It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Webcams and Software

page: 2
0
<< 1   >>

log in

join
share:

posted on Mar, 17 2010 @ 09:27 AM
link   
reply to post by Annie Mossity
 


Ph ony Profile



And you could be an FBI agent using a Phony Profile to prevent people from being informed.

[edit on 17-3-2010 by ljib777]

Backdoor Microprocessors

Another Article

I found the articles, just do a search on Backdoor Microprocessors and you will find more about it. Don't ever call me a liar and threaten to get me banned again for telling the truth.

Thank you

[edit on 17-3-2010 by ljib777]



posted on Mar, 17 2010 @ 10:36 AM
link   
Here is another link that supports my claims. Do the research people and you will find that my claims are not baseless.

DC hackers



posted on Mar, 17 2010 @ 10:42 AM
link   
reply to post by ljib777
 


Battery is powering motherboard BIOS CMOS - keeping your "basic" clock running. In modern motherboards there is also function "Wake on LAN" - then your BIOS is listening on network card to get special packet (un-routable - it work only over local network). If it happens your computer "wake up" - aka switch your computers power source on as if you press "power button" on your machine. Still you need to have power cable attached to yours computer power source. It is not possible to run PC on 1.5 - 3V/0.0000 A battery (that what is keeping CMOS alive). While CMOS/BIOS troyan is possible, it is very unlikely. Also communication between CMOS/BIOS and OS is quite limited. This is not way which I'll prefer if I want to spy on someone.



posted on Mar, 17 2010 @ 10:47 AM
link   

Originally posted by ljib777

And you could be an FBI agent using a Phony Profile to prevent people from being informed.


uhm ... okay, then. you caught the tater.



Backdoor Microprocessors


you do realize the necessary modifications would have to be accomplished during the design, development and/or actual manufacturing of the chip or pc/component. right?


Researchers who discovered this approach described possible scenarios of attack such as the code being added into the chips during development, or the modified chips being installed during computer assembly.


not to dismiss the Many ways into any Windows-based system, but to make such bold claims of being MS this that and everything ABC certified does give one pause to ponder the actual level or degree of knowledge and capabilities held.

especially the statement of them being able to "use" your PC even when turned off/unplugged. that one was as good as Ron White's tater salad routine.

[edit to include tags]

[edit on 17-3-2010 by Annie Mossity]



posted on Mar, 17 2010 @ 10:55 AM
link   
why are you so afriad of being watched?

Hell, id let them see every thought that passes though my mind.



posted on Mar, 17 2010 @ 01:45 PM
link   

Originally posted by ljib777
My computer is constantly being controlled by the United States Government.

They take over my Norton Internet Security Software and create and install firewall rules that I cannot change. They have stopped my software from communicating to Norton.

Please provide logs, screenshots and other evidence to back this up, I want to see IP addresses confirmed to belong to the US government here, not some random gibberish either. So far this sounds like typical spyware/malware attempting to protect itself by hindering security software on the system.



I feel it necessary to inform all of you that your webcams are being controlled and your firewall's are not secure, no matter what you do. Your routers and access points are also being controlled.

If that is in fact the case then I wonder why your post was successful, why wasn't it deleted by the people who supposedly have access to every computer in the world including yours and likely the ATS webservers?



Utilizing Fast Access biometric software has proven to me that they can also con this software into thinking that you are recognized, when in fact they will capture streaming video of you and replay it, or attempt to use still shots. When the software keeps trying to recognize your face, after testing by changing my password, it continues to faulter. So you cannot even depend on this either to protect your system or your software.

This is about the most accurate thing you have said so far; no security system is foolproof and with enough thinking can be defeated or circumvented.


They have so many holes in any of the Windows operating systems that you cannot plug them up. Even disabling peer to peer, all remote desktop, remote control, remote registry. I utilize my WEP and encryption keys. I have done everything in my power to keep out intrusion.

I won't deny that the Windows OS is generally riddled with holes that put its security at grave risk, however a good hardware firewall/router has kept my network secure for years and I haven't seen the first hint of any intrusion into it like you have described here.


You have no privacy, you have no protection, except for just shutting off the computers and dismantling them. They can even run your computers when they are turned off and unplugged. They can control your CDROM/DVD Roms.


