Results 1 to 10 of 12

Thread: The FAQ for <alt.privacy.spyware> [updated July 30, 2003]

Hybrid View

  1. #1
    shplink Guest

    The FAQ for <alt.privacy.spyware> [updated July 30, 2003]

    1. What is alt.privacy.spyware?
    ---
    alt.privacy.spyware is an unmoderated newsgroup for the discussion of
    internet privacy and spyware issues. This newsgroup was formed in
    April of 2000.
    --------------------------------------------------------------------------------
    2. Who can post here?
    ---
    alt.privacy.spyware is open to anyone who wishes to post, provided
    they remain on-topic and observe established standards of netiquette.
    Please note that this is a *discussion* group. Unsolicited commercial
    posts, also known as spam, are not welcome and will be reported to the
    offender's ISP.
    --------------------------------------------------------------------------------
    3. What is spyware?
    ---
    Spyware refers to any software capable of collecting or reporting
    information that might compromise your privacy.
    --------------------------------------------------------------------------------
    4. Can you give me some more details on the types of spyware that
    exist?
    ---
    Spyware can be found in many forms, such as an application program,
    installation utility, ActiveX control, Browser Helper Object,
    "cookies", (Java)script, Java applet, the HTML code found on some web
    sites, or any combination of the above. In short, ANY form of
    executable code and/or user-to-host data exchange can potentially be
    used to implement "spyware" functionality.

    Some of the more common types of spyware (but by no means a complete
    list) are:

    a. Keyloggers: Small programs which run silently in the background,
    recording every key-press and mouse-click. The data can either be
    recorded to a log which, when later "played back", will then provide a
    complete step-by-step record of exactly what the user did on the
    computer, or it can be sent via a network connection to another
    computer where the usage of the primary system can be monitored
    directly. Although widely considered to be blatant "trojan horse"
    programs, keyloggers and similar utilities are also often marketed
    under the guise of "parental control tools" in an attempt to
    legitimize their functionality.
    b. Ad trackers: Programs, scripts, etc., which attempt to collect data
    on who and/or how often a given ad has been viewed, and/or "clicked
    on," thus indicating a specific interest in that product or service.
    Ad trackers can be as benign as simple statistical counters, or as
    insidious as full-blown "E-pending" -i.e. the correlation of your
    personal data (name, street address, e-mail address, age, gender,
    income, credit history, etc.) with precisely which ads you have viewed
    and/or clicked on, when, and from what source.
    c. Usage trackers: Programs, scripts, etc., which attempt to collect
    data on the usage of a specific program or function (for example,
    tracking which .MP3 files you download with file-sharing programs like
    KaZaa; or your usage of a particular application program on a
    particular machine, such as is done by such DRM tools as C-Dilla). In
    most cases, the collected data is either sent to a third party
    (generally without the user's fully informed consent or knowledge) to
    be used later for any of a wide variety of purposes, and/or used
    directly to determine or alter the functionality of the host
    application program.
    --------------------------------------------------------------------------------
    5. How is spyware different from, or similar to, adware?
    ---
    The term "adware" is sometimes used to describe a class of
    spyware.However, the terms are NOT interchangeable. Some spyware is
    also adware; but some (cf. keyloggers and usage trackers, above) is
    not. Similarly, any given example of adware may or may not also be
    spyware, depending on how it operates. In its purest and simplest
    form, the term "adware" only denotes applications which are in some
    way supported by advertising (typically, as you use the program, part
    of your screen is used to display one or more advertisements). If,and
    ONLY if, the application also engages in some sort of data
    logging/reporting (such as by "phoning home", i.e., reporting
    information or otherwise making information available to a third party
    such as the vendor or advertiser, usually via a surreptitious network
    connection) can it rightly be called "spyware".
    See Q15 below for a more detailed discussion; but in short, to be
    considered acceptable, adware MUST be implemented in such a way as to
    ensure the true consent of the user/owner AND not impinge on the
    user's/owner's security and/or privacy.
    --------------------------------------------------------------------------------
    6. Why/How is spyware a problem?
    ---
    Even in its least objectionable form, spyware exploits web users for
    someone's financial or informational profit. The installation of
    unsolicited commercial software is generally done in a sneaky,
    misleading or unannounced manner. This compromises the security and
    privacy of affected users,usually without their knowledge or consent.
    (Also see Q15, below)

    Many varieties of spyware will create unnecessary additional demands
    on the victim's memory and bandwidth resources, resulting in reduced
    computer performance. Generally speaking, the older or less powerful
    one's system, the greater the performance degradation one can expect
    to see as a result of spyware infections.

