Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
CODE PROJECT For Those Who Code
  • Home
  • Articles
  • FAQ
Community
  1. Home
  2. The Lounge
  3. Identity theft part 2 - lonnnng post

Identity theft part 2 - lonnnng post

Scheduled Pinned Locked Moved The Lounge
helpcomquestion
53 Posts 11 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • L Lost User

    Nice try, LOL! 152.33.186.47 Port 30586

    █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

    B Offline
    B Offline
    Bradml
    wrote on last edited by
    #24

    Why don't you try pinging that IP then? Have you ever heard of packet forging? Anyway I don't have time right now for this. I have a meeting at 4:00pm across town. I'll decide what I'm going to do with your IP later on.


    Brad Australian - Christian Graus on "Best books for VBscript" A big thick one, so you can whack yourself on the head with it.

    L 1 Reply Last reply
    0
    • B Bradml

      Why don't you try pinging that IP then? Have you ever heard of packet forging? Anyway I don't have time right now for this. I have a meeting at 4:00pm across town. I'll decide what I'm going to do with your IP later on.


      Brad Australian - Christian Graus on "Best books for VBscript" A big thick one, so you can whack yourself on the head with it.

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #25

      Bradml wrote:

      Why don't you try pinging that IP then? Have you ever heard of packet forging?

      Yes and yes.

      Bradml wrote:

      Anyway I don't have time right now for this.

      Looks like super hacker lost, now its time to change my IP address so that it will stay that way.

      █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

      B R 2 Replies Last reply
      0
      • L Lost User

        Bradml wrote:

        Why don't you try pinging that IP then? Have you ever heard of packet forging?

        Yes and yes.

        Bradml wrote:

        Anyway I don't have time right now for this.

        Looks like super hacker lost, now its time to change my IP address so that it will stay that way.

        █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

        B Offline
        B Offline
        Bradml
        wrote on last edited by
        #26

        I fail to see how super hacker lost. I managed to locate you without giving away my position. I simply have a job you see.... If you would care to re-post your IP later I would be happy to show you what I can do (not that it would be hard to find you, I know your network info and your netBios info (how can you let such a fundamental security flaw go unchecked) so It would take me a very short time to find you again.


        Brad Australian - Christian Graus on "Best books for VBscript" A big thick one, so you can whack yourself on the head with it.

        R L 2 Replies Last reply
        0
        • L Lost User

          Bradml wrote:

          Why don't you try pinging that IP then? Have you ever heard of packet forging?

          Yes and yes.

          Bradml wrote:

          Anyway I don't have time right now for this.

          Looks like super hacker lost, now its time to change my IP address so that it will stay that way.

          █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

          R Offline
          R Offline
          RoswellNX
          wrote on last edited by
          #27

          Captain See Sharp wrote:

          Looks like super hacker lost

          Look there, in the world outside of TV and newspapers and silly kids, "hacker" means coder, not the person that vandalizes computer equipment. The word "cracker" defines the latter. So it's no surprise that a coder won't want to vandalize a computer. So get a life, buy a dictionary. Roswell

          "Angelinos -- excuse me. There will be civility today."
          Antonio VillaRaigosa
          City Mayor, Los Angeles, CA

          L 1 Reply Last reply
          0
          • B Bradml

            I fail to see how super hacker lost. I managed to locate you without giving away my position. I simply have a job you see.... If you would care to re-post your IP later I would be happy to show you what I can do (not that it would be hard to find you, I know your network info and your netBios info (how can you let such a fundamental security flaw go unchecked) so It would take me a very short time to find you again.


            Brad Australian - Christian Graus on "Best books for VBscript" A big thick one, so you can whack yourself on the head with it.

            R Offline
            R Offline
            RoswellNX
            wrote on last edited by
            #28

            Bradml wrote:

            network info and your netBios info

            :omg: That does it for me...no point in taking Mr. CSS seriously Roswell

            "Angelinos -- excuse me. There will be civility today."
            Antonio VillaRaigosa
            City Mayor, Los Angeles, CA

            1 Reply Last reply
            0
            • R RoswellNX

              Captain See Sharp wrote:

              Looks like super hacker lost

              Look there, in the world outside of TV and newspapers and silly kids, "hacker" means coder, not the person that vandalizes computer equipment. The word "cracker" defines the latter. So it's no surprise that a coder won't want to vandalize a computer. So get a life, buy a dictionary. Roswell

              "Angelinos -- excuse me. There will be civility today."
              Antonio VillaRaigosa
              City Mayor, Los Angeles, CA

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #29

              RoswellNX wrote:

              Look there, in the world outside of TV and newspapers and silly kids, "hacker" means coder, not the person that vandalizes computer equipment. The word "cracker" defines the latter. So it's no surprise that a coder won't want to vandalize a computer. So get a life, buy a dictionary.

