Archive for the ‘Computers’ Category

Final Post

October 2, 2009

No – I’m not dead yet!!

This is a final post at Tigerstail.wordpress.com because I am tired of seeking knowledge and bitching about that which is. It is time to use my skills to develope the solutions to all of the problems I have discovered.

Join Me at jimmicap.wordpress.com

IE8 Privacy is an Oxymoron

September 20, 2008

I could have said that the IE8 privacy function is a lie or a joke but I happen to like the word oxymoron. In my preliminary tests I was acting as if my life and future depended on my online privacy and didn’t bother doing a comparison. I found my surfing history in cache memory, that Ccleaner didn’t wipe the cache memory information and that there was a hidden system file called PrivacIE (pronounce that “Priv A C”) which contained a hashed index.dat file which was untouchable. Not a bad find for a quick survey. I did a preliminary test against Firefox 3 automatically wiping all privacy data on closing and found a few lingering cookies which Ccleaner seemed to wipe out but no cache memory of the sites I visited.

I sort of find a hashed index.dat file (in a folder called PrivacIE) and a record of my surfing history in cache memory an insulting and direct compromise of the promise of real internet privacy.

If anyone cares about the method, I’ll do a post on it.

Resistance is Futile!

July 21, 2008

Once you realize that Resistance is Futile, knowledge truly is soporific. The problem is, life without knowledge acquisition becomes somewhat boring. After all how much, sex, booze,beach time and loud music can a sing person handle. So for various reasons such as the potential for my liver falling out and fear of going brain dead, I decided to sober up and read the content of all my emails from Sans to see what I’ve been missing since April. The following is extracted from various Sans newsletters and attracted my attention because of the “unique” content.

WINDOWS SECURITY
Researchers at the Internet Storm Center estimate that it takes about
four minutes for an unpatched Windows PC to be compromised once it
connects to the Internet. The survival time has consistently dropped
over the past years due to the increasing number of worms and viruses
and hackers using more and more automated attacking tools. However, a
researcher with the German Honeypot Project claims the survival time is
much higher than 4 minutes and in fact is nearer 16 hours. Either way its less than one day on line.

Google can’t stand the competition
A controversial law was narrowly voted
in last month and allows Swedish security services to eavesdrop on all
international calls into and out of Sweden. In response to the new law
TeliaSonera, the Finnish-Swedish telecoms operator, has moved its
servers from Sweden to Finland and Google is also considering a similar
course of action. After all, why should Google allow anyone other than Google to snoop on your surfing
habits and keep a history of your actions

Google Caches Retain Stolen Data
Stolen sensitive personal data, including financial account information,
have been found to linger in Google caches for months even after the
server holding the stolen information has been disabled. Cyber
criminals collect information through keystroke loggers and store the
data on servers. When the servers are discovered, they are taken down,
but the Google pages are not unless specific requests are made. A
Google spokesperson said that in general, the company does not remove
cached information, but that it eventually disappears on its own after
the original source is no longer accessible.

Coming to America!

Phorm’s technology can be
used by Internet Service Providers to track end user activity on the
Internet and place advertisements based on their online activity. Phorm
already has agreements in place with some of the U.K.’s top ISPs such
as the BT Group PLC (BT), Carphone Warehouse’s (CPW.LN) Talk Talk and
Virgin Media.

Expanding the Patriot Act
The Foreign Intelligence Surveillance
Act (FISA) allows for warrantless surveillance of
telecommunications and immunity from subsequent lawsuits served against
the telecommunications companies facilitating the surveillance. A
lawsuit claims that FISA breaches the Fourth Amendment of the U.S.
Constitution, which prevents the government from unreasonable searches
and seizures. Supporters of the law claim it is a vital weapon in the
fight against terrorism.

Don’t Xerox any $3 Bills
A feature built into many modern laser printers is raising concerns
among civil liberties groups that individuals’ privacy may be eroded.
The feature uses technology to print hidden yellow dots that are unique
to the printer onto each page. These dots are invisible to the eye, but
when viewed under a blue LED light they can identify the printer and the time of use. The
technology is used to track those who attempt to use color laser
printers to create counterfeit money. However, privacy advocates are
concerned that the technology could be misused to track and identify
whistleblowers or dissidents in totalitarian regimes.

Read it and Weep!

Google Content Filtering in America!

January 26, 2008

If content filtering exists in America, there ought to be a way to prove it one way or the other. Any experiment should be open to the public with all assumptions identified and the experiment should be reproducible and have a scientific evaluation criteria.