    How significant these additional demands will be vis-a-vis any given
    system will vary on a case-by-case basis; but, in general, even
    minimal-impact spyware can represent a noticeable additional load. In
    some cases, the basic functionality of the infected system is severely
    impacted. The user may no longer have a choice of desktop items,
    browser toolbars, web browser home page, or of which applications may
    be used for what task.

    In the more extreme instances, trojans and other types of spyware can
    do serious damage: They can gather information about e-mail addresses
    and use an e-mail application's address book in order to propagate.
    Passwords, financial information, and credit card numbers can be also
    compromised by this type of program.

    Advertising-supported software in general falls under a slightly
    different category. However, it can and must be presented in such a
    way as to get the true consent of the user and not impinge on security
    and privacy.

    Monitoring spyware, such as a keylogger, which is installed on
    business machines by an employer, also falls into a different
    category. The ethics of snooping by employers is a subject that
    continues to receive a lot of attention and debate. However, if you
    are using your employer's computer, it's a good idea to do so only for
    uses authorized by your employer.

    Note that the above represent a general outline of some of the
    problems related to spyware, and is not an exhaustive or definitive
    list of all possible issues or concerns. There can also sometimes be
    mitigating circumstances where some degree of spyware-like behavior is
    actually legitimate and acceptable. For example:

    - Some applications have an option to turn the spyware feature off.
    For example, "SuperCookies" in Windows Media Player, although WMP is
    rife with other, more general, security issues.
    - Some applications phone home for potentially benign reasons, such as
    an auto-update.
    If features like these default to "off," that's usually not a problem.
    If they come up with an alert box clearly and fully disclosing all
    relevant information and asking the user for permission to connect,
    that's usually not a problem. If, however, their default setting is to
    phone home without specific and explicit user approval, that should be
    presumptively considered spyware, as the user has no way to know what
    information will be actually up/downloaded, to whom, when, or why.
    --------------------------------------------------------------------------------
    7. Are there any posting restrictions, rules or guidelines?
    ---
    Unless requested, do not post the URL where you suspect you obtained
    your adware / spyware / malware / parasite infection. Instead, alter
    the URL in some way so as to make it human-readable but NOT clickable,
    such as "h**p://www.example.com". Why? Unsuspecting or inexperienced
    lurkers might just click on the URL and get unwittingly hijacked. Note
    that this request applies only to suspect URLs, and is not meant to
    discourage the posting of information about possibly rogue web sites.
    Please DO tell us about them; just do so safely.
    --------------------------------------------------------------------------------
    8. How reliable is the information I might get?
    ---
    Reliability varies and depends on many factors. Just like in any other
    unregulated/unmoderated forum, anyone can post their opinion, offer
    their expertise, and give advice. You never know who might have what
    ulterior motives, who might only have partial information, or who is a
    veritable expert on the issue they choose to address. Our
    recommendation is to take everything with a grain of salt and lurk for
    a while, before deciding to take *anyone's* advice. Lurking will give
    you an opportunity to be introduced to the regulars and to form your
    own opinion about the reliability of a poster's advice.
    --------------------------------------------------------------------------------
    9. How can I identify, prevent and eliminate spyware in my computer?
    ---
    There is not one fail-safe, guaranteed method of keeping a system
    spyware-free. There are too many variables, such as what programs you
    commonly use, what your browser of choice is, how you connect to the
    internet, etc. In most cases a combination of tools will help reduce
    your system's susceptibility to spyware.
    Spyware applications can infect a computer in many ways. The potential
    for infection while browsing is only one of them. Sometimes spyware is
    clandestinely bundled with freeware or shareware programs which are
    downloaded from the Internet, included in regular programs that you
    buy at a retail store, might come aboard during the use of
    file-sharing applications, and so on.
    Uninstalling a program which carries offending lateral spyware is
    usually only part of the solution. In order to clean up spyware
    remnants from the original installation, you will probably need some
    software, or at least some expert advice. There are various programs,
    a lot of them free, which will help you do that.
    The best way to check a computer for infections is to use one or more
    of many "spyware sniffer" applications, and to become familiar with
    basic firewall terminology. Managing block lists and Hosts files will
    protect a computer against infection while browsing the Internet. Keep
    in mind that not all spyware eliminator programs are entirely
    legitimate. Asking for feedback in this NG will help you choose
    programs which are safe.

