Lindaland
  Lindaland Central
  Everyone Please Read: Gather Here And Be Counted! (Page 5)

Post New Topic  Post A Reply
profile | register | preferences | faq

UBBFriend: Email This Page to Someone!
This topic is 6 pages long:   1  2  3  4  5  6 
next newest topic | next oldest topic
Author Topic:   Everyone Please Read: Gather Here And Be Counted!
Nephthys
Knowflake

Posts: 941
From: California
Registered: Apr 2009

posted April 24, 2009 10:40 PM     Click Here to See the Profile for Nephthys     Edit/Delete Message   Reply w/Quote
I'm in.

IP: Logged

Nephthys
Knowflake

Posts: 941
From: California
Registered: Apr 2009

posted April 24, 2009 10:41 PM     Click Here to See the Profile for Nephthys     Edit/Delete Message   Reply w/Quote
That sucks that it doesn't show my 10 year history with this place!

IP: Logged

Randall
Webmaster

Posts: 74167
From: From a galaxy, far, far away...
Registered: Apr 2009

posted April 24, 2009 10:50 PM     Click Here to See the Profile for Randall     Edit/Delete Message   Reply w/Quote
I feel ya. I had the most Posts, but now I'll probably be lagging behind many of the Knowflakes before long.

------------------
"Fortune favors the bold." Erasmus

IP: Logged

Blueswan84
Knowflake

Posts: 151
From:
Registered: Apr 2009

posted April 24, 2009 10:55 PM     Click Here to See the Profile for Blueswan84     Edit/Delete Message   Reply w/Quote
Sorry, I should have read the post b4 I sent you a msg, but I've registered again.

IP: Logged

Writesomething
unregistered
posted April 24, 2009 10:58 PM           Edit/Delete Message   Reply w/Quote
http://www.linda-goodman.com/ubb/Forum1/HTML/019791.html

LL solar return...weird.

IP: Logged

Coffee
Knowflake

Posts: 2242
From: Leeds
Registered: Apr 2009

posted April 25, 2009 12:21 AM     Click Here to See the Profile for Coffee     Edit/Delete Message   Reply w/Quote
Kick It....aka Coffee is now....Coffee.

IP: Logged

Tigerlily
Knowflake

Posts: 59
From:
Registered: Apr 2009

posted April 25, 2009 01:16 AM     Click Here to See the Profile for Tigerlily     Edit/Delete Message   Reply w/Quote
I'm back. Thanks!

IP: Logged

mercuranian
Knowflake

Posts: 1042
From: not here
Registered: Apr 2009

posted April 25, 2009 01:57 AM     Click Here to See the Profile for mercuranian     Edit/Delete Message   Reply w/Quote
thanks for getting this up and running again! (formerly gemlike)

IP: Logged

AngelicGemini33
Newflake

Posts: 1
From: Colorado
Registered: Apr 2009

posted April 25, 2009 06:41 AM     Click Here to See the Profile for AngelicGemini33     Edit/Delete Message   Reply w/Quote
Hello Everyone! Long time listener, first time caller...lol!
After "lurking" here at Lovely LindaLand for the past squillion days, I decided to finally stop peeking into you-all's gleaming window and come introduce myself!
(and I guess today turned out to be the perfect time to join, with the whole rebirth of the board, as I understand. I usually check the forums everyday and became very confused and disturbed to find LindaLand a 'ghost town' for the past few days, lol!!!)
Much Love to You All!

------------------
"Those who dream by day are cognizant of many things which escape those who dream only by night." ~ Edgar Allan Poe

IP: Logged

Dreamy_AriesGirl
Knowflake

Posts: 233
From:
Registered: Apr 2009

posted April 25, 2009 07:12 AM     Click Here to See the Profile for Dreamy_AriesGirl     Edit/Delete Message   Reply w/Quote
im here too.

i was girlloveboy

IP: Logged

Peri
Knowflake

Posts: 1848
From: 49N35 34E34
Registered: Apr 2009

posted April 25, 2009 10:48 AM     Click Here to See the Profile for Peri     Edit/Delete Message   Reply w/Quote
welcome to LL, AngelicGemini33

IP: Logged

Happy Dragon
unregistered
posted April 25, 2009 10:55 AM           Edit/Delete Message   Reply w/Quote
re:
**yes can't help wondering what does a hacker get out of doing something like that?? there's no financial gain, not even the satisfaction of seeing everyone's distress (assuming a sadistic motive)...anyone have a clue WHY???***

~~~~~~~~~~~~~~~~~~~~~~~~~~
3 posts from a uk forum site ..
recently hit with spam to 'private message' inboxs
~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~
Many of you have received messages from unsolicited senders over the last two days.
These messages are part of a widespread spam attack that has taken place across both this and other IBP powered forums. Where by humans have been used to break the reCAPTURA security measures used and create accounts that have then made use of bots to bulk spam users via the PM system.
~~~~~~~~~~
Banning the IP will do very little as the majority of spam comes from "bots" and they use any IP address they find available. I have seen one username try to join a forum I run 97 times in one morning,the name and email in use remained the same the IP changed to machines placed all over the world at each attempt. The professional spammers use infected or unprotected machines and servers anywhere they can find them.
~~~~~~~~~
Don't take it personally whatever you do - spammers are paid by these 'viagra' selling rackets to write computer programmes to infiltrate internet communites and get their spam to as many users as possible.
It's not a real person that sent you the spam, but a 'bot'.
This is how they managed to target so many of us. We will probably have to look at updating the boards software in order solve the problem. It's kind of a similar thing to antivirus software - as the spammers get smarter with their clever programmes we have to figure out new ways of solving these problems.
~~~~~~~~~
Botnet 'ensnares government PCs'
~ http://news.bbc.co.uk/1/low/technology/8010729.stm ~
Hi-tech crime: A glossary
~ http://news.bbc.co.uk/1/low/uk/5400052.stm ~
~~~~~~~~~~~~~

IP: Logged

PeaceAngel
Knowflake

Posts: 4313
From:
Registered: Apr 2009

posted April 25, 2009 11:05 AM     Click Here to See the Profile for PeaceAngel     Edit/Delete Message   Reply w/Quote
Happy Dragon

Good to see you resigned. There's been a lot of spam the last few days that I've seen in various forums. It's not personal but still annoying. Interesting information. Thanks.

IP: Logged

Happy Dragon
unregistered
posted April 25, 2009 11:06 AM           Edit/Delete Message   Reply w/Quote
Glossary ..
~~~~~~~~~~~~~~~~~~~~~~

ADWARE
Unwanted programs that, once installed, bombard users with unwanted adverts. Often those pushing the aware programs get paid for every machine they manage to recruit.
Some adware poses as fake computer security software. Can be very hard to remove.

BLACKHAT
A hacker that uses his or her skills for explicitly criminal or malicious ends. Has been used to mean the writers of destructive viruses or those that use attacks to knock websites offline. Now as likely to refer to those that steal credit card numbers and banking data with viruses or by phishing.

BOT
The name given to an individual computer in a larger botnet and which is more than likely a home PC running Windows. The name is an abbreviation of "robot" to imply that it is under someone else's control.

BOTNET
A large number of hijacked computers under the remote control of a single person via net-based command and control system.
The machines are often recruited via a virus that travels via e-mail but increasingly drive-by downloads and worms are also used to find and recruit victims.
The biggest botnets can have tens of thousands of hijacked computers in them. Research suggests they can be hired from as little as 4 cents per machine.

BOTNET HERDER
One of the names for the controller or operator of a botnet.

BULLET-PROOF HOSTING
A company that guarantees that its servers will not be shut down even when the request to do so comes from law enforcement agencies.
These hosting companies are often located off-shore or in nations where computer crime laws are lax or non-existent and where extradition requests will not be honoured.

CARDER
Someone who steals or trades exclusively in stolen credit card numbers and their associated information.

CASH-OUT
A euphemism that means to steal money from a bank account or credit card to which someone has gained illegal access.
Hackers who grab credit card data often do not possess the skills or contacts to launder the money they can steal this way.

CHANNEL
A virtual "room" on the IRC text chat system. Most channels are usually dedicated to a single topic.

CROSS-SITE SCRIPTING
A sophisticated phishing attack that exploits weaknesses in the legitimate sites of financial institutions to make attempts to trick people into handing over confidential details more plausible.
A successful use of Cross-site scripting will make it look like all the transactions are being done on the website of the real bank or financial institution.

DEAD-DROP
A hijacked PC or server used to store all the personal data stolen by keyloggers, spyware or viruses.
Criminal hackers prefer to keep their distance from this data as its possession is incriminating. Dead drops are usually found and shut down within a few days of the associated phishing e-mails being sent out.

DDoS
Abbreviation for Distributed Denial of Service. This is an attack in which thousands of separate computers, which are usually part of a botnet, bombard a target with bogus data to knock it off the net.
DDoS attacks have been used by extortionists who threaten to knock a site offline unless a hefty ransom is paid.

