The $1 Wi-Fi trick blowing up online

The $1 Wi-Fi trick blowing up online

Released Wednesday, 30th April 2025
Good episode? Give it some love!
The $1 Wi-Fi trick blowing up online

The $1 Wi-Fi trick blowing up online

The $1 Wi-Fi trick blowing up online

The $1 Wi-Fi trick blowing up online

Wednesday, 30th April 2025
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

is on the rise and hackers are

0:02

getting smarter every day. From phishing scams

0:04

to ransomware attacks, criminals are

0:06

after your devices and your money. So

0:09

how do you fight back? One of

0:11

the best defenses is solid antivirus

0:13

software. Blocks suspicious websites and stops

0:15

hackers before they can do any

0:17

damage. A healthy dose of

0:19

skepticism when opening emails or clicking

0:21

links doesn't hurt either. But for

0:23

the antivirus help you need, I

0:25

trust and recommend Total AV. They

0:28

update you in real time, keeping you protected

0:30

from the latest threats. Go to

0:32

protectwithkim.com now and get Total AV

0:35

for just $19 for the first

0:37

year. It covers up to five

0:39

devices, including Windows, Macs, and smartphones.

0:41

That's protectwithkim.com. Don't wait until it's

0:44

too late. Your security matters. Get

0:46

protected now. Go to

0:48

protectwithkim.com for my exclusive deal with

0:51

Just $19 for the first year.

0:53

That's protectwithkim.com, protectwithkim.com, protectwithkim.com. Hi, Kim

0:55

Commando here. Well, first up, we

0:58

have your digital life hack. And

1:00

after that, I'm going to play

1:03

a call for my weekend national

1:05

radio show. And this time, Jane

1:07

and Dallas Oregon says her daughter's

1:10

iPhone is acting pretty strange after

1:12

leaving an abusive relationship. This is

1:14

always tough. She's frozen,

1:17

she's locked out of accounts, and even

1:19

some Pegasus spyware. It's pretty big stuff,

1:21

maybe involved. People are losing

1:23

it over a Wi -Fi trick that

1:26

involves, get this, played old aluminum foil.

1:28

A viral post on X says, stick some

1:30

foil behind your router and thank me later.

1:32

Well, it blew up. One guy said he

1:35

finally got Wi -Fi and a dead zone

1:37

in his house. Another said, this changed my

1:39

life. I'm Kim Command over Total AV,

1:41

the award -winning antivirus software for

1:44

just $19 a year right now

1:46

at ProtectWithKim.com. I've spoken about

1:48

this trick before. You fold a

1:50

sheet of foil into a curve, Crop

1:52

it behind your router's antennas, and boom,

1:55

you just built a homemade Wi -Fi

1:57

booster. It's cheap, it's fast, and surprisingly

1:59

awesome, but foil's not just for better

2:01

bars. Do you have any loose batteries? Jam

2:03

a little foil between the battery and the contact

2:06

to keep your remote working. Are

2:08

you worried about digital pickpockets? Well, wrap

2:10

your credit cards or key fob and

2:12

foil to block RFID scanners. Whether you're

2:14

boosting your Wi -Fi or blocking creeps,

2:17

aluminum foil's basically the real MVP. Start

2:19

your day with my free newsletter. up

2:22

at getkim.com. Next

2:24

up, a call for my weekend show,

2:26

the Kim Commando show. There's a growing

2:28

expense eating into your company's profits. It's

2:30

your cloud computing bill. You

2:32

may have gotten a deal to start, but

2:34

now the spend is sky high and increasing

2:37

every year. What if you could

2:39

cut your cloud bill in half? and improve

2:41

performance at the same time. Well,

2:43

if you act by May 31st, Oracle

2:45

Cloud Infrastructure can help you do just

2:48

that. OCI is the next generation cloud

2:50

designed for every workload, where you can

2:52

run any application, including any

2:54

AI projects, faster and more securely,

2:56

for less. In fact, Oracle

2:58

has a special promotion where you can cut your

3:01

cloud bill in half when you switch to OCI.

3:03

The savings are real. On average,

3:06

OCI costs 50 % less for

3:08

computing, 70 % less for storage

3:10

and 80 % less for networking.

3:12

Join today's innovative AI tech companies

3:15

who upgraded to OCI and saved.

3:17

Offer only for new U .S.

3:19

customers with a minimum financial commitment.

