Petronius -> RE: Maybe leaving CM.. A warning (7/14/2007 7:55:35 PM)
|
I'm not sure who the "you" is in ThePrincessBych's post. quote:
I gave you evidence multiple times of how someone can get into your computer by messenger. If you turn on your cam using yahoo or if you even VIEW someones cam...and they have the knowledge to hack, they are in your computer. That is exactly how I stopped my interenet stalker, by getting his IP and finding out his information so I could stop him. They can also get into your computer through sending a pic file etc... as long as that person gets your IP...which is SO simple through Yahoo messenger...then they are IN your computer. Plain & simple. Ive had it happen to me, Ive gotten help and did what my stalker did to me to get HIS info & yes it DOES work.... Some people just love the sake of an argument for attention...just ignore the posts of those who don't offer you help and move on. But if she was referring to me was wrong about her claim before her ostensible explanation and she's still wrong after it. Saying that something somehow can happen if somebody knows how to hack is not an explanation of the original claim made by Lockit and hardly an explanation at all. I must admit I can't quite puzzle out her other claims since I get a tad confused by the ellipses. On the one hand she seems to say that if somebody has your IP address they can use Yahoo messenger to get inside your computer, a claim I don't ever recall seeing before. On the other hand she seems to state that if you're sent a piece of malicious code through normal channels and you run it you can be hacked. This is trivially true. But it is hardly the fault of your messenger or email program. Similarly I've never heard of a hack made possible simply because somebody is viewing a web cam. I'd like to see some authoritative material to back up the claim T. made. I also predict we won't see it. Lockit's claim was essentially that messenger software had a security hole in it and the company security did nothing about it, leaving users vulnerable. Specifically, she wrote that "If you use a messenger service for communications with people you meet online… if they have the wherewithal, they can use that to get into your computer." I said, in essence, it simply ain't true. Most people use messenger services and others, regardless of their wherewithal, can't get into their computers. More accurately, given the inability to prove a negative: it is highly unlikely that anybody in the world has the "wherewithal' to get into your computer simply because you use a messenger software package. Moreover, those who claim it happens have not produced any evidence to support their assertions." Put another way, I use messenger services and nobody has tried to show how anybody with the where, the with, or the thal can get in. I'm sure that there are dejected 14 year-old-boys who got emailed a file called "Paris Hilton and the [deleted] Nude!!" that was a piece of malicious software. I'm sure that there are dejected Republicans who got sent a file, via messenger service, called "John Kerry's Communist Party Card!!!!" that was also malicious. But that's not the fault of the email programs or the messenger software. It's due to ignorance on the part of the people hacked. It certainly isn't a problem with the software and there's no fault in the software company if it doesn't respond to idiotic complaints. You can hit your thumb with a hammer and it might really hurt. But it isn't poor hammer design and the company will hardly "correct" the problem. If you try to dry your hair in a microwave oven don't blame the over manufacturer for the outcome. And if you open malicious software programs don't blame the postman. A real explanation of a hole in messenger software might take some form like "There's a bug in yahoo messenger that let's somebody spoof IP addresses repeatedly overloading the TCP/IP stack and negating the ACL security on key administrative files letting them run ... and you can read about it at this URL on Slash Dot" or "There's a problem with Microsoft services that if somebody sends a line in excess of 25 Kb security collapses and ... you can see how this works at Extreme Tech." Those would be explanations of real problems in messenger software. Saying that you can get a piece of malicious code via email is not.
|
|
|
|