It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by burntheships
reply to post by kcfusion
Your kidding right?
So...let me understand your line of thinking is that Anon could only be held
responsible for something they cop to?
Originally posted by MindSpin
Originally posted by burntheships
reply to post by kcfusion
Your kidding right?
So...let me understand your line of thinking is that Anon could only be held
responsible for something they cop to?
No...he is not kidding...he refuses to believe Anon has ever done anything wrong.
You can give him 1000 sources...but if it isn't a statement from Anon (whoever that is )...he won't believe it.
Originally posted by burntheships
reply to post by kcfusion
In case you did not realize, which obvioulsy you did not....
Wikipedia does contain footnotes, and in many of them are hyperlinks to the actual news stories,
As in this one....
a group calling itself Anonymous launched a viral No Cussing Sucks campaign across the Web.
On sites that seemed to vanish as quickly as they appeared, they posted Hatch’s name, photo and contact information and urged people to harass him.
McKay’s father, Brent Hatch, said his son had received more than 22,000 e-mails in fewer than two weeks.
“We are conducting an investigation at this time, but I’m not able to talk about what we’re doing,” South Pasadena police Capt. Richard Kowaltschuk said.
He did say detectives were examining the e-mails, adding, “If someone threatens your life that is a violation of the law, whether it’s done verbally or over the Internet.”
www.vcstar.com...
Originally posted by burntheships
Originally posted by burntheships
reply to post by kcfusion
In case you did not realize, which obvioulsy you did not....
Wikipedia does contain footnotes, and in many of them are hyperlinks to the actual news stories,
As in this one....
a group calling itself Anonymous launched a viral No Cussing Sucks campaign across the Web.
On sites that seemed to vanish as quickly as they appeared, they posted Hatch’s name, photo and contact information and urged people to harass him.
McKay’s father, Brent Hatch, said his son had received more than 22,000 e-mails in fewer than two weeks.
“We are conducting an investigation at this time, but I’m not able to talk about what we’re doing,” South Pasadena police Capt. Richard Kowaltschuk said.
He did say detectives were examining the e-mails, adding, “If someone threatens your life that is a violation of the law, whether it’s done verbally or over the Internet.”
www.vcstar.com...
I am not following you....
Where did I mention porn?
Originally posted by burntheships
reply to post by kcfusion
I am not Mindspin, now am I?
I think your deflecting?
You first said Wiki was not a valid source of information concerning Anon.
I pointed out that there are news articles, plenty of them that trace the activities of Anon.
Then you again deflect by saying that Anon can only be gulity of what they "take credit" for.
And then, I said your kidding right?
Originally posted by burntheships
reply to post by kcfusion
I did not mention porn.
I am not Mindspin.
Its ludicrous to think that Anon can only be credited with what they admit to.
Done.
Originally posted by _R4t_
......and your ignorance is disturbing, If you are using an online server proxy, they delete your log files as per a legal agreement when you sign up with the companies. There are real "hackers" out there that offer online services in pursuit of their "everyone owns the internet" theory and they make sure your tracks are covered for you. It costs you a monthly payment but it gets done. They delete (automatically) the log files and DHCP timestamps and they do a DOD security wipe to ensure there is no recovery. There are private VPN services that are even faster considering bandwidth using strong encryption methods such as SSL/TLS and do the same as the previous. Don't try to exalt yourself over someone here who actually knows how the internet works. You will become now the foolish one. I know a couple of these guys and I have seen them at work. Go learn something new.edit on 10-2-2011 by Phenomium because: (no reason given)
#1> When you have to PAY for it, you leave traces behind... as much as you think those are secure you MIGHT want to... paypals/credit card is never good... and when you know s*** about hacking you learn not to trust just anybody's stuff... when the next 10-25 years of your life depends on a dude saying he's the "3l33t3 h4x04 sh1zn1t..." if you can't to it yourself... you don't do it at all... plain and simple...
#2> Before you REACH the proxy you go through in average 20 nodes... WHICH anyone can hack into and sniff anything that can go through... OR government can request the info with a subpoena... What good is your proxy server here???
