Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Normal
I was going to post this .... you beat me to it. Never run in the admin account. During my military days we were tasked to do pen testing and our favorite thing was to find all the local admin accounts for select machines (machine that admins liked to log in to) break into the machine and wait for an network admin to log in and steal the network token. We could then masquerade as that admin all over the network. If you have Vista or Windows 7 log in as a regular user and then use the run as administrator --- Windows 7 allow you run as any user but not Vista. Thing two...... run a router with a firewall or make a Linux box as a firewall and router with the ability to NAT. Most routers allow this. This will only expose the routers IP.None of these things are 100%. If a hacker decides to target you and you're connected .....it's only a matter of time. The only good thing is most hackers run tools to find the weak. But this is old hat. Hackers use to store their contraband in company/government computers ......now that regular people have massive storage capabilities they have become a target for this too.
I was going to post this .... you beat me to it. Never run in the admin account. During my military days we were tasked to do pen testing and our favorite thing was to find all the local admin accounts for select machines (machine that admins liked to log in to) break into the machine and wait for an network admin to log in and steal the network token. We could then masquerade as that admin all over the network. If you have Vista or Windows 7 log in as a regular user and then use the run as administrator --- Windows 7 allow you run as any user but not Vista.
Thing two...... run a router with a firewall or make a Linux box as a firewall and router with the ability to NAT. Most routers allow this. This will only expose the routers IP.
None of these things are 100%. If a hacker decides to target you and you're connected .....it's only a matter of time. The only good thing is most hackers run tools to find the weak. But this is old hat. Hackers use to store their contraband in company/government computers ......now that regular people have massive storage capabilities they have become a target for this too.