The Facebook or Twitter post below: "Do Not Accept A Friend Request From A Christopher Davies and Jessica Davies," is another hoax created by pranksters. It claims that both Christopher Davies and Jessica Davies are hackers and both can hack your computer, if they can obtain your computer's ID and address. And, they (the hackers) can obtain your computer's ID and address if you or one of your friends accept a friend request from them.
The "Do Not Accept Friend Request from a Christopher and Jessica Davies" Hoax
DO NOT ACCEPT A FRIEND REQUEST FROM CHRISTOPHER DAVIES OR JESSICA DAVIES THEY ARE HACKERS....PLEASE TELL EVERYONE ON YOUR LIST BECAUSE IF SOMEONE ON YOUR LIST ADDS THEM THEY WILL BE ON YOUR LIST TOO....HE WILL FIGURE OUT YOUR COMPUTER IP AND ADDRESS...SO PLEASE COPY AND PASTE THIS MESSAGE TO EVERYONE, EVEN IF YOU DON......T ......CARE FOR THEM , CAUSE IF HE HACKS THEM , HE HACKS YOU
Obviously, the person who started the hoax does not know much about computer hacking, nothing about computer hacking, or did this for the fun of it.
Currently, it is not possible to obtain your computer's ID and address by accepting a Facebook friend request. The computer ID and address the hoax is referring to is your computer name and Internet Protocol (IP) address.
An IP address is a number that is assigned to every computer or device that goes on the internet. This number is used to locate a computer or device on the internet, so other computers or devices can connect to it. It is like a telephone number. Every connected telephone has a number, so if you need to reach someone on his/her telephone; you just dial that person’s number.
Do not share, "like", comment on the Facebook hoax and if it is posted on your Facebook Wall or Timeline, use the Facebook "Report Story or Spam" option to report it to Facebook to help stop the hoax from spreading to other users.
Here are some very simple ways your computer can be hacked:
- clicking on a link in a Facebook post, a Tweet (Twitter), an email message, or elsewhere, that takes you to a malicious website
- downloading pirated or cracked software online embed with malware like spyware, Trojan horse or Key logger
- using weak or easily guessed passwords
- opening a malicious email attachment that contains a virus, Trojan horse or other malware
- downloading bogus antivirus software
- downloading fake software updates
- allowing an unknown person to access your computer remotely via a remote desktop software
- not updating your operating system and web browsers
- browsing the internet without antivirus software installed
- browsing the internet without a firewall software
- connecting your computer to an unsecured Wi-Fi connection at places like a coffee shop, hotel or other Wi-Fi hotspots
- not protecting your Wi-Fi (wireless) connection with a password
- allowing the "Auto Run" or AutoPlay feature in Windows, which opens a default program (could be a virus), when a flash/thumb drive is inserted into one of your USB ports
- allow a stranger to use your computer without monitoring him/her
- installing a malicious Facebook application
- entering your user names and passwords on a fake or phishing website
- giving your user name and password to someone who request it via email or telephone