    See Appendix 1 for a list of some applications that are frequently
    discussed and used in this NG. (Posting a question here should result
    in considerable suggestions and comparisons by regulars.) We recommend
    that you do *not* use an adware uninstaller from an adware vendor -
    since it could and probably would compound your problem(s)."

    Overall, remember that "an ounce of prevention is worth a pound of
    cure."
    --------------------------------------------------------------------------------
    10. Why didn't (X anti-spyware program) find (Y spy program or file)
    on my computer?
    ---
    Because new spyware is being developed all the time, some of it
    purposely designed to avoid existing spyware detectors.
    --------------------------------------------------------------------------------
    11. Am I being spied upon?
    ---
    Imagine that every time you go online, a commercial internet
    application verifies its registration number against a licensing
    server. Is it spying on you?
    Well, it depends: If all the server does is check the number against a
    list and send back a go/no-go signal then it isn't spying, at least
    not in the blatant, for-profit sense we usually mean in this group.
    However, perhaps the server has a GUID (="Global Unique Identifier,"
    your registration number) which is tied to your registration info, and
    it has your IP, and it knows when you're online. Let's say you fire up
    your browser, visit a website, the website sends your IP to the
    licensing server, and the server returns your name and address, etc.
    to the website. *Now* that internet application is spyware.
    --------------------------------------------------------------------------------
    12. What are third party cookies and what do they have to do with
    spyware?
    ---
    Cookies are a standard way for your browser to exchange information
    with the visited site. But, there is a privacy issue with third-party
    cookies: When you go to site A, which includes content from site B,
    site B gets to know a little about what you are doing at site A. If
    there are *many* site As --for example, if site B is a big advertising
    network-- this can be used to build a profile of your web usage.
    --------------------------------------------------------------------------------
    13. How can I keep track of what another person in the household is
    doing on a computer?
    ---
    This is not the proper NG for this type of question. You will find
    here mostly people who are very serious about the sanctity of personal
    freedoms and, naturally, privacy. Most of the regulars believe that
    communication, honesty and full disclosure are the greatest tools in
    order to avoid ever having to ask a question like this.
    --------------------------------------------------------------------------------
    14. Is privacy the same as anonymity on the Internet?
    ---
    No. Being anonymous in the Internet is not impossible, but it's very
    challenging. At any rate, anonymity is not the focus of this NG.
    However, the abusive behavior of spyware vendors upon the user's
    presumed lack of anonymity *is* an issue.
    A company derives value from something they take from you without your
    knowledge or consent. That meets the standards of most people's
    definition of theft.
    Spyware exploits the "lack of anonymity" for profit and returns
    nothing to the victim. Under normal circumstances, there is no value
    derived from the tracks one would leave around the net: They are a
    by-product. The corporate world has created a value/potential
    profit-maker in your surfing habits that was never intended and you
    did not agreed to.
    --------------------------------------------------------------------------------
    15. How is the issue of consent important when it comes to spyware?
    ---
    As mentioned previously, spyware typically sneaks into a user's
    computer without their explicit or informed consent. Being fully aware
    that something is spyware, and choosing to install it nevertheless,
    does not change the fact that it's spyware. However, since most
    spyware is designed to function clandestinely, we believe that terms
    like "informed" and "coerced consent" are important: I am about to
    install a program. Does it contain spyware? Am I fully informed?
    Informed should mean informed. Not "You should have read the EULA and
    deciphered it." EULAs can be intentionally ambiguous, and
    unfortunately you don't get a screen during the installation that says
    "This software monitors what websites you visit, keywords you search
    for, and reports it back to ____________. Do you accept this?" Chances
    are that there are "phone home" violations, among others, whenever you
    see operative words like "opt-in", "opt-out", and "GUID." Licensing
    agreements that accompany software downloads sometimes warn the user
    that a spyware program will be installed along with the requested
    software, but the licensing agreements may not always be read
    completely because they are often couched in obtuse, hard-to-read
    legal disclaimers. A great deal of software users routinely click on
    the "I agree" button of a EULA without bothering to read it very
    carefully or thoroughly. Most of us feel that this click does not
    truly constitute consent.
    Spyware can also be an application which is installed by coerced
    consent: For example, a user may be required to accept a EULA before
    they can install an essential update to a program they've come to
    depend on and this agreement might include consent to accept spyware.
    Or, a user may have already paid for an application only to find out
    too late for a refund that they have "explicitly agreed" to the
    installation of spyware.
    --------------------------------------------------------------------------------
    16. How can I be spyware-free without all this hassle?
    ---
    Using an open-source operating system and strictly open-source
    applications downloaded from reliable sources will minimize the risk.
    However, as open-source becomes more popular, it seems inevitable that
    there will be spyware which targets it. Some source code is difficult
    to comprehend and could mask spyware. Also, there is much freeware
    that is safe. Od course, checking with others before
    downloading/installing is sensible advice.
    --------------------------------------------------------------------------------
    17. Do different types of programs exhibit different degrees of
    vulnerability to spyware?
    ---
    As mentioned in a previous question, the spyware "machine" mutates and
    evolves based on market conditions. The primary concern of a spyware
    manufacturer is volume of users. The more people who use a certain
    program, or a certain version of a program, the greater the chances
    are that it has become a more attractive target for spyware.
    --------------------------------------------------------------------------------
    Appendix 1. Some helpful URLs: Free programs and further information.
    Note that any opinions and recommendations in the links below are not
    necessarily those of the majority of this newsgroup.
    ---
    Sponge's Site:
    http://www.geocities.com/yosponge/
    Sponge is a regular contributor to this newsgroup. His site is full of
    good information for beginners and advanced users alike.

