|
Post by Elliot Kane on Jan 11, 2008 14:31:06 GMT
I would have thought he'd need a password, IP or not!
You could try either changing your password or switching to Yahoo or some other e-mail service.
|
|
|
Post by cleglaw on Jan 11, 2008 16:56:58 GMT
This site contains a list of software which allow the sending and receiving of secure e-mail messages. There are links on the site for other email privacy concerns. I have not used any of it myself.
|
|
|
Post by cleglaw on Jan 11, 2008 17:05:52 GMT
And this site has a nice readable article on remailers with links.
|
|
|
Post by Galadriel on Jan 12, 2008 12:14:05 GMT
I went in the search machine to find stuff my ex did, to give him a cookie of his own dough and with his nickname i found several sex forums he signed up to. And some of them shows the date he signed up, october 2007. That is way before we split up, so no wonder he was invading my privacy, he was doing all these things himself. And now he's playing the big poor betrayed victim here
|
|
|
Post by Alrik on Jan 12, 2008 14:12:51 GMT
I wondered if the woman who still seems to like him tried to put doubt in him ... to make the hiatus deeper ?
I don't know.
Or he's of the kind of people who think "all the rules apply to everyone - except me" (like my father, by the way) ?
Apart from that, I'm still clueless and worried.
|
|
|
Post by Galadriel on Jan 12, 2008 14:28:19 GMT
Or he's of the kind of people who think "all the rules apply to everyone - except me" (like my father, by the way) ? He sure is like that, what he could do was forbidden for me. He could flirt with girls and I wasn't even allowed to talk to guys, it's always been like that. There is a saying for those people, but I don't know it in english. It's kinda like: "Measuring with two sizes and weights" or something in that line. But don't worry Alrik, I'm out of here in a week from now
|
|
|
Post by The Sonar Chicken on Jan 12, 2008 14:42:36 GMT
As for downloading from Gmail to your computer: you can do that? Übereil Yes, you can. Be paranoid and don't use Windows if you're absolutely worried about your safety. There're places worms, trojans, etc. can be planted which only a few programs can trace. Or sometimes, if it's a new creation? Then, you might have to wait for months for a cure or solution to be found. And there are ways to plant virii inside an email which sometimes even Yahoo or Gmail might not be able to detect. Also, just 'cos a method is said to be secure doesn't mean it can't be defeated. There're tons of "underground programs and hardware" which can defeat all your efforts. If I was Gal, I'd try to learn as much about computers as possible and also, switch to Linux. For Linux, I'd use a livecd temporarily with a loop file to store all the data. That way, the only way you can access the data is via loading the o/s from the livecd. Linux, btw, is much more secure than Windows but its' security is only applicable if you take steps to enforce it. A first-class security system is worthless if you only enable the minimum settings. Note: even hardware can be used to "trace" and "spy on" others. Like learning the MAC address of an LAN card can allow someone to hack into your pc or to exploit it. I'm sure there're tons of other exploits available and if I were her, I'd check the inside of and near the computer for any suspicious devices. All this might sound pretty far-fetched and paranoid but in the case of intrusion of privacy, you can never be 100% sure of your safety. And if said party is persistent and determined to infringe your privacy, let it be noted that he might go to extreme lengths in order to harass and stalk you and bring distress to your life.
|
|
|
Post by Alrik on Jan 12, 2008 14:50:28 GMT
In principle you are right, but the possibility that hacks into your computer is relatively low - although never gone. And Linux is a fine system, yes, I'd recommend Ubuntu.
|
|
|
Post by The Sonar Chicken on Jan 12, 2008 14:53:11 GMT
In principle you are right, but the possibility that hacks into your computer is relatively low - although never gone. And Linux is a fine system, yes, I'd recommend Ubuntu. Well these days, it's so easy to download a kiddie's script and use it to "whack" another person's pc. In the past, you needed real technical skills in order to hack. These days? You just get a few programs to do all the dirty work. Basically, I wouldn't trust the computer or any rewritable media to be safe. Or even email. After all, if it takes just a few clicks to purchase and place a "spybot" or "virus" into a diskette or cd-rw, what would stop the person from doing that? Humans evolve after all so Gal shouldn't discount such an act from him. And yes Ubuntu is wonderful although Linux-Mint takes Ubuntu's features and improves on them.
|
|
|
Post by Alrik on Jan 12, 2008 15:34:30 GMT
The only *real* protection is an operating system that's so obscure no-one dares to develop something to break into it, I believe. And ... virtualization could be the next Buzz-Word. I think it almost already is.
|
|
|
Post by The Sonar Chicken on Jan 13, 2008 0:42:24 GMT
The only *real* protection is an operating system that's so obscure no-one dares to develop something to break into it, I believe. And ... virtualization could be the next Buzz-Word. I think it almost already is. Well that's kinda true. Nevertheless, I don't think it's so easy to break into a well-fortified Linux system. It'd be like trying to shatter a 50 inch steel wall: doable? Yes. But you'd need a lot of time, patience and a vast assortment of methods and equipment in case some don't work. Still, virtualisation is quite a few steps away from being really usable. Currently, installing guest-images on Ubuntu and at least a few other distros will slow down your o/s and even affect WinXP(how it does that? I don't know). Then, in order to "simulate" a graphics card, you need much more work.
|
|
|
Post by Alrik on Jan 13, 2008 17:38:14 GMT
Well, virtualization at least works for common software - in an emulator sense, so to say. DOSBOX is the best example for that.
By the way, my guess is that the next big, big fashion in computing will be "Retro".
|
|
|
Post by Galadriel on Jan 13, 2008 17:44:23 GMT
I solved the email problem for now, we text instead of mailing and next week i'll be moving and then my brother will take a look at my computer to make sure my ex can't get in it anyway.
|
|
|
Post by Galadriel on Jan 13, 2008 19:22:04 GMT
I found out how he knows soo much stuff now. Appearently he could follow my gmail chat. I had no idea that he could do this, and certainly not after I changed my password. But he did anyway, should I start thinking of reporting this to the police?
|
|
|
Post by The Sonar Chicken on Jan 14, 2008 0:56:22 GMT
I found out how he knows soo much stuff now. Appearently he could follow my gmail chat. I had no idea that he could do this, and certainly not after I changed my password. But he did anyway, should I start thinking of reporting this to the police? Oh crap... I think you've got a keylogger installed on your system. A keylogger is a program/device which records every keystroke you make, basically, every key you type on the keyboard. Once installed, it will keep track of all your passwords, your personal info, etc. It can be a trojan or it can be something else. And just remember: even if you've removed the program/virus, there could be more. Reporting this to the police would likely kick things into motion but if I were you? Take a bit of my advice from my first post in this thread and don't give him an edge over you. The worst thing would be him "stalking" you electronically, no matter where you've moved to. And once that starts, believe me... it can drag on for years. Oh and one more thing: if you use the pc for any banking or financial transactions, you ought to stop doing that now. If there really is a keylogger on your system, he can check and trace your financial transactions and use that as material/evidence in court or to gain leverage over you(blackmail).
|
|
|
Post by Galadriel on Jan 14, 2008 10:32:14 GMT
thanks Luce!! I will keep your advice in my mind and format my pc as soon as I'm at my dads, my brother can fix that problem for me. I don't want him to track my online behavior after our divorce. Pathetic of him right?
|
|
|
Post by The Sonar Chicken on Jan 14, 2008 11:08:17 GMT
thanks Luce!! I will keep your advice in my mind and format my pc as soon as I'm at my dads, my brother can fix that problem for me. I don't want him to track my online behavior after our divorce. Pathetic of him right? No problem... Just get away from scum like him.
|
|
|
Post by Galadriel on Jan 14, 2008 12:02:14 GMT
thanks Luce!! I will keep your advice in my mind and format my pc as soon as I'm at my dads, my brother can fix that problem for me. I don't want him to track my online behavior after our divorce. Pathetic of him right? No problem... Just get away from scum like him. Planning on doing that on saturday! ;D
|
|
|
Post by Dark Phoenix Rising on Jan 14, 2008 13:18:02 GMT
I know i'm a bit late to this discussion, but I personally think that a minor level of snooping can be ok out of curiosity. But the level of snooping that you've been talking about is not just unethical, but probably illegal to boot. When you move out, I suggest that your brother (if he can) duplicates your HD before you get it formatted/checked out, so that if there is anything that's been planted on it, then it can be re-accessed if needed for evidence (you could also send a copy to yourself recorded delivery and not open it, to ensure time stamp). As for GMail. When you log onto gmail, you already have the option of logging on securely. If you do this then any of his remote snooping programs won't be able to stop it. Another thing to look for is extra user accounts on your computer that you don't know about. + changing the password on all accounts you do know about. If you install a good quality software firewall that is permissions based (e.g. Sunbelt personal firewall which has a program permissions based system in it. Also opening task manager and googling every task that is shown in processes (with all users set to ticked) should show up most trojans/spyware. Also you can use tools like spybot search and destroy.
|
|
|
Post by Dark Phoenix Rising on Jan 14, 2008 13:22:08 GMT
what he's probably using to get the full transcripts of gmail chats is a packet sniffer
|
|