Results 1 to 22 of 22
  1. #1
    Sicilian30's Avatar
    Sicilian30 is offline Respected Member
    Join Date
    Sep 2001
    Location
    There is no place like ho
    Posts
    3,688

    Internet safety (Please read)

    Alright guys, I have been wanting to post this thread for some time, and I got brave .. so here goes.
    Some safety precautions that you may find that will help you protect yourself on the Internet.
    Now by no means what I say in this thread are to be taken in any aspect that I am a dealer or participate in any sort of illegal activity, because I do not practice in such matters. However, I do read a lot, and knowing what I know, and seeing what I see, I get inside info pretty steady.
    Okay with that said, here a few things that most of you guys need to be aware of. The FBI and DEA have very useful tools at their disposal, to help catch people doing illegal activities on the Internet, email etc.
    One of the tools that is raising eyebrows, is this new thing they call, “The Magic Box”. Now I have been doing searching and trying to find out how this technology works, but so far all I have come up with is, that this “computer” or device, can lock into your Internet connection and record your keystrokes as they are leaving your computer. So what this means is, that there is no need for a keyboard sniffer, to be loaded on your computer. They (meaning anyone who is trying to look for suspicious activity) simply tap into your Internet connection and monitor what you do, by watching and recording the signals and packets leaving your computer. They can also ask ISP companies to watch and track your movements, on the Internet. Also if you use encrypted emails accounts, the “Magic Box” not only can record where you go and how many times you access your email, but can also provide prying eyes with your user name and password. This way someone can log into your account without having the encryption key. This brings me to another point; online emails, such as hush mail, cyber rights, zip lip, etc.
    I personally would recommend you delete everything in your boxes. Inbox, sent items, and trash. Keep them deleted, and always if you “RESPOND” to someone else email, it is best to delete the text that you are responding to. This could lead to a trail, and as most of you know, when you respond to an email, all previous conversations are there in that responding email.
    Don’t’ forget about the sent and trash folders with your “Online email accounts as well”. Also another good practice is to maybe check and answer your emails from other computers such as friends, work, etc. But beware, some offices, can record where you go, and could have keyboard loggers installed as well. Watch out.
    I would also recommend an ISP that changes your ** numbers regularly, (DHCP leases). What this means is every 2 or more hours your ** number changes, therefore it is harder for someone to lock onto your ** number.
    Again, I am not exactly clear how this technology works or any counter software that will prevent this. The FBI, for obvious reasons do not and will not share this info with the public. This is because they know that if they let everyone know how the technology works, there will be hackers all over the world trying to find ways to get around this, and stop it.
    I know of one case that it was used to bring down a hacking ring, and actually led FBI to the guys that were committing the crimes. They were grabbing their emails, everything they would type to one another, sites they visited, keystrokes they made etc. They used all of this along with phone tapping to catch these hackers. Actually the “Magic Box” is similar to a phone tap, just on a computer and Internet level.
    I can’t say I blame the FBI for not sharing to the public how this technology works. We live in a country in which national security is a very important thing now, since September 11th. I applaud the FBI and DEA for cracking down on Terrorists activities and hope that this technology will lead to stopping them as well as other things that are happening on the Internet.

    Now a possible way of working around this:

    For those of you who are interested, I believe that this technology can be worked around if you are fearful that someone is snooping around where they shouldn’t be. There are a few rules and guidelines I would suggest to people, if they are worried about prying eyes. One way to counter act this, disconnect your computer from your Internet connection. Once this is done, open up a word document, or other type of word processor, even notepad, type what you wan to type, save the file, and reconnect your Internet connection. (This may require a restart).
    Yet another simpler way of doing this is to have a program such as Zone alarm. Go into zone alarm, set it to “Internet Lock”, that way no traffic leaves your computer via Internet. Open up your Word Processor and type what you want, copy it, now reengage your Internet connection via Zone alarm by taking the Internet lock off, now surf to your website, (bare in mind, now someone could be recording your keystrokes, therefore, it may be good to keep the website or email addy in your favorites.) Now compose an email, or whatever, now paste the info you just copied into your email, thread, or whatever, then send. To my knowledge there is no way for them to track this unless they intercept your username and password, and you forget to delete your sent items or trash mail boxes. Now this works if you are using a secure online email service. It may not be as effective if you use a regular email program such as outlook express, or use hotmail or another none encrypted email.
    Once your computer is restarted and logged onto the Internet, surf where you want, open your document that you previously saved containing the text you want to send, copy the text you typed previously, and then paste it in an email, thread or whatever. This in theory from what I know about this technology, does not allow someone to snoop on your keystrokes, because you have no connection to the Internet. Once you have copied and pasted, the info you want, use a good “file shredder” to delete that document. I use Norton Utilities to delete files, or X cleaner has a good shredder built into it.

    Secondly if you are a source, I would suggest your keep your price lists on a diskette. They are easier to destroy, and can be easily transported from computer to computer. Always have a back up plan, like a quick way of formatting your computer or keeping incriminating evidence from your hard drive. I also see a lot of guys who actually are starting to use external drives to store data on then moving that hard drive to an undisclosed location. I don’t recommend this, due to if anyone finds it, then they got any info they need. The FBI and special teams have ways of retrieving data from formatted hard drives and yes deleted files. This can be done, and is done all the time. So really the only way of protecting yourself, is to keep things off your hard drive. This means using cleaners, and file shredders.
    I am not going to stress the importance of a firewall, updated virus scanner, history and Internet Cache Cleaners; I have other post that explains the importance of these items.
    Again, I feel that this info is important to some of the members here, because no one likes someone snooping around on their computers. I was also told by one member here, that there are “special teams” of FBI and DEA agents that troll the boards, and try to catch people practicing illegal activities. Of course this does not apply to the members here at AR, we do not participate in Illegal activities here, well none that I know of.. LOL..
    I like the fact that the members here, try to help others not only with AS questions, but diet, nutrition, and other things that it is hard to find answers anywhere else.
    Just some info I wanted to share with you all.
    Here is also a very interesting article which describes something similar to what I am talking about.
    http://www.corpwatch.org/news/PND.jsp?articleid=1092

  2. #2
    Nevermind is offline New Member
    Join Date
    Nov 2002
    Location
    Stockholm
    Posts
    38
    Hmm USA is a country where alot of shit is happening all the time i dont think FBI or DEA have time to deal with guys that do steroids ... Im guessing they are thinking So what they are just hurting them selfs....hah you guys are about to start a war so what if some guys are dealing Steroids..

  3. #3
    BigMike J's Avatar
    BigMike J is offline Anabolic Member
    Join Date
    Apr 2002
    Location
    USA
    Posts
    3,387
    Good read, very informative.

    Bump

  4. #4
    painintheazz's Avatar
    painintheazz is offline Anabolic Member
    Join Date
    Dec 2002
    Location
    Boston area
    Posts
    3,348
    Good read bro, but I agree let the DEA come after me, what a waste of time. If they are going through all that trouble for me a small user they are wasting their time. But still good info to have. Thanks.

    Pain.

  5. #5
    Sicilian30's Avatar
    Sicilian30 is offline Respected Member
    Join Date
    Sep 2001
    Location
    There is no place like ho
    Posts
    3,688
    bumpadump..

  6. #6
    RON's Avatar
    RON
    RON is offline Anabolic Member
    Join Date
    Aug 2001
    Location
    So Cal
    Posts
    5,451
    Originally posted by Nevermind
    Hmm USA is a country where alot of shit is happening all the time i dont think FBI or DEA have time to deal with guys that do steroids... Im guessing they are thinking So what they are just hurting them selfs....hah you guys are about to start a war so what if some guys are dealing Steroids..
    Tell that to all the Bro's who got caught for plain possession. It does and will happen



    Sicilian30, good post bro. I'm glad to see your still among us

  7. #7
    Sicilian30's Avatar
    Sicilian30 is offline Respected Member
    Join Date
    Sep 2001
    Location
    There is no place like ho
    Posts
    3,688
    Originally posted by RON


    Tell that to all the Bro's who got caught for plain possession. It does and will happen



    Sicilian30, good post bro. I'm glad to see your still among us
    Well Ron this post I have been wanting to put up for a while, I wanted this to be one of my last major posts for a while..
    You know where to find me eh RON? LOL..

  8. #8
    Big Rush's Avatar
    Big Rush is offline The Juice Man
    Join Date
    Feb 2002
    Location
    Wal-Mart
    Posts
    3,498
    good post sicilian

  9. #9
    MBaraso's Avatar
    MBaraso is offline Retired Mod
    Join Date
    Oct 2001
    Location
    Somewhere
    Posts
    7,629
    Good post :-)

  10. #10
    nails55 is offline New Member
    Join Date
    Apr 2003
    Location
    north carolina
    Posts
    29
    Deffinately a post everyone on here should read.
    user: "Nevermind" you are very wrong.

  11. #11
    calidude's Avatar
    calidude is offline Senior Member
    Join Date
    Feb 2002
    Location
    LAS VEGAS, NV
    Posts
    1,242
    great post. BUMP

  12. #12
    justme's Avatar
    justme is offline Associate Member
    Join Date
    Apr 2002
    Location
    Canada
    Posts
    240
    Sicilian30

    quick question for you, if you are behind a custome firewall (not one of the off the shelf models) would they still be able to get through ?
    ie. what if you had a linux box with your own firewall on it and that plugged into a hub then you plugged into the hub ?

  13. #13
    Sicilian30's Avatar
    Sicilian30 is offline Respected Member
    Join Date
    Sep 2001
    Location
    There is no place like ho
    Posts
    3,688
    Originally posted by justme
    Sicilian30

    quick question for you, if you are behind a custome firewall (not one of the off the shelf models) would they still be able to get through ?
    ie. what if you had a linux box with your own firewall on it and that plugged into a hub then you plugged into the hub ?
    According to the info I have on this technology, firewalls won't do you a bit of good, they aren't actually coming into your system, they are monitoring your traffic going out thru port 80 or port 8088. Now port 8088 is an encripted port, but still I am sure they have ways of breaking the encription method for that port. I am behind a customized firewall as you say, probally one of the best by far, but again, it isn't what they are trying to get in, they are monitoring what goes out, and that is a good way of doing it, no special hacks or ports to filter thru. Hope this makes sense. Read more about the technology with the link I put at the bottom of the article.

  14. #14
    Jack87's Avatar
    Jack87 is offline Retired Vet
    Join Date
    Mar 2002
    Posts
    6,086
    Not sure how I missed this post the first time around... Great info...

    BUmp

  15. #15
    TheChosen1's Avatar
    TheChosen1 is offline Member
    Join Date
    Aug 2002
    Location
    SoCal
    Posts
    582
    Quote Originally Posted by buff87
    Not sure how I missed this post the first time around... Great info...

    BUmp
    Same here.
    Great read, bro.

  16. #16
    Dude-Man's Avatar
    Dude-Man is offline Anabolic Member
    Join Date
    Jul 2003
    Location
    Nowhere, USA
    Posts
    5,966
    On the semi-serious lighter side..

    Better be careful bro.

    now that they know that you know, there's no telling what can happen to you!

  17. #17
    Gearhead007 is offline Associate Member
    Join Date
    Aug 2003
    Location
    Aukland, NZ
    Posts
    356

    How about encryption software?

    dddddddddddddd
    Last edited by Gearhead007; 09-27-2007 at 07:42 PM.

  18. #18
    talon's Avatar
    talon is offline Senior Member
    Join Date
    Aug 2003
    Location
    Florida
    Posts
    1,367
    Wow, eventhough the chances are very slim, this stuff still makes you think about you own privacy.....

  19. #19
    Sicilian30's Avatar
    Sicilian30 is offline Respected Member
    Join Date
    Sep 2001
    Location
    There is no place like ho
    Posts
    3,688
    Quote Originally Posted by talon
    Wow, eventhough the chances are very slim, this stuff still makes you think about you own privacy.....
    Unfortunately there is not such thing as privacy anymore on the Internet. I learn ways everyday of gathering info via internet about anyone.

  20. #20
    Dude-Man's Avatar
    Dude-Man is offline Anabolic Member
    Join Date
    Jul 2003
    Location
    Nowhere, USA
    Posts
    5,966
    bumptastic

  21. #21
    spywizard's Avatar
    spywizard is offline AR-Elite Hall of Famer~
    Join Date
    Dec 2003
    Location
    In the Gym, if i could
    Posts
    15,929
    We use to be protected by the "Freedom of Information Act" now we live in a time after "Homeland Security Act" without proven cause your ISP can be required by local, or pretty much anyone that says "John Smith" has data about me on his computer, to provide access or monitoring of your (IP that you have) along with your information as to your billing to that person that is requesting....

    Most people that have a cable modem dont' know how to turn off the guest accounts, thus giving a simple way to log the key strokes.. Hint Hint...

    here is an example of how things have changed.. I have several programs on my computer that crack passwords.. encrypted passwords..

    5 years ago data encryption using PGP (pretty good privacy) and Blowfish and 16 bit encryption was around.. it would take the combined processing power of all the desk tops in the world 100 years to break that encryption..

    I can do it with a 2.6 ghz processor desktop at the rate of 20,000,000 attemps per second....................

    what do you think they can do now.............

    Good luck.. stay to small to bother with..

    Me
    The answer to your every question

    Rules

    A bigot is a person obstinately or intolerantly devoted
    to his or her own opinions and prejudices, especially
    one exhibiting intolerance, and animosity toward those of differing beliefs.


    If you get scammed by an UGL listed on this board or by another member here, it's all part of the game and learning experience for you,
    we do not approve nor support any sources that may be listed on this site.
    I will not do source checks for you, the peer review from other members should be enough to help you make a decision on your quest. Buyer beware.
    Don't Let the Police kick your ass

  22. #22
    Sicilian30's Avatar
    Sicilian30 is offline Respected Member
    Join Date
    Sep 2001
    Location
    There is no place like ho
    Posts
    3,688
    Quote Originally Posted by spywizard
    5 years ago data encryption using PGP (pretty good privacy) and Blowfish and 16 bit encryption was around.. it would take the combined processing power of all the desk tops in the world 100 years to break that encryption..

    I can do it with a 2.6 ghz processor desktop at the rate of 20,000,000 attemps per second....................

    what do you think they can do now.............

    Good luck.. stay to small to bother with..

    Me
    There is no need to break encription codes now. Read about my Magic Box deviced used now by the FBI. This device monitors the keystrokes after they get past your firewall, and hit the Internet. They can also track keystrokes before they are encripted with special FBI software now, and yes, virus scanners and spyware's can not pick them up. And believe me, they have someone who can break encription code. Trust me, some one can break it. There is nothing out there that is created without some type of backdoor or code overridder.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •