Moderators: Elvis, DrVolin, Jeff
Percival wrote:daba64 wrote:nathan28 wrote:Bridge It wrote:This blog is still available.
You don't have to go thru way back. http://dreamsend.wordpress.com/
It's the new stuff that he's pulled.
Somebody HTTrack it before it disappears
Now it's all gone except for an old About Me section.
Weird that an ARG pops up here and DE disappears. Coincidence? You decide.
Well we know he is watching since he just deleted that entire site within the last few hours after it was linked here.
Also, there are no coincidences, its all connected somehow I am sure.
I am loathe to look into it too deeply, however, because I do sense a certain vacuum of information, one all too likely to be filled with bullshit... I mean, fucking hell, this was back when if you wanted to run a program you put a 5 1/2" literally floppy disc into a drive.
justdrew wrote:well, at least the primary version of it ran on DEC's PDP11. DEC's stuff was much better than the crappy PCs around that time, but still, it may know in theory how to access a wide variety of DBs and formats but still those DBs have to be made available and configured for it's access. My feeling is it was a nice case-management system and legendary stuff got built up around it. I would kinda like to trace the history of the wild claims about it (or about later versions of it I guess), many of the claims of vast world wide-info-matrix capabilities seem to maybe have come "From the Wilderness"
Zap wrote:Bridge It wrote:What is that thing where people see patterns in everything and feel that they are enlightened somehow because they see it and others don't.
"Hugh Manatee Wins"?
Oh, wait, you probably mean
http://en.wikipedia.org/wiki/Pareidolia
or
http://en.wikipedia.org/wiki/Apophenia
Bridge It wrote:Zap wrote:Bridge It wrote:What is that thing where people see patterns in everything and feel that they are enlightened somehow because they see it and others don't.
"Hugh Manatee Wins"?
Oh, wait, you probably mean
http://en.wikipedia.org/wiki/Pareidolia
or
http://en.wikipedia.org/wiki/Apophenia
Yeah - I think that's what I'm talking about. Hugh's thing seems to be more of a six degrees of separation concept pertaining to all things governmental and black opish. Dreams End on the other hand, tried to find coded patters between anything confined to planet earth, could be government related, could be Hollywood related, could be NFL related, or maybe related to the latest stamps issued by the post office. It was all "connected." But in the last however many months, none of it was at all engaging. Like the Michael Jackson/Bob Fosse thing I mentioned. It just boiled down to "dance lessons - so what." I don't think he's schizophrenic, but I think "the deep end" may apply.
Percival wrote:Since it says that PROMIS has to installed on the computer you want to spy on for it to work are we safe to assume that WINDOWS has PROMIS within it?
One of the truths of computer security, to which there are a few exceptions. See also: physical security.
Even if a system is impenetrable from over a network, unrestricted physical access is an easily forgotten or disregarded security vulnerability. If an attacker can simply walk into the room the machine is in without restriction of her actions there, it is only a matter of time before she can begin to do Bad Things to it, such as changing its root password.
Means by which to exploit such a weakness include:
Exploit a lack of access control on the console.
Some operating systems, such as Microsoft Windows, do not or can be configured not to require someone at the machine's console to authenticate (usually by entering a password) at all. Alternatively, if the system does require such authentication at the console, but someone is still logged in there, then you can use whatever privileges they have, such as access to sensitive data.
Exploit a lack of access control in the boot loader.
This can be accomplished by means such as pressing F8 while recent versions of Microsoft Windows are booting, specifying 'init=/bin/sh' as a boot parameter to Linux (usually done at LILO's 'boot:' prompt), etc.
Use a bootable floppy disk or CD-ROM.
Reboot the machine and boot from it, and voila, you can do whatever you like. The program on your boot disk might simply give you an unrestricted command prompt, or it might be some automated procedure for e.g. installing a rootkit. The machine's BIOS might be set to not boot from floppy or CD-ROM, in which case that setting will need to be changed. On an IBM PC-like machine, if a BIOS password is set which prevents this, it can be removed by opening up the chassis and pulling out the battery on its motherboard that powers the NVRAM that holds this password. However, all of the other BIOS settings will be erased as well!
Pull the recording media.
If you only need to get at what's on it, and you have the time, you can simply power off the machine, physically remove its recording media (usually one or more hard disks), and leave. The machine probably won't work after you do this, in which case it will be apparent that someone has done something to it; if you close everything up and make it look like it hasn't been tampered with (e.g., by replacing the chassis cover and plugging everything back in), it may take longer for someone to realize what's happened.
Swipe the whole thing.
