-recognise-tablet-usb-cable.html
 * 47) http://forums.androidcentral.com/general-help-how/287820-pc-doesn-t-recognize-tablet-through-usb.html
 * 48) http://www.makeuseof.com/answers/why-does-my-pc-not-recognize-my-android-tablet/
 * 49) http://uk.mcafeestore.com/?cmpid=ppc-bing&mtu_campaign=ppcbrat31ppc20160607v3
 * 50) https://campaigns.f-secure.com/safe/sem/en_UK/s/?ecid=&adcid=
 * 51) https://antivirus-uk.thetop10sites.com/best_antivirus_for_mac.html?matchtype=b&keyword=best%20internet%20security%20for%20mac&adposition=
 * 52) https://en.wikipedia.org/wiki/Cyberwarfare
 * 53) https://en.wikipedia.org/wiki/Cyber-attack
 * 54) http://www.consumeradviser.net/best/?y=broadband-deals&utm_source=taboola&utm_medium=referral&3id=1757002&pbid=msn-edgedefaulthomepage-uk
 * 55) https://en.wikipedia.org/wiki/Mirai_(malware)
 * 56) http://www.theverge.com/2016/10/21/13362354/dyn-dns-ddos-attack-cause-outage-status-explained
 * 57) https://www.akamai.com/uk/en/
 * 58) https://krebsonsecurity.com/2016/10/ddos-on-dyn-impacts-twitter-spotify-reddit/
 * 59) http://dyn.com/
 * 60) https://help.dyn.com/
 * 61) https://en.wikipedia.org/wiki/Akamai_Technologies
 * 62) https://www.helpnetsecurity.com/2016/01/29/the-history-of-cyber-attacks-from-ancient-to-modern/
 * 63) https://cybermap.kaspersky.com/
 * 64) https://threatmap.checkpoint.com/ThreatPortal/livemap.html
 * 65) http://cyberattack.news/
 * 66) http://www.dictionary.com/browse/cyberattack
 * 67) https://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history#2016
 * 68) http://www.arnnet.com.au/slideshow/341113/top-10-most-notorious-cyber-attacks-history/
 * 69) http://www.nytimes.com/interactive/2015/02/05/technology/recent-cyberattacks.html?_r=0
 * 70) http://www.telegraph.co.uk/news/worldnews/asia/japan/8775632/A-history-of-major-cyber-attacks.html
 * 71) http://www.securityweek.com/how-logging-starbucks-can-compromise-your-corporate-security
 * 72) https://cybermap.kaspersky.com/
 * 73) https://threatmap.checkpoint.com/ThreatPortal/livemap.html
 * 74) http://cyberattack.news/

Also see

 * 1) Science
 * 2) Help desk
 * 3) Codeine addiction help
 * 4) Global cyber-warfare index
 * 5) How to tell your election was rigged!?