resistorX

Out-of-the-box way to lock your computer

11 posts in this topic

Here's what I'm about to do on my computer which I'll now share:

I'll be making a "decoy" user account that'll "look real", complete with desktop wallpaper, personal files/folders on the desktop, etc. It'll be password protected.

Then, instead of "just locking the computer", I'll simply "switch user" (which'll keep my actual session still going lest anything I was really working on closes on me) and I'll login to the decoy account. Over there, I'll make the decoy look "complete" by opening a few windows, maybe the browser with a couple of tabbed sites opened up, & even open Thunderbird email window like I was checking email or getting ready to send one - of course to add the "air of believability" with Thunderbird I'll have already put "decoy email accounts" in it beforehand by just getting a few free email accounts which I'll never actually "use" since they aren't my real accounts - also, over here in the Thunderbird email window I have open, to make it look like it was being used, I'll email something from a webmail account (a separate one I set up beforehand just for this decoy trickery and one that's not pop3'ed in Thunderbird) and send myself an email - for text in that email (to make it look "real"), I'll simply go over and quickly pick some post off of some forum and paste it in there and give it a matching subject line - reason for this is to "make it seem like I really know this person who has been talking to me about this topic-some ongoing conversation in other words".

Then I can leave and purposely leave the computer "unlocked" with this decoy account open for any snoop to see so if someone should come spying they'll think they've stumbled upon my "actual" stuff. But little do they know I have a keylogger installed and running in stealth mode to let me know if anyone's been spying around in this decoy account - reason for this keylogger in a hoax account is simply so I'll be made aware of snoops "trying to get at me" without having to sacrifice my actual stuff and the privacy that goes with it in my actual account. But the keylogger's just my person twist on it.

At the least, anyone can trick a would-be snoop into thinking they've seen your stuff, but since it isn't your stuff at all the joke is on them, won't it be? Yes and that's one point of it.

Another point is it'll make it so they can't get anything on you - your stuff will still be "private", password protected in your "other account", much like just locking your computer the usual way people do it - except when they come up to your computer, instead of getting the "locked screen" window and the password field, they'll look on the computer and think otherwise...haha, little will they realize your account IS actually locked right now just not in an obvious way. They'll stand there, like the suckers they are, thinking, "Oh good. They haven't bothered to lock their computer". Yes it is sucker, just in a way not visibly obvious to any snooper :) .

Another thing this does is send the sucker(s) on a wild goose chase. Here they are thinking they've gotten to see your damn desktop, files, etc. when actually they've seen nothing at all - just a hoax account. Suckers. I can picture them, grinning to themselves, going through your shit - or what they think is your shit, and it's all a damn hoax account. Fools. :)

I'll be doing this today and came up with this earlier today as I sat there pondering the use of a keylogger.

Imagine the uses for this. Say someone has a snooping spouse and you've been looking at porn. Just "switch user" and login to your other hoax account and open a few windows to make to "appear you're in middle of working on something innocent", then leave and leave this account unlocked and if they come up snooping, they'll see you were just watching a "cute puppy" video on YouTube and had another tabbed browser window open to YouTube search results for cute puppy videos. This will act as a great cover and they'll not realize what you were really doing "elsewhere". And if they try snooping and do "switch user" because they're trying to see if there are other accounts, just say later you set it up to test the computer or whatever. Will they know the truth? Nope.

That is just one use for it.

There are other uses for the decoy account, just think outside the box and you'll come up with some.

Edited by resistor X
0

Share this post


Link to post
Share on other sites

I heard at least 6 maniacal laughs while I was reading this. Creepy.

Edited by sojourner
0

Share this post


Link to post
Share on other sites

I heard at least 6 maniacal laughs while I was reading this. Creepy.

:)

Why creepy? Hehe.

0

Share this post


Link to post
Share on other sites

Hiding one's porn activity was just an idea.

Actually the best thing it's for is to just ensure privacy, period, regardless of your reason(s) for it.

0

Share this post


Link to post
Share on other sites

I heard at least 6 maniacal laughs while I was reading this. Creepy.

:)

Why creepy? Hehe.

haha just I'm just saying someone who thinks of ways to get back at potential snoops before you even know there are snoops is pretty devious.

its almost like walking into an AA meeting, spiking the punch and telling everyone not to drink the punch, then secretly installing breathalyzers into their car so they can't crank it if they blow to high.

I like it.

0

Share this post


Link to post
Share on other sites

Here's what I'm about to do on my computer which I'll now share:

I'll be making a "decoy" user account that'll "look real", complete with desktop wallpaper, personal files/folders on the desktop, etc. It'll be password protected.