DRIVE-BY DOWNLOAD
Malicious programs that automatically install when a potential victim visits a booby-trapped website.
The vast majority exploit vulnerabilities in Microsoft's Internet Explorer browser to install themselves.
Sometimes it is obvious that a drive-by download has occurred as they can lead to bookmarks and start pages of the browser being replaced. Others install unwanted toolbars.
Increasingly criminals are using drive-bys to install keyloggers that steal login and password information.

EXPLOIT
A bug or vulnerability in software that malicious hackers use to compromise a computer or network.
Exploit code is the snippet of programming that actually does the work of penetrating via this loophole.

FIREWALL
Either a program or a feature built into hardware and which sits between a computer and the internet. Its job is to filter incoming and outbound traffic.
Firewalls stop net-borne attacks such as worms reaching your PC.

HONEYPOT
An individual computer or a network of machines set up to look like a poorly protected system but which records every attempt, successful or otherwise, to compromise it.
Often the first hints of a new rash of malicious programs comes from the evidence collected by honeypots.
Now cyber criminals are tuning their malware to spot when it has compromised a honeypot and to leave without taking over.

IP ADDRESS
The numerical identifier that every machine attached to the internet needs to ensure the data it requests returns to the right place. IP stands for Internet Protocol and the technical specification defines how this numerical system works.

IRC
Abbreviation for Internet Relay Chat - one of the net's hugely popular text chat systems.
The technology is also used by botnet herders to keep tabs on and control their flock of machines.

KEYLOGGER
Program installed on a victim's machine that records every keystroke that a user makes.
These tools can obviously be very useful for stealing login and password details. However, the data that is stolen often has to be heavily processed to make it intelligible and to extract names and numbers.

MALWARE
Portmanteau term for all malicious software covers any unwanted program that makes its way on to a computer. Derived from Malicious software.

MAN-IN-THE-MIDDLE
A sophisticated attack in which a criminal hacker intercepts traffic sent between a victim's computer and the website of the organisation, usually a financial institution, that they are using.
Used to lend credibility to attacks or simply steal information about online accounts. Can be useful to defeat security measures that rely on more than just passwords to grant entry to an account.

PACKET SNIFFING
The practice of examining the individual packages of data received by a computer to find out more about what the machine is being used for.
Often login names and passwords are sent in plain text within data packets and can easily be extracted.

PHISHING
The practice of sending out e-mail messages that look as if they come from a financial institution and which seek to trick people into handing over confidential details.
Often they direct people to another website that looks like that of the bank or financial institution the e-mail purports to have come from. Anyone handing over details could rapidly have their account plundered.

PORT
The virtual door that net-capable programs open to identify where the data they request from the net should be directed once it reaches a computer.
Web browsing traffic typically passes through port 80, e-mail through port 25.

ROOTS
A slang term for networks that have been hacked into by criminal hackers. Derives from the deep, or root, access that system administrators typically enjoy on a network or computer.
The login details to get root access are often sold to spammers and phishing gangs who then use these networks to send out millions of e-mail messages.

SCRIPT KIDDIE
An unskilled hacker who originates nothing but simply steals code, techniques and attack methods from others.
Many viruses and worms on the web today are simply patched together from other bits of code that malicious hackers share.

SPYWARE
Malicious program that, once installed on a target machine, steals personal and confidential information. Distinct from adware.
Spyware can be contracted many different ways. Increasingly it arrives on a PC via a web download. Often uses a keylogger to grab information. Some are now starting to record mouse movements in a bid to foil the latest security measures. Some fake security programs pose as spyware cleaners.

TCP
Abbreviation for Transmission Control Protocol - the series of specifications which define the format of data packets sent across the internet.

TROJAN
Like the wooden horse of legend this is a type of program or message that looks benign but conceals a malicious payload. Many of the attachments on virus-bearing e-mail messages carry trojans.

VIRUS
A malicious program - usually one that requires action to successfully infect a victim. For instance - the malicious programs inside e-mail attachments usually only strike if the recipient opens them.
Increasingly the word is used as a portmanteau term for all malicious programs - those that users must set off or those that find their own way around the net.

WHITEHAT
A hacker that uses his or her skills for positive ends and often to thwart malicious hackers.
Many whitehat security professionals spend their time looking for and closing the bugs in code that blackhats are keen to exploit.

WORM
Self-propelled malicious program that scours the web seeking new victims - in the past this has been used to distinguish it from a virus that requires user action to compromise a machine.
Worms can infect and take over computers without any help, bar lax security, from a victim.

ZERO DAY
A Zero day vulnerability is one on which code to exploit it appears on the first day that a loophole is announced.
As most of the damage done by exploiting bugs occurs in the first few days after they become public, software firms usually move quickly to patch zero day vulnerabilities.

