-Caveat Lector- --- byron wahl <[EMAIL PROTECTED]> wrote: > Date: Thu, 1 Mar 2001 16:32:04 -0800 (PST) > From: byron wahl <[EMAIL PROTECTED]> > Subject: more PC privacy 2 > To: [EMAIL PROTECTED] > > > --- byron wahl <[EMAIL PROTECTED]> wrote: > > Date: Thu, 1 Mar 2001 10:41:51 -0800 (PST) > > From: byron wahl <[EMAIL PROTECTED]> > > Subject: PC privacy 2 > > To: [EMAIL PROTECTED] > > > > > > --- byron r wahl <[EMAIL PROTECTED]> wrote: > > > To: [EMAIL PROTECTED] > > > CC: [EMAIL PROTECTED] > > > Date: Thu, 1 Mar 2001 17:15:16 -0800 > > > Subject: PC privacy 2 > > > From: byron r wahl <[EMAIL PROTECTED]> > > > As a precaution, immediately following the clean re-install of WIN98, go to Zone Labs and download their firewall -- the process does not require the use of Winzip which you may install later. Also, be sure to run RegClean, another download available from many sources. It removes redundant registry entries -- it's essential if the operating system has been in use for a long time. It speeds up everything. > > > ..........................more PC privacy > > > 2........................... > > "flexy" from http://flexy.mastak.com/ cleans out > > and pumps up temporary memory. RAM is drained > badly by some applications. flexy may? also > whisk > away some hostile implants acquired online. It's > good, quick and easy. > > > > > > Reading online data concerning computer and > > internet > > > communication > > > privacy leaves me feeling somewhat discouraged. > > > Apparently it doesn't > > > really exist. The multi-billion dollar > > corporations > > > don't trust anything, > > > period. The best they can do is to use very > strong > > > encryption and private > > > lines. > > > > > > Some of the internet privacy freaks and > > > techno-supergeeks resort to > > > "proxy servers" which render the user kind of > > > invisible-like to his ISP. > > > The proxy mode of access is hard to understand > > let > > > alone install, tweak, > > > and actually use. It involves a mysterious > > something > > > called an "external > > > shell" which is regarded as essential for > secure, > > or > > > maybe almost-secure, > > > operations. In any case, the use of these > methods > > > amounts to waving a red > > > flag in the face of your service provider since > > they > > > are the > > > self-appointed guardians of our sexual purity > and > > > national insecurity. > > > > > > The use of encryption isn't regarded with such > > dark > > > suspicion because it > > > has become a normal part of doing internet > > business. > > > If it's good for > > > business it must be OK. And of course encryption > > > always has a "back-door" > > > to facilitate fedbeast's access to our most > > private > > > affairs. > > > > > > The easiest smoke-screen to operate behind is > > > probably the time-honored > > > anonymous web-surfing provider. The swiftest and > > > least commercialized > > > anonymous surfer I've found so far may be found > at > > > > > www.safeweb.com and > > > it's a joy to use. For the encrypted anonymous > > email > > > remailer try > > > www.all-nettools.com/ -- both sites are mines > of > > > marvelous, much-needed > > > information. > > > > > > For the firewall probing packets blocker go to > > > www.neoworx.com and try > > > their NeoWatch. I use Hack Tracer which is Sharp > > > Technology and it's > > > associated with Neoworx. Another one is the old > > > standby Zone Alarm from > > > Zone Labs -- it reports offenders' DNS numbers > > > emanating from operatives > > > not reported by the others and vice versa so I > use > > > two of them. It's > > > amazing the hanky-panky going on all the time > when > > > you access the > > > internet. > > > > > > After you get the DNS numbers of the probers > enter > > > those into SmartWhois > > > downloaded from www.tamos.com/ SmartWhois is > > > incredibly fabulous. It > > > really gets into the exact detail of who is > trying > > > to sneak their way > > > into your computer. > > > For instance, after posting my earlier comments > on > > > computers transmitting > > > your credit card and PIN numbers to > well-equipped > > > spies in nearby > > > buildings I experienced a probe event authored > by > > > the Sakura > > > Bank-Internet online banking collossus in Osaka. > > > They didn't get very > > > far. Their probing packets attempted to enter > via > > a > > > very obscure port > > > normally used for nothing. > > > > > > As we all know, cookies and history should be > > > expunged before going > > > online. Also, the program Kleen-It downloaded > from > > > > > www.overware.com > > > removes the files implanted by Microbloat, > online > > > service providers, and > > > other miscreants -- files which virus scans > can't > > > scan so we shouldn't > > > have them hanging around on our hard disk. > Trojans > > > are not detected by > > > anti-virus scans. Trojans can wreak havoc. You > can > > > download a Sub7 Trojan > > > detector/expunger -- use a search engine to > locate > > > it. Sub7 works as a > > > .EXE plague. > > > > > > One solution is simply to avoid having any > serious > > > data on the hard disk > > > of your online computer. Sensitive data may be > > kept > > > on an isolated > > > computer which is never used to access the > > internet. > > > Thermonuclear > > > operatives use that method. The online computer > > > should be periodically > > > wiped clean and the operating system > re-installed > > > from scratch. This is > > > easily done if you are using Windows98 (WIN98). > > > This method nullifies > > > surreptitious files, undetectable trojans etc > etc > > > which your security > > > precautions failed to block. The probers will be > > > attempting to enter a > > > machine which features a big zero if they do > > manage > > > to get inside. Only > > > encrypted passwords should be stored on the hard > > > disk. Never check yes > > > for the Save Password? box when you login. Don't > > > store credit card > > > numbers on the hard disk, ever. > > > > > > A word of caution concerning Linux. If Linux is > > > installed using the > > > entire hard disk, i.e., Linux is the only > > operating > > > system installed, you > > > will not be able to drop Linux and re-install > > > Windows because LILO -- the > > > Linux Loader -- is glued to the hard disk with > > > immutable epoxy and > > > prevents the installation of Windows or anything > > > else except the > > > reinstallation of Linux. To be rid of it > > > necessitates writing zeros from > > > one end of the hard disk to the other -- it's a > > > little program which runs > > > from one floppy -- then there is nothing on the > > hard > > > disk so that even C: > > > produces no results whatever. In order to > > reinstall > > > WIN98 you will have > > > to use the emergency boot floppy which you've > > aleady > > > made (one hopes) and > > > it contains the CD-ROM driver which you are > > actually > > > using so you can > > > load WIN98 from its CD-ROM and not have to > install > > > the correct CD-ROM > > > driver afterward. > > > > > > For ordinary reinstallation of WIN98 reboot > WIN98 > > in > > > the MS-DOS mode and > > > at the C: prompt type format C: /s (It looks > like > > > this, C:\>format C: > > > /s ) the /s is crucial because by using it the > DOS > > > boot files are > > > retained or migrate to the beginning of your > > totally > > > empty re-formatted > > > hard disk and you may proceed easily to > reinstall > > > WIN98 using your > > > emergency boot floppy which contains the CD-ROM > > > driver you are actually > > > using in that computer -- then proceed as usual. > > > When you get to question > > > Help? and the A: prompt greets you, simply type > D: > > > > > then enter. At the D: > > > prompt enter "setup" (without the quote marks) > > with > > > the WIN98 CD-ROM in > > > the D: drive. Try to avoid getting involved with > > the > > > partition hassle > > > (DOS) fdisk -- unless you're an old hand with > such > > > dossian operations. > > > > > > Your final backup and cure is to erase the > entire > > > hard drive, that is, > > > reformat from the C:\> prompt the hard disk, and > > do > > > a clean install of > > > the operating system. I'm not sure, but there > may > > be > > > a possiblity of > > > destructive insertions in the DOS boot- up > sector > > so > > > for a fully > > > bullet-proof approach the hard disk should be > > > totally erased (i.e., > > > format C: but without the /s) and zeros > written. > > > Then you must use fdisk > > > (not a pleasant task) and it should be done from > a > > > floppy which is "pure" > > > and not infected with whatever. Hopefully that > is > > > the condition of the > > > installation floppy which comes with the WIN98 > > > installation CD-ROM > > > package but then later you will have to install > > the > > > CD-ROM driver since > > > the WIN98 startup installation floppy will use a > > > temporary generic CD-ROM > > > driver for loading the CD-ROM. The floppy is > > > necessary in order to set > > > up a partition (which must then be formatted, > > don't > > > forget that) for the > > > installation of Windows from the WIN98 CD-ROM. > > There > > > is sufficient DOS > > > data on the floppy to do the partition and its > > > formatting. Be sure you have the drivers for > your > > hardware -- especially the modem driver, it's on a > > floppy or a CD-ROM -- they are not difficult to > > install, usually. > > > > > > Your serious, isolated, 100% secure computer > > should > > > have a partition > > > where DOS 6.22 (the final flowering of DOS) is > > > installed. The DOS in > > > Windows is incomplete and not the entire ball of > > > dossian wax. That will > > > involve another fdisk partition hassle -- a > > > procedure which is difficult > > > to get used to and not at all user friendly but > it > > > can be done. If you > > > are running NT4 re-installation is difficult and > > > beyond the scope of the > > > novice. > > > > > > A final gloomy note: all of the security > blocking, > > > tracing, cleansing, > > > and other highly touted cures mentioned above, > may > > > have their "backdoors" > > > written into the programs. Seventy-six years in > > > this insane country > > > hasn't made me a trusting person. > > > > > > __________________________________________________ > > Do You Yahoo!? > > Get email at your own domain with Yahoo! Mail. > > http://personal.mail.yahoo.com/ > > > > > __________________________________________________ > Do You Yahoo!? > Get email at your own domain with Yahoo! Mail. > http://personal.mail.yahoo.com/ > __________________________________________________ Do You Yahoo!? Get email at your own domain with Yahoo! Mail. http://personal.mail.yahoo.com/ <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om