View Single Post
  #2   Report Post  
Old May 22nd 04, 02:12 PM
AB8MQ
 
Posts: n/a
Default

PRISON BITCH PARIS "Fag-lame Freddy, The Lamenetter"
whined in message
...
Max Mustermann wrote:
In article s.it
futureworlds whined:

On Wed, 19 May 2004 07:41:33 +0200 (CEST), George Orwell
wrote:

In article
Backpedal Boy Stagger Lee whined:


Then why is it that a traceback to you comes up with domain names like
1Cust127.tnt1.wheeling.wv.da.uu.net these days? (The digits in
"1Cust127" may change, but the "tnt1.wheeling.wv.da.uu.net" seems to
remain the same.)

BWHAHAHAHAHAHA..Saggytits Lee ****s up yet again! You better try again,
fatty!
I'll laugh and laugh when you try to say these come from that server.

Introduction To Remailers

[ignoramus snip]



Yes, you are quite the ignoramus.


No one bothers with remailers. It's too easy to find out what you
want to know by other means.



Sure it is, ****tard. When it is encrypted?


I suppose we can give Woger a hint, even though he once laughed at the
notion that SLee knows something about hacking.



Saggytits know about "hacking?" BWHAHAHAHAHAHAHAHAHAHAHA!!!
That dumb**** can't even find the Marshall County, WV ARES website.


The way to trace back your packets is through SNMP (simple network
management protocol) as applied to the various routers and terminal
servers which manage dialup connections around your area. For some
reason, the manufacturers have too often assumed that an SNMP request
would come from one of their own technical people, and they have left
authentication turned off and the service available to the world.



That's fine, except that that "dialup" wasn't used to send those
packets, dumb****. BWHAHAHAHAHAHAHAHAHA!!
And, they are encrypted, dip****. He got that ip from the admin of the
Nim Buster board. And tried to connect the dots.


That means SLee can query the routing tables and internal information
of many such machines without ever breaking into them. It is like
making a finger request used to be in the good old days.



Saggytits couldn't find his tiny litle vienna sausage withyout moving
his big fat gut.


So he makes SNMP queries until he finds the front end server for your
dialup service by searching for your name or last destination. It's
easy.



Bwhahahahahahaha..wrong...that isn't my dialup server.


He doesn't have to break into anything.

The SNMP information leaks have been around for at least 10 years.
Back when alt.2600 was inhabited by clueful people, the leaks used to
be a common topic of discussion.

Until CISCO and a half dozen other equipment makers secure their SNMP
protocols better, he will always be able to track you down.



Gee, I wonder if the computer crime division of certain Federal agencies
will see it like that?


Why don't you send it to them. I'm sure that they just love hearing from
people that they have a long file on....


You mean CONVICTS like yourself, PrisonBITCH?
From:
Oklahoma Department of Corrections
http://www.doc.state.ok.us/DOCS/offender_info.htm

DOC#:127605
Name: Paris, Paskell E
Race:White
Gender:Male
Hair Color:Brown
Eye Color:Brown
Height:5ft 8in
Weight:170
Birth Date:07-JAN-1962
FBI #:463278DA5
OSBI #:515550
Reception Date:08-JUN-1994
Contact Phone:Inactive Out
Current Facility: 127605
Discharge from prison date:31-MAY-1997

Alias Name Type Last Name First Name Middle Init
Alias Paris Paskell E

Body Marks Body Part Description
No row returned.

Sentence Details Crf Num Convict Date County Offense Term Prob Rel
Date
93-4237 23-MAY-1994 Oklahoma County False Pret Or Bogus Check Over
$50/Con G
5Y/0M/0D 07-JUN-1999
93-7215 23-MAY-1994 Oklahoma County Poss Of Credit Card Belonging To
Another
3Y/0M/0D 07-JUN-1997
93-7215 23-MAY-1994 Oklahoma County Misuse Of
Forged/Counterfeit/Suspended D
3Y/0M/0D 07-JUN-1997
93-7215 23-MAY-1994 Oklahoma County Forgery 2nd - Notes, Checks,
Bills, Draf
3Y/0M/0D 07-JUN-1997
82-51 26-APR-1985 Marshall County Rec/Poss/Conc Stolen Property
4Y/0M/0D
25-APR-1989