3:21

See if you qualify for half

3:24

off at oracle.com/chem. That's

3:26

oracle.com/chem. Oh, remember

3:29

the internet's good old days. when it was

3:31

a place where you could be free. Unfortunately,

3:34

now we go online knowing we

3:36

are being tracked. Our internet

3:38

providers can see our entire browsing history.

3:41

And here in the United States, they're

3:43

legally allowed to sell it. That's why

3:45

I use ExpressVPN. It's a

3:47

virtual private network that reroutes 100 %

3:50

of my online activity through

3:52

secure encrypted servers, shielding it

3:54

from prying eyes of my

3:56

ISP and other third parties.

3:58

It hides my IP address, the number

4:00

for identifying me online, so I can't

4:02

be tracked. My online history is actually

4:05

mine again. It's so easy to use

4:07

that your entire family can figure it

4:09

out with just one tap. ExpressVPN

4:11

works on all your devices, up to

4:13

eight devices at once. Let's

4:15

return to the good old

4:17

days of online privacy and

4:20

freedom. Get up to four

4:22

extra months of ExpressVPN for

4:24

free at expressvpn.com/kim. That's

4:27

expressvpn.com/kim. Enjoy. Jane

4:30

in Dallas, Texas. Hi there, Jane.

4:33

Hey, it's Dallas, Oregon. Okay.

4:36

Let me try again. I only

4:38

saw Dallas. That was my fault, Jane.

4:42

Jane in Dallas, Oregon. Hi there,

4:45

Jane. Where is Dallas, Oregon? Dallas,

4:48

Oregon is just south of

4:50

Salem for 45 minutes from

4:52

the coast, which we just

4:54

love going to. But

4:56

we listen to sign Arizona initially. So

4:59

I have been listening to you since

5:01

forever in a day, way before Ian

5:03

was born too, I think. And

5:07

I so appreciate how your

5:09

knowledge has expanded as technology

5:11

has expanded. I think initially

5:14

you just gave all kinds

5:16

of tips and hints. Now

5:19

you can help me with something

5:22

much more technical and scary like

5:24

my daughter's phone being cloned. Oh

5:27

What's going on? Well,

5:29

she was in a somewhat

5:32

abuse moment somewhat of very

5:34

abusive stalking type of relationship

5:37

with a gentleman who unfortunately

5:39

passed in this May and

5:42

she is trying to rid

5:44

herself of all aspects

5:46

of that relationship. And she really does

5:49

feel like her phone has been cloned

5:51

that he was the responsible party. She's

5:53

got an Apple iPhone 12 mini.

5:57

And the reason I'm calling

6:00

is because this is so

6:02

emotional to her. She gets

6:04

so agitated and everything. So

6:07

I'm trying to... Oh, you know

6:09

what? And you're a mom, okay?

6:12

Yes. Mama Bear is here. Watch

6:14

out. Yeah, so the

6:17

thing she reports that she

6:19

feels are very suspicious is

6:22

it frequently freezes and the

6:24

battery dies down really quickly.

6:28

And she repeatedly gets locked out of

6:30

her email account. She's had to change

6:32

her email account. She

6:35

got subscribed to various YouTube

6:37

stations that she never did.

6:39

She found Pegasus was added

6:41

to her phone. her

6:44

password would get changed without her

6:46

knowledge. And she

6:49

was just up here visiting from

6:51

Tucson last week, and her son

6:53

has an iPhone also. And she

6:55

noticed that the location of her

6:58

phone always showed Tucson, but

7:00

her son's iPhone would show the

7:02

location of where they actually were,

7:04

probably for the cell towers. And

7:08

she didn't that. Now, has

7:10

any of this stopped since the guy

7:12

died months ago? Well,

7:17

to be honest, I didn't really

7:19

ask her that question. She just

7:21

feels like things are still being

7:23

a little still there suspicious. Well,

7:27

and you mentioned Pegasus.

7:29

Wow. That's something. Yeah.

7:33

All right. There's a lot

7:35

going on here. OK.

7:37

Yeah. It's definitely sounds like

7:40

her phone has been cloned. Who

7:42

knows? with him passing who has

7:45

possession to that phone and his

7:47

laptop computers, whatever it may be,

7:50

what he has access to, what he used

7:53

to have access to, that maybe somebody else

7:55

has access to, up to

7:57

including, you know, getting into her

7:59

router and then seeing everything that's

8:02

on her network and controlling it

8:04

from that side. So

8:06

anytime something like this happens, especially in

8:08

a in a, like you

8:10

said, a controlling relationship, domestic violence, whatever

8:12

it may be, is that's

8:15

where you have to truly sever all

8:17

ties, okay? What that

8:19

means is, like you mentioned Pegasus, well,

8:21

you know, there is a tool that

8:23

she can use to detect if Pegasus

8:26

is actually on her phone and it's

8:28

put out by Amnesty International, and

8:30

we can give you a link to

8:32

that, but that's just one little crumb.