    Kerio:
    http://www.kerio.com/us/kpf_home.html Kerio is the firewall preferred
    by a lot of experienced users. See sponge's site above for specific
    rule sets tailored to your requirements.
    http://www.blarp.com/faq/faqmanager.cgi?toc=kerio Kerio firewall FAQ.
    http://www.dslreports.com/forum/kerio Kerio forum at DSL Reports

    Zone Alarm:
    http://www.zonelabs.com Zone Alarm is a firewall popular among
    beginners.

    Outpost Firewall:
    http://www.agnitum.com/products/outpost/#

    Proxomitron:
    http://www.proxomitron.org
    or http://www.imilly.com/tools.htm Free web proxy server.

    Privoxy:
    http://www.privoxy.org/ Same as the Proxomitron, but also runs on
    Linux

    Ad Aware:
    http://www.lavasoft.de/
    http://www.lavasoftusa.com/
    http://lavasoft3.element5.com
    Three mirror sites from where you can download Ad-Aware, a spyware
    eliminator. Lavasoft (makers of Ad Aware) forum:
    http://www.lavasoftsupport.com (requires registration)

    Spybot Search and Destroy:
    http://security.kolla.de/
    http://spybot.eon.net.au
    Spyware eliminator. SpyBot threats database:
    http://spybot.safer-networking.de/in...gebase/threats
    (URL may mirror to another, depending a server load at the time)

    DNS Kong:
    http://www.pyrenean.com/dnsintro.php DNS lookup redirector

    Spider:
    http://www.fsm.nl/ward File cleaner, will deal with the infamous MS
    "hidden files" among other things.

    A hosts file:
    http://www.mvps.org/winhelp2002/hosts.htm

    Hijack This!
    http://www.spywareinfo.com/~merijn/index.html There's a link for a
    great utility that wipes out Kazaa entirely, which works as well as
    Hijack This! A note on the latter, use with caution, it's a bit of a
    Beta utility. If you use it, post your scan results log in the
    newsgroup for us to check out before you take any further action.

    Spywareblaster:
    http://www.wilderssecurity.net/spywareblaster.html Preventive tool.

    MRU-blaster:
    http://www.wilderssecurity.net/mrublaster.html Detects and cleans up
    MRU lists and other "hidden" stored information.

