Bitch Slapped By Facebook. – Your Account is Temporarily Locked

This is my experience dealing with getting stuck in a never ending loop of being locked out of my account…resetting my password, submitting ID to Facebook and then immediately getting locked out again./ Repeat loop…if I ever get it sorted out I will update this video on how the problem was fixed. Facebook has some SERIOUS problems in their software for detecting when an account is hacked, and when a person is simply using a VPN like Private Internet Access ( for their own internet privacy and protection.

Your Account is Temporarily Locked

We’ve detected suspicious activity on your Facebook account and have temporarily locked it as a security precaution.
It’s likely that your account was compromised as a result of entering your password on a website designed to look like Facebook. This type of attack is known as phishing. Learn more in the Help Center.
Over the next few steps we’ll walk you through a security check to help secure your account, and let you log back in.



We locked your account because it might be compromised. Here’s how you can get back in:

1. Try logging into your account and completing the recovery steps from a computer or mobile phone that you normally use to access Facebook. You can start the recovery process here:

2. If your account is still locked, please wait while we review your ID.

We won’t be able to take any action on this account without a copy of your photo ID. If you haven’t sent us a copy of your ID, please reply to this email and attach a picture it.

See the different kinds of IDs we accept in the Help Center:

Please note that, for privacy reasons, this account will remain hidden on Facebook while it’s locked.

The Facebook Team

Thanks for confirming your identity. To finish the account recovery process, click here:

Alternatively, you can log in at and use the following code as your password:

The unlock link and code will expire on:

If you’ve created another account, note that it’s not possible to merge accounts or maintain multiple accounts. You can learn more about deleting additional accounts in the Help Center:



After reviewing your ID, please note that we may have updated your account with your real name and date of birth according to our policies.
Please open the following link to change your password:

We take the security of your account very seriously. Here are 6 things you should do to keep your information safe:

1. Pick a strong password
2. Secure your email account(s)
3. Log out when you use a shared computer
4. Run anti-virus software on your computer
5. Use our extra security features
6. Think before you click or download anything

You can see your account security rating and start making your account more secure here:

To learn more about protecting your account, visit:


Community Operations

Your Account is Temporarily Locked

This message is no longer available because it was identified as abusive or marked as spam.

This message has been temporarily removed until we can verify the sender’s account.

This action came from the same device you are using now:

You may need to pass a security challenge, create a new password, and update your account before you can log in.
This Was Me This was someone else

Are you sure this email is secure?
Please confirm that this email address is secure. If You’re not sure, you should change the email password now

Anyone who knows the password for @ may be able to log into your Facebook account. To keep your Facebook account secure we reccomend changing the password on your email address

Only I know the password for

Operating System
This message was sent to at your request.
Facebook, Inc., Attention: Department 415, PO Box 10005, Palo Alto, CA 94303

Please confirm your identity

Please complete the security check by entering the text shown in the box

To confirm your identity, please answer your security question.

In what city or town was your mother born?


Facebook Account Locked Bitch Slapped By Facebook Security Compromised Phishing Suspicious Login Security Check Attack SEO SEM GOOGLE search engine optimization Recover facebook account Blackhat Hacked Confirming Account Government ID email help center privacy The Facebook Team account recovery process Accout recovery Multiple accounts phishing sites phished youtube messenger google+ Hidden Privacy VPN Private Internet Access Multiple IP’s Proxy server Blackhat SEO Online Casino Account recovery process Copy Log in Login password Change facebook phone number 1-800- not gonna happen.

Fix it Facebook….

Read More

Remove Security Protection in 4 Easy Steps If your computer has been infected with Security Protection, then use these easy to follow instructions to remove Security Protection.

Read More

Remove Security Protection in 4 Easy Steps If your computer has been infected with Security Protection, then use these easy to follow instructions to remove Security Protection.

How to remove Security Protection. Learn how to remove Security Protection and finally restore your computer. Security Protection removal instructions.

Security Protection removal, Remove Security Protection, Delete Security Protection, Uninstall Security Protection, How to get rid of Security Protection, How to remove Security Protection

Read More



Read More


NSA AGENTS who specialize in SECRET BACK DOORS FOR SPYING ON YOU are able to keep an eye on all levels of our digital lives. THE NSA ILLEGAL GOVT HACKERS SPY ON computing centers to individual computers, and from laptops to mobile phones. UNLOCKING ANY AND ALL PHONES AND COMPUTERS AND LABTOPS. FOR EVERY SECURED COMPUTER OR NETWORK the ANT seems to have a key in its toolbox TO OPEN AND GAIN INSTANT ACCESS TO EVERYONE. And no matter what walls companies erect, the NSA’s specialists seem already to have gotten past them.
THE NSA 50-page CATAOLOG HAS A list that reads like a mail-order catalog. ALL NSA employees can order technologies from the ANT division for tapping their targets’ data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to 0,000. In the case of Juniper, the name of this particular digital lock pick is “FEEDTROUGH.” This NSA MALWARE burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive “across reboots and software upgrades.” In this way, US GOVERNMENT SPIES can SECURE and PLANT themselves a permanent presence in ANY computer networks. The catalog states that FEEDTROUGH “has been deployed on many target platforms.”
NSA SPECIALISTS at ANT which stands for Advanced or Access Network Technology, ARE GOVT EMPLOYED MASTER HACKERS for the NSA’s department for Tailored Access Operations (TAO). In cases where TAO’s usual hacking and data-skimming methods don’t suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such “IMPLANTS,” as they are referred to in NSA parlance, have played a considerable role in the intelligence agency’s ability to establish a global covert network that operates alongside the Internet.


Read More

Cybersecurity can be improved for free

A computer expert offers quick, free and simple steps for protecting your technology. Marc Stewart reports.

The Denver Channel, 7News, brings you the latest trusted news and information for Denver, Colorado, Mile High and the Rocky Mountains.

Our mission is to provide useful, interesting news and updates on breaking news to people in the Denver metro area, all across our beautiful state of Colorado and all over the world.

For more download the 7News mobile app:


Read More

Protecting your identity: Steps you can take to prevent theft

Globally, cybercrime costs hundreds of billions of dollars each year and it comes in many forms, from computer hacking to phishing scams. It is one of the biggest challenges facing federal and state authorities.

Read More

Protecting your computer.

The newest video from Techmech on How to help protect your computer, now in 5 easy steps!
WARNING: I do not accept responsibility of your device being damaged from downloading any software onto it, but as long as it’s a trusted site you shouldn’t have to worry about it.
Be careful when changing your password regularly, as you may forget it!
Music obtained from:

Read More

How to keep a computer running properly in 14 steps

How to keep a windows 8 or 8.1 computer running properly in 14 steps!

These steps are for the non-techie minded PC users
but for the more advanced users among ye!
A few things that you’re probably not aware of !

So basically anyone should be well capable of using them
to keep their computer running correctly!
These are the only steps you will ever need to keep
a PC running correctly and save you money by not having to
buy poor at best software for implementing a maintenance plan.
and when you do have a problem built into these 14 steps
is a fix for that issue whither it’s hardware or software problem.
And all common problems users encounter with there computers

Now as a computer technician these are the 14 steps i use to sort
out most computer problems.

Step 1
Remove software programs & app’s you do
not use!
This will free up hard drive space,
resources and services!

Step 2
Cleaning start-up
Removing programs from the start-up

Step 3
Cleaning up your drive {disk cleanup}
You must run everyday.
Efficiency and maintains speed.

Step 4
To set it up correctly takes 2 min
runs on autopilot keeping files and folders tidy
will maintain fast and efficient data searching.

Step 5
Leaving 15 % of free space on your drive!
This step is extremely important!
Drives full to capacity will cripple a PC.

Step 6
setup time 5 min and
runs on autopilot. The most over
Looked and misunderstood area of a PC.

Step 7
Malware/Spyware Protection
setup time 5 min

Step 8
Windows Updates
setup takes 2 min runs on autopilot
helps keep your computer more secure
and reliable.

Step 9
Hardware Driver Updates
Checking and updating takes 2 min.
Check once every 3-6 months.

Step 10
Memory Levels
checking takes 5 min. It’s simple
but very important to make sure you
have enough memory!

Step 11
Backing up your data
Setup time 5 min runs on autopilot
again there is a lot of confusion
and false info about how to
backing up your precious data.

Step 12
Making a System Image
set up 5 min. This is the most important
part. Every computer owner should
make a system image or a clone
of there drive this will recover your
computer from every kind of problem or
disasters large or small.

Refreshing Operating System
Every 12 months
Keeps the operating system from getting corrupted
also removes viruses, damage program on so on…

Step 14
Replacing Parts
Hardware Replacement Plan
saves money and keeps you PC up-to-date
If you do not follow this step your computer
will fail!

There’s no learning curve to
this System you either apply it and have
complete control over your computer,
Or you do not and it will slow down,
start giving trouble, eventually
loose everything and your computer will fail!
It’s completely up to you…

Read More