Spying

by Adonai438 14 Replies latest jw friends

  • Valis
    Valis

    Why is clarifying what you are talking about sidetracking? Did the husband have access to her private account? If so, it isn't hacking, and just another Internet story of careless behavior. Not an injustice to anyone. people get busted all the time by thier spouses/significant others engaged in activity they know will have some consequence, (I.E. porn collections, Internet relationships, etc...). I don't fell one bit sorry for anyone who puts themself in that position.

  • freeman
    freeman

    Please don’t tarnish the title “hacker” by linking it to the Borg.

    I was a professional hacker for many years and have been paid many thousands of dollars for my services (mostly from your taxes thanks) and never would I even imagine using spiritual type warfare tactics on anyone. Hackers of the ‘old school’ don’t destroy system or peoples lives. We hack for the same reason people climb mountains, because it challenges us, because it’s there.

    Freeman (maybe disclosing enough about himself so the Elders can track him down)

  • hippikon
    hippikon

    Password cracking programs are easy to get. Hotmail is crackable too. Just don't leave stuff in your inbox.

  • Brymichmom
    Brymichmom

    Internet spy software is readily available if a family member decides that he/she wants to see what you are doing. All keystrokes can be recorded, passwords, everything. You wouldn't even know that the program is installed unless you knew what you were looking for. Here is an example: http://www.internet-monitoring-software.com/
    The good thing is that anti-spy software is available also!

    Cynthia

  • freeman
    freeman

    Hippikon said: “Password cracking programs are easy to get.”

    Many years ago, (am I dating myself?) I wrote a simple program called “crack” that brute force hacked encrypted passwords on Unix systems using a form of the Data Encryption Standard (DES).

    To the best of my knowledge, that was the first such program of it’s type. Originally written in shell script and then later converted to the “C” language, versions of it are now all over the net in various forms.

    Programmers, much more talented then myself, (NASA’s brilliant Matt Bishop comes to mind) have now optimized password cracking programs to the point that if one is able to get to the encrypted password file, it is not a matter of “IF” it can be cracked, but “WHEN” it will be cracked. Amazing! It’s kind of cool that you folks are talking about this stuff. I never expected this topic on this board; thanks for a trip down memory lane.

    Freeman (feeling sentimental about his youth and the good-old-days)

Share this

Google+
Pinterest
Reddit