ZOMBIE
Another name for a hijacked computer that is a member of a botnet.

~~~~~~~~~~~~~~~~~
( from ~ http://news.bbc.co.uk/1/low/uk/5400052.stm ~ )
~~~~~~~~~~~~~~~~~~~
re : spamming LL ..
i would have thought that inserting a user ID plus a password to get posting on a forum right away ... be dead easy for a 'bot' programmer ..
maybe as to why the 'spammers' ID's are seemingly all random letters

IP: Logged

pidaua
Knowflake

Posts: 67
From: Back in AZ with Bear the Leo
Registered: Apr 2009

posted April 25, 2009 11:34 AM     Click Here to See the Profile for pidaua     Edit/Delete Message   Reply w/Quote
I'm here and registered again

IP: Logged

steelrose
Knowflake

Posts: 114
From: Spain
Registered: Apr 2009

posted April 25, 2009 08:28 PM     Click Here to See the Profile for steelrose     Edit/Delete Message   Reply w/Quote
Me too!!! Registered again!!!

IP: Logged

D for Defiant
Knowflake

Posts: 590
From:
Registered: Apr 2009

posted April 25, 2009 11:30 PM     Click Here to See the Profile for D for Defiant     Edit/Delete Message   Reply w/Quote
I felt deeply traumatized. I still feel traumatized, despite the fact I've re-registered.

Thank you Randall for helping us.

I'm back...still shocked.

D

------------------
The opposite of love is indeed hate, not indifference, for indifference is a form of detachment, and both love and hate are two forms of attachment, and detachment is naturally the opposite of both the two forms of attachment. There are many theories of the relationships between love and hate, but ultimately, hate is death force, which creates untimely or chronic destruction; whereas love is life force, which brings life.

IP: Logged

Fleurdelis
unregistered
posted April 26, 2009 12:51 AM           Edit/Delete Message   Reply w/Quote
I was under the username Atlenta - been wanting to change it for years. Now I can.

IP: Logged

blue moon
Knowflake

Posts: 1344
From: U.K
Registered: Apr 2009

posted April 26, 2009 03:15 AM     Click Here to See the Profile for blue moon     Edit/Delete Message   Reply w/Quote
Nice to meet you, Angelic Gemini.

Us Gems have got to stick together, because before you know it we will be accused of being flaky and promiscuous.

IP: Logged

Coffee
Knowflake

Posts: 2242
From: Leeds
Registered: Apr 2009

posted April 26, 2009 04:22 AM     Click Here to See the Profile for Coffee     Edit/Delete Message   Reply w/Quote
Like you care what people think! More concerned with what you think! Rightly so.

IP: Logged

Vicarious_Aquarius
Newflake

Posts: 16
From:
Registered: Apr 2009

posted April 26, 2009 02:11 PM     Click Here to See the Profile for Vicarious_Aquarius     Edit/Delete Message   Reply w/Quote
Hi, I just registered yesterday and created a new string because I couldn't find this one lol! Thankfully writesomething guided me here.

I am new to Lindaland, but I have been (seriously) interested in astrology for a couple of years now.

IP: Logged

katatonic
unregistered
posted April 26, 2009 03:08 PM           Edit/Delete Message   Reply w/Quote
"spammers are paid by these 'viagra' selling rackets" - from happy dragon's contribution, this makes sense! i've seen at least one viagra-related (nonsense) post since the "fall"!

IP: Logged

Suzette
Newflake

Posts: 4
From: Europe
Registered: Apr 2009

posted April 26, 2009 03:14 PM     Click Here to See the Profile for Suzette     Edit/Delete Message   Reply w/Quote
I registred today :P

IP: Logged

eve
Knowflake

Posts: 191
From: jane
Registered: Apr 2009

posted April 26, 2009 10:25 PM     Click Here to See the Profile for eve     Edit/Delete Message   Reply w/Quote
I'm here. Formerly jane.

IP: Logged

Azalaksh
Knowflake

Posts: 1008
From: New Brighton, MN, USA
Registered: Apr 2009

posted April 26, 2009 10:49 PM     Click Here to See the Profile for Azalaksh     Edit/Delete Message   Reply w/Quote
eve ~
Wahhhhh -- No more Tarzan jokes

IP: Logged


This topic is 6 pages long:   1  2  3  4  5  6 

All times are Eastern Standard Time

next newest topic | next oldest topic

Administrative Options: Close Topic | Archive/Move | Delete Topic
Post New Topic  Post A Reply
Hop to:

Contact Us | Linda-Goodman.com

Copyright 2000-2017

Powered by Infopop www.infopop.com © 2000
Ultimate Bulletin Board 5.46a