One day my I.P traced to where it should - Melbourne of Sydney CBD, and the next it was tracing here...
There is a background to all of this but I cannot tell you it. Suffice to say I upset someone. Apparently they had a problem with something you call "encryption". It's a long story.
Is there anyone out there who can tell me what is out there in the great sandy desert? A lone server of some sort?
I have extensive logs that I will post.
I do not have the knowledge base to decipher it all.
I do not know what is normal ******** , slightly abnormal ********, very abnormal ********, **** here come the men in black.
So any help would be good.
My butt hurts by the way. It's like I've been....probed.
The alleged humans doing all the "pinging" seem to have a very unhealthy interest in svchost.exe and ntoskrnl.exe
They just ping away ALL day. Especially during office hours.
It's NOT foreign I.P's. It's like they are on my network. I.P's the same as mine but different last numbers.
I am not using a router - mobile broadband with good software firewall - good rule list. Locked up tight. All ports blocked and opened only for specific apllications. No I.P traffic. No software like Skype running.
I have watched these people come through Mozilla Firefox and port 80, unblock port 443 (which I had blocked for specific reasons) and then download a 2 meg file. ALL updates including certificates on Firefox were turned off.
Whoever they were - they obviously LOVED Mozilla Firefox. When I took it away they were crying. I.P's coming from Google were being used to get in. I could have SWORN it was Google employees and I know MOzilla have a deal with Google.
I need people with more knowlege than me to sort out what I am seeing.
[Just as I type this the pinging starts after an hour of surfing]
This leads me to believe they have a key logger of some sort on this computer. It has been in THEIR hands twice and was clearly pulled apart.
I once surfed for 2 solid hours everywhere I could and not a single port scan. I then sent an encrypted message to a friend laughing that my arch nemisis having the day off. Within 30 seconds the scans started. My e-mails are being decrypted in real time.
You tell M.R at T.C if he F***ING interferes with my computer one more time I will F***ING drag him out of his office and beat him to death.
Got it?
I haven't forgotten IINet and the disappearing e-mails and NO LOGS. I recorded the conversation with their liason officer - the dumb little blonde - I can see how she got the job. The knee pads were the dead giveaway.
Lets talk about YOU and IINet shall we?
Lets talk about 2005 and a BROKE company that suddenly finds the cash to buy up Westnet and Ozziemail and become the largest I.S.P in Australia.
And do you want me talking about our data intercept friends?
You touch ONE MORE E-MAIL and I pull the temple roof down. You understand?
I REPEAT - touch ONE MORE E-MAIL or an e-mail ATTACHMENT and I will bring the temple roof down.
I have had enough of you imbecilic fools and your games.
YARDofSTUF wrote:The images won't show because you didn't use the direct link. Make sure to copy the direct link.
They just tried the same old thing they used to do with Mozilla Firefox with Oprah...go through "updates" and port 443. I never have updates on and have never had an auto update take place in the 6 months I have been using Oprah.
Heres the log.
I've started recording packet logs.
I dont have the knowledge to analyse things properly.
On one occasion, I was using Ubuntu on a Netbook. They came through the wireless card. Put a 2 gig hidden partition on the drive.
I have the wireless off in bios and switched off manually. I tried to log off as the hard drive went crazy and the computer locked up. It said..."Unable to log off other users logged on".
The people doing this are the hardest core of the hardest core. They ar'nt hacking as it were. They are IN the system. They built it. They manufacture and install the routers and switching gear in the telephone exchanges.
Google...
Rad Group.
AMDOCS.
Verint.
Guardium.
Will I get any peace?
Will a town meeting have to take place shortly attended by 200 people including a member of parliament?
Will Four Corners have to do a story?
Will a certain software and hardware installer with high security clearances have to be subpoenaed to appear in court? I hear his wife would have a nervous breakdown.
Well, if the constant port scanning continues that is what is going to happen.
I hear he does'nt give a stuff about his wife anyway.
Amdocs got a 600 million dollar contract with Telstra - Australia's largest telco.
This Israeli company does billing services and database services for telco's all over the world. The company was started and is run by serving and ex israeli Military Intelligence personnel.
The database service was/is a disaster. Sensis (Yellow Pages) is now looking to sell itself and it's database to a buyer which is most likely going to be Google.
Google is in bed with these Israeli companies.
With the flick of a button they have your entire life. Your banking, medical, telephone and criminal records.
Rad Group - 24 start up companies ALL out of Israel and ALL Military Intelligence.
Verint - data intercept and video security specialists - D.E.A wanted them OUT of the U.S because of suspicions they had hardware backdoors in their equipment.
Airport security, Special Forces communications equipment, military electronics of every kind, control tower electronics. The list is endless. Skype. Software firewalls. Wireless chips. Intel factory in Israel - 2nd largest in world. The list is endless.
This is how Israel controls the U.S - it knows everything that is going on.
Why do I have over 1 meg of upload when compared with only 4 meg of download? All I have done is come to this forum and upload a few small screenshots?
I say the "TROJAN" is IN the actual usb dongle itself.
I put in a "3" dongle and surfed for 6 hours without a SINGLE port scan or alert. Not one.
It's not in my computer.
Things are getting busier. Things are hotting up.
Hopefully I will be able to surf and prepare and communicate with very important people and they will receive the important documents without Google employees and whoever else deleting them either on the server or en route.