8:34

That's all we're talking about, right? So

8:37

what I would recommend, especially because now

8:40

you mentioned you have a grandson, she

8:42

has a son, we want to make

8:44

sure that his safety is paramount. At

8:47

her house, I would recommend that

8:50

she do a complete factory reset

8:52

on anything that's digital, meaning let's

8:54

start at the router because he

8:57

may have enabled remote access into

8:59

the router that would give him

9:02

access to everything on the network.

9:06

And then whatever passwords that she

9:09

has open her browser and then

9:11

she can look at every account

9:13

on her iPhone or on her

9:15

Mac, whatever it may be. And

9:17

then she can see wherever she had accounts

9:20

and then she needs to, I would even

9:22

delete every account that was there rather than

9:24

just changing the password, I would delete it.

9:26

And I know you said she had to

9:29

get email addresses multiple times. Well, this is

9:31

gonna be yet another time. Lock

9:33

down her phone, also put a security

9:36

pin on her phone that requires a

9:38

four digit from her directly, not through

9:40

text message or through an authenticator app

9:43

that will be on her phone so

9:45

that this way she knows her phone

9:47

is completely locked down. I mean, there's

9:49

a lot of steps here, a lot

9:52

of steps. And

9:55

doing factory resets on

9:57

anything that she can

9:59

do. and

10:03

replace the SIM card in her

10:05

phone, I would probably get

10:07

a new, I would probably, you know what I

10:09

would do? I would reset the router, I would

10:11

get rid of every account that I had, get

10:14

a new phone number, and just start

10:16

with a whole clean slate. That's what

10:18

I would do. Oh, okay.

10:22

And then I would do it with the kid too. Okay.

10:26

I'd say this is just the way that it is.

10:28

Sorry, I know you like your, your

10:31

Snapchat avatar handle, whatever it may

10:33

be, and Instagram, but our

10:35

safety is paramount because you don't know

10:37

where that phone is or who has

10:39

access to it. But the fact that

10:41

she's in Oregon and it still says

10:43

she's in Tucson, there's some

10:45

monkey business going on. If

10:47

you want me to talk, I'm happy to talk

10:49

to your daughter too, by the way. I know

10:52

you said she gets upset and agitated, but if

10:54

at any point along the way where you're like,

10:56

why don't you talk to Kim? Jane, I'm here

10:58

for you. Okay, I appreciate that. Okay,

11:01

so start there and if there's

11:03

anything that you want to talk

11:05

about further, you want me to

11:07

talk about with her, we also

11:09

have some tips on the website.

11:11

Just search for the word divorce

11:13

or you can also search for

11:15

domestic violence because we've got a

11:17

lot of resources there to help

11:19

kind of break those tech connections

11:21

because they're far and deep and

11:23

especially when somebody's safety is concerned,

11:25

we want to make sure that

11:27

everything is taken care of. Once

11:30

again, Jane, just want to reiterate, I'm here for

11:32

you and your entire family always. What

11:48

does the future hold for business?

11:50

Ask nine experts and you'll get

11:52

10 answers. Rates rising or falling,

11:54

inflation being up or down. Can

11:57

someone please invent a crystal ball? Until

12:00

then, over 41 ,000 businesses

12:02

have future -proofed their business with

12:04

NetSuite by Oracle. The

12:06

number one cloud bringing accounting,

12:08

financial management and HR

12:10

all into one fluid platform.

12:13

With one unified business management suite, there's

12:15

one source of truth, giving you

12:17

the visibility control you need to make

12:19

quick decisions. giving you the visibility control you need to make

12:21

quick decisions. With real-time insights

12:24

and forecasting, you're appearing into

12:26

the future with actionable data.

12:28

When you're closing the books

12:31

and days, not weeks, you're

12:33

spending less time looking backward

12:35

and more time on what's

12:38

next. And speaking of opportunity,

12:40

you can now download the

12:42

CFO's guide to AI machine

12:45

learning at netsweet.com/Kim.

12:46

cam.

Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features