Email password cracking

Discussion in 'Computer Science & Culture' started by sonicgirl, Sep 26, 2007.

Thread Status:
Not open for further replies.
  1. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,105
    Do realise however there is something else I neglected, you are now a Free Single woman and your posting in the Computer section of a forum.... We'll you don't want to know where that usually heads....

    Please Register or Log in to view the hidden image!

    oke:
     
  2. Google AdSense Guest Advertisement



    to hide all adverts.
  3. Zakariya04 and it was Valued Senior Member

    Messages:
    6,045
    cool she can screw him for all she can
     
  4. Google AdSense Guest Advertisement



    to hide all adverts.
  5. Orleander OH JOY!!!! Valued Senior Member

    Messages:
    25,817
    or part of the house/computer were his and what she did may have been illegal. (not that I think he'd be arrogant enough to try, but considering what else he has done :shrug: )
     
  6. Google AdSense Guest Advertisement



    to hide all adverts.
  7. cosmictraveler Be kind to yourself always. Valued Senior Member

    Messages:
    33,264
    Many states do not recognise common law marriages as legal. If she were living with him she better have kept her stuff including money in her name only. If not it is going to be hard to separate everything they bought together. She should be glad she didn't contract any dideases that he might have picked up.
     
  8. Anti-Flag Pun intended Registered Senior Member

    Messages:
    3,714
    How petty. Can't come up with an arguement then please leave, don't be so childish.
    Actually they were very valid and supported sam's statements. It was already over, sonic had no trust in him, and should have left. If she didn't then he had every right to leave - It's blatantly disrespectful to invade privacy, the issue isn't if the suspicions are correct or not.
    Which is exactly what you continue to do as my post pointed out, which was so obviously lost on you, surprise surprise.
    Seeing as your reading comprehension is seriously limited I shall point this out to you; most people haven't said she was wrong to suspect, just wrong to snoop. She should have left without it, she didn't trust him, and shows no respect, neither of them are anywhere near ready to be married.
    So it's hope which justifies anything?
    She did the right thing to leave him, pity she lowered herself to that level first. Checking became irrelevant after her first post, as sam put it "the relationship was doomed".
    I think a comparison with Iraq isn't far fetched at all, especially in the context of what I wrote, but that was lost on you too.
    He might be scum, but I'd trust people with her attitude about as far as I can throw manhattan.
     
  9. domesticated om Stickler for details Valued Senior Member

    Messages:
    3,277
    I fully support the OP's position and hope the best for her, but since this isn't exactly a computer related thread, shouldn't it be moved elsewhere (like "about the members")?
     
  10. S.A.M. uniquely dreadful Valued Senior Member

    Messages:
    72,825
    What is the duration for common law marriage?
     
  11. cosmictraveler Be kind to yourself always. Valued Senior Member

    Messages:
    33,264
    It again depends on the state. Some are at least 7 years but others vary.
     
  12. S.A.M. uniquely dreadful Valued Senior Member

    Messages:
    72,825
    Anyway from all I have searched on the net, the spyware stuff is illegal:

    So anyone who thinks its okay should check their local cops first
     
  13. Orleander OH JOY!!!! Valued Senior Member

    Messages:
    25,817
    then how can they sell it?
     
  14. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,105
    Well the problem with this thread is that it's Evolved, originally it was the usual Moral and Ethical debate over whether using Keyloggers or Hacking accounts was right (which it technically isn't unless you own the equipment, for instance if she access Hotmail she would have violated Hotmail Legally, however if she accessed something downloaded on the computer then she would of had every right to it because she owned the computer.)

    I have to be careful what I say in regards to people asking to hack email accounts since a few years ago I was asked a lot of the time while serving an underground community "How do I hack hotmail?".

    The nativity of the skript kiddies trying to use a program that one of the community had uploaded didn't realise that the program they used was actually a trojan, so when it was claimed the program could hack hotmail, we'll it literally hacked their hotmail accounts (and other accounts) through keylogging and uploading to an IRC server.

    I'm not a bad guy and didn't know about the trojan plant, until I investigated it and once it came about what was being used I had to pull the plug (and setup methods for people to uninstall the trojan safely.)

    This is why every time the topic of the thread pops up, I take an a stance on it to try and stop skript kiddies finding out what occurs the hardway. Sonic's original post was very similar to many other posts I had seen before, usually the stories given were false for the reasons of wanting to get access to an account however apparently in her case she had a real reason.
    (There's the truth, I couldn't tell if sonic was a socially engineering skript kiddie or a damsel in distress.)

    Of course the thread has now spiralled out from it's humble beginnings and well became a bit of a soap opera (Not down to sonic, but other posters

    Please Register or Log in to view the hidden image!

    ) While only 1/4 or so of the thread is on it's initial subject, it's the only reason why it hasn't been moved (but then where would you move it? Free thoughts? It would probably be better starting a new thread with just the hypothetical 'What would you do in this situation?' question/poll)
     
  15. cosmictraveler Be kind to yourself always. Valued Senior Member

    Messages:
    33,264
    You have to look in the right places to find stuff that is illegal.
     
  16. S.A.M. uniquely dreadful Valued Senior Member

    Messages:
    72,825
    Depends on the purpose, I guess. Businesses use it to monitor fraud, so that is not illegal use, but I'm not certain where personal messages fall in that category.

    The govt can do what they like, what with the Patriot Act

    In the Florida case, the judge said:
    http://www.news.com/2100-1030_3-5577979.html

    This may or may not apply everywhere, but its best to be aware of this stuff.
     
  17. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,105
    Thats states a Man installed spyware on HIS WIFE's computer. Technically you can install spyware on a computer YOU OWN since the computer is YOUR PROPERTY and you have every right to know how YOUR PROPERTY is being used.

    However using keyloggers and then accessing say HOTMAIL is a completely different kettle of fish, since you are ILLEGALLY accessing HOTMAIL's services which YOU personally didn't make any agreements to use. Basically a person accessing HOTMAIL through a keylogger could actually be taken to court by HOTMAIL (Microsoft) and maybe even banned from accessing electronic devices for a number of years.

    (In fact technically even your ISP could probably sue you for accessing HOTMAIL illegally, since you are using their services which you've made agreements in terms of use, one of which would be against the "willingly illegal accessing, manipulation or destruction of data housed on systems that you don't personally own."
     
  18. broadandbeaver 'Now I am become Death Registered Senior Member

    Messages:
    282
    I highly doubt Keylogging software is in anyway a violation of any law if you load it on YOUR PC. If you loaded it on the PC at the local coffee shop, then yes. What Sonicgirl loaded on her PC is her business. The idiot boyfriend should have seen it coming...

    Download.com has a couple of software items on its site.

    http://www.download.com/3120-20_4-0.html?tg=dl-20&qt=keylogging&tag=srch
     
    Last edited: Oct 9, 2007
  19. S.A.M. uniquely dreadful Valued Senior Member

    Messages:
    72,825
    Did you read what the judge said? Does that cover what you said?
     
  20. S.A.M. uniquely dreadful Valued Senior Member

    Messages:
    72,825
  21. broadandbeaver 'Now I am become Death Registered Senior Member

    Messages:
    282
    Wow, talk about a detailed - gonna-catch that-bastard type program!

    By this standard, parents aren't allowed to monitor kids internet usage in the state of Florida. This seems a misinterpretation of the law.
     
    Last edited: Oct 9, 2007
  22. Stryder Keeper of "good" ideas. Valued Senior Member

    Messages:
    13,105
    Btw if you didn't know, Most of the Anti-spyware programs don't pull up the 'Legitimate' spyware that you can purchase for monitoring single computers or networks of computers. This is because the companies pay the anti-spyware companies to let their warez slide.
     
  23. S.A.M. uniquely dreadful Valued Senior Member

    Messages:
    72,825
    So how would you detect these legit spywares?
     
Thread Status:
Not open for further replies.

Share This Page