SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Stock Attack -- A Complete Analysis -- Ignore unavailable to you. Want to Upgrade?


To: Chris who wrote (17961)11/24/1998 9:06:00 AM
From: Follies  Respond to of 42787
 
Chris,

This can also be done by what I would call a virus. You can inadvertantly download and run stuff which allows others to completely control your machine remotely. Its from Cult of the Dead Cow:

cal.shaw.wave.ca




To: Chris who wrote (17961)11/24/1998 4:08:00 PM
From: BI*RI  Read Replies (1) | Respond to of 42787
 
Chris,

In case you didn't see this about Janus 20:

cbs.marketwatch.com

Marc



To: Chris who wrote (17961)11/28/1998 4:42:00 PM
From: Stoctrash  Read Replies (1) | Respond to of 42787
 
Chris also tell everyone how easily emails can be traced since the originators IP information is in the headers. I've also recently learned that some IPS's have minor security flaws where you can even see who's online and from what port they are loging in from. It's simply amazing how somethings can be traced right back to server from which it was sent,, even when they are sent via net based mails like Yahoo and Hotmail.

I have a buddy who works on Anti-Spam/Security stuff for a college and it was amazing the little tricks he's shown me that are 100% legal. Here is a portion of a recent email he sent me:

"I can't tell you how to retrieve the full headers from your e-mail
program, which apparently is Microsoft Outlook Express. I know
that "View Source" works from Netscape mail. There may be instructions for your software on spam.abuse.net or one of the other anti-spam sites. There's also header decoding instructions at
some of those sites,

With ______ mail, I'm confident that I will be able to isolate the sender
back to their ISP and port number. In one case, I managed to find a mailbomber's real identity without any help from the originating ISP, and even the FBI was in awe over how I identified the sender.