.comment-link {margin-left:.6em;} <$BlogRSDURL$>

Friday, September 12, 2003

I CAN'T HACK THE HACKERS ANY LONGER



And I wrote a long note to them today and told them in no uncertain terms that they have got to go. Then I posted it where they're sure to see it. I even pointed out the program that Hewlett-Packard has giving computers to needy people. Surely if they are so poor that they must barge in to take over my computer, times must be hard for them, no? I know for damn sure I don't like sharing, especially as I have no computer privileges. I really laid it out there for them and tried to explain my side of it.

Last night I spent over two hours blogging about important FCC and Constitutional amendment petitions and faxes that need your attention. I had to struggle with the links for some reason. I gave a little history on the issues, some personal insights, the current picture, you know, the whole ball of wax. And guess what? It evaporated. But the computer had been acting way strange all night. I mean really strange. I know they know where I go because they hear me telling my kids on my bugged phone that I'm at the library. The library is about two blocks fromy house.

I had fifteen minutes till closing, so I tried to explain and at least put some links in. Guess what? That vanished too. That reminds me. I'm publishing this unfinished right now.

Today has been a revelation. I think I have just about figured out what they do and how they do it. It's unbelievable. If you had told me this three months ago I don't know if i could have swallowed it.

Because I am a computer addict, I still get up in the morning and desolately poke the keyboard around while I drink my coffee. There's not much to do but disable their files. Oh, I got creative yesterday. I got out the Recovery Console and disabled all their remote and network devices. I re-did set-up installation piece by piece as well as did another re-format and re-installation. I disabled devices in the device manager. I uninstalled lots of services. I did some of my own creative registry editing. Big surprise--the poor computer had a fatal error and shut down. When I'm sabotaging their stuff it's like it's not even my computer anymore, because, let's face it: it's not.

They're still logging on the hoards of the "trusted", "authenticated' souls whose names go on and on. Big party at Local Authority's crib. Or Local Service's, or Local Security Authority, or Microsoft Terminal Services, or Global Knowledge, and on and on with the names. They believe in diversifying. But I was sort of right about them being in the security business.

Stay in suspense a minute. First up--get with the technology. How they do it. Here's one part of the answer perhaps. You sure don't need to be hooked up to the internet anymore. You can control from the comfort of your car apparently. Isn't that special? Here's an ad I found buried in one of the e-mails they sent me today (and therefore allowed me to see). Check out the features on this thing. System requirements, "The computer can be accessed from any device which has a web browser, regardless of the operating system." They still need script though, and that's why I find it. "Script-defined alerts and warnings." ("Alert. Alert. She's trying to go online".) File Transfer feature, which explains why all of a sudden I got a message on my screen that I was out of memory when I had barely saved anything yet. You get the idea. Things are wireless now. People need to adjust their thinking with the times. (Did you notice the 30-day free download? Who do you want to torture?)

Hacking is not a crime for brainless hoodlums. These guys could have Ph.D.'s in technology if they wanted. I think they were proud to show off their Tech Target e-mails to me today with it's "Expert Advice" columns and it's lists of websites. It's all above the ground information for hackers. No more underground message boards for them. It's big business now. And why not. No one wants to catch them or prosecute them. I can vouch for that. Today was more rejections from FBI offices, internet fraud agencies, the Chicago Police, the Illinois State's Attorney, AOL Fraud Dept., and a in-person rejection from the local police. They didn't even raise an eyebrow about them breaking in my apartment. But getting back to the hackers have brains topic, look at this little article I also found in the e-mail today. I don't know what it says but I doubt a firewall will work against it. I mean this hacking is a science. (A bitch receptionist at the Illinois State's Attorney's Office today wanted to know if I had tried a firewall. Wow! Never thought of that. )

Okay, so I knew I was calling AOL Fraud Dept. today. A kid at AOL had me all psyched up that they were really going to help me. He told me that they helped arrest hackers all the time. I was so excited I can't tell you. I put off calling for two days while I put all my notes together organized my presentation. I kid you not. I'm not getting called crazy anymore. What a waste all that was. Just plain "No."

But the point is that I decided this a.m. to see what would happen with the dial-up internet so I could tell AOL. Now I know that they have power even over AOL. I worked and worked to get the damn connection. Finally it said it was connected. I'm all excited except that there's a little note there that I've seen before. It means I'm not hooked up to the real internet--just to some of my e-mail. I couldn't even get to my main e-mail. They let me look at my small e-mail account which was mostly full of e-mails from Tech Target which I think is them or associated with them. It was interesting reading. I cannot get over how brazen hackers are, but, believe me, now I know why.

Here's my boys: "A terrific IT (?) offer got even Better!"

(Note: Their manifesto was full of capital letters that didn't need to be capitalized too.)

"Global Knowledge has added the color Palm M130 to the Cool Stuff program. As you probably know, Global Knowledge has IT training courses in Security, Web, Cisco,Microsoft, Networking, (I know they have that down) and dozens more. Now any of over 100 courses come with your choice of XBOX Gaming System, Playstation2, Linksys 54G Wireless Router or the new Palm M130 PDA."

(I wonder if those last two would keep my hackers out. I was all set to buy a Linksys but the guy at Best Buy told me not to bother unless I was on a network. I didn't know I was part of a network at that time.)

"Purchase any number of classes, virtual classes, e-learning courses on our web site and you will receive your choice of a Cool Stuff item for each course you purchase!" Here's the cool website for hacker wannabees. I signed up for a course myself while I was there. Why not? That's the side of the law that wins. (Don't panic. I didn't give my correct information.) There were courses in all the stuff I see in their files: Cisco Remote Access Products, ATM Core Concepts, Overview of Cisco Hardware, Java Script Basics, etc. I may go back for ATM Core Concepts. I'm not promising to stay on the side of the law that loses.

So now that I'm getting the big picture I wrote them several things in my letter today. I asked did they want to work as my security consultants, since they know everything and can tear through firewalls like lions being thrown meat. I inquired as to what this would cost me in terms of them acting as consultants, and, of course, getting the hell out of my computer. While I was asking, I decided to get some free security advice from my hackers. Some cop or somebody told me the other day that good computer security consultants charge hundreds of dollars an hour. So I asked them if I made a mistake not to get the Linksys router, if that might have worked. I wondered if they could recommend any firewall that they couldn't tear up before breakfast. I asked in general what to do about a Windows XP besides get rid of it. And if you do get rid of it, what do you get? I saw some disturbing articles about Linux in Hackers' Weekly today. I just don't know. It would be good to have them as consultants. Who better? But they really need to get the hell out.

I told them I'd worked on an MS in Psych and couldn't help but guess that they were white, early 20's, longish hair but neat, minimal neat facial hair, maybe a soul patch here or there. I asked if being obsessive-compulsive or anal retentive didn't interfere with the wildness one thinks of as being inherent in a life of crime. I told them they are too young to remember the Odd Couple, but it's like imagining Felix as a big time kidnapper or something. He would worry more about the kid making a mess than he would getting caught. They have to be so attentive to detail, so precise and yet they are totally criminal and thumb their noses at the law big time. I may end up writing an article or even a book about this experience, if it ever ends. I mean I'd like to write it on my damn computer.

Gotta go now. And Rasman really has to go.

------------

PLEASE NOTE: The names of actual companies and products as being hackers or made for hackers is libelous and I am only postulating here. I am not really suggesting it's the truth.






Comments: Post a Comment


This page is powered by Blogger. Isn't yours?