SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
SI - Site Forums : Silicon Investor - Welcome New SI Members! -- Ignore unavailable to you. Want to Upgrade?


To: Green Receipt who wrote (4314)2/4/1999 4:33:00 PM
From: Bill Ulrich  Read Replies (1) | Respond to of 32871
 
If you went to www.schwab.com and entered your uid/pswd, then yes, he could capture it. That is a risk. But this doesn't have anything to do with the redirect. You see, if he took out the re-direct and had a regular SI profile, he could still put a link in his profile that says www.schwab.com, yet really isn't. Thus, the 're-direct' is a moot point. You'd still be under the impression you were going to Schwab.

And really, SI is spawning a window without a location field, which isn't helping the situation. If they spawned w/ location field, then you could tell straightaway that you weren't at Schwab. That is, unless he's doing a more intricate spoof, but that's a risk anywhere—not just SI. Might as well stay off the net at that point.



To: Green Receipt who wrote (4314)2/4/1999 8:22:00 PM
From: mr.mark  Read Replies (3) | Respond to of 32871
 
i posted these items on the computer learning thread a week ago. please check them out.

#reply-7522428, #reply-7525284 and #reply-7542659

my cable modem was dialing by itself late one evening, and when i went to the puter and turned on the monitor, word was opening by itself.

i spoke to the system administrator of my cable company isp the next morning. he did a port scan on my pc and said he thought that "something was listening" on an open port that is typically used for net bios functions. he was particularly worried about word opening on its own. he suspected 'back orifice'.

i read up on it, and checked in my directory for telltale signs (see above posts). it's not 'back orifice'. i also emailed symantec to see if norton antivirus 5.0 detects 'back orifice'.... it does.

the most important thing i've gleaned from the experience is that one should NOT store one's passwords. from the above link...

"something else that came to my attention the last couple of days... it's a wise move to
NOT store your passwords on your machine. trojans like back orifice steal cached
passwords in a matter of seconds once they're inside a target. so what if it takes a few
extra seconds to type in a password? every time you do so you can feel that much
smarter for having taken the preventative step to uncache your passwords."


any thoughts on the open port? i'm not too sure how to proceed. relying a lot on antivirus scans, uncached passwords, and careful clicking, though the last one is a crap shoot from the get go.

mark