AgroJohn951
New Member
HEY GUYS, my name is John. I am new to any Linux forums and also new to Linux. I have my mesterious hacker to thank for that. Someone installed remote access into my 4 laptops and about 4 metropcs android phones. I bought this iPhone yesterday because a sheriff ensured me they were “unhackable”.
Not to tempt any pros lol I’m sure it can be done...
So anyways, I gather that it was either specter meltdown l1tf style attack and I catch tidbits of info in the load up logs of Linux saying io with ram blah blah I don’t understand what it means and also video card with shadowed rom is in the mix.
What I wanna know is can anyone help me get this code out of my to me inaccessible cache and if so does anyone live near enough to lake Elsinore California to have me buy them a coffee or beer and educate me a bit? All laptops are hp 3 have intel chips 1 has amd and phones all have snapdragon chips.
Also all my usb sticks now contain undeletable “system volume information” folder with “WPSettings.dat” which beacons to my amigo for with current network login info so he can instantly repack any device that said usb is plugged into. I’m a total tech noob but I’m also a contractor so we could even trade work for tech help if that’s interesting to you, also I would like this @$$hole to get hacked back........
Not to tempt any pros lol I’m sure it can be done...
So anyways, I gather that it was either specter meltdown l1tf style attack and I catch tidbits of info in the load up logs of Linux saying io with ram blah blah I don’t understand what it means and also video card with shadowed rom is in the mix.
What I wanna know is can anyone help me get this code out of my to me inaccessible cache and if so does anyone live near enough to lake Elsinore California to have me buy them a coffee or beer and educate me a bit? All laptops are hp 3 have intel chips 1 has amd and phones all have snapdragon chips.
Also all my usb sticks now contain undeletable “system volume information” folder with “WPSettings.dat” which beacons to my amigo for with current network login info so he can instantly repack any device that said usb is plugged into. I’m a total tech noob but I’m also a contractor so we could even trade work for tech help if that’s interesting to you, also I would like this @$$hole to get hacked back........