stella40
Posts: 417
Joined: 1/11/2006 From: London, UK Status: offline
|
quote:
ORIGINAL: Petronius Let's look at reality. I know of no authoritative reports that messenger services have the holes in them that Lockit so casually claimed. I've never read a single account of this by Hotmail or AOL or Yahoo. I've never read a single report of some security breach by hackers around places like 2600 Magazine or security people around groups like L0pht [sic] Heavy Industries. I've never seen a single article on it in industry magazines like PC or in technical web sites like Slash Dot. And like, you think that these are the only sites and places for hackers? Oh, and if you like, I can send you a program which cracks an Instant Messenger program - would you prefer C or Python? quote:
If one could use a messenger service to control a computer the genius hacker who discovered this would target employees of major banks who improperly use the service from work. Then, having gotten control of the computers, would simply rip off the banks for millions of dollars. I'm sorry, but your reality here is starting to look very fictional. Hackers do target banks and other institutions, constantly, and the banks and institutions welcome this because they employ their own teams of hackers in IT to handle all security and network issues and these professionals do all they can to encourage and attract hackers. This is what really happens, it happens anywhere where there's a network, sensitive information and computers. These provoked attacks show up security issues which are then handled by network administrators so that there are no real security issues lasting anything more than a couple of hours. quote:
The genius hacker would hardly waste all of his time with somebody like Lockit. And how do you know that this is a genius hacker? You don't need to be a genuis hacker to be able to hack, just a live Linux CD, average programming knowledge (I'm talking here for a geek, not for the average person) and a network connection. quote:
She simply presents a paranoid fantasy of almost classic style. One aspect of paranoia is the almost-inhuman genius attributed to the evil nasties coupled with an ostensible action that is utterly out of proportion and incomprehensible to normal rational thought. Now are you writing here from authority of some sort? Or is your knowledge like your 'reality' of the IT industry which looks just as much a fantasy as what you're suggesting from my perspective. Is this something you've read in a magazine or even googled as you were writing your posting? quote:
Space aliens don't travel jillions and jillions of miles to give Mr. Smith a secret anal probe. I wouldn't know, I haven't come across anything which proves the existence of space aliens, and besides I thought you were basing your arguments on facts and not stories about little green aliens. quote:
The CIA didn't secretly take over all the leftwing groups in the US so that years later they could later misdirect a probe into the Kennedy assassination by Mrs. Jones, an otherwise simple housewife from Dry Throat, Arizona. What's this got to do with anything? quote:
And a genius hacker who could discover a loophole in messenger services undiscovered by every security expert in the world would not waste time using it to stalk Lockit. Up to this point I only suspected you're talking wet, now I know you're talking wet. (wet= 100% BS) Now do you expect me to believe that Yahoo! MSN, Google etc are all secure? Why of course, you were only a moment ago writing about little green space aliens travelling 'jillions and jillions of miles'. So what now? Are you going to introduce Santa Claus to the debate, or should I start writing about the Loch Ness Monster? quote:
I'm not indifferent to Lockit's experiences. I'm glad about that. quote:
But I'm far more interested in the real victims of real stalking and real harassment who must, in addition to the real crimes against them, deal with the wild tales and technological nonsense posted by Lockit and people like her. They deserve a public educated about reality, not miseducated by wild narcissistic and paranoid claims. Oh here we go again with the use of 'real' and 'reality'. Well I really do hope you are a real, genuine medical doctor because if you aren't, from what I can see you've just libelled a fellow CM member and broken the Collarme TOS. I certainly hope they are not like your IT credentials - and here's a clue, why would any self-respecting network administrator (or genius hacker, because that's what you've got to be to get any network administration post in the IT industry) read a magazine or even be bothered what Yahoo! or MSN have to say about security issues? Oh and another thing, you failed to mention the one website ALL hackers go to check for any current security issues on any website or application using a network. Oh and what with the little space aliens, it strikes me that you have issues differentiating between fact and opinion, and even fact and fiction. This is my humble opinion, based on what you wrote in your posting. It's a pity really, I might have enjoyed debating this further, I enjoy a good healthy debate, but it seems you're not up to it. quote:
The solution to Lockit's problems seems to me to rest not with Windows Task Manager or Norton's security programs; it rests with psychotherapy. I'll leave this for a moderator to comment on. quote:
I've also found that the paranoid person who can instantly invent principles attributed to science, history, and the like, is able to denounce people who actually know something as "ignorant" or uneducated. So it is with Lockit in this area as well. quote:
[Petronius's] ignorance of opinion is just that. Tell your line of crap to those who might fall for it… for I am not the only one that has been stalked and hacked into and there are others who have mentioned it here on this thread and many have emailed me. Pot, kettle, kettle, pot.... So what about these space aliens 'jillions and jillions' of miles away. Distance in space is measured in light years, not miles. I've never heard of space aliens. I don't know what a jillion is. Now I know what Einstein meant when he said "Imagination is more important than knowledge." quote:
Nobody on this thread has written about being hacked by a hole in a messenger service. While I can't read minds, I strongly suspect that not a single person has written Lockit confirming it. I equally suspect she simply invented the claim. Well I can send you programs and scripts which will hack into an instant messenger program - you can have them either in C or Python. Therefore I'm confirming it. quote:
I also suspect that she has no idea of what the security services from companies like Hotmail or Yahoo are "unlikely to investigate." I can't imagine something that would trigger a faster investigation than a security hole of the size Lockit claims. I also suspect that Lockit has never heard of groups like 2600 Magazine or L0pht or Norton where one could get accurate information. And you my friend are clearly not an expert, or even knowledgable that much about what you are writing. And that website? And you seriously believe that Yahoo! and Hotmail are really going to jump to investigate every security issue, especially when it's well known that the majority of viruses and spyware come from people such as..... Microsoft and Yahoo!? Go figure. quote:
She wrote that "They say anything can be traced...." I strongly suspect that she can't name a single reputable security person or group who made that claim. Those familiar with modern computer security in both the universities and the street state that public key cryptography coupled with a chain of anonymous remailers is untraceable. Because anything can be traced. I'm writing on the basis of having translated a 22 chapter 250 page manual for network administrators on up to date computer security. Software is written by humans (programmers) in various languages, C, Perl, Python, etc and translated into machine code to be read by a computer, errors can and do occur therefore NO program, application or website can ever be 100% secure. Your public key cryptography with a chain of anonymous remailers sounds wonderful.. pure science fiction. However anything and everything sent through a network is broken into packets which all contain TCP/IP headers and checksums etc which can be traced. Now are you trying to tell me you cannot trace something through a checksum? quote:
Other technical farces in her claims were, I thought, well presented by DomKen. While I personally like to use more established terms like "paranoia" and "narcissism" I must admit there's a certain amount of street truth in DomKen's conclusion about Lockit: quote:
Finally you defend yourself by claiming that people support you by email. The classic defense of the net loon. I wouldn't normally have come in on this, but you appear to have a strong interest in putting Lockit down for some reason, your arguments well.... don't add up to much, in fact you cannot argue your way out of a paper bag with a hole in it.
_____________________________
I try to take one day at a time, but several days come and attack me at once. (Jennifer Unlimited) If you can't be a good example then you'll just have to be a horrible warning.
|