As a working assumption, there should be three elements to the number of site visitors when averaged over time. First, there should be some measure or regular visitors who would average out over time to some relatively constant value. Next there should be a feed from the search engines which is a factor of the public interest in your topic. Also, there could be a viral effect where visitors recommend you to others and therefore one site visit by Google referral or one regular visit may translate into any number of visits. (This is probably highest with jokes and politics and lowest with technical). However, if both groups (regulars and referrals from Google) recommend you to about the same number of people, this doesn’t alter the mathematical approach.

For the past three weeks, this site has varied around 41 to 87 visitors a day with an average around 60 a day but WordPress only holds the search engine data for a week. So I have the following Google Data and site visitors.

Google Referrals—–Visitors
44——————53
51——————67
44——————64
48——————62
50——————75
33——————48
40——————54

Now I ran the above data through an online Linear regression tool and came up with a very high correlation coefficient of 86% (R squared 75%). For a moment just think of a fat reduction pill where the weight you lost was 75% related to the pills you took and independent of all other variables like food and alcohol consumption and exercise or other variables.

The equation is visitors equals 1.3(Google Referrals) plus 4.1(regulars)

Obviously no viral effect and a small number of regular visitors, but if you need the technical information you come because of a Google search.

Now the data is drifting down because the site has not been very active for the month but the average for the data above is 60 with a two standard deviation range of 42 to 78. I would be hard pressed to make a case for effective Content Filtering based on this data set because there is no sharp break in the curve and the number of visitors for the past week is much the same as it’s been for the past three weeks.

Just for fun, I have two very dormant sites one in business (2.6 visitors a day) and the other in recreation (5.4 visitors a day). The equations and correlations are as follows:

visitors equals 1.4(Google Referrals) plus NO(regulars) correlation coefficient 95%
visitors equals 1.0(Google Referrals) plus 1.8(regulars) correlation coefficient 89%

Once again there is no sign of content filtering as the sites just suffer from a lack of interest, both mine in writing on the topic and visitors needing information on the topic.

Content filtering is an on-off switch which is turned on when the content gets out of hand so there should be signs of a dramatic drop in traffic.

At Fatsavage.wordpresss.com I have seen three cases of dramatic content filtering over the past 6 months with two in the past month. Start reading at the home page and work backwards to December 18, 2007. In that short month (about 12 posts), I managed to piss of the Feds twice and been slammed by provable content filtering. Now, I was attempting to be offensive with all of it, but I failed 10 times as only two posts were serious enough to get blocked.

Can you figure out which two?

Kolmic.com, The Family Tree

January 12, 2008

For most people finding evil sites is tough and even after you get a browser hijack or a URL redirect from your Browser, you’re never quite sure what site infected you. Now my perspective is somewhat different, I have my list of known kiddie porn sites which exist by consent of the government and also associated law enforcement honeypots. I periodically go to these sites and check the source code to find out who the face page is linking to. It seems that all the control is usually from one master computer with face URL’s gathering their feeds and images from that master. When one feed site gets so famous that it is blocked by crapware protection, they switch to the next site. Right now everyone concerned with cnomy.com or Kolmic.com for crapware should also start blocking malkm.com at the firewall level.

Finding these associations is fairly easy once you know the starting point.

If your a sex starved teenage you might dream of multiple partners at:

Orgy.com where the source code shows the javascript and pictures come from Kolmic.com

Hell, you might even dream of multiple orgies at:

Orgies.com where the source code shows the javascript and pictures come from Kolmic.com

If your too young to dream of orgies, you may just want to see naked people at:

naked.com where the source code shows the javascript and pictures come from naked.com and a pop-up comes from kolmic.com

Now these are all tame sites so you might want something more raunchy at:

raunchy.com which redirects to freetube.com with a pop-up from Kolmic.com

Now at one point, the source code for kolmic.com showed scripts and pics from cnomy.com so it’s not surprising that:

femalesex.com also redirects to freetube.com with a cloned pop-up of kolmic from cnomy.com

If you can’t spell, orgie.com used to redirect to raunchy.com but now:

orgie.com redirects to freetube.com

Siteadvisor.com confirms the link between orgie.com and ranuchy.com

So what is the future bad boy on the block to serve our nation at war. My money is on malkm.com based on information obtained from Lolitacj.com which was one of two sites that sent Charles Stephano to jail. When you check siteadvisor.com for lolitacj.com it says it links to kolmic.com yet when you go to:

lolitacj.com, the source code is from malkm.com while the cloned pop-up of kolmic shows cnomy.com source code.

A quick check of malkm.com shows it is connected to erotika.ru and the list of entrapment sites continues to grow.

There are many branches of this tree with crooked roots.


Even Will Smith should be able to decide that kolmic.com was designed by evil people.

Born to Be Bad – Will Smith, Kolmic and Hitler.

