Re: THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND

Discussion in 'Computer Security' started by Cap, Aug 10, 2003.

  1. Cap

    Cap Guest

    http://www.sand-n-sea.us/debbiesdrival.htm

    "Tracker" <"snailmail(remove)222000"@yahoo.com> wrote in message
    news:...
    > Copyright 2003 by Debbie Xl. All rights Reserved. No part of this
    > publication may be reproduced in any form or by any means, or stored in
    > a data base or retrieval system, without prior written permission of the
    > publisher.
    >
    >
    > Remember, you heard this from me first. Installing a backdoor for
    > future and continued access to your computer system is simple once a
    > computer system is compromised. Here are the "Malicious Hackers Best
    > Kept Secrets!"
    > They install a Trojan Horse which disables your anti-virus and firewall
    > protection; also, they install a second set of their own hidden firewall
    > application(s) to protect their Virtual Private Network(s). The point
    > that I am trying to make is this, you can check your system for a
    > Backdoor, Trojan Horse, Virus, or Worm until your blue in the face, you
    > wouldn't find any. The hackers own firewall application(s) can be
    > installed on your hard drive in a hidden folder and the only way you
    > would know it's there is by going to your Control Panel, Folder Options,
    > View, Show All Files and Folders (Windows ME and earlier).
    > Windows keeps files and folders hidden by default so you don't make
    > changes to their important files. You need to View all Files and
    > Folders on your computer to reveal what malicious hackers have installed
    > without your knowledge. This will open your eyes and show you all the
    > files and software applications now sitting on your hard drive. If you
    > want to learn more about computer security, if you're a beginner, one
    > avenue is to read-up on configuring your mail and browsing
    > applications. Google and Yahoo also have Newsgroups and message boards
    > pertaining to the aforementioned. If utilizing a Windows platform, do
    > some reading on configuring your Windows Internet Options both Internet
    > and Local Settings. Also, spend time learning what applications in
    > Windows are running and on what port they run on.
    >
    > Tracker
    > Beefs Fiancee'
    >
    > I know how important it is for me not to define myself by how others
    > perceive me.
    >
    > Interested in purchasing my book named "Security Minds versus Malicious
    > Minds" visit:
    > www.securityminds2003.com
    > It will teach you to learn about Windows, the Internet and Hacking
    >
    > To view some kick butt artwork, visit:
    > http://www.captiveimagery.com/index.cfm
    >
    >
     
    Cap, Aug 10, 2003
    #1
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. John Elsbury

    Re: THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND

    John Elsbury, Jun 22, 2003, in forum: Computer Security
    Replies:
    0
    Views:
    1,400
    John Elsbury
    Jun 22, 2003
  2. Peter M
    Replies:
    0
    Views:
    1,401
    Peter M
    Jun 23, 2003
  3. Daniel Billingsley

    Re: THE BEST KEPT SECRETS OF THE COMPUTER UNDERGROUND

    Daniel Billingsley, Jun 23, 2003, in forum: Computer Security
    Replies:
    9
    Views:
    1,012
  4. Cap
    Replies:
    2
    Views:
    1,006
  5. Chuck
    Replies:
    0
    Views:
    1,076
    Chuck
    Jun 23, 2003
Loading...

Share This Page