Do you know there are lists of passwords that have been compiled into a master list? Yes, all those big companies, IRS, Home Depot, Credit Ratings, Lowes, and so on, all got passwords stolen and compiled into a list. This list is attached with the various hashtags used to identify your accounts. This is all saved into a Linux-based software called Kali. All the hackers are using this program to hack. They can also hide their hacking attempts by hiding off of other computers. This is known as a proxy. This might be what is on your computer, as hackers use it to hack others.
Furthermore, if you learn to create a virtual machine on your computer using a Linux system, you can use your cloned machine when you go out onto the internet. This will help to increase your privacy as you are on the internet. It is time for us to learn how to create a second OS on our computer and use that to search the web, buy our coins, or hang out on social media. Time to learn…