Re: [CTRL] PC privacy 7

2001-03-18 Thread Bond



- Original Message - 

From: "byron wahl" <[EMAIL PROTECTED]>

Subject: [CTRL] PC privacy 7
 
> > I'd been 
pinging or attempting to snoop around the NSA HQ address> > 
144.51.101.73 (mil, Fort Meade, MD) when, very soon thereafter, 
BlackIce> > Defender reported a suspicious, not-ordinary, 
probe> > from Haifa. This turned-out to be 
194.90.104.134> > ([EMAIL PROTECTED]) 
Haifa, Israel. The site www.netvision.net.il
> > is entirely in Hebrew with no place to click on 
"English." Doubly cryptikk.
 
*** If you lookup netvision.net.il there's this 
under the DNS:
 
dns.netvision.net.ilnypop.elron.netrelay.huji.ac.il
 
*** Then a lookup 
of Elron.net:
 
Elron Technologies850 Third AveNew York, NY 10022US
 
Group, WAN
[EMAIL PROTECTED]NetVision 
LTD.Omega Center Advanced Technology Center MATAMHAIFA, IL 
31905ISRAEL
 
*** Now a check of Elron 
Technologies:
 
http://www.ipo.com/venture/vcprofile.asp?p=IPO&vc=732
 
Corporation Profile:
 
Elron Electronic Industries, Ltd.
The Triangle Building, 42nd Floor3 Azrieli CenterTel Aviv, NON-US 
67023Israel
 
Company Description Elron is a multinational high technology holding 
company.
Elron participates in the manufacturing of defense 
electronics, communications,
semiconductors and, increasingly, information technology.
 
Regional Investment HistoryFlorida  
50%NON-US  50%
 
Sector Investment HistoryTelecommunications  
100%Internet  50%
 
*** And so we see the "Defense" connection. Note 
also "The Triangle Building" (Pyramid reference?)
 
*** Now.. a little more digging finds a 
subsidiary:
 
Elron Software
 
Company Overview 
 
ProfileSince 1997, Elron Software has been the leading provider of 
Internet Policy Management (IPM) solutions, which enable organizations and 
service providers to maximize the productive use of the Internet and minimize 
risk. Over 3,500 organizations utilize Elron Software's award-winning family of 
solutions for web access control, electronic messaging, content filtering, virus 
protection and network security. With worldwide headquarters in Burlington, 
Massachusetts, Elron Software has 120 employees and is a private company whose 
investors include Elron Electronic Industries Ltd. (Nasdaq: 
ELRNF) and Critical Path (NASDAQ:CP)
 
ProductsThe Internet 
Manager (IM) family of solutions - including IM Web 
Inspector, IM Message 
Inspector, IM 
Anti-Virus and IM Firewall 
- enables companies to develop, implement and manage comprehensive Internet 
Usage Policies. The recipient of numerous awards, including PC Magazine's 
prestigious Editor's Choice Award and Network Computing Editors' Choice Award, 
as well as IDC's #1 Selling Stand-alone Web Access Solution, the Internet 
Manager family of solutions empowers organizations of all sizes to: 

  Align Internet usage with business priorities 
  Increase employee productivity 
  Protect confidential information 
  Reduce network congestion 
  Limit legal liability by managing web access, reducing recreational 
  surfing and blocking spam, viruses and junk e-mail
*** Firewall experts among 
other things huh.
 
ClientsJoin the growing number of 
organizations who have aligned Internet usage with their business 
priorities:
20th Century Fox, Wal-Mart, Texaco, Lucent 
Technologies, Time Warner and many 
more. 
 
*** Hmm... a LUCENT TECHNOLOGIES connection... 
how surprising. ;-)
 
Executive Team Ray 
BoeligPresident and Chief Executive 
Officer Larry 
DeranyChief Operating Officer and Vice 
President of Engineering Duncan G. 
PerryChief Financial Officer and Vice 
President of Information Systems Adam 
BosnianVice President of Marketing 
Michael J. 
CrismondVice President of North American 
Sales Mark 
UickerVice President of Business 
Development
 
*** I think 
there may be some further things of interest here, however this data is a 
good start.
 
Bond.
 
 


Re: [CTRL] PC privacy 7

2001-03-18 Thread kl

-Caveat Lector-

> --- byron r wahl <[EMAIL PROTECTED]> wrote:
> > To: [EMAIL PROTECTED]
> > CC: [EMAIL PROTECTED]
> > Date: Sun, 18 Mar 2001 18:43:32 +
> > Subject: PC privacy 7
> > From: byron r wahl <[EMAIL PROTECTED]>
> >

What happened to PC privacy 6?
--

Best Wishes


Political correctness is just tyranny with manners.   ~~Charlton Heston

http://www.ctrl.org/">www.ctrl.org
DECLARATION & DISCLAIMER
==
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]

http:[EMAIL PROTECTED]/
 http:[EMAIL PROTECTED]/">ctrl

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] PC privacy 7

2001-03-18 Thread byron wahl

-Caveat Lector-

--- byron r wahl <[EMAIL PROTECTED]> wrote:
> To: [EMAIL PROTECTED]
> CC: [EMAIL PROTECTED]
> Date: Sun, 18 Mar 2001 18:43:32 +
> Subject: PC privacy 7
> From: byron r wahl <[EMAIL PROTECTED]>
>
> Some odd developments following the probe from Mr
> Big Bank, Osaka. I'd
> been pinging or attempting to snoop around the NSA
> HQ address
> 144.51.101.73 (mil, Fort Meade, MD) when, very soon
> thereafter, BlackIce
> Defender reported a suspicious, not-ordinary, probe
> from Haifa. This
> turned-out to be 194.90.104.134
> ([EMAIL PROTECTED]) Haifa,
> Israel. The site www.netvision.net.il  is entirely
> in Hebrew with no
> place to click on "English." Doubly cryptikk.
>
> Descriptions by some users at www.downloads.com/
> report that BlackIce
> Defender used in conjunction with Tiny Personal
> Firewall provide
> excellent "security" (inspite of Microbloat being
> one huge backdoor leak
> to fedbeast 666 in the District and Langley
> according to German
> government investigators who have decided to banish
> MS from their
> Teutonic operations).
>
> There is nothing "tiny" about the Tiny Personal
> Firewall. It may be the
> best available for a free download but requires a
> lot of know-how in
> order to set the port priorities and a million other
> things which the
> ordinary human has never heard of let alone
> adjusted. BlackIce Defender
> doesn't let much pass that's of significance (one
> hopes). Ice gets the
> numbers, SmartWhois gets the exact details
> concerning who's up to what
> and where www.tamos.com/ .
>
> There certainly is a backdoor at my location in
> Vermont. At times when I
> log on to sover.net or juno.com the browser IE4.03
> simply will not access
> the internet. (via local Northland Telephone Co.
> lines == a joke) This
> occurs after I have fired-off very resistant-type
> emails to whomever
> fedbeast loathes the most. There is also,
> apparently, an adjustable
> slow-down mechanism which makes everything on the
> web move at less than a
> snail's pace. This procedure is often accompanied by
> threatening violent
> door-bangings in this apartment building -- the
> "Green Mountain State"
> crawling with very green secret police imbeciles and
> multi-billionaires
> who have taken over. The locals are mere servants.
>
> For those who don't already know about it, useful
> free scans of your
> internet connection in every aspect are available
> from
> www.dslreports.com/scan  but it's best to connect
> there during quiet
> times like 3 or 4 am. There's often a waiting line.
>
> Reported in an earlier post, the QNX Demodisk
> wonderworker which runs out
> of RAM exclusively, will not work with Winmodems --
> it's no wonder:
> another Microbkloat aberration. You should try it
> www.qnx.com/
>
> An easy way out of the horrors of setting-up a proxy
> server may be to
> simply use anonymous surfing. A choice of four are
> available at
> www.all-nettools.com/
> and on the same page are two anonymous remailers.
> One (above the other)
> is Riot (an MIT operation) which actually works.
> Below it is Freedom
> which is not reliable. Use both and something may
> get through. So far, I
> don't think Riot remailer has ever failed. Test them
> both.
>
> As mentioned in an earlier post KleenIt from
> www.overware.com/  will
> purge your hard disk of pesky little files
> downloaded unbeknownst to you
> while on line -- stuff that anti-virus scans can't
> scan. Juno seems to
> plant at least one every time and that makes any
> other access almost
> inoperative. Of course Microbloat packs in crap all
> the
> timeapparently essential to making all the bloat
> work at all -- or
> work around the pipeline to Langley.


__
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail.
http://personal.mail.yahoo.com/

http://www.ctrl.org/">www.ctrl.org
DECLARATION & DISCLAIMER
==
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]

http:[EMAIL PROTECTED]/
 http:[EMAIL PROTECTED]/">ctrl

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]


[CTRL] PC privacy 5

2001-03-07 Thread byron wahl

-Caveat Lector-

--- [EMAIL PROTECTED] wrote:
> From: [EMAIL PROTECTED]
> To: [EMAIL PROTECTED]
> Date: Wed, 7 Mar 2001 16:49:43 -
> Subject: PC privacy 5
>
> PC privacy
> 5..
>
> Very difficult working conditions here.
>
> The firewall/blocking probing packets security
> subject is more
> complex than it may seem at first glance.
>
> Trojans get in but they have to send data out to
> complete their
> nasty mission. Zone Labs'  Zone Alarm claims to be
> the best at
> blocking bad stuff coming in and going out.
>
> NeoWatch and Hack Tracer appear to be about the same
> although
> I prefer Hack Tracer. Hack Tracer catches some heavy
> probes
> which Zone Alarm does not report. Zone Alarm blocks
> stuff which
> Hack Tracer does not report so I use both. After
> much digging I'm
> back to square one: Zone Alarm and Hack Tracer. I
> mean a lot of
> digging and reading. I still doubt that any of these
> blocking
> programs are reliable. The net is a seething mass of
> treachery and
> deception.
>
> After you get the DNS, input the numbers to
> SmartWhois and you
> will know exactly who is attempting to violate your
> machine.
>
> A sure cure for negative penetration of your hard
> disk is to move
> about web sites while operating exclusively from
> RAM, temporary
> memory. There is a miraculous deliverance and it is
> known as the
> QNX demo floppy, available free download at
> www.qnx.com/  a
> Canadian outfit. The basic program was written by a
> miracle worker
> who died of cancer at age 37 years.
>
> That 1.44M floppy does brilliantly what Microbloat
> can't do with its
> 240MB. It is so fast on the web that it's
> mind-boggling.
>
> QNX is addictive, do not fail to try it. It is also
> handy in case you
> experience a total melt-down of your operating
> system. Boot with
> QNX and you'll be right back online.you don't
> even need a hard
> disk!
>
> E-mail can't be sent to QNX but you can get your
> mail at Yahoo,
> Excite, or whatever (free email service at
> www.ireland.com  works
> fine with QNX both sending and receiving mail)  QNX
> sends mail
> just jimdandy using some web based email services
> while others
> don't seem to like QNX. Experiment. It may be
> possible to send
> anonymous remailer email while running QNX in RAM.
> The hard
> disk and Microwhatever are completely out of the
> picture. When
> you back out and shut down the computer any traces
> of incoming
> nastiness evaporate into zero.
>
> QNX does not work with file systems in NT4 and NT5
> (WIN2K).
> Many ISPs run servers using NT.
>
> www.qnx.com/
>
> A good test site is  www.oomph.net  when everything
> is running
> properly the connection is almost instantaneous.
> It's an Apache
> server running Red Hat Linux. It is located in
> Seoul, South Korea.
>
> I
>
>


__
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail.
http://personal.mail.yahoo.com/

http://www.ctrl.org/">www.ctrl.org
DECLARATION & DISCLAIMER
==
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]

http:[EMAIL PROTECTED]/
 http:[EMAIL PROTECTED]/">ctrl

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



Re: [CTRL] PC privacy 4 alert

2001-03-04 Thread c.

-Caveat Lector-

well- if it was all installed (as advised)  together then it would be false
positive city - as well being *more* than enough information to protect
yourself with. the advice in the series of postings is *sometimes* sound-
but more confusing than ever for a newbie looking to secure his/ her puter
and there is something tabloidy and scaremongery about it that smells fishy
:)

if you want a secure puter get ONE firewall and ONE virus checker. nothing
more is needed to stop anything coming in the way.

the biggest threat to anyone is a remote administration tool (RAT) that can
control your puter from afar-  one of the true computer conspiracies last
year was the obscuring by the media of the fact that the "i love you" virus
was a small server for a RAT- bad for confidence in ecommerce if everyone
and his brother is open all hours, y'know?
RATs themselves are generally swept under the carpet and are portrayed as
possible urban myth.
as byron mentions- SUBSEVEN is the most popular and most sophisticated-
everyone should try it- until you have been hit by someone using subseven
against you- you haven't felt insecure online LOL
it is scarey. but nothing a firewall can't deal with.


- Original Message -
From: "byron wahl" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Sunday, March 04, 2001 3:46 AM
Subject: [CTRL] PC privacy 4 alert


> -Caveat Lector-
>
> --- byron wahl <[EMAIL PROTECTED]> wrote:
> > Date: Sat, 3 Mar 2001 19:44:52 -0800 (PST)
> > From: byron wahl <[EMAIL PROTECTED]>
> > Subject: PC privacy 4 alert
> > To: [EMAIL PROTECTED]
> >
> > The firewalls/port probe blockers described in
> > earlier
> > posts may NOT be reliable. Test them carefully
> > before
> > placing full reliance upon them.
> >
> > We are searching for something 100% reliable. Will
> > report what we find.
> >
> > __
> > Do You Yahoo!?
> > Get email at your own domain with Yahoo! Mail.
> > http://personal.mail.yahoo.com/
> >
>
>
> __
> Do You Yahoo!?
> Get email at your own domain with Yahoo! Mail.
> http://personal.mail.yahoo.com/
>
> http://www.ctrl.org/">www.ctrl.org
> DECLARATION & DISCLAIMER
> ==
> CTRL is a discussion & informational exchange list. Proselytizing
propagandic
> screeds are unwelcomed. Substancenot soap-boxingplease!  These are
> sordid matters and 'conspiracy theory'with its many half-truths, mis-
> directions and outright fraudsis used politically by different groups with
> major and minor effects spread throughout the spectrum of time and
thought.
> That being said, CTRLgives no endorsement to the validity of posts, and
> always suggests to readers; be wary of what you read. CTRL gives no
> credence to Holocaust denial and nazi's need not apply.
>
> Let us please be civil and as always, Caveat Lector.
> 
> Archives Available at:
> http://peach.ease.lsoft.com/archives/ctrl.html
>  http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
> [EMAIL PROTECTED]
>
> http:[EMAIL PROTECTED]/
>  http:[EMAIL PROTECTED]/">ctrl
> 
> To subscribe to Conspiracy Theory Research List[CTRL] send email:
> SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
>
> To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
> SIGNOFF CTRL [to:] [EMAIL PROTECTED]
>
> Om

http://www.ctrl.org/">www.ctrl.org
DECLARATION & DISCLAIMER
==
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]

http:[EMAIL PROTECTED]/
 http:[EMAIL PROTECTED]/">ctrl

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] PC privacy 4 alert

2001-03-03 Thread byron wahl

-Caveat Lector-

--- byron wahl <[EMAIL PROTECTED]> wrote:
> Date: Sat, 3 Mar 2001 19:44:52 -0800 (PST)
> From: byron wahl <[EMAIL PROTECTED]>
> Subject: PC privacy 4 alert
> To: [EMAIL PROTECTED]
>
> The firewalls/port probe blockers described in
> earlier
> posts may NOT be reliable. Test them carefully
> before
> placing full reliance upon them.
>
> We are searching for something 100% reliable. Will
> report what we find.
>
> __
> Do You Yahoo!?
> Get email at your own domain with Yahoo! Mail.
> http://personal.mail.yahoo.com/
>


__
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail.
http://personal.mail.yahoo.com/

http://www.ctrl.org/">www.ctrl.org
DECLARATION & DISCLAIMER
==
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]

http:[EMAIL PROTECTED]/
 http:[EMAIL PROTECTED]/">ctrl

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] PC privacy 3

2001-03-01 Thread byron wahl

-Caveat Lector-

--- byron wahl <[EMAIL PROTECTED]> wrote:
> Date: Thu, 1 Mar 2001 16:32:04 -0800 (PST)
> From: byron wahl <[EMAIL PROTECTED]>
> Subject: more PC privacy 2
> To: [EMAIL PROTECTED]
>
>
> --- byron wahl <[EMAIL PROTECTED]> wrote:
> > Date: Thu, 1 Mar 2001 10:41:51 -0800 (PST)
> > From: byron wahl <[EMAIL PROTECTED]>
> > Subject: PC privacy 2
> > To: [EMAIL PROTECTED]
> >
> >
> > --- byron r wahl <[EMAIL PROTECTED]> wrote:
> > > To: [EMAIL PROTECTED]
> > > CC: [EMAIL PROTECTED]
> > > Date: Thu, 1 Mar 2001 17:15:16 -0800
> > > Subject: PC privacy 2
> > > From: byron r wahl <[EMAIL PROTECTED]>
> > >
  As a precaution, immediately following the clean

  re-install of WIN98, go to Zone Labs and
  download their firewall -- the process does not
  require the use of Winzip which you may install
  later. Also, be sure to run RegClean, another
  download available from many sources. It removes
  redundant registry entries -- it's essential if
  the operating system has been in use for a long
  time. It speeds up everything.

> > > ..more PC privacy
> > > 2...
>
> "flexy" from http://flexy.mastak.com/ cleans out
>
> and pumps up temporary memory. RAM is drained
> badly by some applications. flexy may? also
> whisk
> away some hostile implants acquired online. It's
> good, quick and easy.
> > >
> > > Reading online data concerning computer and
> > internet
> > > communication
> > > privacy leaves me feeling somewhat discouraged.
> > > Apparently it doesn't
> > > really exist. The multi-billion dollar
> > corporations
> > > don't trust anything,
> > > period. The best they can do is to use very
> strong
> > > encryption and private
> > > lines.
> > >
> > > Some of the internet privacy freaks and
> > > techno-supergeeks resort to
> > > "proxy servers" which render the user kind of
> > > invisible-like to his ISP.
> > >  The proxy mode of access is hard to understand
> > let
> > > alone install, tweak,
> > > and actually use. It involves a mysterious
> > something
> > > called an "external
> > > shell" which is regarded as essential for
> secure,
> > or
> > > maybe almost-secure,
> > > operations. In any case, the use of these
> methods
> > > amounts to waving a red
> > > flag in the face of your service provider since
> > they
> > > are the
> > > self-appointed guardians of our sexual purity
> and
> > > national insecurity.
> > >
> > > The use of encryption isn't regarded with such
> > dark
> > > suspicion because it
> > > has become a normal part of doing internet
> > business.
> > > If it's good for
> > > business it must be OK. And of course encryption
> > > always has a "back-door"
> > > to facilitate fedbeast's access to our most
> > private
> > > affairs.
> > >
> > > The easiest smoke-screen to operate behind is
> > > probably the time-honored
> > > anonymous web-surfing provider. The swiftest and
> > > least commercialized
> > > anonymous surfer I've found so far may be found
> at
> >
> > > www.safeweb.com  and
> > > it's a joy to use. For the encrypted anonymous
> > email
> > > remailer try
> > > www.all-nettools.com/  -- both sites are mines
> of
> > > marvelous, much-needed
> > > information.
> > >
> > > For the firewall probing packets blocker go to
> > > www.neoworx.com  and try
> > > their NeoWatch. I use Hack Tracer which is Sharp
> > > Technology and it's
> > > associated with Neoworx. Another one is the old
> > > standby Zone Alarm from
> > > Zone Labs -- it reports offenders' DNS numbers
> > > emanating from operatives
> > > not reported by the others and vice versa so I
> use
> > > two of them. It's
> > > amazing the hanky-panky going on all the time
> when
> > > you access the
> > > internet.
> > >
> > > After you get the DNS numbers of the probers
> enter
> > > those into SmartWhois
> > > downloaded from  www.tamos.com/  SmartWhois is
> > > incredibly fabulous. It
> > > really gets into the exact detail of who is
> trying
> > > to sneak their way
> > > into your computer.
> > > For instance, after posting my earlier comments
> on
> > > computers transmitting
> > > your credit card and PIN numbers to
> well-equipped
> > > spies in nearby
> > > buildings I experienced a probe event authored
> by
> > > the Sakura
> > > Bank-Internet online banking collossus in Osaka.
> > > They didn't get very
> > > far. Their probing packets attempted to enter
> via
> > a
> > > very obscure port
> > > normally used for nothing.
> > >
> > > As we all know, cookies and history should be
> > > expunged before going
> > > online. Also, the program Kleen-It downloaded
> from
> >
> > > www.overware.com
> > > removes the files implanted by Microbloat,
> online
> > > service providers, and
> > > other miscreants -- files which virus scans
> can't
> > > scan so we shouldn't
> > > have them hanging around on our hard disk.
> Trojans
> > > are not detected by
> > > anti-virus scans. Trojans can wreak havoc. You