When a computer is unplugged both from power and network there is NO, I repeat NO way to control it. As for optical drives its fairly simple, most backdoor clients such as BackOrrifice, NetBus and such can eject/close the drive bay.


------

So far all this sounds like is paranoid, delusional ranting with little technical knowledge behind it. I seriously doubt the supposed credentials touted by the OP, because anybody with that level of experience should understand some of the rudiments of computers such as power and network connectivity.



posted on Mar, 17 2010 @ 02:17 PM
link   
Norton Internet Security Software isn’t exactly a top rated security suite. Someone with your “credentials” would be using Avast or MSE. Let’s take a look at the symptoms that are possible:

• They take over my Norton Internet Security Software and create and install
• They have stopped my software from communicating to Norton.
• They can install software into your system at their will.
Windows Defender, any malware protection, any firewall protection…

Wait a second…. You are using software that was decommissioned 5 years ago? Seriously… 5 years ago? What version of Norton are you using? By the same reasoning, what version of Windows were you running before you reinstalled?

You may be infected with a variation of the Vondo virus-suite. Start talking honestly, stop oversensationalizing, and you may get some assistance. The way you are talking now, I have to agree with the above posters who are stating that you nee to get professional help.



posted on Mar, 17 2010 @ 02:53 PM
link   

Originally posted by Helig



When a computer is unplugged both from power and network there is NO, I repeat NO way to control it. As for optical drives its fairly simple, most backdoor clients such as BackOrrifice, NetBus and such can eject/close the drive bay.


I dont want to change the subject ever so slightly but I remember reading some information that the government can access and even LISTEN in on you via your cellphone even if it is turned off. I realize that the networking between wireless internet and cell signal could be different in terms of access, but what if they are similar?

Sources:

CNET :news.cnet.com...
SlashDot: yro.slashdot.org.../11/23/196229
ABC News: blogs.abcnews.com...



posted on Mar, 17 2010 @ 03:29 PM
link   
reply to post by AlwaysAware23
 


Cell phones have batteries that must be removed to truly disable them, if you pull a computer's network and power cables are removed its unable to do anything. If you want to read about something in the same vein but truly orwellian check out the way the government has been using OnStar in vehicles to snoop on folks.



posted on Mar, 17 2010 @ 03:54 PM
link   
I think I may have found out what your problem is!!!
FBI Cracked a WEP encryption in 3 minutes live on stage...
www.smallnetbuilder.com...
www.isaac.cs.berkeley.edu...


Originally posted by ljib777
I utilize my WEP and encryption keys. I have done everything in my power to keep out intrusion.



For someone who is a MCP I would think that this would have been common knowledge NOT to use WEP almost 2 years ago now...

Problem solved! /thread

[edit on 17-3-2010 by Envisionimage]



posted on Mar, 17 2010 @ 04:10 PM
link   

Originally posted by ljib777
My computer is constantly being controlled by the United States Government.

They take over my Norton Internet Security Software and create and install firewall rules that I cannot change. They have stopped my software from communicating to Norton.



Get rid of Norton and switch to Avast! or something else.



I am a Computer Support Specialist and Licensed MCP (Microsoft Certified Professional), with over 20 years of computer experience and beta testing.



Cool, I have a degree in computer science and am a software engineer. When did you get MCP certified?




I feel it necessary to inform all of you that your webcams are being controlled and your firewall's are not secure, no matter what you do. Your routers and access points are also being controlled.


This blanket statement is completely false. My firewall is very secure. Its running OpenBSD with packet filtering and AuthPF. I also have a OpenBSD box running as my main border router, so its completely custom and pretty secure. Not -all- firewalls are compromised. I will agree however, that some firewalls are indeed either compromised by the company who created them or have been forced to have NSA backdoor's in them.



Utilizing Fast Access biometric software has proven to me that they can also con this software into thinking that you are recognized, when in fact they will capture streaming video of you and replay it, or attempt to use still shots. When the software keeps trying to recognize your face, after testing by changing my password, it continues to faulter. So you cannot even depend on this either to protect your system or your software.


I'm not exactly sure what you are talking about here. Fast acting biometric software? You mean fingerprint or face recognition software maybe? Why the need for such antics in calling it what it is?

