Unconfigured Ad Widget

Collapse

FBI computer harddrive scan...

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • #16
    Khanan
    Member
    • Apr 2011
    • 329

    DNS Changer

    This is to help people that still don't know that their DNS settings have been taken over by DNS Changer and that the substitute DNS servers that were setup temporarily to work around this issue are going down by court order.

    http://www.circleid.com/posts/20120327_dns_changer/ That link should give you more information if you are interested.
    What part of "shall not be infringed" don't you understand?

    sigpic

    Comment

    • #17
      Jeepers
      Veteran Member
      • Sep 2009
      • 3415

      the only issue i have with going to there site is, well all they would have to do is redirect the traffic going to the servers to be shut down to that site(http://www.dcwg.org) that way its a none issue only one that even get there is infected computers ... so just my 2 cents something is fishy that they are asking folks to go there on there own ...
      Originally posted by Ronald Reagan
      Before I refuse to take your questions, I have an opening statement.

      Comment

      • #18
        the86d
        Calguns Addict
        • Jul 2011
        • 9587

        Everyone needs to do a quick:
        dd if=/dev/zero of=/dev/sd[a-z] bs=1M

        DON'T DO THAT.

        Comment

        • #19
          JDay
          I need a LIFE!!
          • Nov 2008
          • 19393

          Originally posted by the86d
          Everyone needs to do a quick:
          dd if=/dev/zero of=/dev/sd[a-z] bs=1M

          DON'T DO THAT.
          You should use /dev/urandom and not /dev/zero.
          Oppressors can tyrannize only when they achieve a standing army, an enslaved press, and a disarmed populace. -- James Madison

          The Constitution shall never be construed to authorize Congress to prevent the people of the United States, who are peaceable citizens, from keeping their own arms. -- Samuel Adams, Debates and Proceedings in the Convention of the Commonwealth of Massachusetts, 86-87 (Pearce and Hale, eds., Boston, 1850)

          Comment

          • #20
            Demonicspire
            Member
            • Apr 2012
            • 197

            its not a deep scan, that would take hours

            Comment

            • #21
              Merc1138
              I need a LIFE!!
              • Feb 2009
              • 19742

              Originally posted by fighter4cage
              Did you guys see the FBI on TV today asking everyone to visit a website and have their computer scanned for a nasty virus?

              "TheFBI is encouraging users to visit a
              website run by its security partner, http://www.dcwg.org , that will inform them
              whether they're infected and explain how to fix the problem. After July 9,
              infected users won't be able to connect to the Internet"

              Let the FBI search your Harddrive? How stupid do you think we are? No way I am falling for this **** !!!

              Opinions please:
              How is that letting the FBI search your hard drive? Please learn how the internet works.
              Originally posted by fighter4cage
              I guess some Calgun folks are dumber than I thought.....
              Really? You're calling other calguns members dumb, when you're the one freaking out over a DNS check and somehow equating this to scanning your hard drive when the DNS changer issue is a well known problem? Please don't ask us on July 9th why you have to browse calguns from your cellphone or the public library because your internet connection quit working.

              Comment

              • #22
                TheHarvester
                Junior Member
                • Apr 2011
                • 42

                Originally posted by JDay
                You have entirely too much faith in the capabilities of the FBI.
                No, not really. Hacking isn't all that hard and hiring a hacker and/or script kiddie is even easier.

                Comment

                • #23
                  JDay
                  I need a LIFE!!
                  • Nov 2008
                  • 19393

                  Originally posted by TheHarvester
                  No, not really. Hacking isn't all that hard and hiring a hacker and/or script kiddie is even easier.
                  I supposed you're an expert on this subject? Can you then explain to me how they are going to get into a computer system that they know nothing about without being detected? This is not a simple matter and I think you believe too much of what you see on shows like CSI and NCIS. What happens in those shows is very far from reality.
                  Oppressors can tyrannize only when they achieve a standing army, an enslaved press, and a disarmed populace. -- James Madison

                  The Constitution shall never be construed to authorize Congress to prevent the people of the United States, who are peaceable citizens, from keeping their own arms. -- Samuel Adams, Debates and Proceedings in the Convention of the Commonwealth of Massachusetts, 86-87 (Pearce and Hale, eds., Boston, 1850)

                  Comment

                  • #24
                    TheHarvester
                    Junior Member
                    • Apr 2011
                    • 42

                    Originally posted by JDay
                    I supposed you're an expert on this subject? Can you then explain to me how they are going to get into a computer system that they know nothing about without being detected? This is not a simple matter and I think you believe too much of what you see on shows like CSI and NCIS. What happens in those shows is very far from reality.
                    I am by no means an expert or a hacker nor do I believe in the TV shows but I do know a thing or two about computers. I also know the ONLY way to be 100% safe online is to be offline. Yes it is difficult to hack a specific persons computer (like the FBI getting into YOURS specifically), but the right person could gain access to your computer. Hell, just sending an e-mail can give up the city you live in, cell phone pictures can have GPS tags embedded in them, snap a shot of your gun(s) in your home and you could be posting the GPS coordinates of your gun room and Google Maps will gladly show anyone how to get there. As you know,(I have read many of your posts) computers can be compromised regardless of operating system and most people don't take the proper steps to stay safe. Just look at the 1/2 million + apple users who fell for the fake Adobe update that took advantage of the Java Script hole that apple left open.

                    Comment

                    • #25
                      Merc1138
                      I need a LIFE!!
                      • Feb 2009
                      • 19742

                      Originally posted by TheHarvester
                      I am by no means an expert or a hacker nor do I believe in the TV shows but I do know a thing or two about computers. I also know the ONLY way to be 100% safe online is to be offline. Yes it is difficult to hack a specific persons computer (like the FBI getting into YOURS specifically), but the right person could gain access to your computer. Hell, just sending an e-mail can give up the city you live in, cell phone pictures can have GPS tags embedded in them, snap a shot of your gun(s) in your home and you could be posting the GPS coordinates of your gun room and Google Maps will gladly show anyone how to get there. As you know,(I have read many of your posts) computers can be compromised regardless of operating system and most people don't take the proper steps to stay safe. Just look at the 1/2 million + apple users who fell for the fake Adobe update that took advantage of the Java Script hole that apple left open.
                      All of which has nothing to do with this FBI page, the original exploit, or people failing to resolve the problem.

                      Not to mention...

                      1. GPS tagging is easy to turn off on cellphones. Reading GPS tags from someone's photo is not "hacking".

                      2. If you want to, you can also avoid the problem of the source IP of your emails giving up the city/county you're in(it's actually not particularly common for that to give up a city, unless the city itself is so massive that it wouldn't matter anyway). Also, looking at email headers and checking the DNS entry for the IP is not hacking either.

                      3. Neither scenario is getting any information from your hard drive. Your previous post about the FBI getting access to your computer if they really wanted to already rather than using this DNS check to somehow do so, is correct.

                      4. The sad truth about most of the attacks you read about in the news(credit card info stolen from CC companies or online retailers) is still usually rarely an attack that actually involved a hacker, and mostly crappy admins failing to update systems to protect against exploits that have been known about for months and even years, that some basement dweller finally ran across using programs written by someone else. Heck, you can find servers that are easy to compromise using google.

                      Comment

                      • #26
                        JDay
                        I need a LIFE!!
                        • Nov 2008
                        • 19393

                        Originally posted by TheHarvester
                        I am by no means an expert or a hacker nor do I believe in the TV shows but I do know a thing or two about computers. I also know the ONLY way to be 100% safe online is to be offline. Yes it is difficult to hack a specific persons computer (like the FBI getting into YOURS specifically), but the right person could gain access to your computer. Hell, just sending an e-mail can give up the city you live in, cell phone pictures can have GPS tags embedded in them, snap a shot of your gun(s) in your home and you could be posting the GPS coordinates of your gun room and Google Maps will gladly show anyone how to get there. As you know,(I have read many of your posts) computers can be compromised regardless of operating system and most people don't take the proper steps to stay safe. Just look at the 1/2 million + apple users who fell for the fake Adobe update that took advantage of the Java Script hole that apple left open.
                        Well some of us are and pretty much none of what you said falls under "hacking". And FYI, if you use webmail (most people do) your IP is most likely not attached to the headers. Not that it really matters since the only geographic information that would be tied to your IP would be the city your ISP has that IP block registered in, it is not uncommon for that to be in another state.

                        Originally posted by Merc1138
                        4. The sad truth about most of the attacks you read about in the news(credit card info stolen from CC companies or online retailers) is still usually rarely an attack that actually involved a hacker, and mostly crappy admins failing to update systems to protect against exploits that have been known about for months and even years, that some basement dweller finally ran across using programs written by someone else. Heck, you can find servers that are easy to compromise using google.
                        Most of the time it's a simple SQL injection attack. Always remember to validate that input.
                        Last edited by JDay; 04-27-2012, 2:21 AM.
                        Oppressors can tyrannize only when they achieve a standing army, an enslaved press, and a disarmed populace. -- James Madison

                        The Constitution shall never be construed to authorize Congress to prevent the people of the United States, who are peaceable citizens, from keeping their own arms. -- Samuel Adams, Debates and Proceedings in the Convention of the Commonwealth of Massachusetts, 86-87 (Pearce and Hale, eds., Boston, 1850)

                        Comment

                        • #27
                          Khanan
                          Member
                          • Apr 2011
                          • 329

                          Originally posted by JDay

                          Most of the time it's a simple SQL injection attack. Always remember to validate that input.
                          <sarcasm>
                          Validate inuput? Waaaaaaaaaaaaaaaaa, that is no fun! I want to write cool programs not do menial ****!
                          </sarcasm>
                          What part of "shall not be infringed" don't you understand?

                          sigpic

                          Comment

                          • #28
                            bill_k_lopez
                            Banned
                            • May 2011
                            • 2836

                            But I saw them do something like that on CSI...

                            Comment

                            • #29
                              JaMail
                              Senior Member
                              • Apr 2009
                              • 1897

                              you should always hold ctrl & the F4 buttons at the same time to find out if the FBI has a bug on your system.

                              Jason M- My 5 year old is a NRA life member, are you?

                              WTB: Stoeger Condor Competition Combo (I'll trade 1911's or other handguns)

                              Comment

                              • #30
                                JDay
                                I need a LIFE!!
                                • Nov 2008
                                • 19393

                                Originally posted by JaMail
                                you should always hold ctrl & the F4 buttons at the same time to find out if the FBI has a bug on your system.

                                Don't you mean ALT+F4?
                                Oppressors can tyrannize only when they achieve a standing army, an enslaved press, and a disarmed populace. -- James Madison

                                The Constitution shall never be construed to authorize Congress to prevent the people of the United States, who are peaceable citizens, from keeping their own arms. -- Samuel Adams, Debates and Proceedings in the Convention of the Commonwealth of Massachusetts, 86-87 (Pearce and Hale, eds., Boston, 1850)

                                Comment

                                Working...
                                UA-8071174-1