Home › Forums › Archives › Instant Messaging › Yahoo! Messenger Support › Stalking, booting, and voice on profile
- This topic has 24 replies, 11 voices, and was last updated 21 years, 10 months ago by
darkagents.
-
AuthorPosts
-
March 9, 2004 at 11:31 pm #84560
Netti
MemberAside from all this spyware stuff, I’m more curious to know if when pearl is changing id’s, is she changing to a totally new account, or just changing to an alias on the main account. If so there are programs out there that allow you to find out someones alias’s. If they are alias’s I suggest making sure all the alias’s are unchecked under the preference section when you click to change id’s.
March 9, 2004 at 11:34 pm #84577Shadowcrest
MemberI think she did mean changing to a totally new account; a new ID is a new account.
March 9, 2004 at 11:35 pm #84578Shadowcrest
MemberQuote:quote:Originally posted by pearlI have some questions:
1.My friend can always identify me no matter how many times I changed ID or even when I just stayed quietly in a room. I’m on dial up. How did he do that? How do I know if I’m hacked?
2.Is there any way we could see who’s booting us?
3.I put voice in my profile. But after several days or weeks, suddenly the link doesn’t work. I have to redo it again. But after a while the same thing happened again. Why is that and how to fix it?
Thanks.
And if he’s you’re friend, why is he hacking you?
March 10, 2004 at 3:27 am #84571pearl
MemberOops… just saw the notice that I’m the only one who can see the image I posted. Anyway, it’s:
HKEY_LOCAL_MACHINEsoftwareMicrosoftwindowscurrentversionrun [Kernel32=c:WINDOWSSYSTEMKernel.dll]Thanks again for your replies guys.
I’ll check out the forum, uppyman. Yes Netti I mean changed the ID (main account), not alias.
To answer Shadowcrest’s question, umm..he is (or was) my cyber-only lover. As I said before I’m not sure he’s hacked or stalked me. But IF he did I guess it’s to make sure I don’t have affairs with other guys (or, rather, ID’s :p) because when he’s being jealous and sarcastic he accidentally said things that is impossible for him to know unless he get into my computer. When I asked him he said he’s just guessing or sth like that. OK I can consider it as coincidences. Other thing, most of the times when I chat in PM with other guys and it’s getting just a bit intimate, I got booted. The “good timing” of the bootings makes me suspicious. That’s why I asked my question no.2. But, about him knowing all my secret IDs, I’m definitely sure about that. I wanna know if it’s only possible through hacking or there’s other way without hacking.
FYI he’s quite well known as a hacker, but they say he’s a nice one, meaning never threat or harm anyone. But in the mean time I’d rather back off and not chat much.
March 10, 2004 at 2:52 pm #84580darkagents
MemberFirst Off I’d Like to say I’m new to the fourms but have been programming for yahoo for 7 years now, haveing said that, I made both ill and programs for protection. I’m now looking at only the secureing yahoo and I have found more holes in the yahoo messenger system then any other IM client, It is possible to “Obtain” access THOUGH YIM to your comp without a trojan, but odds are if you where just booted out of YIM and not had your computer rebooted or somthing I can’t see you ex “Cyber-Lover” being nothing more then a child with a program. If he presists contact yahoo they really take stuff like that now and do something about it, anywho I’m soon gonna start a fourm for protection purposes. I am wondering if any programmers would like to help me on ym quest to a safer yahoo !! ??
March 17, 2004 at 4:24 am #84570pearl
MemberYeah… but reporting is not that easy without a solid proof which is hard to get and impossible to provide without revealing parts of my personal life. Sometimes we have to wait till the case got real bad to be able to do that. Anyway, so far so good, it doesn’t bother me anymore. Thanks for your advice 🙂
So you are 1 of Yahoo programmers? Cool! 😉 Could you try to fix the bug that flashes our aliases when we log out of YM? It’s pretty disturbing.
April 9, 2004 at 6:36 pm #84558Jeff Hester
KeymasterNot to be crude or anything but I didn’t know there were any such things as ” good hackers” if they can break into your system and steal your privacy how on earth can that be considered good?
Secondly Darkagent if you ever get that website set up can you let us know, I am NOT a programmer but would be interested in stopping this from happening or going any further….
April 9, 2004 at 8:51 pm #84566zhugeliang
MemberOkay, first off, you have to understand that hackers were given a bad name in the early ’90’s by Hollywood. Back in the early ’80’s when there wasn’t much of an internet, and only businesses used networks, the system administrators were the only people allowed access (and the only ones that could get access) to the mainfraim computer. Other users just didn’t have the knowledge to do so, they only knew how to do simple things. Not to mention, most people that did have a network connection, only had it at work to their company’s mainframe. Anyways, the real “hackers” weren’t actually bad people, they were skilled programmers that wrote program fixes and patches for thier company mainframes, instead of waiting for the original creater of the software to make the patch. They were called hackers because they knew the ins and outs of computer hardware and software. Nowadays, the term hacker is used to describe those who break into computers and steal/destroy information, which they should actually be called “crackers”. But, based on Hollywoods definition, there are two different kinds of hackers, “White hats” (the good guys) and “Black hats” (the bad guys). White hats break into other systems to report to those system administrators about the holes in thier security, black hats do it to steal/destroy information. So as you can see, there are good and bad hackers. Companies that do security auditing could be considered white hat hackers, because they are hired by people to hack into thier systems and test thier security, but there are several non profit groups that get together every so often and just hack into networks to report thier security flaws. It’s like, free auditing, lol. Anyways, I hope that makes things a little more clear on the “definition” of “hackers” and “crackers.” ^_^
April 10, 2004 at 5:50 am #84557Jeff Hester
KeymasterYes, Thank you very much Zhuge, I have one more question for you. Is it possible for a ” cracker” to gain administrative rights to your computer therefore anytime you run a trojan scan it goes undetected?
And a file that is sent to you, if you try to open it but it won’t open, does that mean its a trojan? The one I got looked like it downloaded but it would never open.
Justified
April 10, 2004 at 8:09 pm #84565zhugeliang
MemberOkay, to answere the first question, no, if a person gains access rights to your computer, they can not make the trojan undetectable unless they change the code, and they’ld have to recompile it and put it back on your system, which is way too much work to go and do.
If you download a file from someone (or anywhere on the net) and you can’t open it, it’s most likely that you don’t have the proper program to open and read the file, or the file is incomplete. If the file you downloaded is a program, and it is a trojan, your anti-virus should have caught it. It most likely isn’t a trojan, but at the same time, it could be. There are some files that aren’t meant to do anything (for you) and they might open an ms-dos prompt and close it really fast, before you can read anything. If it’s a .exe, delete it, and run a virus scan on your system.
You should keep in mind not to download any programs from anyone over yahoo. If you’re going to recieve a file from someone, then it should only be a picture, and that’s it.
-
AuthorPosts
- You must be logged in to reply to this topic.