About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Phreak
Boxes, Old and New
Bugs and Taps
Cellular Phones
Introduction to Telecommunications
PBX's and Switches
Payphones
Phone Phun
VMB's, Pagers, E-Mail, and S&F Systems
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Data Snooping


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
???????????????????????????????
( )
) Abstruse Authors of Merca (
( )
???????????????????????????????

Presents

Data Snooping : the Right Way
-----------------------------

by
Lee Day

Data snooping is a popular passtime among personal computer users in North
Merca. A data snooper may be defined as one who examines friends' personal,
private data while they are not looking. Most users could probably be labeled
data snoopers at one time or another. The problem is, many friends are made
aware of data snooping activities on their system, either by catching the
snooper in the act, or by finding traces of an invasion. Therefore, some
public education is necessary to ensure the continuation of this enriching
activity.

During a "local" snoop, one must be on the alert for the return of the data's
owner. If the snooper hears the return of the owner, he should act quickly to
appear innocent. Here are several methods :

1) Set up a multi-tasker, and switch to an innocent partition. Caution : The
owner may notice a lack of memory, or may switch to the incriminating
partition.

2) Call a memory-resident pop-up screen. Programs such as BOSS-SW.COM zip a
bogus spreadsheet on the screen. Problem : you may have a hard time
explaining your activity, particularly if you are using the owner's computer
and he does not have a spreadsheet program.

3) Turn the screen off. Not very effective if the owner turns the screen on
again.

4) Reboot. This may be accomplished by "accidentally" tripping the power
switch, or making an excuse for rebooting, such as a need for "fresh RAM".

If the owner has keen eyes, he may thwart a snooper with a time/date stamp.
Some programs automatically create or update files during execution without the
user's permission. The snooper's best bet is to avoid these programs, or
write-protect the disk. A hard disk may even be write-protected with the use
of a trojan horse detector called "BOMBSQAD", which prompts the user for
instructions every time a disk-writing attempt is made.

If a time-date stamp is actually updated, and looks suspicious, the snooper may
change it using Norton's utilities, or a special date-changing utility. He may
also delete any newly created files. Of course, a data snooper should NEVER
modify the owner's files. This would be the equivalent of cutting the balls
off the gander that laid the goose that laid the golden egg. Surely the
snooper would gain much more from repeated instances of data snooping than a
few moments of revenge or tease. Remember : Data snooping can be an
enriching, exciting activity, if approached with an attitude of maturity.

???????????????????????????????????????????????????????????????????????????????
) Written by Lee Day for Abstruse Authors of Merca (
???????????????????????????????????????????????????????????????????????????????
 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS