-Caveat Lector-

--- byron wahl <[EMAIL PROTECTED]> wrote:
> Date: Thu, 1 Mar 2001 10:41:51 -0800 (PST)
> From: byron wahl <[EMAIL PROTECTED]>
> Subject: PC privacy 2
> To: [EMAIL PROTECTED]
>
>
> --- byron r wahl <[EMAIL PROTECTED]> wrote:
> > To: [EMAIL PROTECTED]
> > CC: [EMAIL PROTECTED]
> > Date: Thu, 1 Mar 2001 17:15:16 -0800
> > Subject: PC privacy 2
> > From: byron r wahl <[EMAIL PROTECTED]>
> >
> > ................................PC privacy
> > 2...........................
> >
> > Reading online data concerning computer and
> internet
> > communication
> > privacy leaves me feeling somewhat discouraged.
> > Apparently it doesn't
> > really exist. The multi-billion dollar
> corporations
> > don't trust anything,
> > period. The best they can do is to use very strong
> > encryption and private
> > lines.
> >
> > Some of the internet privacy freaks and
> > techno-supergeeks resort to
> > "proxy servers" which render the user kind of
> > invisible-like to his ISP.
> >  The proxy mode of access is hard to understand
> let
> > alone install, tweak,
> > and actually use. It involves a mysterious
> something
> > called an "external
> > shell" which is regarded as essential for secure,
> or
> > maybe almost-secure,
> > operations. In any case, the use of these methods
> > amounts to waving a red
> > flag in the face of your service provider since
> they
> > are the
> > self-appointed guardians of our sexual purity and
> > national insecurity.
> >
> > The use of encryption isn't regarded with such
> dark
> > suspicion because it
> > has become a normal part of doing internet
> business.
> > If it's good for
> > business it must be OK. And of course encryption
> > always has a "back-door"
> > to facilitate fedbeast's access to our most
> private
> > affairs.
> >
> > The easiest smoke-screen to operate behind is
> > probably the time-honored
> > anonymous web-surfing provider. The swiftest and
> > least commercialized
> > anonymous surfer I've found so far may be found at
>
> > www.safeweb.com  and
> > it's a joy to use. For the encrypted anonymous
> email
> > remailer try
> > www.all-nettools.com/  -- both sites are mines of
> > marvelous, much-needed
> > information.
> >
> > For the firewall probing packets blocker go to
> > www.neoworx.com  and try
> > their NeoWatch. I use Hack Tracer which is Sharp
> > Technology and it's
> > associated with Neoworx. Another one is the old
> > standby Zone Alarm from
> > Zone Labs -- it reports offenders' DNS numbers
> > emanating from operatives
> > not reported by the others and vice versa so I use
> > two of them. It's
> > amazing the hanky-panky going on all the time when
> > you access the
> > internet.
> >
> > After you get the DNS numbers of the probers enter
> > those into SmartWhois
> > downloaded from  www.tamos.com/  SmartWhois is
> > incredibly fabulous. It
> > really gets into the exact detail of who is trying
> > to sneak their way
> > into your computer.
> > For instance, after posting my earlier comments on
> > computers transmitting
> > your credit card and PIN numbers to well-equipped
> > spies in nearby
> > buildings I experienced a probe event authored by
> > the Sakura
> > Bank-Internet online banking collossus in Osaka.
> > They didn't get very
> > far. Their probing packets attempted to enter via
> a
> > very obscure port
> > normally used for nothing.
> >
> > As we all know, cookies and history should be
> > expunged before going
> > online. Also, the program Kleen-It downloaded from
>
> > www.overware.com
> > removes the files implanted by Microbloat, online
> > service providers, and
> > other miscreants -- files which virus scans can't
> > scan so we shouldn't
> > have them hanging around on our hard disk. Trojans
> > are not detected by
> > anti-virus scans. Trojans can wreak havoc. You can
> > download a Sub7 Trojan
> > detector/expunger -- use a search engine to locate
> > it.  Sub7 works as a
> > .EXE  plague.
> >
> > One solution is simply to avoid having any serious
> > data on the hard disk
> > of your online computer. Sensitive data may be
> kept
> > on an isolated
> > computer which is never used to access the
> internet.
> > Thermonuclear
> > operatives use that method. The online computer
> > should be periodically
> > wiped clean and the operating system re-installed
> > from scratch. This is
> > easily done if you are using Windows98  (WIN98).
> > This method nullifies
> > surreptitious files, undetectable trojans etc etc
> > which your security
> > precautions failed to block. The probers will be
> > attempting to enter a
> > machine which features a big zero if they do
> manage
> > to get inside. Only
> > encrypted passwords should be stored on the hard
> > disk. Never check yes
> > for the Save Password? box when you login. Don't
> > store credit card
> > numbers on the hard disk, ever.
> >
> > A word of caution concerning Linux. If Linux is
> > installed using the
> > entire hard disk, i.e., Linux is the only
> operating
> > system installed, you
> > will not be able to drop Linux and re-install
> > Windows because LILO -- the
> > Linux Loader -- is glued to the hard disk with
> > immutable epoxy and
> > prevents the installation of Windows or anything
> > else except the
> > reinstallation of Linux. To be rid of it
> > necessitates writing zeros from
> > one end of the hard disk to the other -- it's a
> > little program which runs
> > from one floppy -- then there is nothing on the
> hard
> > disk so that even C:
> > produces no results whatever. In order to
> reinstall
> > WIN98 you will have
> > to use the emergency boot floppy which you've
> aleady
> > made (one hopes) and
> > it contains the CD-ROM driver which you are
> actually
> > using so you can
> > load WIN98 from its CD-ROM and not have to install
> > the correct CD-ROM
> > driver afterward.
> >
> > For ordinary reinstallation of WIN98 reboot WIN98
> in
> > the MS-DOS mode and
> > at the C: prompt type format C: /s  (It looks like
> > this,  C:\>format C:
> > /s ) the /s is crucial because by using it the DOS
> > boot files are
> > retained or migrate to the beginning of your
> totally
> > empty re-formatted
> > hard disk and you may proceed easily to reinstall
> > WIN98 using your
> > emergency boot floppy which contains the CD-ROM
> > driver you are actually
> > using in that computer -- then proceed as usual.
> > When you get to question
> > Help? and the A: prompt greets you, simply type D:
>
> > then enter. At the D:
> > prompt enter "setup" (without the quote marks)
> with
> > the WIN98 CD-ROM in
> > the D: drive. Try to avoid getting involved with
> the
> > partition hassle
> > (DOS) fdisk -- unless you're an old hand with such
> > dossian operations.
> >
> > Your final backup and cure is to erase the entire
> > hard drive, that is,
> > reformat from the C:\> prompt the hard disk, and
> do
> > a clean install of
> > the operating system. I'm not sure, but there may
> be
> > a possiblity of
> > destructive insertions in the DOS boot- up sector
> so
> > for a fully
> > bullet-proof approach the hard disk should be
> > totally erased (i.e.,
> > format C:  but without the /s) and zeros written.
> > Then you must use fdisk
> > (not a pleasant task) and it should be done from a
> > floppy which is "pure"
> > and not infected with whatever. Hopefully that is
> > the condition of the
> > installation floppy which comes with the WIN98
> > installation CD-ROM
> > package but then later you will have to install
> the
> > CD-ROM driver since
> > the WIN98 startup installation floppy will use a
> > temporary generic CD-ROM
> > driver for loading the CD-ROM.   The floppy is
> > necessary in order to set
> > up a partition (which must then be formatted,
> don't
> > forget that) for the
> > installation of Windows from the WIN98 CD-ROM.
> There
> > is sufficient DOS
> > data on the floppy to do the partition and its
> > formatting. Be sure you have the drivers for your
> hardware -- especially the modem driver, it's on a
> floppy or a CD-ROM -- they are not difficult to
> install, usually.
> >
> > Your serious, isolated, 100% secure computer
> should
> > have a partition
> > where DOS 6.22 (the final flowering of DOS) is
> > installed. The DOS in
> > Windows is incomplete and not the entire ball of
> > dossian wax. That will
> > involve another fdisk partition hassle -- a
> > procedure which is difficult
> > to get used to and not at all user friendly but it
> > can be done. If you
> > are running NT4 re-installation is difficult and
> > beyond the scope of the
> > novice.
> >
> > A final gloomy note: all of the security blocking,
> > tracing, cleansing,
> > and other highly touted cures mentioned above, may
> > have their "backdoors"
> > written into the programs. Seventy-six  years in
> > this insane country
> > hasn't made me a trusting person.
>
>
> __________________________________________________
> Do You Yahoo!?
> Get email at your own domain with Yahoo! Mail.
> http://personal.mail.yahoo.com/
>


__________________________________________________
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail.
http://personal.mail.yahoo.com/

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to