textfiles/hacking/snoop.txt

86 lines
4.0 KiB
Plaintext

ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸
( )
) Abstruse Authors of Merca (
( )
ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ;
Presents
Data Snooping : the Right Way
-----------------------------
by
Lee Day
Data snooping is a popular passtime among personal computer users in North
Merca. A data snooper may be defined as one who examines friends' personal,
private data while they are not looking. Most users could probably be labeled
data snoopers at one time or another. The problem is, many friends are made
aware of data snooping activities on their system, either by catching the
snooper in the act, or by finding traces of an invasion. Therefore, some
public education is necessary to ensure the continuation of this enriching
activity.
During a "local" snoop, one must be on the alert for the return of the data's
owner. If the snooper hears the return of the owner, he should act quickly to
appear innocent. Here are several methods :
1) Set up a multi-tasker, and switch to an innocent partition. Caution : The
owner may notice a lack of memory, or may switch to the incriminating
partition.
2) Call a memory-resident pop-up screen. Programs such as BOSS-SW.COM zip a
bogus spreadsheet on the screen. Problem : you may have a hard time
explaining your activity, particularly if you are using the owner's computer
and he does not have a spreadsheet program.
3) Turn the screen off. Not very effective if the owner turns the screen on
again.
4) Reboot. This may be accomplished by "accidentally" tripping the power
switch, or making an excuse for rebooting, such as a need for "fresh RAM".
If the owner has keen eyes, he may thwart a snooper with a time/date stamp.
Some programs automatically create or update files during execution without the
user's permission. The snooper's best bet is to avoid these programs, or
write-protect the disk. A hard disk may even be write-protected with the use
of a trojan horse detector called "BOMBSQAD", which prompts the user for
instructions every time a disk-writing attempt is made.
If a time-date stamp is actually updated, and looks suspicious, the snooper may
change it using Norton's utilities, or a special date-changing utility. He may
also delete any newly created files. Of course, a data snooper should NEVER
modify the owner's files. This would be the equivalent of cutting the balls
off the gander that laid the goose that laid the golden egg. Surely the
snooper would gain much more from repeated instances of data snooping than a
few moments of revenge or tease. Remember : Data snooping can be an
enriching, exciting activity, if approached with an attitude of maturity.
ÖÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ·
) Written by Lee Day for Abstruse Authors of Merca (
ÓÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĽ
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Rat Head Ratsnatcher 510-524-3649
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 415-567-7043
Lies Unlimited Mick Freen 415-583-4102
Specializing in conversations, obscure information, high explosives,
arcane knowledge, political extremism, diversive sexuality,
insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
Full access for first-time callers. We don't want to know who you are,
where you live, or what your phone number is. We are not Big Brother.
"Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X