#3> Proxy server can be miss-configured even by the best admin errors happen all the time... as SQUID proxy can leak IP's if x-forwarding is added to squid.conf... TOR proxy is knows to leak... WEB server can be forced to leak IP's... OR you can exploit the browser being used itself to push forward the IP
4>DHCP timestamp... do you actually even have a clue of what DHCP is or you just googled stuff quickly to try to sound intelligent??? DHCP as in "Dynamic Host Configuration Protocol" is a daemon running that provide DHCP lease containing IP/DNS/GW.... that allows you to be lazy and not have to configure it manually on a WAN/LAN network which has anything to do with what you think it does...
5> when you connect to a proxy all it does is port forward you in the direction you chose to your never allocated an IP... a simple version of a 2 way proxy that would point at a straight host would be done on a linux box with this command [socat TCP-LISTEN:sumport, fork TCP: sumaddress.com:sumport] which would wait on a port and forward you to the address and port you've pre-defined... at NO point your being assigned an IP the only reason why they see this IP at the destination node is because they see the IP of where the data come from which is the node your going through... no DHCP here man... LOL
6> SSL has been cracked... [www.worldnewschannel.info...] lets assume your only speaking of WEB proxies here... another thing is you can craft packets/inject code in the data stream to exploits the browser your using and force it to reply information you wouldn't want it to... or force it to reverse connect back to you without going through the proxy which would give away your IP right away.
7> you can even force network discovery beyond firewalls by simple UDP datagram/TTL packet manipulation/injection... to force errors on the network and the host past the firewalls will start spiting errors your way revealing data/IP address that otherwise should of been not accessable...
8>DOD wipe right??? LOL... you MUST be talking about tools that says "DOD Standard drive wiper"... which just write/overwrite/erase and start over again thousands of times hoping to circumvent any forensic attack from recovering the data... well SORRY dude... Class 3 forensic attack such as magnetic force microscopy WILL get it back NO MATTER what... you can DOD wipe it until it starts smoking... it can be put back together its just a matter of money... MFM forensic is very expensive... But the funds are always allocated when you tick off the wrong people...
and finaly... I didn't try to exalt myself above anybody I've been in cyber-security business for the last 12 years, I'm currently working for one of Canada's major ISP, I administrate linux servers and I was going to start my own small security firm around here but I was offered something for the government in Can pertaining to cyber security/digital forensic they are creating a team of talented individuals in anticipation of an certain "upcoming bill" that they seem to believe will pass... anyways I can't really talk about it I signed a NDF and I'm waiting to know if I passed the TS clearance so I better shut up in the meantime I'm cleared to talk more about it... All I wanted to do was to let you know that you were foolish to believe a proxy would magically make you 100% safe... cuz they don't... never did... never will they only slow things down and make it a bit harder... but they definitely don't protect you as well as you think they do...
But if you don't believe me be by guess... like Barney in "How I Met Your Mother" would say.... "Proxy up!"
ps: "real hackers" won't make you pay for it... they give it away for free because we/they are motivated by the intellectual challenge... Linus Torvalds is a "real" hacker... he created Linux the best operating system out there and gave it to the world...edit on 10-2-2011 by _R4t_ because: (no reason given)
#1> When you have to PAY for it, you leave traces behind... as much as you think those are secure you MIGHT want to... paypals/credit card is never good... and when you know s*** about hacking you learn not to trust just anybody's stuff... when the next 10-25 years of your life depends on a dude saying he's the "3l33t3 h4x04 sh1zn1t..." if you can't to it yourself... you don't do it at all... plain and simple...
"another thing is you can craft packets/inject code in the data stream to exploits the browser your using and force it to reply information you wouldn't want it to... or force it to reverse connect back to you without going through the proxy which would give away your IP right away."
Ahh, but to a certain extent. hackers are people who have to make money too, not all of them get accepted into the 'hacker hall of fame' like yourself. There are some who actually have to sell their services for provisions.....they are not like you White Hat, they are not the evil Bin Laden hacker called Black Hats......they are Grey Hats and they work alone.
"ps: "real hackers" won't make you pay for it... they give it away for free"