• Starting today August 7th, 2024, in order to post in the Married Couples, Courting Couples, or Singles forums, you will not be allowed to post if you have your Marital status designated as private. Announcements will be made in the respective forums as well but please note that if yours is currently listed as Private, you will need to submit a ticket in the Support Area to have yours changed.

  • CF has always been a site that welcomes people from different backgrounds and beliefs to participate in discussion and even debate. That is the nature of its ministry. In view of recent events emotions are running very high. We need to remind people of some basic principles in debating on this site. We need to be civil when we express differences in opinion. No personal attacks. Avoid you, your statements. Don't characterize an entire political party with comparisons to Fascism or Communism or other extreme movements that committed atrocities. CF is not the place for broad brush or blanket statements about groups and political parties. Put the broad brushes and blankets away when you come to CF, better yet, put them in the incinerator. Debate had no place for them. We need to remember that people that commit acts of violence represent themselves or a small extreme faction.
  • We hope the site problems here are now solved, however, if you still have any issues, please start a ticket in Contact Us

  • The rule regarding AI content has been updated. The rule now rules as follows:

    Be sure to credit AI when copying and pasting AI sources. Link to the site of the AI search, just like linking to an article.

Hacking from a forum

I have a friend (yes, a friend and not myself) who wrote me saying that they were on an Israeli 'christian' forum and that somehow another person sent her an email (from this forum). The letter was basically a "Ha. Ha" type letter and now she can no longer get into much of her email and some have been deleted!

Is this a virus??

What should she do now???
 

KristiXP

The fun in my life...My Boys! <img src="http://www
Jul 26, 2002
2,903
88
40
Maine
✟3,957.00
Faith
Baptist
Politics
US-Republican
Stryper said:
or if he installed a keylogger in her system remotely and is recording every single keystroke she types

This would be true if he had direct access to her computer, but you can't install keylogger onto someone's computer with out direct access unless you are on a network and have admin access.
 
Upvote 0

SirKenin

Contributor
Jun 26, 2003
6,518
526
from the deepest inner mind to the outer limits
✟9,370.00
Faith
Baptist
Marital Status
Married
Unimatrix said:
If the programmer has done their job properly, it'll just waltz right over a firewall/router and on the way back take a leak on it, just to take the the miff...It takes them 20 days to counteract what a good rogue programmer can do in 20 minutes.

Hmmm. Any run of the mill firewall can detect unauthorized communication on a port. :) You can also lock down programs to prevent them from access to the net. Norton Internet Security will notify you of a problem, even if it doesn't know what it is. :)
 
Upvote 0

SirKenin

Contributor
Jun 26, 2003
6,518
526
from the deepest inner mind to the outer limits
✟9,370.00
Faith
Baptist
Marital Status
Married
Check this out:

There are six ways Trojans generally capture passwords (numbers are hexadecimal):

1) INTERRUPT 9. This is a hardware interrupt which occurs every time you hit a key. The Trojan waits for an INT 9, then interrogates the keyboard to discover which key was pressed, saves the key, then returns normal control.

2) INTERRUPT 16. This is an operating system call which deals with the keyboard. Every time an application program needs a key, it calls this software interrupt. A Trojan piggybacks onto the INT 16 and saves the keys every time the program asks for them.

3) INTERRUPT 21. Similar to INT 16, much more widely known, but less elegant. Once again, a Trojan will piggyback INT 21.

4) INTERRUPT 15. Similar to INT 16, but called from INT 9. A Trojan will again piggyback to this BIOS function in order to capture passwords.

5) Hardware polling. A quirky and unreliable method, one which NetSafe authors have not encountered in any available Trojan yet, but one which the NetSafe product nonetheless counters. This method simply polls the keyboard many times a second, and records any new keys you press as it notices you pressing them. If you type too fast, it will miss some.

6) RAM-buffer snooping. A Trojan can copy the DOS keyboard type-ahead buffer from the system area (also called segment 40:) or from the executable-programs memory regularly to disk.

Once the password is captured, the Trojan will usually either save it in RAM, or on a local or network disk (in a hidden file in a hidden directory), or even in CMOS. A purpose-written Trojan can be programmed to download passwords via modem or onto the internet, or broadcast them to some other place for remote retrieval.

I wonder how old that information is? lol
 
Upvote 0

jayswife29

Active Member
Jun 26, 2003
294
5
52
n.y.
Visit site
✟454.00
Faith
Christian
Marital Status
Married
Politics
US-Republican
Yes, I can get into my account, but some weird things show up in my mail now, alot of Anti-christian and Anti-Israeli trash. I lost all the mail that I had at the time I opened this "mail" from a palestinian claiming he hacked into my site. No it wasnt on this forum, another one in Israel. Thanks for all your help,
Jen
 
Upvote 0