[RCSE] Sunday flying at Beyer

2004-10-12 Thread Juster
Anyone flying at Beyer this Sunday.  I will bring the winch

Kirk Stockham, R/C Pilot
Computer Forensics Investigator/Instructor
Stockham Computer Forensics and Investigations
CA PI Lic. #23914
P.O. Box 578351
Modesto, CA  95357
(209) 521-7379  (Voice/Fax)

[EMAIL PROTECTED] 

-Original Message-
From: Chuck Anderson [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 12, 2004 7:41 PM
To: [EMAIL PROTECTED]
Subject: re: [RCSE] Sailaire Spoiler Servo Mount

At 09:08 PM 10/12/2004, you wrote:
>Chuck,
>   You are a better flier than I am to feel that difference in of all 
> things a Sailaire, when I watch guys put in 5 pound blocks for ballast 
> and say they fly no different, I cannot imagine that two wing servos 
> would make much of a difference.  If set up correctly you get crisper 
> action, more adjustability, and more accurate throws.  I am not saying 
> use 2 ounce servos, how about .5 ounce ones with good tight pushrod set 
> ups and that will more than do the job.  I will never make another 
> spoiler ship with out this set up, my Skybench Aerotech Legionaire will 
> be next, I will use JR217's to drive them.
>
>Marc
I didn't say I could feel the difference in the Sailaire.  It is just bad 
engineering to put unnecessary weight in outboard wing panels, especially 
in RES models.  Another thing I don't do on my original designs is put wing 
servos aft of the spar. Bad engineering.  I once even had to add weight at 
the leading edge of the wing near the tip to alleviate a violent wing 
flutter problem on my cross country sailplane.  Another thing I do on my 
original designs is to design the spoilers to avoid pitch problems when 
spoilers are deployed.  Been doing this for 30 years too. My RES models can 
be flown with any three channel radio.  No mixing required.  The Ava and 
Bubble Dander both are my idea of what an RES model should be except for 
the spoiler and modern computer radios can take care of that problem.

Chuck Anderson 

RCSE-List facilities provided by Model Airplane News.  Send "subscribe" and
"unsubscribe" requests to [EMAIL PROTECTED]  Please note that
subscribe and unsubscribe messages must be sent in text only format with
MIME turned off.


RCSE-List facilities provided by Model Airplane News.  Send "subscribe" and 
"unsubscribe" requests to [EMAIL PROTECTED]  Please note that subscribe and 
unsubscribe messages must be sent in text only format with MIME turned off.


[RCSE] Gentle Lady and Bird of Time ARF's-WARNINGS

2004-10-02 Thread Juster








For you beginners our there, like I am:

 

The Gentle Lady ARF Glider should not be
Winch Launched without replacing the stock wooden wing joiner.  Use metal
rod and tube.  I just tried a lightweight launch with the Gentle Lady and
the wings folder up real quickly.  The fix was fast since the foldup break
was clean and only nose fuselage damage.

 

 

The Bird Of Time:  The wing joiners
are now aluminum sandwiched double ply, and should be able to do a NON-ZOOMING
Winch launch.  I will test mine shortly.

 

Kirk

www.hitechpi.net









RE: [RCSE] Virus

2004-09-11 Thread Juster
Finding who the actual sender of virus code requires a series of tracing
steps.  The first step is to examine the sending computer, and work
backwards.  We, in this field, have done this many times.  Unfortunately,
the infected computer is usually held by an innocent victim.  I had one
case, for example, where we served search warrants on a home and seized the
sending computer.  

Once we had the sending computer the real suspect, in another county, was
traced and arrested.  Unfortunately, the owner of the sending computer was
detained at gunpoint, his door was kicked in, and he learned a terrible
lesson.  As an Internet Computer user you must have up-to-date anti-virus
software and a firewall system.  The user has to be aware of folders and
files that are on the user's PC.  Turn off your PC or at least physically
disconnect from the Internet when your computer session if over.  

This user did not have any online protection.  He sure does now, and
literally was quoted as saying later: "Don't use the internet without
anti-virus and firewall protection."

With the war on terrorism, you don't want a terrorist using your PC
remotely, committing acts of war that will bring law enforcement and/or the
military to your door to seize your PC.  It is a documented fact that
terrorists, as well as hackers, use the Internet, and they love remote
control access to your PC to avoid a direct trace to them.  Remote control
access starts with sneaking a virus onto your PC.

Kirk Stockham, R/C Pilot
Computer Forensics Investigator/Instructor
Stockham Computer Forensics and Investigations
P.O. Box 578351
Modesto, CA  95357
(209) 521-7379  (Voice/Fax)

CA PI License #23914

www.hitechpi.net

[EMAIL PROTECTED]



-Original Message-
From: Michael Neverdosky [mailto:[EMAIL PROTECTED] 
Sent: Saturday, September 11, 2004 9:00 AM
Cc: [EMAIL PROTECTED]
Subject: Re: [RCSE] Virus

As you are claiming to be an expert in this area, please tell us
how to tell who the ACTUAL sender is, in the case of emailed virus code.

The point is that the "sender", i.e. the address in the "FROM" field
is RARELY the actual person (computer) sending out the virus.

