The hardwares functional requirements may be the same which explains the high level permission requirements but presents a real issue for laymen not understanding the apparent risks or lack of. Recording the screen and displaying video from a recording device has a huge discrepancy. may be a neighbor prying or something ? I do appreciate the answers and direction a lot so I’ll ask just one more and if I get an answer it will most likely be the most important ! Where can a 40 yr old average technical ability person learn about the actual workings of our digital world ? Like languages terms and knowing what’s actually possible and can and does happen? Hope you have a good day everyone!Īgreed, I think Android (Google) (assuming it's Android in the OPs issue) should resolve this in the OS. I have malware bytes and use it, I don’t know anyone contact wise “sh” but it also occurred to me I have a problem with someone hopping on my iPhones hot spot. I don’t know what I’m looking at and an activty monitor screen can be a dangerous thing to a person in a panic with all the Nefarious sounding words like daemon, syslogd ,spindump,trustd,sysextd,ath.so that’s a AMPDevicesagent.these things are most likely normal but why do half of them end in “d” user root means? UHG. To further explain the screen recording incident ,I sat down at my iMac and when I logged in immediately a message said “sh” Is asking to record your screen I said no and while I’ve had weird stuff happen I was never concerned now I am looking back at all the odd things and like a hypochondriac on web MD I started looking at hacking stories and seeing the worst case scenario. ![]() Wow so thank you what a response ! I do appreciate it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |