LOGO
General Discussion Undecided where to post - do it here.

Reply to Thread New Thread
Old 10-27-2005, 08:00 AM   #1
WoCTrt0X

Join Date
Oct 2005
Posts
498
Senior Member
Default
I can remember being warned against getting Demon (UK based ISP, i think) for exactly that reason.

Every little helps.
WoCTrt0X is offline


Old 11-05-2005, 08:00 AM   #2
forumsfavoriteall

Join Date
Oct 2005
Posts
346
Senior Member
Default
That is true, to falsify the return address. Have the people who got rude emails from you look at their email headers, so they can see the originator\'s true IP address.

- Krish
forumsfavoriteall is offline


Old 11-25-2005, 08:00 AM   #3
gDGwm8BC

Join Date
Oct 2005
Posts
563
Senior Member
Default
====In reply========
As easy as falsifying the source address when your sending regular mail
krtel
=================

That situation is very unpleasant, the solution is: get a digital certificate and sign yours e-mails.. Free digital certificate at: http://www.thawte.com/
gDGwm8BC is offline


Old 12-07-2005, 08:00 AM   #4
gDGwm8BC

Join Date
Oct 2005
Posts
563
Senior Member
Default
I was thinking about if her really hacked in your email...
Perhaps she only uses a \" Fake email \"...
it is very simple to change origin address of an e-mail
then she send false email and who receives thinks that is you!

Test it!
http://www.sendfakemail.com/
gDGwm8BC is offline


Old 12-11-2005, 08:00 AM   #5
WoCTrt0X

Join Date
Oct 2005
Posts
498
Senior Member
Default
Man that lady has some issues...

Bet your glad you got out of it!
WoCTrt0X is offline


Old 12-12-2005, 08:00 AM   #6
Nundduedola

Join Date
Oct 2005
Posts
609
Senior Member
Default
Server assigned IP. It\'s the standard for convienance reasons. Static IP usually costs more but can be worth it.
Nundduedola is offline


Old 01-23-2006, 08:00 AM   #7
Nundduedola

Join Date
Oct 2005
Posts
609
Senior Member
Default
I own a computer business and have quite a few years experience in the industry. This is something I see all too often and the victim almost invariably left the door open to it happening.

It was easy enough if she had your user name and password. Even if she didn\'t, most people are terribly predictable. The name of a pet, a favored person from a good book, a birthday etc. If she is clever and knows the technology, there are all sorts of ways to handle it. I have a program that shows me everything typed on a computer.

Some suggestions: Change your password frequently. Or at least when ending a relationship. Be creative when you come up with a new password. DO NOT WRITE IT DOWN, ANYWHERE!!!!!
Nundduedola is offline


Old 02-03-2006, 08:00 AM   #8
forumsfavoriteall

Join Date
Oct 2005
Posts
346
Senior Member
Default
Well, there are many factors.

1. You could have had a weak password.
2. She snuk a sniffer (trojan) onto your machine.
3. She snuk a key logger (which could explain how she got your password) onto your system.
4. You opened some form of java attachment in hotmail.

Solution: Use complex passwords which consists of lowercase, upperscase, numbers, and symbols, at least 8 characters. Don\'t open attachment from people you are uncertain about.

If it was a trojan, you could easily know if you had anti-virus installed on your system. As for sneaking them on, you have little or no control over that. Windows 95/98 doesen\'t provide much security. Windows 2000 Professional or XP gives you an additional layer of security where you have to logon with your own username and password to get to your profile.

I honestly think #2 and/or #3 occured.

Advice: Install a firewall, like Norton Personal Firewall. With this, even if a trojan or a key logger was installed, it would be stopped right in it\'s track.

And yes, we do have computer scientists on this board, look in my profile. :>

- Krish
forumsfavoriteall is offline


Old 02-07-2006, 08:00 AM   #9
gDGwm8BC

Join Date
Oct 2005
Posts
563
Senior Member
Default
I agree.
You are right krtel... My public ID key: 0x24A60900 [img]/ubbthreads/images/styles/World/icons/wink.gif[/img]
gDGwm8BC is offline


Old 02-14-2006, 08:00 AM   #10
laperuzdfhami

Join Date
Oct 2005
Posts
465
Senior Member
Default
Didn\'t realize it at the time of letting her run in the pastures...but it\'s the best thing she could have done for me. Where ever she\'s at...is the best place for her, and it\'s definitely not with me. I still don\'t hate her, and wish her the best in all she does. Just glad I don\'t have the worry, and hope she stays away from me and my email accounts. Geeez! After 25 years, I even quit smoking after she left!!! What does that tell you? [img]/ubbthreads/images/styles/World/icons/smile.gif[/img]
laperuzdfhami is offline


Old 03-02-2006, 08:00 AM   #11
Enliseell

Join Date
Oct 2005
Posts
441
Senior Member
Default
If thats what she did, she doesen\'t need to hack YOU personally in any way. Just has to change the return address on the email to YOUR email address. As easy as falsifying the source address when your sending regular mail.


- Krish
Enliseell is offline


Old 03-24-2006, 08:00 AM   #12
WoCTrt0X

Join Date
Oct 2005
Posts
498
Senior Member
Default
Yes that was an obvious one I meant to point out.

The fact that she got into two accounts suggests more than mear guesswork however, unless Mr Mobley uses his password for both accounts, which is entirely understandable.
WoCTrt0X is offline


Old 03-28-2006, 08:00 AM   #13
Nundduedola

Join Date
Oct 2005
Posts
609
Senior Member
Default
I was assuming she was not in the industry. Most of those toys are not readily available outside the industry and are expensive. The one I mentioned can be purchased over the web for $10 and anybody can use it.
Nundduedola is offline


Old 04-21-2006, 08:00 AM   #14
gDGwm8BC

Join Date
Oct 2005
Posts
563
Senior Member
Default
You say that she hacked your Yahoo and Hotmail pass?
I think the problem is at your computer
I think if your pass is strong (up 8, with mixing letters, numbers, symbols)
the bruteforce attacks is clumsy..

I suggest that you use a Firewall..

1 - we will see if the problem is at your computer..

May she put at your computer some trojan. May that trojan
cannot detected very easily by antivirus. (trojan seem a legitimate program)
If you dont have firewall (Norton Personal Firewall, Black Defender,
Conseal, Zone Alarm, etc..)

go to MS-DOS prompt and type:

netstat -na >> you see all current socket conections, do it without connect at net. (ps>for help type: netstat/?)

in my computer the result was that:
TCP 0.0.0.0:1091 0.0.0.0:0 LISTENING
translation:
Well I have a program listening in the door 1091 (Just is a SQL SERVER) and
anyone client connected (0.0.0.0:0)

Most of the trojans is only server listening in some door...
That trojan is waiting for client connected..
depending the trojan It can:
Read/write HD.
Capture screen
Logging the Keyboard Map Buffer (Keylogger)
Open your CD-ROM
Change some configurations, etc...

If your conputer is clean, you canīt see any TCP connection (perhaps trojan modifies some Windows API
then that technique will fail [img]/ubbthreads/images/styles/World/icons/frown.gif[/img] sucks!! )


My friend if you really get a good literature about Security go to:

www.securityfocus.com
http://packetstormsecurity.nl/

More:::
Http://packetstormsecurity.nl/links.html

PS-> I Know, I Know for sure... ICQ have millions security flaws....
gDGwm8BC is offline


Old 04-23-2006, 08:00 AM   #15
Nundduedola

Join Date
Oct 2005
Posts
609
Senior Member
Default
One thing to keep in mind is that there is no such thing as a secure computer if it attaches to an outside line. No more than there are unbreakable locks. That\'s why Fort Knox has armed guards.

I\'ve been in the computer field a long time. The best advice I give my customers is to keep security and anti-virus programs up to date. Change passwords frequently. If you have any reason to believe you have been hacked you should change accounts with your ISP immediately or change ISPs.

It\'s a pain in the butt. But the hackers are smart.
Nundduedola is offline


Old 05-08-2006, 08:00 AM   #16
anatmob

Join Date
Oct 2005
Posts
598
Senior Member
Default
Oh no!!! You don\'t need to be fighting!!! No, I didn\'t meet her on here. After we had been broken up for a while, she came into the library to find me, saw the site\'s name, started visiting thinking I was using mones to get someone else, and checking to see if I had been on. She\'s probably using mones by now. [img]/ubbthreads/images/styles/World/icons/smile.gif[/img] I wouldn\'t be suprised if she\'s on here somewhere. And yes....NASTY she was. It only bothered me about her hacking into my emails because she hurt people that she didn\'t know by sending them nasty grams. People that had sent me pictures, AFTER, we had broken up...the nude pics - she cursed them out, the regular pics - she told them she was my wife. It was terrible!!! I\'m writing all my suppose to be friends, and they weren\'t responding. Anyway, you don\'t need to be fighting, cause you have a serious temper...somebody would get killed!!! [img]/ubbthreads/images/styles/World/icons/wink.gif[/img] Thanks!!! {{{SMOOCH}}}
anatmob is offline


Old 06-07-2006, 08:00 AM   #17
WoCTrt0X

Join Date
Oct 2005
Posts
498
Senior Member
Default
There are many ways, some more simple than you think.

-There are unumerable code breaking programs that \"brute force\" their way into your account.

-Various tricks with the encription and things like that (obviously more complex)

-Dummy login screens, where a duplicate of the login screen is made, and changed so that when you hit enter, the information they typed gets forwarded to an email address of your choice.

-Remote login programs, I can recall one not long ago, but it was rumbled and the hole plugged.
WoCTrt0X is offline


Old 06-07-2006, 08:00 AM   #18
forumsfavoriteall

Join Date
Oct 2005
Posts
346
Senior Member
Default
A PGP key (SHA1 Hash) is much more secure than that solution.

- Krish
forumsfavoriteall is offline


Old 06-10-2006, 08:00 AM   #19
laperuzdfhami

Join Date
Oct 2005
Posts
465
Senior Member
Default ARE THERE ANY COMPUTER SCIENTIST ON THE FORUM?
I use to date this girl off and on for about a year total, she disappeared for about a year, and after drinking beer, partying, and mating with those that made her feel good, she came back. I was hoping that she had changed...one that needs space is not in love...but she hadn\'t. ANYWAY, after seeing that she hadn\'t changed...I finally said to myself...\"Self! Enough is enough.\" Anyway, she hacked into my HOTMAIL and YAHOO accounts sent ugly emails to people that I was associated with, changed my personal ads that I had posted, and went in to delete my address in the Sweepstakes that I had enter, which confirmed that it was her, because she was the only one that knew I entered the Sweeps. What is killing me is how!!? She\'s on this forum, but that\'s not what bothers me...it haunts to no end, not knowing how she did it, and I\'d really like to know. Anyone? Anyone? Thanks!!
laperuzdfhami is offline


Old 06-16-2006, 08:00 AM   #20
laperuzdfhami

Join Date
Oct 2005
Posts
465
Senior Member
Default
Thanks each and everyone of you!! From the reading, it sounds like the only way to remain somewhat safe from a crazy stalking computer wiz, is to change my password frequently. I never gave her my pass word, she knew my email address, and my password question was \"what city did you retire from\"...that she knew. Maybe that\'s it! Thanks again. Tater!!
laperuzdfhami is offline



Reply to Thread New Thread

« Previous Thread | Next Thread »

Currently Active Users Viewing This Thread: 2 (0 members and 2 guests)
 

All times are GMT +1. The time now is 11:27 AM.
Copyright ©2000 - 2012, Jelsoft Enterprises Ltd.
Search Engine Optimization by vBSEO 3.6.0 PL2
Design & Developed by Amodity.com
Copyright© Amodity