Yes, the virus is probably sent out by a 'zombie' but the address
that claims to be sending the mail is not very helpful in finding
and curing the zombie.

michael

Juster wrote:
> 
> Someone on this list said the following:
> 
> >>>>>>>>>>>>>.1) Don't bother to inform the "sender" of the emails that
they
> have a virus -- it is almost always the case that they are an innocent
> 3rd-party who just happens to have their address handy in some address
book
> on the actual virus-infected machine.<<<<<<<<<<<<<<<<<<<
> 
> If someone is sending out virus code then that someone should be told for
a
> number of common sense reasons!   How will they know that it is
> happening?  How will the other users, the potential new victims know? The
> sender can be the victim, and should be advised that some hacker has taken
> over their account or their PC.
> 
> As an expert in this field virus code sent via E-mail has to be taken
> seriously...Anyone who has had their PC destroyed from a virus knows how
> important this is.  Virus Code makers need to go to jail and we can help
> them get there.
> 
> "If you are connected to the Internet, the Internet is connected to
you..."
> 
> Kirk Stockham, R/C Pilot
> Computer Forensics Investigator/Instructor
> Stockham Computer Forensics and Investigations
> P.O. Box 578351
> Modesto, CA  95357
> (209) 521-7379  (Voice/Fax)
> 
> CA PI License #23914
> 
> www.hitechpi.net
> 
> [EMAIL PROTECTED]
> 
> RCSE-List facilities provided by Model Airplane News.  Send "subscribe"
and "unsubscribe" requests to [EMAIL PROTECTED]  Please note that
subscribe and unsubscribe messages must be sent in text only format with
MIME turned off.
RCSE-List facilities provided by Model Airplane News.  Send "subscribe" and
"unsubscribe" requests to [EMAIL PROTECTED]  Please note that
subscribe and unsubscribe messages must be sent in text only format with
MIME turned off.


RCSE-List facilities provided by Model Airplane News.  Send "subscribe" and 
"unsubscribe" requests to [EMAIL PROTECTED]  Please note that subscribe and 
unsubscribe messages must be sent in text only format with MIME turned off.


RE: [RCSE] Virus

2004-09-11 Thread Juster
Someone on this list said the following:

>.1) Don't bother to inform the "sender" of the emails that they
have a virus -- it is almost always the case that they are an innocent
3rd-party who just happens to have their address handy in some address book
on the actual virus-infected machine.<<<

If someone is sending out virus code then that someone should be told for a
number of common sense reasons!   How will they know that it is
happening?  How will the other users, the potential new victims know? The
sender can be the victim, and should be advised that some hacker has taken
over their account or their PC.   

As an expert in this field virus code sent via E-mail has to be taken
seriously...Anyone who has had their PC destroyed from a virus knows how
important this is.  Virus Code makers need to go to jail and we can help
them get there.

"If you are connected to the Internet, the Internet is connected to you..."


Kirk Stockham, R/C Pilot
Computer Forensics Investigator/Instructor
Stockham Computer Forensics and Investigations
P.O. Box 578351
Modesto, CA  95357
(209) 521-7379  (Voice/Fax)

CA PI License #23914

www.hitechpi.net

[EMAIL PROTECTED]




RCSE-List facilities provided by Model Airplane News.  Send "subscribe" and 
"unsubscribe" requests to [EMAIL PROTECTED]  Please note that subscribe and 
unsubscribe messages must be sent in text only format with MIME turned off.


RE: [RCSE] Virus

2004-09-10 Thread Juster








I have received the same virus from your
account, however, my Norton Virus Checker and Zone Alarm Firewall stopped
it.  You don’t have to kill your E-mail listing.  Try a few
things first.

 

You have what is called a “tag
along” virus.  Someone has remote control of your PC.  You are
what the hackers call a ZOMBIE.  When you send out E-mail, ANOTHER E-mail
is sent out with a virus attachment with the goal of infecting other computers
and turning them into remote controlled computers or ZOMBIES.  A
successful TAG ALONG virus can give a hacker control of hundreds of PC’s
without the user’s knowledge.  The hacker can be from another
country.  The hacker might even be reading this after you get this
E-mail.  

 

Dear Mr. Hacker….you need to go to
jail, and I know how to get you there!

 

Get yourself another E-mail address, like
from your 7 AOL addresses that you are allowed to have, and send your new
address a message from your infected E-mail address to the new one and see what
happens.  

 

The test may not work since you would be
sending from and AOL address to an AOL address.  If you don’t have
an outside E-mail get one, like from HOTMAIL or DYNAMITEMAIL.com.  They
are still free, and send to one of those addresses to see what happens. 
Those are just some of the steps I would take.

 

Send me another one and I will look more
closely to the hidden E-mail data.

 

On the DOWN side your PC may be so under
control of someone that you may even have NEW FOLDERS on your PC that you
don’t know about.  You should write down your hard drive capacity
and see if it changes.   If you are leaving your PC on 24 hours a
day…..the hacker who is controlling your PC loves that.  While you
are sleeping they do all kinds of things……

 

Since NORTON Anti-Virus software found
what you sent me, I would recommend using that product to find and kill that
virus code if you are lucky, and the damage is not too great.  If the
damage is too extensive, and your PC is too far under remote control, then save
off all of your important files and documents………before you
have to do the last option…..erasing your drive and starting over.

 



Kirk Stockham, R/C Power and Glider Pilot
Computer Forensics Investigator/Instructor
Stockham Computer Forensics and Investigations
CA PI Lic. #23914
P.O. Box 578351
Modesto, CA 
 95357
(209) 521-7379  (Voice/Fax)


www.hitechpi.net
[EMAIL PROTECTED]