WaMu

Members
  • Content count

    64
  • Joined

  • Last visited

  • Days Won

    1

WaMu last won the day on September 23 2009

WaMu had the most liked content!

Community Reputation

2 Neutral

About WaMu

  • Rank
    HACK THE PLANET!

Profile Information

  • Gender
    Male

Recent Profile Visitors

886 profile views
  1. I wish I could start a blog. Damn permissions!

  2. You should see it in wireshark. You'll see, "Who's at [gives mac address]" and the computer will respond "[ip address] is at [mac address]".
  3. Oops, wrong profile. Sorry bro.

  4. Hey bro, just so you know us regular users don't have teh permissions to post blogs. Love to post some, but I can't.

  5. A couple times, actually. Google around, I'm sure you can find the news stories. Like I said before, LikeLock primary works by placing "holds" and "alerts" on your credit report. That way, whenever anybody applies for credit using your name, the creditor will prompted to call you and verify that you're the one requesting credit after he runs your credit history. However, some places don't pull your credit report before granting credit or loans (usually because it's not cost effective because credit reports cost around $50 a pop). So, you can get around LifeLock by finding places that don't run your credit history before granting credit. That's what's happened to him in the past. People have taken out small loans in his name (small enough the creditor didn't feel the need to review his credit history, and therefore he didn't see the alerts). Of course, whenever you apply for anything financially significant (like a credit card, or home loan), they'll always run your credit before granting credit. So, if you subscribe to LifeLock, no credit cards will be opened under your name! However, like I said before, you can contact the credit bureaus directly and have alerts put on your report for free (bypassing the middle man). I think the best thing these companies offer is the agent that will work to get your identity back in the event it is stolen...
  6. That eRecon™ thing is only a small part of the LifeLock package. I'd put money that it catches less than 1% of all thefts. And, I'd also put money that LifeLock's Identity Alert™ is responsible for the most of their identity theft discoveries. They just use the rest of the features for show. The Identity Alert works really well. If you don't know all about Credit Reporting, I'd definitely look into it to improve your grasp of identity theft. Look into the three major credit reporting agencies (TransUnion, Equifax, and Experian). Identity Alert places an "alert" on all three of your credit reports, requiring creditors to call you before granting credit to somebody using your name. However, this only works if the creditor runs your credit report BEFORE granting credit. Todd Davis (the guy who gives his social out) actually had several small loans taken out under his name, because the cash advance places didn't run credit checks if the value was less than a certain amount of money. So, he has had his identity stolen before! But the primary method of preventing and catching identity theft isn't crawling the web for your social security number. I meant that the majority of identity theft doesn't result in somebody selling your info over the internet. And when they do sell your information, it tends to be in a private section of the net. They don't do it in open forums. And if they advertise in public, they're obviously not going to give your personal information out until they've been paid. So I'm skeptical of these web crawlers. I mean, your personal information isn't just going to be sitting in any ol' public section of the net for google to index, and grandma to see. And, going off of your other point (which isn't related to your original post about the crawler, or LifeLock), the majority of identity theft cases are low tech. Generally, it's somebody physically getting a hold of your personal information by dumpster diving, stealing your wallet, knowing somebody who works in a place that has access to sensitive personal information, ect. The majority of identities aren't stolen "over the internet".
  7. What company's advertising this? I've heard of identity theft protection companies, but they don't operate the way you're describing them. Companies like LifeLock put alerts on your credit reports (you can do this yourself for free), telling potentional creditors to call you and verify that you're actually applying for their credit before granting it. And the also sometimes offer identity theft insurance, and a personal fraud officer who will make all the phone calls to get your identity back if it ever gets stolen. There are companies, non-profits, and law enforcement agencies who scawer the net looking for fraud, but I don't think any personal protection program does. It's also important to note that the majority of identity theft doesn't happen over the internet. So the odds of your info being sold is low. And the likelihood that your info would be sold in the open (where bots could find it) is even lower.
  8. This is coming from the guy who has a picture of a gangly oriental boy in tight short-shorts set as his avatar.
  9. You could argue that about any issue. Give up your freedom of speech because you're hurting his feelings! Give up your right to bear arms because you may use that gun against somebody! Give up your right to not incriminate yourself because it helps criminals get away. Give up your right to privacy, so the government can spot criminals! Personally, I'd rather let a criminal go free over giving up my rights.
  10. Yeah, you guys seem to forget about the fourth amendment. You can't just program a virus to search everybody's computer for kiddy porn. Although, your intentions are good, you definitely have some civil liberty issues! Even if the police accepted your logs as evidence, it'd definitely get thrown out of court, and you'd open yourself up to being sued (a class action lawsuit consisting of everyone you infected). The police can't just barge into your house looking for contraband; what makes a virus any different?
  11. You know how many false positives you'd get with file names? For example, if a porn video was titled "Brandy", any grandpa who had a video of his grandchild Brandy (and named it "brandy") would have his video deleted. There can only be so many file names, and porn names generally aren't that unique. You're extremely likely to have a TON of false positives. Likewise, anyone who renamed the file would get it past your virus. And alot of this filth is viral, so all it takes is for someone to reupload the video/image under a different name to throw of the virus. The checksum method is the way to go. Either MD5 or SHA-1.
  12. Do you know any foreign languages? If so, the "international option" is the way to go. Back in High School, one of my history teachers used quizes from the teacher edition of the textbook. I bought the "privileged" teacher edition by claiming I taught at a school in Austria (I spoke a little German). So, I simply called them up, put on an obnoxiously fake German accent, and gave them fake school information (I think it was the Düsseldorf Weißen Gymnasium). Now, the textbook company didn't even know how to put the umlaut above the u, or get the s-set (the funny looking , let alone speak German to call and verify I was a teacher. They didn't know of Austria's teaching laws, any databases to run me through, and they couldn't even speak the language to call and verify my identity with anyone. In order to call, they'd need to enter the Austrian country code, pay a shitload of money, and so on. So, they had someone willing to pay them $110, what do you think they did? To be frank, I don't know what steps they took to attempt to verify me, or if they even took steps for anybody else; but, within a few days, a received a package forwarded from Austria, with the teacher edition textbook and all the quizes. These companies are so used to verifying people within the United States, that it'll come to a shock when they get an international costumer. They're used to going to American university websites, calling American schools, and identifying .edu web suffixes. Think of how hard it would be to verify someone living in a foreign land. Especially one that doesn't speak your native language. They'll probably take the easy way out and not even bother. Especially when money is on the line.
  13. It's probably be easiest to identify kiddy porn by calculating the MD5 checksums of videos and JPGs, and comparing them to known kiddy porn files. However, in order to create such a list, you'd have to download the kiddy porn yourself... For whatever reason, that's just sick! But, the law frowns apon vigilantes. The courts won't care your reason for planting viruses on computers; it's illegal, and you'll face the same punishment of somebody planting malicious programs.
  14. I might check them out. But, they actually advertise caller id spoofing on their main page.
  15. I'm not using it personally, but everything I've heard about it sounds good. It's coming standard on all Windows 7 machines, so it may just put everyone else out of business.