[CTRL] PC privacy 2

2001-03-01 Thread byron wahl

-Caveat Lector-

--- byron wahl <[EMAIL PROTECTED]> wrote:
> Date: Thu, 1 Mar 2001 10:41:51 -0800 (PST)
> From: byron wahl <[EMAIL PROTECTED]>
> Subject: PC privacy 2
> To: [EMAIL PROTECTED]
>
>
> --- byron r wahl <[EMAIL PROTECTED]> wrote:
> > To: [EMAIL PROTECTED]
> > CC: [EMAIL PROTECTED]
> > Date: Thu, 1 Mar 2001 17:15:16 -0800
> > Subject: PC privacy 2
> > From: byron r wahl <[EMAIL PROTECTED]>
> >
> > PC privacy
> > 2...
> >
> > Reading online data concerning computer and
> internet
> > communication
> > privacy leaves me feeling somewhat discouraged.
> > Apparently it doesn't
> > really exist. The multi-billion dollar
> corporations
> > don't trust anything,
> > period. The best they can do is to use very strong
> > encryption and private
> > lines.
> >
> > Some of the internet privacy freaks and
> > techno-supergeeks resort to
> > "proxy servers" which render the user kind of
> > invisible-like to his ISP.
> >  The proxy mode of access is hard to understand
> let
> > alone install, tweak,
> > and actually use. It involves a mysterious
> something
> > called an "external
> > shell" which is regarded as essential for secure,
> or
> > maybe almost-secure,
> > operations. In any case, the use of these methods
> > amounts to waving a red
> > flag in the face of your service provider since
> they
> > are the
> > self-appointed guardians of our sexual purity and
> > national insecurity.
> >
> > The use of encryption isn't regarded with such
> dark
> > suspicion because it
> > has become a normal part of doing internet
> business.
> > If it's good for
> > business it must be OK. And of course encryption
> > always has a "back-door"
> > to facilitate fedbeast's access to our most
> private
> > affairs.
> >
> > The easiest smoke-screen to operate behind is
> > probably the time-honored
> > anonymous web-surfing provider. The swiftest and
> > least commercialized
> > anonymous surfer I've found so far may be found at
>
> > www.safeweb.com  and
> > it's a joy to use. For the encrypted anonymous
> email
> > remailer try
> > www.all-nettools.com/  -- both sites are mines of
> > marvelous, much-needed
> > information.
> >
> > For the firewall probing packets blocker go to
> > www.neoworx.com  and try
> > their NeoWatch. I use Hack Tracer which is Sharp
> > Technology and it's
> > associated with Neoworx. Another one is the old
> > standby Zone Alarm from
> > Zone Labs -- it reports offenders' DNS numbers
> > emanating from operatives
> > not reported by the others and vice versa so I use
> > two of them. It's
> > amazing the hanky-panky going on all the time when
> > you access the
> > internet.
> >
> > After you get the DNS numbers of the probers enter
> > those into SmartWhois
> > downloaded from  www.tamos.com/  SmartWhois is
> > incredibly fabulous. It
> > really gets into the exact detail of who is trying
> > to sneak their way
> > into your computer.
> > For instance, after posting my earlier comments on
> > computers transmitting
> > your credit card and PIN numbers to well-equipped
> > spies in nearby
> > buildings I experienced a probe event authored by
> > the Sakura
> > Bank-Internet online banking collossus in Osaka.
> > They didn't get very
> > far. Their probing packets attempted to enter via
> a
> > very obscure port
> > normally used for nothing.
> >
> > As we all know, cookies and history should be
> > expunged before going
> > online. Also, the program Kleen-It downloaded from
>
> > www.overware.com
> > removes the files implanted by Microbloat, online
> > service providers, and
> > other miscreants -- files which virus scans can't
> > scan so we shouldn't
> > have them hanging around on our hard disk. Trojans
> > are not detected by
> > anti-virus scans. Trojans can wreak havoc. You can
> > download a Sub7 Trojan
> > detector/expunger -- use a search engine to locate
> > it.  Sub7 works as a
> > .EXE  plague.
> >
> > One solution is simply to avoid having any serious
> > data on the hard disk
> > of your online computer. Sensitive data may be
> kept
> > on an isolated
> > computer which is never used to access the
> internet.
> > Thermonuclear
> > operatives use that method. The online computer
> > should be periodically
> > wiped clean and the operating system re-installed
> > from scratch. This is
> > easily done if you are using Windows98  (WIN98).
> > This method nullifies
> > surreptitious files, undetectable trojans etc etc
> > which your security
> > precautions failed to block. The probers will be
> > attempting to enter a
> > machine which features a big zero if they do
> manage
> > to get inside. Only
> > encrypted passwords should be stored on the hard
> > disk. Never check yes
> > for the Save Password? box when you login. Don't
> > store credit card
> > numbers on the hard disk, ever.
> >
> > A word of caution concerning Linux. If Linux is
> > installed using the
> > entire hard disk, i.e., Linux is the only
> operating
> > s

Re: [CTRL] PC privacy

2001-02-26 Thread Nessie

-Caveat Lector-

  > According to www.stopcarnivore.org/ there are only
  > two (2) internet service providers
  > in the US which have publicly stated that they will
  > not permit the FBI's illegal
  > carnivore equipment to be used to spy upon their
  > customers: Earthlink.net and RMI.net
  > (Denver).



That's what they say, anyway.

www.ctrl.org
DECLARATION & DISCLAIMER
ÝÝÝCTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
ÝÝÝÚrchives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 Archives of
[EMAIL PROTECTED]

http:[EMAIL PROTECTED]/
 ctrl
o subscribe to Conspiracy Theory Research List[CTRL] send 
email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] PC privacy

2001-02-25 Thread byron wahl

-Caveat Lector-

--- byron wahl <[EMAIL PROTECTED]> wrote:
> Date: Sun, 25 Feb 2001 10:10:18 -0800
> From: byron wahl <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> CC: [EMAIL PROTECTED]
> Subject: PC privacy
>
> .PC privacy.
>
> It has been said that Woodrow Wilson said that
> government will never produce liberty,
> only resistance will bring about liberty.
>
> View computers as low-power radio transmitters.
> Ideally, for purposes of privacy, only
> manually encoded (use no keyboard of any kind) text
> and data should be typed at the
> computer keyboard. From there it is encrypted by the
> computer: a double code with no
> clear language radio transmission from the the
> keyboard and monitor cables -- which
> should be shielded using metal foil and grounded to
> a cold water pipe.
>
> According to www.stopcarnivore.org/ there are only
> two (2) internet service providers
> in the US which have publicly stated that they will
> not permit the FBI's illegal
> carnivore equipment to be used to spy upon their
> customers: Earthlink.net and RMI.net
> (Denver).
>
> The free web mail provider www.x-mail.net is located
> in Canada and out of reach of
> criminal FBI carnivore activity although one never
> knows for sure what CSIS may be
> doing in those chilly regions (and don't forget the
> company -- Canada is a foreign
> country). It doesn't require much investigative
> skill to uncover criminal CIA activity
> in Quebec.
>
>

> Web Based E-Mail & Hosting from x-mail.net,
> http://www.x-mail.net
>
> ***Carnivore Free***
http://www.x-mail.net/carnivore_free.html


__
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail.
http://personal.mail.yahoo.com/

http://www.ctrl.org/">www.ctrl.org
DECLARATION & DISCLAIMER
==
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]

http:[EMAIL PROTECTED]/
 http:[EMAIL PROTECTED]/">ctrl

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om