January 7, 2008

Will Smith started quite a controversy when he said that he believed that all people are intrinsically good and because he used Hitler as an example the argument degenerated without thought. Well Mr. Smith, I beg to differ and I use as my argument the Internet which I doubt that you know too much about.

Internet usage seems to be dominated by the concept that people do bad just because they can and only do good when they want to. Christ, I might say that that concept even includes Government sites which have a tendency to politicize every fact for political correctness or to dissociate blame. I mean who can possibly believe the psycho who designed the online war game for young people using actual Army equipment interfaces to recruit people. No one could believe this site was designed to do intrinsic good for the nation unless you believe that the use of Gaming addicts as soldiers is the highest and best use of these compulsive children. On the civilian side, what psycho would want to take down Norad for bragging rights or open the secrets of NSA to the world just to prove it can be done?

The internet is full of very twisted people. I casually included Kolmic.com on a list of sites that couldn’t be explored using Google Hacking techniques and immediately people stated flocking to my sites with Kolmic as the search term. Seems I stumbled on Kolmic in my research on American Kiddie Porn and I do mean I was lucky to make the connection to Government supported kiddie porn sites.

On the surface, they are a dramatic success story. They are touted at killerstartups.com as a new search engine. Quantcast.com ranks the site as being 314 in the world while alexa.com ranks them at 1917. IPwalk.com shows them hosting 11,650 domains. Their daily traffic is over 150,000 people per day.

These are incredible numbers considering the site was only organized about 8 months ago and the ownership of this fantastically successful organization is secret with a stealth registration. The IP information suggests Boston but a more realistic guess would put them in Houston working with Everyones Internet.

So what’s bad about a fantastic success in only six months, other than the direct connection to domestic kiddie porn and law enforcement honeypots. It seems that this brand new site is already attracting complaints about URL redirection, start page hijacking and other techniques common to the porn industry and image loading to unsuspecting surfers. One very complete analysis can be found in the comment section of McAfee Site Advisor by phantazm.

Obviously Kolmic.com was a site born to be bad by people with very evil intentions who hide anonymously in cyberspace because of the cowards they are.

Too bad Mr. Smith, there really are some fucking evil people in this world.

Screwing up XP!

January 6, 2008

I’ve sort of been suggesting that part of the reason that Vista has not been universally accepted is because Windows XP is a mature, sable and secure operating system which has no need for a replacement except perhaps in the gaming community. There are many independent companies that understand the system and are writing independent security software to defend you against Virus, malware and to secure your privacy against unwanted preservation of sensitive data or images.

The truth is you can do a pretty good job of defending your machine by using Firefox as your browser with settings that insure your privacy and erase all surfing history. Naturally, you can back this up with Ccleaner and an independent antiviurus and your in pretty good shape. You may want to use your traditional XP search function to check for cookies that may have been missed and to check the images in all hidden and back-up files. After everything unwanted has been eliminated, defragment your system and overwrite your unused space with a seven pass disk wipe.

From what I know of forensics, that is probably enough to prevent the repairman at your computer repair shop from reporting you to Homeland Security and may be enough to prevent recovery of images and files after you reformat your hard drive. (However, if it were my freedom at stake, I would give the drive the Lot’s wife treatment and buy a new drive.) Overall, I am fairly well convinced that XP is a defendable operating systems for mere mortals that follow a set routine and pay attention to security.

Since this belief is probably true, it leaves, Microsoft and the government out in the cold when you choose to observe their nefarious connections. No, you cannot stop unwanted predators from connecting to your machine and probing you but you can keep your machine clean enough that there is little there to find. Now with Vista, this is clearly not the case. There are back-ups of everything as the default and many are complaining that that use of Vista will be a one way ticket to jail or unemployment as your total computer use is an open book.

So what is the answer for Microsoft and the Government to threats from a protectable XP operating system? Simple, introduce an unavoidable SP3 service pack. I mean I avoided the upgrade for IE7 forever or at least until there were so many vulnerabilities that were left unplugged until I down loaded it even though I use Firefox. I suspect avoiding SP3 will eventually leave me so exposed that I will have to do it and ultimately upgrade myself to a system as unknown and undefendable as Vista. Once this happens I may as well switch to Vista.

Oh well, shit happens.

Resistance is Futile, Knowledge is Soporific!

Is Google Spying?

December 30, 2007

Seventy seven percent (77%) of Google Users are not aware that Gogle is spying on them and neither was I.

I tried researching the topic but didn’t find much information. I knew that Google used email filters and linked advertising to the content so that when Cousin Ed told you that Auntie Mame died, your email might include an advertisment for coffins and flowers. While that may be cool technology, I avoided it by avoiding a Gmail account.

Even after I read accounts that I would be 92 when my Google cookie expired and their new privacy policy would delete all records after 2 years unless requested to retain them longer by law enforcement, I wasn’t terribly concerned. I mean I have seen the use of Google Cookies which contain my IP, Hotmail account, my surfing habits to other sites and all my porn cookies so fore warned is fore armed and defend yourself. After all these are browser side records and can be erased and wiped when you close your Browser (with quite a bit of effort).

All this changed when I had the need to sign up for an email account under my own name instead of Mr. Daimon, fatsavage or other ficticious names. I cleverly opted out of email advertising so I could avoid coffin offers when my mother dies and did a minimal sign-up with minimal information even avoiding address and location. I didn’t think much about it and only used it for commercial activity under my own name. I only signed up with GoogleTalk to track my email because that’s faster than signing in on their web page and going to their rather slow site only to find you have no mail.

Last week I had the need to sign up as a Google Developer so I paid more attention to their site. Seems there is a button in the upper right that allows you to sign in to Google and that happens rather automatically when you sign in to GoogleTalk or at least it did for me. It showed I have an account and a history which I know I never signed up for.

The history has been keeping track of me more or less since the day I signed in for my Gmail account. It is the default option which you have to work to turn off. Naturally, I checked my history and was appalled. I’m doing a Sans Security Course and am looking up various penetration tools. I am also blogging about some pretty nasty sites. Of the hundreds of searchs I do a day, my Google history only registered the ones which make me out to be a pervert or a security risk.

Of course, I deleted the records but all that means is that I will no longer see them. They already have my IP, my email account, cookies from all accounts, the record of cookies from sites visited etc. I really didn’t accomplish anything by turning off their blatent record keeping. They still have all the rest and have publically stated they will keep it for two years.

It would appear my only real option is to stop using their services. To many that would be a tough choice, but if they have already blocked access to your site and Ask.com is doing a pretty good job of searching and you have no commercial revenues from the web, I can’t think of a serious downside.

Ask for Privacy????

December 29, 2007

Ask.com recently announced a new privacy policy called AskEraser. All of your search terms and session cookies are erased after a few hours and there is no record of your activity with a few exceptions. The most obvious is if there’s a court order to keep your records,they will.

The other exception should be equally obvious, when you click a link to another page, that site is beyond the control of Ask.com so all of the cookies, malware and cache images of pictures which come from that site are maintained in index.dat files on your machine.

I took a short tour to see if the search engine was so filtered that it wouldn’t direct you to tasteless sites and found out that search terms like porn, young models, young pussy and teen sex took you to some fairly tasteless sites which of course set cookies and loaded images on your machine. I even found some evidence that there was less site filtering than Google. I then checked the cache pages from the nasty sites and found that the images and scrips were being fed from the page on the original site that was in the ask.com collection of cache pages so in fact the original site was documenting your visit.

In other words, the worlds of corporate and government spying are so large that it’s difficult to do truly trackless searching of surfing. Still it’s nice to know that Ask.com has taken a step in the right direction in at least recognizing my rights to privacy and freedom of information.

Vista Security-Oxymoron

December 11, 2007

Let’s start with basics, Vista Security is an oxymoron – It simply doesn’t exist.

I finally hacked an installation on a brand new machine and worked at putting an anti-virus on the machine. At the time, everything I tried was incompatable or my downloads were blocked. I tried Zone Alarm, PCcillin and Kaspersky. So I ended up with One Care which the whole world is condemning for being a weak system. I also attempted to install my Malware protection but every time I ran Spybot Search and Destroy, my computer locked up and AdAware wouldn’t update without locking up my machine.

I have now reached the end of my one month trial period for One Care so decided to check my machine and see how outside suppliers rate it. One Care says I’m at risk because I won’t let that cancerous back up program operate and I haven’t paid them. I tried running PCcillin House Call and was told that they couldn’t really check some operating systems. I tried Kaspersky on Line service and it told me I looked OK but there were 150 blocked files that they were incapable of inspecting.

I would have felt better if I was told that they inspected everything and I was clean.

I tried reinstalling Spybot Search and Destroy but it locked up when I tried to update it and I couldn’t get it to run. I tried to run it a few more times. It identified a couple of problems and shut down saying I aborted the process. AdAware refuses to update and stalls. When you force it a few more tries a screen pops up saying the update is complete without telling you what was updated. When I ran it, it took 18 minutes to get half way and finished in one more minute. I removed the cookies I found but don’t really trust the results.

If the Vista machine were used for anything more than surfing and writing an occasional post, I wouldn’t know what to do. I have no idea what kind of bug is on the machine nor do I trust any tools that are supposed to help me find and eliminate it.

Vista Security, Truly an Oxymoron.