Email password cracking

Status
Not open for further replies.
Wow, talk about a detailed - gonna-catch that-bastard type program!



By this standard, parents aren't allowed to monitor kids internet usage in the state of Florida. This seems a misinterpretation of the law.

Parents are legal guardians of their children.
 
You clearly have not READ the whole thing
I wasnt looking for a way out of the wedding, he was acting suspiciously & I WAS PROVEN RIGHT
HE WAS HAVING SEX WITH HIS EX SO I WAS RIGHT
IM GLAD I FOUND OUT SO AT LEAST I DIDNT MARRY THE LYING CHEATING ***
HE DIDNT GIVE ME HIS PASSWORD I GOT IT BY A KEYLOGGER
I HAVE TOLD HIM WHAT IVE DONE
AND I PACKED HIS BAGS FOR HIM!!!!!!!!!!

makes you feel good eh? all the emotions. the drama...
 
Wow, this thread is still going. :roflmao:
With that said, here's what I've taken from it,

How to Cheat and Not Get Caught 101
-do not accept or make calls to the mistress from a cell phone that the fiance' can access; in fact, if you are going to put that much effort into it, you minus well get two cell phones, one of which the fiance never sees
-do not email or IM the mistress on the fiance's PC
-all emails and IMs should be done on your own PC
-ensure you have your own account/profile on your PC
-ensure your account is the only administrator account so you are the only one that can install programs
-clear your internet history (and delete any relevant cookies)
-do not act suspicious/shady or different once you start your extra-cirricular activities
-if you are stupid enough to use the fiance's PC, check this out before you do: http://www.spywareremove.com/removeSpector.html







disclaimer: only a joke intended as satire towards Sonic's ex.
 
Parents are legal guardians of their children.


Nothing is mentioned in the law pertaining to legal guardians...

section 934.03(1)(a)-(e)
(a) Intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept any wire, oral, or electronic communication;
(b) Intentionally uses, endeavors to use, or procures any other person to use or endeavor to use any electronic, mechanical, or other device to intercept any oralcommunication when:

1 Such device is affixed to, or otherwise transmits a signal through, a wire, cable, or other like connection used in wire communication; or

2 Such device transmits communications by radio or interferes with the transmission of such communication;
(c) Intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection;
(d) Intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection; or
(e) Intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication intercepted by means authorized by subparagraph (2)(a)2., paragraph (2) (b), paragraph (2) (c), s. 934.07, or s. 934.09 when that person knows or has reason to know that the information was obtained through the interception of such a communication in connection with a criminal investigation, has obtained or received the information in connection with a criminal investigation, and intends to improperly obstruct, impede, or interfere with a duly authorized criminal investigation;
shall be punished as provided in subsection (4).

http://www.ictlex.net/index.php/200...eals-5th-districts-case-no-5d03-3484-opinion/

The whole arguement rest on of the definition of "Storage"....
intercept” is defined by the Act as “the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device.” 934.02(3), Fla. Stat. (2003). We discern that there is a rather fine distinction between what is transmitted as an electronic communication subject to interception and the storage of what has been previously communicated. It is here that we tread upon new ground. Because we have found no precedent rendered by the Florida courts that considers this distinction, and in light of the fact that the Act was modeled after the Federal Wiretap Act, we advert to decisions by the federal courts that have addressed this issue for guidance.

Federal Law seems to feel that if the information was retrived from "storage" then no violation was commited.
The federal courts have consistently held that electronic communications, in order to be intercepted, must be acquired contemporaneously with transmission and that electronic communications are not intercepted within the meaning of the Federal Wiretap Act if they are retrieved from storage. See Fraser v. Nationwide Mut. Ins. Co., 352 F.3d 107 (3d Cir. 2003); Theofel v. Farey-Jones, 359 F.3d 1066 (9th Cir.), cert. denied, 125 S. Ct. 48 (2004); United States v. Steiger, 318 F.3d 1039 (11th Cir.), cert. electromagnetic, photoelectronic, or photooptical system that affects intrastate, interstate, or foreign commerce . . . .”
 
Nothing is mentioned in the law pertaining to legal guardians...



http://www.ictlex.net/index.php/200...eals-5th-districts-case-no-5d03-3484-opinion/

The whole arguement rest on of the definition of "Storage"....

Federal Law seems to feel that if the information was retrived from "storage" then no violation was commited.

Parents have legal status as guardians, its like having power of attorney, you don't need to mention it. :)

Ah thanks for that link, it clarifies the basis of illegality
 
Well, this thread is taking up inordinate amounts of my reading time lately and I resent that, but I'm amused to see how many of our posters have hit on sonicgirl thus far, and am curious to see who'll be next. Meanwhile, sonicgirl, if you want to chat in a more intimate setting, just let me know and I will PM you my email.
Stryder said:
(Most of the Trolls are people that have no real life social skills so hide in forums, usually bullying people because they don't know how to interact with them in any other way.)
In order to make a valid judgement of this kind, you would have to know most trolls offline, on a personal basis, as well as online. Either that, or have access to a controlled, comprehensive study of the phenomenon. Do you?
 
In order to make a valid judgement of this kind, you would have to know most trolls offline, on a personal basis, as well as online. Either that, or have access to a controlled, comprehensive study of the phenomenon. Do you?

Pfft! Moderating at Sciforums isn't enough? :D

Just hunt down a few users Myspace or Facebook pages, or read their blogs.... do I need to say more? (Btw, I wasn't suggesting you didn't know how to socialise Red ;) )
 
How petty. Can't come up with an arguement then please leave, don't be so childish.

Anti-flag, there are not words enough in the English language for me to illustrate my disinterest in your opinion.

Good day.
 
Well the problem with this thread is that it's Evolved, originally it was the usual Moral and Ethical debate over whether using Keyloggers or Hacking accounts was right (which it technically isn't unless you own the equipment, for instance if she access Hotmail she would have violated Hotmail Legally, however if she accessed something downloaded on the computer then she would of had every right to it because she owned the computer.)

The majority of this thread's existence has been more oriented towards the relationship itself with the occasional return to computer related discussion.

I'd vote on this being more of an "about the members" kinda thread with any relation to computer related stuff being more of a "side topic"
 
.... I'd vote on this being more of an "about the members" kinda thread with any relation to computer related stuff being more of a "side topic"

haven't you become a bit obsessive about this...its like, what, your 3rd post about it.

I think it talks a fair amount about the legaility and ethics of using computer software to read others email. Heck, people are posting legal links, not dating services.
 
Yeah well I apoligize for adding to the pages of this thread. I just can't beleive the STUPID things SAM is spewing from her "NON JUDGEMENTAL" :rolleyes: mouth.
 
Hell I still get hit on now, and its a well known fact I have a boyfriend right here in the forum. Its funny when the newcomers start sending mail, and I don't say too much. I let them figure it out for themselves, some take longer then others LOL
 
Hell I still get hit on now, and its a well known fact I have a boyfriend right here in the forum.
Oh get over yourself. I bet all your hats and helmets are too small for you now. :D

Its funny when the newcomers start sending mail, and I don't say too much.
It's probably because you're speechless from being overwhelmed by an over inflated sense of appearance. LOL
 
Oh get over yourself. I bet all your hats and helmets are too small for you now. :D


It's probably because you're speechless from being overwhelmed by an over inflated sense of appearance. LOL

HAHA ......What do i need with another IDOIT!! I already have one LOL
 
Status
Not open for further replies.
Back
Top