hi you better read this well and here what i have to say.
i was recently hacked by someone who really knows how to do it how they got in initially is the big question but they sat back and watched everyone written to or were i went then they waited for avg anti virus to auto update and when they did they road in i am told this cannot be done but have the programs the call out went to FRANCE on a global fast ethernet connection and came in they then removed tech stuff from my computer and everything else they wanted but i don't keep stuff on this computer then they went to my e-mail and locked me out and asked all my contacts for money saving i was in nigeria in jail then they went on to threaten others that would still contact me i am sure this is over science things i was working with these people over due to what was gone through on my computer.
they went after my credtit cards and bank accounts but i do not have anything so they were out of luck there they installed a program to watch error codes and correct any error codes to null return this left microsoft with a no problem scan of my computer but it had read flags due to encrypted files on my computer and i have no encryption program.
there were empty files that werwe running in the task mannager and files that could not be removed or transfered as well as files used to add program lines to files and alter and watch dates to override backup to previous restore points.
microsofts answer to this is it can't be done.
I AM POSTING THIS TO YOU ALL FOR A WARNING BECAUSE THEY WERE LOOKING FOR PEOPLE WITH IDEAS AND WHAT THEY KNOW AND BECAUSE I WANT YOU ALL TO BE AWARE THAT YOU MAY BE HACKED WITHOUT EVEN KNOWING IT.
MARTIN
http://www.linuxmint.com/
Need I say more?
First thing I want you to do is turn off your computer. Second thing I want you to do is never turn it back on/ operator/ come near/ get on the internet. It seems you are to dumb to install a decent enough anti-virus program or to not download crap from the internet.
ReCap. Never go near a computer/ Wi-Fi enabled device/ PDA or any other electronic device you have no idea what it does or can do.
Well it's certianly obvious that you must be one of the hackers, prying into others computers. To make such a statemet without knowing all the facts kind of makes you look pretty stupid.
Or maybe it's just imaturity.
Any way you want to look at it, my computer is not only being controlled by an outside force, they did so useing AVG antivirus automatic UPDATE to gain access into my computer. This(these) person(s) has downloaded many files onto my computer. "They" control any and all aspects of it.
One thing that I've noticed on this OverUnity site is the number of people who with very little provocation place dis-crediting posts. Discrediting others to make them look dumb, stupid, ignorant, etc. etc. Now it's my opinion that this type of person has one of several reasons why they do so.
1) Either they themselves are very ignorant, and in order to feel good about themselves must try
to make others look more stupid that themselves.
2) Or, they are involved in a much larger way. Be it SPYing on others to try to steal information
because they themselves are to stupid to figure it out for themselves, or for monatary gain
($$$$$.##) Thieves, thieves upon our internet.
3) Or to stop valuable information from getting out to the public, for what ever reason!
So let it be a warning to all who read this reply. Don't trust your antivirus software. AVG is supposed to be about the best on the market. ?????
Spybot also failed to clean up this mess.
Microsoft search did not clean it all up.
A new router, and IP address did not stop this (these) individual(s).
I don't know exactly what it is that I have, that they are willing to go so far to take away from me, except knoledge.
I am smart enough that I don't use any of my credit cards on the internet. But that has not stopped them from trying to make numerous purchases in France using my account numbers: they failed.
It did not stop them from trying to purchase a computer useing my Pay-Pal account: they failed.
They even tried to access my bank account to transfer money into my Pay-Pal account: they failed, because ALL my bank accounts are set up on a WALK-IN basis only!
They sent DEATH THREATS to those individuals whom I emailed often concerning free energy and the likes of other similar subjects. This they have succeded, some what. They so far haven't controlled my telephone conversations with these same individuals. Nor slow-mail, nor other means of communication.
So really...................... All they have succeded in doing is screwing up my computer for good!
So, sir, if your one of these individuals, I feel sorry for you, because we all know what your real father's name is.
Martin
THESE PEOPLE ARE NOT HACKERS!
please watch the front page video at www.hackersclub.net (http://www.hackersclub.net)
and i also recommend you watch the video documentary they have there.
then you should stop using micro$oft and go with linux www.ubuntu.com (http://www.ubuntu.com) / www.hacktolive.org (http://www.hacktolive.org)
have a nice day.
LinuxMint is Ubuntu based btw, Debian with Gnome.
I don't understand why people keep on using Windows.
Quote from: Tink on March 23, 2010, 11:59:27 PM
LinuxMint is Ubuntu based btw, Debian with Gnome.
I don't understand why people keep on using Windows.
I think it has to do with what is installed already on computers being sold today, most people don't even know how to press the start button let alone run a different O/S.
haha
hello .. i have held a record for such
but i am a windows user..
linux works.. but keep in mind that if more people used linux then the "hackers" would get you too..
i had a record once for shutting down 1005 linux os's in 1.2756 seconds on over 2700 networks and 14 isp's with no recovery
but those where the good old days..
people ask me what is the best way to secure there selfs when they buy a new pc.. i tell them reformatt with a clean install no bulk oem crap..
and use something like nod32 for AV..
it's what you do online that makes you a victim..
this should clue to you in to what os is good.. i had a buddy piss me off real bad.. i worked his network till i found him and rewrote his bios on his mac laptop.. oh.. no there went 3 grand down the poop tube.. hahahaha
but i have a new hobby it's renewable energy.. so don't ask me about working someone over..
robbie
@kooler
have you ever heard of open source?
Quote from: nueview on March 23, 2010, 07:40:07 PM
Well it's certianly obvious that you must be one of the hackers, prying into others computers. To make such a statemet without knowing all the facts kind of makes you look pretty stupid.
Or maybe it's just imaturity.
What is obvious is you don't know how to type/spell or use spell check. The facts speak for themselves.
Name calling will get you no where.
Quote
hi you better read this well and here what i have to say.
i was recently hacked by someone who really knows how to do it how they got in initially is the big question but they sat back and watched everyone written to or were i went then they waited for avg anti virus to auto update and when they did they road in i am told this cannot be done but have the programs the call out went to FRANCE on a global fast ethernet connection and came in they then removed tech stuff from my computer and everything else they wanted but i don't keep stuff on this computer then they went to my e-mail and locked me out and asked all my contacts for money saving i was in nigeria in jail then they went on to threaten others that would still contact me i am sure this is over science things i was working with these people over due to what was gone through on my computer.
they went after my credtit cards and bank accounts but i do not have anything so they were out of luck there they installed a program to watch error codes and correct any error codes to null return this left microsoft with a no problem scan of my computer but it had read flags due to encrypted files on my computer and i have no encryption program.
there were empty files that werwe running in the task mannager and files that could not be removed or transfered as well as files used to add program lines to files and alter and watch dates to override backup to previous restore points.
microsofts answer to this is it can't be done.
I AM POSTING THIS TO YOU ALL FOR A WARNING BECAUSE THEY WERE LOOKING FOR PEOPLE WITH IDEAS AND WHAT THEY KNOW AND BECAUSE I WANT YOU ALL TO BE AWARE THAT YOU MAY BE HACKED WITHOUT EVEN KNOWING IT.
MARTIN
I am sorry to say this, but I do not think you generally know what you are talking about when it comes to computers, and you are just assuming the very worst of what happened. The way you relate it, it makes you sound like a paranoid crazy person.
It sounds like your email account got hacked, and this is very common. The scammers email the people in your address book, pretending to be you, and asking for money for you to get out of jail or whatever. They make the situation sound dire in order to get your friends to pay up, but this is not a death threat and it has nothing to do with your research. This is like the old Nigerian scam. This isn't about your overunity secrets.
As far as your PC, it sounds like maybe you do have some rogue agent or whatever running, and that needs to be cleaned up. With something like this, you need to reinstall the OS to make sure nothing is left of the original system.
And finally, I am in the IT profession, and I can tell you that nearly 100% of the time, the reason you are in this situation is because of something you did. You went to some website and clicked "scan my registry" or some other lame bullshit come on that you fell for, and that got you in the mess you are in now. I am sure you are not stupid, but it sounds like you are Internet-gullible, and the sooner you wise up the better, as you can prevent this from happening again.
Also, you can get a Mac, probably easier learning curve than Linux.
Quote from: FreeEnergy on March 24, 2010, 01:23:30 AM
@kooler
have you ever heard of open source?
yes.. why you ask..
if you are Trojaned, disconnect the hard line to the computer which meets the internet then follow suit. step one. a Trojan is only as good as its internet connection.
Quote from: Tink on March 23, 2010, 11:59:27 PM
LinuxMint is Ubuntu based btw, Debian with Gnome.
I don't understand why people keep on using Windows.
I only have access to a borrowed, public computer. I can't download a lot of things like freeware, etc. I can, however, download .PDF's to a 1 gigabyte SanDisk and I take it with me.
I do occasionally have problems with the computers I use. This is because viruses are so common and it takes a good, professional antiviral suite and preferably Firefox as your 'Web browser.
--Lee
@ nuview, wake up, use snail mail. it works.
Quote from: X00013 on March 24, 2010, 09:52:12 PM
@ nuview, wake up, use snail mail. it works.
I think it was J. Edgar Hoover who had the mail of political opponents searched, wasn't it?
Thusly:
http://en.wikipedia.org/wiki/COINTELPRO
Besides, I have the experience of learning that the USPS lost mail sent to me when I complained to bill collectors that I didn't get their bills.
--Lee
i think most of the comments go to proving my point anything connected to the internet is open for intrusion it seems to be the nature of some people to be proud of the problems they creat for others i am not one of these but did want to make the point to security i am not paranoid stupid or dumb it is just the nature of the internet i just wanted people to be aware that there are those who do not care for the well being of others.
i lost nothing of value at all but some are not as fortunate.for those people i am sorry these things happen.
i new there would be those who would say such things when i posted this to the internet especially here especially for from those who would like to think themselves secure in there operating systems and programs and antivirus software and think that others do not know how to use these as well.
i posted this because it needed to be said and should be an open discusssion here for intelligent conversation about the topic.
last year the FBI estimated that the revinue stolen or moved by such activities was in the billions of dollars and that it is one of the most rapid growing problems. due to identity theft in whole or in part i will not explain this further as i am not here to teach anyone how to do this type of activity.
i want to thank those who helped to make my point and to those who took the time just to look in as for myself i know there is no security other than what is granted by what power may be.
i was at this site to promote science and some understanding but for the most part have run into those with little formal education and less ability to define the problem or deal with it in any arena.
i would also like to thank those who i have had good conversations with and wish them well i am sorry that i could not have shared more but i am done with dealing with the harrassment.
may you all find some peace
Martin
Hey Nueview
Well good to hear your ok. was worried when I got those emails from nigeria. I even made a thread to see if anyone here knew you personally to find out what was really happening.
Anyway, glad your ok. =]
I use Avast free anti virus and zone alarm fire wall. Zone alarm is my favorite.
Mags
default permit firewalls are worthless... so are AV programs (enumerating the badness is an arms race you can't win). 'penetrate and patch' (better known as 'polishing a turd') is a waste of time. people need to learn how to operate their computers and how their operating system of choice works, simple as that.
educate yourself.
the six dumbest ideas in computer security
http://www.ranum.com/security/computer_security/editorials/dumb/
Quote from: onthecuttingedge2005 on March 24, 2010, 09:09:28 PM
a Trojan is only as good as its internet connection.
this is entirely incorrect. a trojan does not require an internet connection, they can be on floppies, usb sticks, a digital picture frame, etc. ad infinitum, ad nauseam.
thank you Wilby for enumerating the problem so well
it has been a year now and two computers and allot more knowledge about this problem has surfaced most of which goes to the point already made that security is just an arms race at best.
i was contacted by a reporter who said that more computers are hacked or intruded for people working along the lines of energy devices and high end physics than any other group of people mostly the hack is a logger for letting someone know were you are going and what you are looking for as far as information and can even go as far as page blocking error 404 it is usually done through the eprom on the motherboard.
Martin