If you can do so without being noticed or stopped, you may want to unplug the entire machine and haul it out. Stealing the machine outright means that, aside from getting at whatever is on its recording media, you can then use the machine itself for a new Web server or something.The viability of this method is significantly affected by the physical size of the machine: laptops and PDAs are a lot easier to steal than mainframes.
Destroy the machine.
If you only need to sabotage the system, rather than use it or get at its data, it might be easier or otherwise more viable to simply render the machine permanently inoperable. There are, of course, plenty of ways to accomplish this: shoot it, blow it up, hack it to pieces with an axe, etc. Use your imagination. It will probably be important that any recording media are properly destroyed, so a post-mortem inspection of the machine before leaving would be wise.
Penguin wrote:Percival wrote:Since it says that PROMIS has to installed on the computer you want to spy on for it to work are we safe to assume that WINDOWS has PROMIS within it?
If the bad guy gets physically on your computer, it doesn't make fuck all difference what the operating system is - physical access means you are fucked, and your system compromised.
There are even exploits to read the contents of your RAM (memory) sticks that have been pulled out of the computer...
http://everything2.com/node/1528211?boo ... alBookmarkOne of the truths of computer security, to which there are a few exceptions. See also: physical security.
Even if a system is impenetrable from over a network, unrestricted physical access is an easily forgotten or disregarded security vulnerability. If an attacker can simply walk into the room the machine is in without restriction of her actions there, it is only a matter of time before she can begin to do Bad Things to it, such as changing its root password.
Means by which to exploit such a weakness include:
Exploit a lack of access control on the console.
Some operating systems, such as Microsoft Windows, do not or can be configured not to require someone at the machine's console to authenticate (usually by entering a password) at all. Alternatively, if the system does require such authentication at the console, but someone is still logged in there, then you can use whatever privileges they have, such as access to sensitive data.
Exploit a lack of access control in the boot loader.
This can be accomplished by means such as pressing F8 while recent versions of Microsoft Windows are booting, specifying 'init=/bin/sh' as a boot parameter to Linux (usually done at LILO's 'boot:' prompt), etc.
Use a bootable floppy disk or CD-ROM.
Reboot the machine and boot from it, and voila, you can do whatever you like. The program on your boot disk might simply give you an unrestricted command prompt, or it might be some automated procedure for e.g. installing a rootkit. The machine's BIOS might be set to not boot from floppy or CD-ROM, in which case that setting will need to be changed. On an IBM PC-like machine, if a BIOS password is set which prevents this, it can be removed by opening up the chassis and pulling out the battery on its motherboard that powers the NVRAM that holds this password. However, all of the other BIOS settings will be erased as well!
Pull the recording media.
If you only need to get at what's on it, and you have the time, you can simply power off the machine, physically remove its recording media (usually one or more hard disks), and leave. The machine probably won't work after you do this, in which case it will be apparent that someone has done something to it; if you close everything up and make it look like it hasn't been tampered with (e.g., by replacing the chassis cover and plugging everything back in), it may take longer for someone to realize what's happened.
Swipe the whole thing.
If you can do so without being noticed or stopped, you may want to unplug the entire machine and haul it out. Stealing the machine outright means that, aside from getting at whatever is on its recording media, you can then use the machine itself for a new Web server or something.The viability of this method is significantly affected by the physical size of the machine: laptops and PDAs are a lot easier to steal than mainframes.
Destroy the machine.
If you only need to sabotage the system, rather than use it or get at its data, it might be easier or otherwise more viable to simply render the machine permanently inoperable. There are, of course, plenty of ways to accomplish this: shoot it, blow it up, hack it to pieces with an axe, etc. Use your imagination. It will probably be important that any recording media are properly destroyed, so a post-mortem inspection of the machine before leaving would be wise.
And as I said, Microsoft co-operates with the NSA in building their software.
Your guess is as good as mine as to what that co-operation entails, in its entirety.
it is just becoming increasingly difficult to believe anything on the web anymore and I am starting to become fed up with it all.
Penguin wrote:it is just becoming increasingly difficult to believe anything anywhere anymore and I am starting to become fed up with it all.
Don't worry...It just is that way.
Complex systems carry an inherent element of paranoia, that can only be countered with hearty abandon and a humorous yet firm disposition
nathan28 wrote:So what does that mean for your security?
On Windows you're fucked. Vista is safer against low-level hacking, but IMO is so obviously, intentionally backdoored to the right parties that it's utterly mind-boggling.
As a further tangent I don't understand, in the least, why they're so apeshit over access to personal machines. I'm a nut tinfoiler and I don't have anything worth hiding on my disk.
Users browsing this forum: No registered users and 8 guests