-Caveat Lector- --- byron wahl <[EMAIL PROTECTED]> wrote: > Date: Sat, 24 Feb 2001 06:39:02 -0800 (PST) > From: byron wahl <[EMAIL PROTECTED]> > Subject: computer privacy ? > To: [EMAIL PROTECTED] > > > --- byron r wahl <[EMAIL PROTECTED]> wrote: > > To: [EMAIL PROTECTED] > > CC: [EMAIL PROTECTED] > > Date: Sat, 24 Feb 2001 14:06:48 -0800 > > Subject: computer privacy ? > > From: byron r wahl <[EMAIL PROTECTED]> > > > > Hackers claim that we create our own worst > security > > hole by saving > > passwords on the hard disk. It's better not to > check > > the "save password?" > > box.Only encrypted passwords should be stored on > the > > hard disk. You > > should check your disk for the Sub7 Trojan. > > > > Every wire and cable connected to the computer and > > its peripherals > > radiates electronic (RF radio frequencies) signals > > which can be detected > > by high-tech snooper equipment located nearby -- > > even in vans parked > > outside, an apartment in your building and nearby > > houses and apartment > > buildings. It helps to wrap connecting cables with > > metal foil and ground > > the foil and the computer to a cold water pipe. > The > > operation of the > > snooping equipment can be detected by other > snoopers > > because every > > electronic device radiates RF. Super-snoopers use > > detection equipment > > which does not radiate any RF at all. How this is > > done is a secret and > > baffles even the keenest technicians. > > > > In an elaborate set up decoy computers may be > > advisable. They should run > > in a normal unshielded mode and be kept busy when > > the secure computer is > > being used for sensitive operations. A shielded > > semi-secure computer > > operating alone will put out a peculiar and > abnormal > > electronic signature > > which could attract unwanted attention. > > > > The keyboard and monitor connecting cables should > be > > especially carefully > > shielded and grounded. If possible, ground the > > keyboard and monitor as > > well as the computer itself. Plain, clear language > > is typed at the > > keyboard and displayed on the monitor before the > > message is encrypted > > within the computer and dispatched via the modem. > > The radiation of clear > > language must be suppressed as much as possible. > > > > There is available a free download which diffuses > > and muddles the > > monitor's plain language radiation. Some equate > > freeware with spyware but > > we can hope it's not as bad as that. In any case, > > the diffussion method > > isn't 100% so shielding shouldn't be neglected > when > > using it. See: > > www.steganos.com It's also a good idea to search > > the web for data on > > Tempest and van Eyck -- devilish snooper equipment > > capable of inflicting > > great damage. The hackers advise maintaining as > many > > different ISP's and > > access phone numbers as possible. It would seem > that > > wireless access is > > absurd and should be avoided altogether except > > possibly as another ploy > > in the decoy set up. > > > > To see where your web connect is sending your > signal > > -- to the NSA? for > > instance -- check out these firewalls, pingers, > > tracer combo programs > > free from www.neoworx.com and Sharp Technology. > > Your connection > > provider won't like your running these programs. > > They work. A firewall is > > essential. Many use the Zone Alert, it is free. I > > don't know if it is > > advisable to use NeoWatch and Hack Tracer at the > > same. Zone Alert claims > > that their firewall is best when run alone. This > may > > be so. The other two > > are extremely sensitive to packets probing your > > ports and they tell you > > exactly who's doing it and where they are located. > > The server at the > > final hop is often blocked and you can get zero > > information. I don't > > regard that as a good sign. Maps of the routing > are > > provided by NeoWatch > > and Hack Tracer. They're fabulous programs and a > lot > > of fun....also > > useful to learn who's doing what to your > > communications. > > > > Signals carrying sensitive material are presumably > > encrypted going both > > ways through the external modem with dial-up > access. > > > > > Internet access using high-speed fiber-optic TV > > cable access is a > > potential pandora's box of horrible leaks. > Everyone > > on the cable access > > loop near your machine can just dip right in. > > > > Perhaps the best privacy is assured by using > > handwritten code and a fax > > machine. Exchanging code books privately might be > > possible via registered > > mail but I wouldn't recommend trusting that > method; > > some travel would > > probably be necessary. Encryption merely > introduces > > a lag in time. > > Mega-crunchers can get the key within three weeks > > but to be prudent it > > seems three days would be a better estimate. > Caution > > is the better part > > of valor. > > > > The way things are going it looks like the time is > > coming when small > > cells of affinity groups will have to be revived > > along with a closer > > study of the methods used by the French resistance > > during the nazi > > occupation. > > > __________________________________________________ > Do You Yahoo!? > Get email at your own domain with Yahoo! Mail. > http://personal.mail.yahoo.com/ > __________________________________________________ Do You Yahoo!? Get email at your own domain with Yahoo! Mail. http://personal.mail.yahoo.com/ <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om