Software and hardware systems are only as secure as their passwords or their "finger or faces" are kept. If someone really anted to, they could just hold a gun to your head and tell you to type your password, or scan your finger, or put your face in front of the camera. Also, why would they bother trying to capture your face in order to circumvent the security of the system? According to you, they already have access to your microprocessor and RAM, and they wouldn't even -need- to circumvent your system, they would just need to alter the register that holds the bit that says whether you are authorized or not. Much simpler and no need to even have you there!





They have so many holes in any of the Windows operating systems that you cannot pllug them up. Even disabling peer to peer, all remote desktop, remote control, remote registry. I utilize my WEP and encryption keys. I have done everything in my power to keep out intrusion.


I can crack 64-bit and 128-bit wep keys in less than five minutes. If you are worried about people cracking into your wireless, either get rid of wireless and go hard wired, or switch to WPA2 encryption. WEP is now useless and should no longer even be included in wireless systems. WEP is security through obscurity, which is no security at all.

I will admit however, that windows has had a crap ton of holes throughout its development. I'm not to sure about their latest version 7 though.



You have no privacy, you have no protection, except for just shutting off the computers and dismantling them. They can even run your computers when they are turned off and unplugged. They can control your CDROM/DVD Roms.


Turned off and unplugged. You have absolutely lost it here my friend. The CMOS/BIOS battery, as other have stated, does not have the power output needed in order to power the system. This is a paranoid, completely false accusation, and as thus would require concrete proof (and the breaking of several physics laws) in order to accomplish.




They can install software into your system at their will. Thus, they can make anyone out there look like they are committing criminal activity without your knowledge!


This is actually true. They can install anything they want through RPC but only if they have your main admin account passwords. These can however be cracked via the SAM security hive where windows (used to) keep the password hash's stored. I say used to because the last time I worked with this was in windows 2000, I have not needed to deal with it since. It may be different now however. BUT, even though, they can only install software remotely if your firewall allows them through. Again, use a better firewall.



I advise all of you to do what you can to make sure that you keep track of any unknown software or programs running on your computer. Windows Defender, any malware protection, any firewall protection that you have will not dismantle nor stop this because it appears that software developers, hardware engineers, MCSE's, and our governments are the culprits.


I take personal offense to this to be honest. Software engineers, as well as many other high level engineering professions, have communities of peers, and ethical mandates that true professionals adhere to. I personally adhere to the IEEE and ASM "Code of Ethics". To insist that we are all partaking in some conspiracy is laughable. However, there may be a small handful that do not view these codes of ethics as law but they are few and far between.



I also advise all of you to keep records of any interent connections that seem suspicious via SNMP Trap and your resource monitor. Back up your log files and event logs.

I will pray for all of you! Only the King of kings and Lord of lords, Jesus Christ, can save us from the BEAST that has risen up to control and manipulate us all!!

Sincerely,

LJB




Your final statement tells me that there is some ulterior motive behind your actions. Paranoia runs rampant through your statements.

Do what you can to be secure, but don't go completely paranoid.

-xmad

[edit on 17-3-2010 by xmaddness]



posted on Mar, 17 2010 @ 04:25 PM
link   
on my pc they would be met by a nice little image file saying hi I aren't here right now but please stick around. I would be pleased to meet them.

Seriously though they would be met by a lot of games. useless crap. An almost full 500gb hard drive. A g25 and a Joystick and lots of GCSE course work. Speaking of which homework time



posted on Mar, 18 2010 @ 06:33 PM
link   
I think any government can watch and control anything its subject does, there is nothing we can do about it.

For most of us this would mean...nothing at all because we dont really do anything illegal or even worthwile/interesting to the people watching.

The problems arrive at the point where the line between criticism and terrorism becomes a -conveniently- blurred area where the government can just take you in for saying something nasty about someone in a high position.

Im pretty sure none of you guys 'n gals are planning on blowing yourself up in the near future, but there simply is no clear line to whats considered terrorism and whats just critical bla-bla.

Ow, and to all those that fear theyre bein watched while doing their..."handywork"...while watching certain things on the computer, im pretty sure whoever is watching you has seen that done a zillion times before so he/she wont really mind




top topics



 
0
<< 1   >>

log in

join