Then, instead of "just locking the computer", I'll simply "switch user" (which'll keep my actual session still going lest anything I was really working on closes on me) and I'll login to the decoy account. Over there, I'll make the decoy look "complete" by opening a few windows, maybe the browser with a couple of tabbed sites opened up, & even open Thunderbird email window like I was checking email or getting ready to send one - of course to add the "air of believability" with Thunderbird I'll have already put "decoy email accounts" in it beforehand by just getting a few free email accounts which I'll never actually "use" since they aren't my real accounts - also, over here in the Thunderbird email window I have open, to make it look like it was being used, I'll email something from a webmail account (a separate one I set up beforehand just for this decoy trickery and one that's not pop3'ed in Thunderbird) and send myself an email - for text in that email (to make it look "real"), I'll simply go over and quickly pick some post off of some forum and paste it in there and give it a matching subject line - reason for this is to "make it seem like I really know this person who has been talking to me about this topic-some ongoing conversation in other words".

Then I can leave and purposely leave the computer "unlocked" with this decoy account open for any snoop to see so if someone should come spying they'll think they've stumbled upon my "actual" stuff. But little do they know I have a keylogger installed and running in stealth mode to let me know if anyone's been spying around in this decoy account - reason for this keylogger in a hoax account is simply so I'll be made aware of snoops "trying to get at me" without having to sacrifice my actual stuff and the privacy that goes with it in my actual account. But the keylogger's just my person twist on it.

At the least, anyone can trick a would-be snoop into thinking they've seen your stuff, but since it isn't your stuff at all the joke is on them, won't it be? Yes and that's one point of it.

Another point is it'll make it so they can't get anything on you - your stuff will still be "private", password protected in your "other account", much like just locking your computer the usual way people do it - except when they come up to your computer, instead of getting the "locked screen" window and the password field, they'll look on the computer and think otherwise...haha, little will they realize your account IS actually locked right now just not in an obvious way. They'll stand there, like the suckers they are, thinking, "Oh good. They haven't bothered to lock their computer". Yes it is sucker, just in a way not visibly obvious to any snooper :) .

Another thing this does is send the sucker(s) on a wild goose chase. Here they are thinking they've gotten to see your damn desktop, files, etc. when actually they've seen nothing at all - just a hoax account. Suckers. I can picture them, grinning to themselves, going through your shit - or what they think is your shit, and it's all a damn hoax account. Fools. :)

I'll be doing this today and came up with this earlier today as I sat there pondering the use of a keylogger.

Imagine the uses for this. Say someone has a snooping spouse and you've been looking at porn. Just "switch user" and login to your other hoax account and open a few windows to make to "appear you're in middle of working on something innocent", then leave and leave this account unlocked and if they come up snooping, they'll see you were just watching a "cute puppy" video on YouTube and had another tabbed browser window open to YouTube search results for cute puppy videos. This will act as a great cover and they'll not realize what you were really doing "elsewhere". And if they try snooping and do "switch user" because they're trying to see if there are other accounts, just say later you set it up to test the computer or whatever. Will they know the truth? Nope.

That is just one use for it.

There are other uses for the decoy account, just think outside the box and you'll come up with some.

This would work great until you notice the firewire port built into the motherboard and the BIOS doesn't have an option to disable it.

0

Share this post


Link to post
Share on other sites

Maybe have it send your cell phone a text message while they are snooping too..

Does anyone else think this would make a good Captain Chaos episode on South Park?

So Captain Chaos, who is your Coon?

;)

0

Share this post


Link to post
Share on other sites

Maybe have it send your cell phone a text message while they are snooping too..

Does anyone else think this would make a good Captain Chaos episode on South Park?

So Captain Chaos, who is your Coon?

;)

.

Captain Chaos? Haha.

.

One keylogger I'm looking at right now has the email option. That's what I prefer to have.

.

I've already made the decoy account & I'm still adding more shit to it for that "realistic" look. Already have some personal folders on the desktop with pics & games etc.

.

This reminds of something. I know of a trick that makes XP do a countdown & when it times out the computers power shuts off & you can include a message with it but I wonder if that would work with my Vista. Perhaps with a few changes to the script it would. Just an additional thought I'm tossing around. If they were ignorant they'd think the motherboard went or something.

.

I'll ponder that one later.

0

Share this post


Link to post
Share on other sites

I like this idea a lot.

BTW the command to do shutdown from the command line is "shutdown" :P

0

Share this post


Link to post
Share on other sites

This is similar to the concept of hidden volumes with encryption. You have a second encrypted volume inside the random-filled unallocated space of the first, and depending on the password given to the encryption program, it will mount either the first volume, or if the password doesn't match for that it will scan the unallocated space for a hidden volume and try that. Useful when someone is trying to squeeze a password out of you, so you can give them one but it won't actually reveal your data.

When I was in military school, I wrote a QuickBASIC program that loaded as a login screen before the Windows 98 login. You could give three different passwords for the correct username, and depending on what you gave it would load normally, load a "clean" desktop by moving files around, or start erasing files in specified directories. This was to get around the "computer inspections" performed if you were suspected of doing something you weren't supposed to be doing -- just tell the tech department the wrong password.

0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now