              A hacker is someone who breaks into a computer system over a network. A cracker is someone who breaks into programs and removes the trial limitation or enables cheating in a game that would otherwise be impossible. Bradml said he could break into a computer and enable the webcam if one is attached to the computer and stream the video and post it on youtube.

              █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

              L 1 Reply Last reply
              0
              • L Lost User

                RoswellNX wrote:

                Look there, in the world outside of TV and newspapers and silly kids, "hacker" means coder, not the person that vandalizes computer equipment. The word "cracker" defines the latter. So it's no surprise that a coder won't want to vandalize a computer. So get a life, buy a dictionary.

                A hacker is someone who breaks into a computer system over a network. A cracker is someone who breaks into programs and removes the trial limitation or enables cheating in a game that would otherwise be impossible. Bradml said he could break into a computer and enable the webcam if one is attached to the computer and stream the video and post it on youtube.

                █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                L Offline
                L Offline
                Lost User
                wrote on last edited by
                #30

                Captain See Sharp wrote:

                A hacker is someone who breaks into a computer system over a network. A cracker is someone who breaks into programs and removes the trial limitation or enables cheating in a game that would otherwise be impossible

                Looks like this industry is now old enough to have a generation gap

                System.IO.Path.IsPathRooted() does not behave as I would expect

                L B 2 Replies Last reply
                0
                • L Lost User

                  Jeffry J. Brickley wrote:

                  even claiming that there were no identity theft victims, that it was all a myth

                  I think its just a buzz word. What I described above could equally be described as fraud and thats what it would have been called 10 or even 5 years ago

                  System.IO.Path.IsPathRooted() does not behave as I would expect

                  E Offline
                  E Offline
                  El Corazon
                  wrote on last edited by
                  #31

                  true, but fraud used to be followed, not limited only to those above $10,000. But now with this "semi-new" type of fraud, it is common enough that it would be impossible to persue all persons who took less than $10,000... so the new way is to limit it only to the top most criminals in fraud, and let the people frauded pay for the rest.

                  _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                  L 1 Reply Last reply
                  0
                  • B Bradml

                    I fail to see how super hacker lost. I managed to locate you without giving away my position. I simply have a job you see.... If you would care to re-post your IP later I would be happy to show you what I can do (not that it would be hard to find you, I know your network info and your netBios info (how can you let such a fundamental security flaw go unchecked) so It would take me a very short time to find you again.


                    Brad Australian - Christian Graus on "Best books for VBscript" A big thick one, so you can whack yourself on the head with it.

                    L Offline
                    L Offline
                    Lost User
                    wrote on last edited by
                    #32

                    Bradml wrote:

                    I know your network info and your netBios info (how can you let such a fundamental security flaw go unchecked)

                    I doubt it, lets see this information, all of it. Having my computer's name is not enough.

                    █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                    1 Reply Last reply
                    0
                    • E El Corazon

                      true, but fraud used to be followed, not limited only to those above $10,000. But now with this "semi-new" type of fraud, it is common enough that it would be impossible to persue all persons who took less than $10,000... so the new way is to limit it only to the top most criminals in fraud, and let the people frauded pay for the rest.

                      _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                      L Offline
                      L Offline
                      Lost User
                      wrote on last edited by
                      #33

                      Jeffry J. Brickley wrote:

                      it is common enough that it would be impossible to persue all persons who took less than $10,000.

                      The problem in our case is that the losses are distributed. Couple of $1000 here and there but from different organisations

                      Jeffry J. Brickley wrote:

                      and let the people frauded pay for the rest

                      In our case we were not responsible for any of it as we provided statutary delcarations. We could go to goal if it turns out that we lied.

                      System.IO.Path.IsPathRooted() does not behave as I would expect

                      E 1 Reply Last reply
                      0
                      • L Lost User

                        Captain See Sharp wrote:

                        A hacker is someone who breaks into a computer system over a network. A cracker is someone who breaks into programs and removes the trial limitation or enables cheating in a game that would otherwise be impossible

                        Looks like this industry is now old enough to have a generation gap

                        System.IO.Path.IsPathRooted() does not behave as I would expect

                        L Offline
                        L Offline
                        Lost User
                        wrote on last edited by
                        #34

                        Josh Gray wrote:

                        Looks like this industry is now old enough to have a generation gap

                        What do you mean?

                        █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                        L 1 Reply Last reply
                        0
                        • L Lost User

                          Jeffry J. Brickley wrote:

                          it is common enough that it would be impossible to persue all persons who took less than $10,000.

                          The problem in our case is that the losses are distributed. Couple of $1000 here and there but from different organisations

                          Jeffry J. Brickley wrote:

                          and let the people frauded pay for the rest

                          In our case we were not responsible for any of it as we provided statutary delcarations. We could go to goal if it turns out that we lied.

