N
Neo
Guest
TweetyBird said:wow damn!! i hate TweetyBird... *rme*
TweetyBird said:wow damn!! i hate TweetyBird... *rme*
TweetyBird said:wow damn!! i hate hacker... *rme*

Neo said:Get MAC. Get Linux. Get Mac. Blah blah. That is not solve her problem. Well I know you try to get her to buy MAC to avoid from worry about hacker.
diehardbiker65 said:Hey buddy, soon or later hacker is going after Linux!
diehardbiker65 said:If you want 100% hacker free computer, then get IBM AS400! In history not even one hacker had successfully hacked in this computer! Oh no, you can't afford this.... It cost at least a million dollars.
FreeWoman77 said:not only 4 in 1, an messengers, also my emails stalker can read deleted/trashed my emials :/

GalaxyAngel said:Emails.. ahh..
Use Thunderbird email under mozzila (firefox) is quite very good!
Unless you have to put security marked for your pwd.
Why don't you put on email whoever hacker attempt your email..will open and shock seeing the image..
![]()
Hacker will scare away and no longer attempt your email..![]()

Bryan said:Reformat your harddrive, jesus christ, doesnt anyone here know the real answer? format your harddrive, or re-install your OS, or do a system restore
Neo said:Like I told her already. Maybe she dont get what reformat and reinstall mean.
Teresh said:No, it won't solve her problem. But it will solve the reason she's have the problem, which is the fact that she is using an inept OS. This stuff *doesn't happen* in other OSes.
They go after Linux anyway... You'll find that their attempts to gain control of a Linux system generally fail unless the sysadmin is a complete inept. In Windows, any reasonably intelligent individual can get Administrator access through a very long list of unpatched bugs. That doesn't happen in Linux because Linux does not have a b0rked security model. If bugs even exist in the first place (and when they are discovered, they are fixed extremely rapidly, faster than hackers find out about them), the strong security model renders the bugs impossible to exploit.
Let's see you do that on a Windows machine... Oh, wait, everyone runs as Administrator on a Windows machine. You can compromise the entire system by ONE PROGRAM having a buffer overflow vulnerability. In Linux, the most damage you can do is delete a user's home directory, and that's assuming you even find a bug that can be exploited.
Linus's Law states that with enough eyes watching all bugs are shallow. This law has proven true thus far.
I've had my $800 Linux desktop (Raven) which I built myself for two years and it's never been compromised or had a virus once. Care to venture a guess as to why?
diehardbiker65 said:If you set up correctly on everything you minimize the chance of getting strike. But 100% foolproof? Nope.
FreeWoman77 said:i have been stalker for 3 yrs, i only found out like 1 yr or less ago![]()
diehardbiker65 said:Ahem... Stalker? You mean you have been stalking at somebody for 3 years?
no, my bad English, sorry, i mean i have been stalkED by 
FreeWoman77 said:no, my bad English, sorry, i mean i have been stalkED by
![]()
diehardbiker65 said:LOL! I caught you when I read it. I said, A woman is a stalker???
I know it SUCKS! I was living in a nightmare for months due to this stalker. He put some kind of program on my computer so he was able to read all of my emails and IMs, whether it was on AIM or MSN or ICQ or Yahoo. I was not able to get away from him. He also got my address and broke into my car.
Gemtun said:Freewoman,
I have been there before.I know it SUCKS! I was living in a nightmare for months due to this stalker. He put some kind of program on my computer so he was able to read all of my emails and IMs, whether it was on AIM or MSN or ICQ or Yahoo. I was not able to get away from him. He also got my address and broke into my car.
I was terrified - I was extremely paranoid.
This guy works as a computer programmer so that was how he knew how to do these things. He even admitted that he does this kind of thing to many women online to gain a sense of power.
I asked one of my best girlfriends husband who is a cop for help. He said that there isnt much cops can do![]()
So after a few months, he finally got bored with the game and moved on to another victim.
I ll never forget that experience. I wish I have answers for you but please hang in there and format your system, etc.
:fu2: :fu2: to these coward hackers who enjoy stalking/hacking others online too much.
i agree it SUCK serious! he also entered my bank acct, knows my ssn and applied some credit cards/debit using my name and permitted additional cards his name on cards under mine, hope u undy what i mean, makes me pissed off big times i have to call there to set password all accts and rid off his name off my acct as closed, one i never forgot he used my AMEX to purchase flight ticket for Europe and spent some in Europe, and many
FreeWoman77 said:i agree it SUCK serious! he also entered my bank acct, knows my ssn and applied some credit cards/debit using my name and permitted additional cards his name on cards under mine, hope u undy what i mean, makes me pissed off big times i have to call there to set password all accts and rid off his name off my acct as closed, one i never forgot he used my AMEX to purchase flight ticket for Europe and spent some in Europe, and many
![]()
FreeWoman77 said:i feel want to throw this brand new dell computer away and get everything new and/or changed he might not know my new sn and e.t.c., possible?