    SpywareGuard:
    http://www.spywareinfo.com/downloads/swguard/ SpywareGuard provides a
    real-time protection solution against spyware that is a great addition
    to SpywareBlaster's protection method. An anti-virus program scans
    files before you open them and prevents execution if a virus is
    detected - SpywareGuard does the same thing, but for spyware! And you
    can easily have an anti-virus program running alongside SpywareGuard.

    Andrew Clover's parasite detection page:
    http://www.doxdesk.com/parasite/ Contains a script that scans for
    common parasites.

    Chris Quirke's Malware page:
    http://users.iafrica.com/c/cq/cquirke/malware.htm A bit out-dated but
    informative.

    CEXX:
    http://www.cexx.org/adware.htm
    CEXX discussion board:
    http://boards.cexx.org/

    Mike Healan's Spyware info:
    http://www.spywareinfo.com
    Spywareinfo Board:
    http://www.spywareinfo.com/yabbse/ requires registration

    http://www.staff.uiuc.edu/~ehowes/main-nf.htm
    A general Privacy & Security site that is a compilation of links to
    third party applications and utilities - use these with caution - post
    here if you are uncertain.

    http://unwantedlinks.com/

    Information about data mining:
    http://www.anderson.ucla.edu/faculty...datamining.htm

    Nice info regarding some known nasties and links to tools:
    http://www.imilly.com/

    the alt.privacy.spyware FAQ:
    http://shplink.com/misc/FAQ.htm

  2. #2
    Randall Bart Guest

    Re: The FAQ for <alt.privacy.spyware> [updated July 30, 2003]

    'Twas Fri, 26 Sep 2003 05:13:22 GMT when all alt.privacy.spyware stood in
    awe as shplink <shplink@removeme.shplink.com> uttered:

    >Message-ID: <b02ed7a0b0371d70b5d137ecc7f3f975@news.teranews.co m>


    I am confused. This message showed up today with today's date and the
    Message-ID above. Yet I have messages from Sept 3 which are replies to
    this message and show the same Message-ID in their reference headers.
    --
    RB |\ © Randall Bart
    aa |/ admin@RandallBart.spam.com Barticus@att.spam.net
    nr |\ Please reply without spam I LOVE YOU 1-917-715-0831
    dt ||\ http://RandallBart.com/ Ånåheim Ångels 2002 World Chåmps!
    a |/ Multiple sclerosis: http://www.cbc.ca/webone/alison/
    l |\ DOT-HS-808-065 The Church Of The Unauthorized Truth:
    l |/ MS^7=6/28/107 http://yg.cotut.com mailto:s@cotut.com

  3. #3
    Jay T. Blocksom Guest

    Re: The FAQ for <alt.privacy.spyware> [updated July 30, 2003]

    On Sat, 27 Sep 2003 02:29:42 GMT, in <alt.privacy.spyware>, Randall Bart
    <Barticus@att.spam.net> wrote:
    >
    > 'Twas Fri, 26 Sep 2003 05:13:22 GMT when all alt.privacy.spyware stood in
    > awe as shplink <shplink@removeme.shplink.com> uttered:
    >
    > >Message-ID: <b02ed7a0b0371d70b5d137ecc7f3f975@news.teranews.co m>

    >
    > I am confused. This message showed up today with today's date and the
    > Message-ID above.

    [snip]

    I suspect your news server, or possibly one of its feeds, "burped", and for
    whatever reason re-dated incoming messages to the date/time they were
    received _at_that_server_.

    > Yet I have messages from Sept 3 which are replies to
    > this message and show the same Message-ID in their reference headers.


    Are you *very* sure of that? Google has been known to do some "spontaneous
    redating" itself; but you are apparently not reading Usenet via Google (good
    thing, that). I can't think of any other way for a follow-up to pre-date
    the original article.

    --

    Jay T. Blocksom
    --------------------------------
    Appropriate Technology, Inc.
    usenet01[at]appropriate-tech.net


    "They that can give up essential liberty to obtain a little temporary
    safety deserve neither liberty nor safety."
    -- Benjamin Franklin, Historical Review of Pennsylvania, 1759.

