So, like everyone else, I would really, really like to put this nasty hacking crap behind us. Unfortunately, it does take time to find the likely culprits, whether individuals, or what they used. I am making progress, but please understand I’m reading these things line by line by line
Who said I was mad? Sure, I’m peeved about the persistence. But, there are ways to find out how they do they things, which is what I’ve been spending time ferreting out. That’s actually the thing, finding out, HOW exactly they were doing what they did, so we can guard against it. I can tell you it was a brute force hack. I can see that in the logs.