Bucky Breeder wrote:
> ~BD~<~BD~@nomail.afraid.org> blah-blah-blah'ed
> news:0a6dnXPpUrSaXrbSnZ2dnUVZ8u2dnZ2d@bt.com:
>
>> One of my ex-army friends, now a long-time
>> professional computer business owner has told me this:
>
> Were you both on the "Don't Ask; Don't Tell" program together?
> Do you both use the same hemorroid plugs for your BUTTOCKS?
>
> IOW : TMI!
Sorry! ;-)
>> "When your computer is connected to a private server,
>> you are at risk from someone with a higher access code
>> (eg Administrator) who can bypass your firewall on port
>> 3389 which is the main port used for remote desktop.
>>
>> The problem here is that an ex member of staff or someone
>> who hacks the server will not let anyone know they have
>> Administrator rights until they are caught."
>>
>> *
>> Does anyone here dispute this fact?
>> *
>
> It *IS* true!
So I understand. Not many believe me!
>> If it *is* true (and I have no reason to doubt it) that
>> presumably means that if anyone subscribes to Annexcafe
>> newsgroups or to the Aumha 'help' server they are, indeed,
>> putting themselves at risk.
>
> It rolls down to how much you trust the server's [proprietor& admin]
> to protect subscribers' privacy/rights...
>
> You can always monitor port/ports... and you SHOULD be if you're
> using these type services...
>
> Here's the real deal, on ANY VPN; the server admin can EASILY
> get behind your firewalls and change almost anything they want
> to, especially with Windows PCs... You can still monitor the
> throughput and cut your station off-line using your firewall[s]
> or just unplug it, if things get really whack...
>
> Here's the main protocol: ALWAYS make a backup image of your
> current system BEFORE you subsribe to a VPN service, and
> you'll only have to wonder a little bit less...
>
> HEY, AT&T had a big ole mess like that up in the Atlanta area
> a few years ago... IOW, your ISP can get behind most conventional
> firewalls and wreck havocs on subscribers too... It's harder
> to do with a NAT firewall in place; but, it's still doable, and
> done-able on occasion. They cleaned out all the techs that were
> involved in the debacle; however, they NEVER admitted it outright,
> even though they had their tech-support services helping out the
> effected customers who called in with similar identifiable issues...
>
> Yep, it's the Wild-Wild-Web out there alright, and as long as
> there are dishonest peeples there will be a need for you to be
> vigilent and cautious.
>
>>
>> Comments welcomed.
>
> On the usernets... blah-blah-blah... wattR-U, retarded?
Of course - I'm on the Usenets! [g] Thanks for your input, BB.
Would you class Aumha.com. Dogagent.com and Malwarebytes.com as VPN's?
*
Cross-posted to alt.privacy.spyware so that Dustin Cook can comment on
your view - *he* says this is "Horse ****" and he's 'da man'!
--
Dave - "It is much better to be hated for what you are, than to be loved
for what you definitely are not." "Do unto others as you would have them
do unto you."


Reply With Quote
