|
Unfortunately Darwin is not a fool proof plan.. A twin brother to pass on the genes
|
|
|
|
|
What a dumb ass, just came from St. Louis and probably never saw a gator.
One gator to another: What did he taste like?
Other gator: Chicken!
New version: WinHeist Version 2.1.1 new web site.
I know the voices in my head are not real but damn they come up with some good ideas!
|
|
|
|
|
We don't have alligators in Michigan either, but I know better.
Though, I did feed a couple of gators that were fenced in a Florida retention pond marshmallows back in '75. That was cool. Still don't ever want to be caught in the water with one.
|
|
|
|
|
As WC Fields said 'They are like women nice to look at(?),dangerous to own'
|
|
|
|
|
Pah! Alligator! Pah! We got crocodile in Darwin!
|
|
|
|
|
They've also got crocodiles in Egypt but nobody ever tells you that because they're all in de Nile!
|
|
|
|
|
The "No Swimming Alligators" sign ...
Well, if they can't swim, it must be safer in the water than on the land.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
I suspect that many ISP's and upstream carrier companies are monitoring HTTP Posts request on port eighty for any password and email addresses contained within form posts that come from web-browsers when anyone press the login button.
Nearly all of Europe's traffic is sent via optical cables to England where CGHQ has the means to inspect the traffic before it is sent over to the USA and anyone in France or Germany will know by now that GCHQ has been doing a lot of things it shouldn't be doing.
It is a well known fact that many of the free proxy servers that people harvest only provide the free service just in the hopes that users are stupid enough to login to none secure sites so that these unscrupulous operators can steel login details and they also hope the same login details are being used on Gmail or Facebook because it is human nature for people to use the same details.
ISP's I suspect also have access to common private keys for all major sites and I know they are doing a type of man-in-the-middle HTTPS spying because they hijack DNS lookups even when users elect to use a 3rd party DNS server such as OpenDNS so that means that both HTTP and HTTPS for a domain name resolves to the same ISP's hijacked IP-Address and my ISP hosts many SSL sites that it does not own.
Let's be honest here ISP's such as Comcast are adding a tracking ID to HTTP Headers and if anyone is prepared to pay Comcast for the service then they will resolve the hidden ID to provide your personal details to anyone that's paying and for all I know since our governments have no respect for the laws or our privacy they might also have a mandate to provide the NSA/CIA/GCHQ with our personal login details.
So what can be done !
Well I have knocked up a bit of code that pulls HTTP Forms from web-pages and then parses the HTML to build up a fake post-data string using the correct INPUT box names from the FORM so that a fake login request can be made to the sites using one of two million random full names and a fake password.
The function that I use for making fake login requests to a list of ten thousand sites only send one fake request about every thirty minutes so hopefully ISP's or the NSA will take the bait and since it will take months to complete the list I don't think anyone could accuse me of using brute force to attack a site
So do you think I am being paranoid or breaking any laws if I decide to run the code ?
How the NSA, and your boss, can intercept and break SSL
|
|
|
|
|
Just because you are paranoid, doesn't mean your name is Marvin...
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Dr Gadgit wrote: ISP's I suspect also have access to common private keys for all major sites and I know they are doing a type of man-in-the-middle HTTPS spying
Extraordinary claims require extraordinary evidence.
|
|
|
|
|
Mladen Janković wrote: xtraordinary claims require extraordinary evidence.
Yes they do, and, if evidence if provided, are we willing to believe?
|
|
|
|
|
Extraordinary claims require extraordinary evidence.
Good point and the best i can give you is that David Cameron want to stop people using encryption only that GCHQ cannot decrypt and not regular HTTPS so that says to me our SSL traffic is an open book.
You might like to read back about ISP's hijacking DNS lookups in regards to SSL traffic.
Both the Germans and the French have caught the NSA/GCHQ spying on them so are you trying to say the likes of Google would not share it's private keys with the NSA when they are only too willing to share our private data with them.
Logic is very hard to argue with i thinks
|
|
|
|
|
You're right and because this is a never ending cycle of them battling ever increasing levels of incursion, I reckon that you need to take pre-emptive action now. The only way you can avoid having all your details stolen is to quit the internet now. Obviously we'll miss you but it'll be for the best and we hope you have a secure future in your bunker.
|
|
|
|
|
NO running away is not the answer and i find that poking a peeping tom in the eys soon stops them.
|
|
|
|
|
Dr Gadgit wrote: NO running away is not the answer
Well you are certainly right about that. What you should really do instead is to run as quickly as you can to your medical professional and have them up your medication.
You can lead a developer to CodeProject, but you can't make them think.
The Theory of Gravity was invented for the sole purpose of distracting you from investigating the scientific fact that the Earth sucks.
|
|
|
|
|
The argument is not if ISP's can intercept our password but are they and I happen to think they are so save the insults because it makes you look like a kid in the school playground.
You need to stop taking the medication you want me to take and start thinking for yourself!
|
|
|
|
|
Hiiiiiiiiiiiighlanders!!!!!!!
B
MCAD
---
|
|
|
|
|
Earthman, it is sometimes difficult to follow your mode of speech!
|
|
|
|
|
|
|
I wouldn't go to that barber !
|
|
|
|
|
You think you might lose your head?
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
A strange claim for a film which had four sequels.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
...all of them total twaddle.
I mean - the first wasn't good (Herself is a Queen fan, so I had to watch it quite a few times) but the others? Good grief, I'd rather watch Sharknado for it's incredible realism...
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
OriginalGriff wrote: I'd rather watch Sharknado for it's incredible realism...
How about the sequels - The Second One[^] and Oh Hell No![^]?
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|