Untrusted certificate

Discussion in 'Spyware' started by ~BD~, May 13, 2011.

  1. ~BD~

    ~BD~ Guest

    hxxps://60.251.127.208/general/common/before/en_us/before.html

    Something for you guys to play with!
     
    ~BD~, May 13, 2011
    #1
    1. Advertisements

  2. ~BD~

    Mike Easter Guest

    First, where did you get it? Or any part of it?

    Did that come from your opening and reading and pasting from spam for
    E-Detective?
     
    Mike Easter, May 13, 2011
    #2
    1. Advertisements

  3. Of course it is untrusted. It is a dot notation URL !
     
    David H. Lipman, May 14, 2011
    #3
  4. ~BD~

    ~BD~ Guest

    Yes - IIRC it *was* from a SPAM notated post in Hotmail.
     
    ~BD~, May 14, 2011
    #4
  5. ~BD~

    ~BD~ Guest

    I 'Googled' and came up with this:-

    http://www.flickr.com/photos/ziebo/358101517/

    Somehow I guess it's not quite what you meant, David! ;-)
     
    ~BD~, May 14, 2011
    #5
  6. ~BD~

    Mike Easter Guest

    I recommend that you cease opening and reading your spam.

    As a general rule, such practice profits the spam process in various
    ways, most of which are unexpected by the foolish spam handler.

    The best way for spam to be 'handled' is for it to be diverted from user
    accessibility by the mail handling processes; preferably by initially
    blocking/preventing its generation into the mail stream, secondarily by
    refusing its acceptance at the server level, tertiarily (new word) by
    the diversion into the spam/junk folder by the mail provider, and as a
    last resort by the user who finds the spam being accessible having the
    *discipline* to go no further in hir reading than to 'see' the
    To/Subject/From, at which time that user /must/ delete the item unopened
    and uninvestigated.

    Experienced anti-spam handlers and spam reporters who are actually doing
    some good about something as opposed to the spammee handlers who profit
    the spam process are to be distinguished from those spam-curious. The
    'rules' of investigation do not include starting the investigation by
    opening the spam like the spamcurious spam-profitting spam opening spam
    reading spamlink clicking spammee who is the 'cause' of spam working
    because it is profitable.
     
    Mike Easter, May 14, 2011
    #6
  7. ~BD~

    Dustin Guest

    Not me. I'd rather play with your bank statements.
     
    Dustin, May 19, 2011
    #7
  8. ~BD~

    ~BD~ Guest

    Do you *really* think you could do so nowadays, Dustin?
     
    ~BD~, May 20, 2011
    #8
  9. ~BD~

    Peter Foldes Guest


    I definitely can even in today's environment

    --
    Peter
    Please Reply to Newsgroup for the benefit of others
    Requests for assistance by email can not and will not be acknowledged.
    This posting is provided "AS IS" with no warranties, and confers no rights.
    http://www.microsoft.com/protect
     
    Peter Foldes, May 20, 2011
    #9
  10. ~BD~

    Dustin Guest

    Without admitting anything, Yes indeed. You have no idea the toys I get
    to play with. I'll give you a little clue for your dossier tho; My
    profession allows me to work on all kinds of things. From PLC
    controllers to ATM machines, and the internal networking in between.
    You wouldn't believe what I learned on my own about the traffic light
    camera systems which are being used in this area. They are riding on
    the net, via a specialized VPN. I won't get into any specifics, but if
    I felt the desire; I could access one from here right now. [g]

    Computers and networking are very interesting to me, David. I learn
    something new every single day. You aren't invincible, as I've told you
    before. I make a choice every day not to go further with you than here.
    For a number of reasons. The primary one being, even if I did flex a
    bit and tap you on the nose; you would learn *nothing* from the
    experience and withen a few days, go right back to irritating and
    otherwise annoying people. It's a waste of time and resources and the
    risk doesn't outweigh the potential benefits.

    If I thought, OTH, you would actually straighten up and only needed
    someone to demonstrate how visible you really are; I'd probably do
    something.
     
    Dustin, May 20, 2011
    #10
  11. ~BD~

    ~BD~ Guest

    Do you have much experience of stealing funds from the bank accounts of
    your fellows, Mr Foldes?
     
    ~BD~, May 21, 2011
    #11
  12. ~BD~

    ~BD~ Guest

    All noted!
    I have no doubt that you could! :)
    I'm much the same! :)
    Sometimes you are just so...oo full of sh*t, Dustin! ;-)
    Tell us all more about the risk(s) you would take if you *did* decide to
    attack/hack my bank account in 2011. *I* reckon you'd end up in jail!
    I'm very well aware of just how visible I am ..... or at least *was*,
    anyway! The folk who stole my money knew my name, my wife's name, my
    daughter's name (and that she'd come home for a while in her late 20's
    to live with us) plus the full name and phone number of my elderly
    neighbour. They knew my full postal address, knew *when* I had bought my
    house and exactly how much I had paid for it!

    I wasn't too happy about that! ;-)

    I do now accept that it was my own damn fault too! :-(

    BD
     
    ~BD~, May 21, 2011
    #12
  13. ~BD~

    ASCII Guest

    He got you, or so you say?
     
    ASCII, May 21, 2011
    #13
  14. ~BD~

    ASCII Guest

    So somebody's got access to 'LexisNexis'
    or whatever it's called over there?
     
    ASCII, May 21, 2011
    #14
  15. ~BD~

    ~BD~ Guest

    I've never said that! *Someone* stole my funds (that was in 2005!)

    PF has resented me wanting to find out *how* it was achieved.

    I did find Trojan.Bytever (IIRC) afterwards - no idea how it got at my
    machine! <shrug>
     
    ~BD~, May 21, 2011
    #15
  16. ~BD~

    ~BD~ Guest


    I'm afraid that, even with Googling, that's gone way over my head! :-(
     
    ~BD~, May 22, 2011
    #16
  17. ~BD~

    ASCII Guest

    As they say grab your head by the ears and wiggle until it comes free
    then click this: http://en.wikipedia.org/wiki/LexisNexis
     
    ASCII, May 22, 2011
    #17
  18. ~BD~

    Dustin Guest

    Not often, as you might still learn. It's not bragging if you can back
    it up.
    Risks? Well, for starters; I'd be abusing certain privledges I have on
    some very nice networks. I didn't mention jail time, as that isn't a
    primary risk. other things are far worse than that. Why do you think
    eveyrthing is hacking anyway? Is it really hacking If I can tell the
    computers that, I'm you, and want to withdraw some funds? I don't think
    so.
    Most of thats on record. Some of those networks I can play on have
    those records. It's not impossible to "hack" you into oblivion.
    This isn't technically hacking tho, as I already have the security
    clearances and access to the data. It's not fair to insult those who
    would have to work for the information by claiming I was hacking.
    I'm sure you weren't.
     
    Dustin, May 22, 2011
    #18
  19. ~BD~

    Dustin Guest

    Over there, over here.. whats the big difference? [g]
     
    Dustin, May 22, 2011
    #19
  20. ~BD~

    Dustin Guest

    Has it then? I wouldn't suggest you offer money in the future to learn
    about you then. It would have taken all of 3 minutes.
     
    Dustin, May 22, 2011
    #20
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.