tech BS / was: Re: dual booting Ubuntu 13.04 and Windows 7

Christine Gipson 29cagn1hnyc at gmail.com
Wed May 29 11:03:48 UTC 2013


Obviously something I already know ...
Still does not make using my LaCie external drive any easier when they
snatch the Windows interfaced software directly from my downloads file in
order to pirate my art and photos. Big business to Chinese, Russians, &
others.
The Patriot Act in the USA and DEA suspicions has been co-opted as an
excuse for installation of spyware and remote capable tech like installing
an old cell phone with Bluetooth capabilties inside desktops that are
offline to watch everything for a while. With the advent of cloud and Smart
Share technologies, it is even easier to be an amateur detective or
pirate/thief.

sent from my LG SPECTRUM
On May 29, 2013 5:34 AM, "Patrick Asselman" <iceblink at seti.nl> wrote:

> If you have tried new installs and did so on multiple devices, you have to
> consider that the snooping does not happen on the device by means of the
> network. There may have been an intruder in your house who placed a small
> device between your keyboard and your computer, to snoop all keystrokes.
> (If you have a wireless keyboard this device may be hidden anywhere in your
> house.) There may be a pinpoint camera hidden in some object, so the
> snooper can peek at your screen. There may be someone across the street
> with a camera and a telelense snooping.
>
> There may be private detective types out there who can help you with
> things like that. They probably know what is available, how they would
> approach this, and that makes them better suited to detect such devices.
>
> Another thing to consider doing is taking a step away from the digital
> world. If you have photos on a disk, store them on a usb stick and keep it
> in your pocket. Print the pictures and store them in a bank vault. Use your
> PC only for non-sensitive stuff, and realise that anything you do on your
> PC will be compromised. (I.e. only use it for some simple browsing etc).
>
> Just my $0.02
>
> Best regards,
> Patrick Asselman
>
>
>
> On 2013-05-29 10:20, Christine Gipson wrote:
>
>> Thank you, Ric.
>>  First, I have called law enforcement, but when the culprit I'd
>> related to a law enforcement officer, the blue code of silence goes
>> into effect and your would becomes one where people begin to be quite
>> duplicitous with their helpful abilities.
>>
>> Second, I have even had problems on Google 2-step verification,
>> having it usurped via a duplicate device or remote access set up
>> exactly as my cell phone. I have no WiFi router, so not the problem.
>> The problem is when my son broadcasts his mobile hotspot from his cell
>> phone and I use it to connect.  The culprit accesses via JS, etc., and
>> just phishes the passwords on data entry.
>>
>> Also, living by the largest mosque in NYC and with Muslim neighbors
>> means the NYD wifi-sniffs right along with the same criminals who
>> scooped all the credit card numbers and codes in that $45 million
>> dollar heist those Dominicans did a couple of months ago.
>>
>> I go for security anew daily. It is a constant battle in my
>> neighborhood.  I thought Ubuntu would be a solution away from
>> Windows.  And actually, I am not the one looking for the dual install
>> at all. I am quite happy to ignore Windows and use the Wine interface
>> for the programs I require. When I see my Windows compatible downloads
>> for my LaCie external drive (which has my art and photos from my 3
>> compromised previous laptops) have disappeared from my system since
>> last night, I know I was correct to call in ic3.gov [3] to counteract
>> the copyright troll seeking to copyright my own works with the Library
>> of Congress before I do due to his/her accessibility to the necessary
>> funds to do so.  It is pretty much a very black and white issue to me.
>>
>>
>> sent from my LG SPECTRUM
>> On May 28, 2013 6:49 PM, "Ric Moore" <wayward4now at gmail.com> wrote:
>>
>>  On 05/28/2013 10:35 AM, Christine Gipson wrote:
>>>
>>>  Look guys, I am not into the tech BS, just need to know how to get the
>>>> cyberstalker off my machine and get some privacy. He is a real menace.
>>>>
>>>
>>> Sounds like you are asking for tech BS in a technical forum, as without
>>> some real information, about all you will get is BS answers.
>>>
>>> You have a gmail address. Use the double password feature they offer for
>>> free, and no one will get into your email account, via google. It's a
>>> heckuva feature. If you have a WiFi hub/router and your neighbor is getting
>>> in through that, you need to up the security settings on it. Or, use wires.
>>> That is as secure as you can get.
>>>
>>> Next, call the police IF you are sure that someone is messing with you
>>> (cyberstalking) for sure. That is what they are for. Jails are meant to
>>> hold people like that, and if you do not report them, then someone else
>>> will become victimized, due to your lack of reporting the offender.
>>>
>>> It is on you, however, to insure that you have done all you can
>>> security-wise on your end. Preserve your log files for evidence. If your
>>> neighbor is accessing your WiFi network, without your permission, you do
>>> have to inform them that you do not give them permission to do so. Fair is
>>> fair. It's called being "Properly Assertive". :) Ric
>>>
>>>
>
> --
> ubuntu-users mailing list
> ubuntu-users at lists.ubuntu.com
> Modify settings or unsubscribe at: https://lists.ubuntu.com/**
> mailman/listinfo/ubuntu-users<https://lists.ubuntu.com/mailman/listinfo/ubuntu-users>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20130529/769ccf3b/attachment.html>


More information about the ubuntu-users mailing list