                          System.IO.Path.IsPathRooted() does not behave as I would expect

                          E Offline
                          E Offline
                          El Corazon
                          wrote on last edited by
                          #35

                          Josh Gray wrote:

                          In our case we were not responsible for any of it as we provided statutary delcarations. We could go to goal if it turns out that we lied.

                          you will pay for it in time and stress for a very long time. Even if no direct money changes hands, you will be fighting the system to prove your innocence for a very long time.

                          _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                          L 1 Reply Last reply
                          0
                          • L Lost User

                            Josh Gray wrote:

                            Looks like this industry is now old enough to have a generation gap

                            What do you mean?

                            █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                            L Offline
                            L Offline
                            Lost User
                            wrote on last edited by
                            #36

                            Captain See Sharp wrote:

                            What do you mean?

                            I was talking more about you than to you but anyways...... You definition of those words is different to what someone older who has been in the industry longer would give. Yours is obviously influenced by what you have been exposed to. Remember when the term cracker was coined there was no such thing as downloadable limited game demos.

                            System.IO.Path.IsPathRooted() does not behave as I would expect

                            L 1 Reply Last reply
                            0
                            • E El Corazon

                              Josh Gray wrote:

                              In our case we were not responsible for any of it as we provided statutary delcarations. We could go to goal if it turns out that we lied.

                              you will pay for it in time and stress for a very long time. Even if no direct money changes hands, you will be fighting the system to prove your innocence for a very long time.

                              _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                              L Offline
                              L Offline
                              Lost User
                              wrote on last edited by
                              #37

                              Jeffry J. Brickley wrote:

                              you will pay for it in time and stress

                              you can say that again :)

                              Jeffry J. Brickley wrote:

                              you will be fighting the system to prove your innocence for a very long time.

                              Im trying to be a bit more optimistic. I think the Australian system is more heavily regulated than those of other countries and there are now mechanisms in place to protect us long term. We want to buy a house this year so that will be the true litmus test i think

                              System.IO.Path.IsPathRooted() does not behave as I would expect

                              1 Reply Last reply
                              0
                              • L Lost User

                                Captain See Sharp wrote:

                                What do you mean?

                                I was talking more about you than to you but anyways...... You definition of those words is different to what someone older who has been in the industry longer would give. Yours is obviously influenced by what you have been exposed to. Remember when the term cracker was coined there was no such thing as downloadable limited game demos.

                                System.IO.Path.IsPathRooted() does not behave as I would expect

                                L Offline
                                L Offline
                                Lost User
                                wrote on last edited by
                                #38

                                Josh Gray wrote:

                                Remember when the term cracker was coined there was no such thing as downloadable limited game demos.

                                Yes but it does not matter it is still software.

                                █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                                L 1 Reply Last reply
                                0
                                • L Lost User

                                  Josh Gray wrote:

                                  Remember when the term cracker was coined there was no such thing as downloadable limited game demos.

                                  Yes but it does not matter it is still software.

                                  █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                                  L Offline
                                  L Offline
                                  Lost User
                                  wrote on last edited by
                                  #39

                                  Captain See Sharp wrote:

                                  Yes but it does not matter it is still software.

                                  Again your arrogance and inability to consider the fact you might be wrong prevents you from learning something.

                                  System.IO.Path.IsPathRooted() does not behave as I would expect

                                  L 1 Reply Last reply
                                  0
                                  • L Lost User

                                    Bradml wrote:

                                    Care to post your IP and find out?

                                    Sure why not. 209.251.20.183 I dare you to hack me.

                                    █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                                    C Offline
                                    C Offline
                                    code frog 0
                                    wrote on last edited by
                                    #40

                                    If that's really your I.P. your a knucklehead if you live in Ohio your more of a knucklehead if your ISP is Siscom it's getting better. Just exactly how far in do you want us to come?;P Just kidding. I wouldn't try to breach your perimeter I'd be as bad as the people I abhor if I did. But you should be careful. Don't post your WAN IP to anyone. It's easy enough to figure out but don't advertise it with a dare to be hacked. Things will get ugly if you encounter the wrong person. I'll tell you for a fact, there are guys here on a regular basis that could slide right in and hand you your password manifest off your machine your sitting at. I've actually used some of them to wage white-hat attacks on some of my firewalls and they were quite good. I learned a lesson. If someone really wants in you cannot stop them. You have to catch them. A human being needs to read the logs off your firewall every day. Those logs have to go through some very good analysis tools looking for patterns and trends and then a human being needs to be looking at things to. If you don't have that then your security isn't anything. A determined bloke will come through with little trouble. Your logging is what will save you... ~maybe~ In my case they showed me how to read the logs and what to look for. They even told me which Linux parsers do a good job. So to that I say go ahead and hack me. I really cannot stop you but I probably can catch you and you'll usually leave such an excellent trail back to yourself that it will be too costly. Unless of course you have figured out how to rogue a university computer lab. That *almost* makes you invisible but in working with University of Arizona I actually helped them nab two guys. So anyway... That WAN IP of yours. Keep it MUM to everyone.:rose:

                                    L 1 Reply Last reply
                                    0
                                    • L Lost User

                                      Captain See Sharp wrote:

                                      Yes but it does not matter it is still software.

