I'm not saying it's easy.. But my dad work for a software company that i'm not allowed to name apparently and i asked him and he laughed and said that on a daily basis he gets anywhere from 90'000 to 113'000 threats and the computer blocks them all as they come..
No clue what he's using or how it works as i work in the oil field and my knowledge about computer software isn't that extensive.. However it seems pretty straight forward..
Proxy or not.. a ip that hacks appears and gets deleted and archived.. another appears and gets deleted and archived and so on and so forth.
No clue what he's using or how it works as i work in the oil field and my knowledge about computer software isn't that extensive.. However it seems pretty straight forward..
Proxy or not.. a ip that hacks appears and gets deleted and archived.. another appears and gets deleted and archived and so on and so forth.