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    NOTE: E-Mail address in "From:" line is INVALID! Remove +SPAMBLOCK to mail.
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Unsolicited advertising sent to this E-Mail address is expressly prohibited
    under USC Title 47, Section 227. Violators are subject to charge of up to
    $1,500 per incident or treble actual costs, whichever is greater.
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  4. #4
    Randall Bart Guest

    Re: The FAQ for <alt.privacy.spyware> [updated July 30, 2003]

    'Twas Tue, 07 Oct 2003 18:18:49 -0400 when all alt.privacy.spyware stood
    in awe as Jay T. Blocksom <usenet01+SPAMBLOCK@appropriate-tech.net>
    uttered:

    > > Yet I have messages from Sept 3 which are replies to
    > > this message and show the same Message-ID in their reference headers.

    >
    >Are you *very* sure of that?


    Yes, but now that I investigate, I see more. Loot at the headers from
    these three messages:

    X-Abuse-Report: abuse@teranews.com
    Message-ID: <b02ed7a0b0371d70b5d137ecc7f3f975@news.teranews.co m>
    Path:
    bgtnsc04-news.ops.worldnet.att.net!wnmaster12!wn11feed!worl dnet.att.net!128.230.129.106!news.maxwell.syr.edu! in.100proofnews.com!in.100proofnews.com!snoopy.ris q.qc.ca!chi1.webusenet.com!news.webusenet.com!news feed-east.nntpserver.com!nntpserver.com!news.teranews.c om!not-for-mail
    Date: Fri, 29 Aug 2003 05:11:30 GMT
    Lines: 417
    From: shplink <shplink@removeme.shplink.com>
    Newsgroups: alt.privacy.spyware
    Subject: The FAQ for <alt.privacy.spyware> [updated July 30, 2003]
    X-Newsreader: Forte Free Agent 1.93/32.576 English (American)
    MIME-Version: 1.0
    Content-Type: text/plain; charset=us-ascii
    Content-Transfer-Encoding: 7bit
    Xref: wnmaster12 alt.privacy.spyware:24833
    X-Received-Date: Fri, 29 Aug 2003 05:11:42 GMT
    (bgtnsc04-news.ops.worldnet.att.net)

    X-Abuse-Report: abuse@teranews.com
    Message-ID: <b02ed7a0b0371d70b5d137ecc7f3f975@news.teranews.co m>
    Path:
    bgtnsc05-news.ops.worldnet.att.net!bgtnsc04-news.ops.worldnet.att.net!wnmaster12!wn11feed!worl dnet.att.net!216.166.71.14!border3.nntp.aus1.gigan ews.com!border1.nntp.aus1.giganews.com!nntp.gigane ws.com!in.100proofnews.com!in.100proofnews.com!sno opy.risq.qc.ca!chi1.webusenet.com!news.webusenet.c om!newsfeed-east.nntpserver.com!nntpserver.com!news.teranews.c om!not-for-mail
    Date: Fri, 26 Sep 2003 05:13:22 GMT
    Lines: 417
    From: shplink <shplink@removeme.shplink.com>
    Newsgroups: alt.privacy.spyware
    Subject: The FAQ for <alt.privacy.spyware> [updated July 30, 2003]
    X-Newsreader: Forte Free Agent 1.93/32.576 English (American)
    MIME-Version: 1.0
    Content-Type: text/plain; charset=us-ascii
    Content-Transfer-Encoding: 7bit
    Xref: wnmaster12 alt.privacy.spyware:25618
    X-Received-Date: Fri, 26 Sep 2003 05:15:20 GMT
    (bgtnsc05-news.ops.worldnet.att.net)

    The message came in the first time on 29 Aug then again on 26 Sep. We can
    see the bang paths diverge at in.100proofnews.com. Somewhere after that,
    it sat around a long time then got a new Date header. You (and others)
    replied the first time, but when the second instance of the message
    arrived, Agent threaded your responses behind the second instance. That's
    what I was seeing.
    --
    RB |\ © Randall Bart
    aa |/ admin@RandallBart.spam.com Barticus@att.spam.net
    nr |\ Please reply without spam I LOVE YOU 1-917-715-0831
    dt ||\ Attemped Murder of Terri Schiavo http://www.terrisfight.org
    a |/ Multiple sclerosis: http://www.cbc.ca/webone/alison/
    l |\ DOT-HS-808-065 The Church Of The Unauthorized Truth:
    l |/ MS^7=6/28/107 http://yg.cotut.com mailto:s@cotut.com

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •