Quote:
Originally Posted by dhays
As for passwords, I try to use different passwords and try to makes them good ones. Over the last year I have been using a system similar to that described by a TF member last year that makes for a strong PW yet is pretty easy to recall if needed.
|
I believe that would be the system I described awhile ago that works well for me. If anybody wants me to reiterate it, happy to do so.
One final word on scams like this. If someone truly has gained access to your computer, they aren't going to ask for some piddling amount of a few hundred$, especially if they think it is a business system. They'll simply encrypt your drive and ask for a few thousand$, up to 100s of thousands$ if they know they've accessed a large, mission critical, system. So, the size of the demand is also a tip off as to the likelihood it is real.