It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by Vasilis Azoth
Also I'm confused about the mod warnings here. If I find something I'm under no legal obligation to turn it in to anyone(right or wrong).
Vas
Originally posted by Vasilis Azoth
The files that appear to be garbage may actually be an encryption key.
Also I'm confused about the mod warnings here. If I find something I'm under no legal obligation to turn it in to anyone(right or wrong).
So now that it's mine I have the right to look at whatever is on it even if said data IS encrypted.
If I forgot the password on one of my documents it's not illegal for me to run programs to find the password so what is the problem?
Vas
Originally posted by Blanca Rose
reply to post by Daisy-Lola
Here is what I think about this thread. I am sort of apalled by your suggestion to open up these files.
Does the train station have a lost and found? And why didn't you take it there immediately if they do?
What you suggest to do seems to me like finding a wallet, and trying out the credit cards to see if they will work.
Isn't anybody trust worthy these days?
Originally posted by Marshall Ormus
Sometimes you have to look at the things contained on data sticks in order to find the possible owner do you think the police or who ever the item is given to in order so it can be looked at and returned to the owner just looks at the stick itself and thinks I know whos it is, no they open it look for clues/ names on or within the files contained and then go from there.
I have found several in recent years, most where students back ups or working copies of their notes..etc I returned some of them in person to their owner and others to their lecturers as I found a common name on various data sticks repeatedly coming up in many of them by looking through the files for a header/ footer.
Looking at the things on the data sticks aren't like your analogy unless you meant to say open the wallet to see if you can find a named item or address. There is a difference between opening a file to find a name or company name and keeping the work for yourself or using the work or things contained for personal gain.
Originally posted by fixer1967
I have a picture that anyone can open stored on all my flash drives. I took a sheet of paper and wrote a note that reads 'IF FOUND CALL (my cell number)" and took a picture with my digital camera. That way I may get one back if I lose it.
Originally posted by ANNED
if you look in the april 2009 popular mechanics issue there is a story on america's growing risk of cyber attack.
there is a part about hackers using what is called a flash drive drop to get around a companies strong firewall.
Flash Drive Drop
WHERE parking lot human nature can sometimes provide an easy end run around a strong firewall. An old hacker trick is to drop a USB drive in a company public area, Then count on the curiosity of a company employee to plug the USB drive into his work computer to identify the owner of the device, The drive automatically installs a hidden rootkit software that invites the hacker into the system.
I have got a company catalog on CD in the mail and when i tried to open it found a virus hidden on the CD along with the catalog.(what caught them was that i opened the CD on a non net connected computer and it complained about not having a connection)
I later complained to there order department about the virus on there catalog CD, Only to be told that they had never had a CD catalog or ever sent one out.
I noticed they immediately put a warning on there web site about the CDs and found that other companies had got the same CDs.
It was some hacker looking for password and company account info so that he could charge ORDERS to the companies acounts.
Originally posted by griffinrl
Format the thing and add it to your USB drive collection. That's most likely the only good use for it now. Besides it protects you from posessing proprietary information if that's what it is