                                      Again your arrogance and inability to consider the fact you might be wrong prevents you from learning something.

                                      System.IO.Path.IsPathRooted() does not behave as I would expect

                                      L Offline
                                      L Offline
                                      Lost User
                                      wrote on last edited by
                                      #41

                                      Josh Gray wrote:

                                      Again your arrogance and inability to consider the fact you might be wrong prevents you from learning something.

                                      I know my computer history and I know a bit what it was like back in the 80s when the PC was relatively new. When I was a youngster first discovering computer programming I had DOS, QBASIC, and an old C compiler. I read books on 8086/88 assembler, I have read the Intel processor manuals that go into intricate detail on every single thing in the processor and related hardware. I'm not saying I am a know it all but I spend most of my free time reading and learning about all aspects of computers and programming languages. I have so many books, from Motorola 68000 to complete schematics of the Apple II computer system, to the PDP/8 from the 60s. I cant say I have read them all but they certainly pull me in like a magnate when I am around them. I am not a hippy nerd that discovered HTML and started an uber geek sci-fi website.

                                      █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                                      L P 2 Replies Last reply
                                      0
                                      • L Lost User

                                        Josh Gray wrote:

                                        Again your arrogance and inability to consider the fact you might be wrong prevents you from learning something.

                                        I know my computer history and I know a bit what it was like back in the 80s when the PC was relatively new. When I was a youngster first discovering computer programming I had DOS, QBASIC, and an old C compiler. I read books on 8086/88 assembler, I have read the Intel processor manuals that go into intricate detail on every single thing in the processor and related hardware. I'm not saying I am a know it all but I spend most of my free time reading and learning about all aspects of computers and programming languages. I have so many books, from Motorola 68000 to complete schematics of the Apple II computer system, to the PDP/8 from the 60s. I cant say I have read them all but they certainly pull me in like a magnate when I am around them. I am not a hippy nerd that discovered HTML and started an uber geek sci-fi website.

                                        █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                                        L Offline
                                        L Offline
                                        Lost User
                                        wrote on last edited by
                                        #42

                                        Mate you got a lot to learn and you wont find any of it in a programming book. Enjoy the ride :)

                                        System.IO.Path.IsPathRooted() does not behave as I would expect

                                        1 Reply Last reply
                                        0
                                        • C code frog 0

                                          If that's really your I.P. your a knucklehead if you live in Ohio your more of a knucklehead if your ISP is Siscom it's getting better. Just exactly how far in do you want us to come?;P Just kidding. I wouldn't try to breach your perimeter I'd be as bad as the people I abhor if I did. But you should be careful. Don't post your WAN IP to anyone. It's easy enough to figure out but don't advertise it with a dare to be hacked. Things will get ugly if you encounter the wrong person. I'll tell you for a fact, there are guys here on a regular basis that could slide right in and hand you your password manifest off your machine your sitting at. I've actually used some of them to wage white-hat attacks on some of my firewalls and they were quite good. I learned a lesson. If someone really wants in you cannot stop them. You have to catch them. A human being needs to read the logs off your firewall every day. Those logs have to go through some very good analysis tools looking for patterns and trends and then a human being needs to be looking at things to. If you don't have that then your security isn't anything. A determined bloke will come through with little trouble. Your logging is what will save you... ~maybe~ In my case they showed me how to read the logs and what to look for. They even told me which Linux parsers do a good job. So to that I say go ahead and hack me. I really cannot stop you but I probably can catch you and you'll usually leave such an excellent trail back to yourself that it will be too costly. Unless of course you have figured out how to rogue a university computer lab. That *almost* makes you invisible but in working with University of Arizona I actually helped them nab two guys. So anyway... That WAN IP of yours. Keep it MUM to everyone.:rose:

                                          L Offline
                                          L Offline
                                          Lost User
                                          wrote on last edited by
                                          #43

                                          code-frog wrote:

                                          Keep it MUM to everyone.

                                          Good advice. I have a question, you guys use the word Mom as a abreviation of Mother but you use mum in this context?

                                          System.IO.Path.IsPathRooted() does not behave as I would expect

                                          C 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups