Radium wrote:
> On Mar 2, 8:26 am, "Radium" <gluceg...@excite.com> wrote:
> > WARNING: THE FOLLOWING IS ONLY FOR SELF-DESTRUCTIVE NET-IDIOTS. UNLESS
> > YOU ENJOY BEING TORTURED VIA THE INTERNET, DO NOT -- I REPEAT -- DO
> > NOT *EVER* DO THE STUFF INSTRUCTED BELOW, CUZ THERE IS A HIGH HIGH
> > CHANCE THAT IT WILL LEAD TO YOUR UNTIMELY END!!!!!!!!!!!!!!!!!
> >
> > Okay, net-masochists, do the following AT YOUR OWN RISK!:
> >
> > 1. Use Internet Explorer
> >
> > 2. Slide the privacy meter down to "Accept all cookies"
> >
> > 3. Set all of the following to "enable":
> > A. Run components not signed with Authenticode
> > B. Download unsigned ActiveX controls
> > C. Initialize and script ActiveX controls not marked as safe
> > D. Run ActiveX controls and plug-ins
> > E. Access data sources acroos domains
> > F. Allow META REFRESH
> > G. Display mixed content
> > H. Don't prompt for client certificate selection when no certificates
> > or only one certificate exists
> > I. Drag and drop or copy and paste files
> > J. Installation of desktop items
> > K. Launching programs and files in an IFRAME
> > L. Navigate sub-frames across different domains
> > M. Submit nonencrypted form data
> > N. Userdata persistance
> > O. Active scripting
> > P. Allow paste operations via script
> > Q. Scripting of Java applets
> >
> > 4. Set the "Logon" of "User Authentication" to "Anonymous Logon"
> >
> > 5. Set "software channel permissions" to "low safety"
> >
> > 6. Set "Java permission" to "custom", then click the "Java Custom
> > Settings" button, and then click on the "Edit Permissions" tab. Now,
> > for the "unsigned content", set all of the following to "enable" :
> > A. Run unsigned content
> > B. Under the "Additional Unsigned Permisssion", set all the following
> > to enable:
> > - "Access to all files"
> > - "Access to all Network Addresses"
> > - "Execute"
> > - "Dialogs"
> > - "System Information"
> > - "Printing"
> > - "Protected Scratch Space"
> > - "User Selected File Access"
> >
> > 7. Don't use any firewall, or any other internet-security, anti-spy or
> > anti-virus software. If already installed, set all settings to the
> > minimum or uninstall prior to doing the above 6.
> >
> > 8. Spam chat rooms and newsgroups with provocative messages using
> > unsecure chat and usenet applications. Use Yahelite, Messenger, IRC,
> > ICQ, or any other chat client and disable any & all privacy/security
> > measures. Post to usenet via IE using Google Groups.
> >
> > 9. Install webcam and microphones, keep both of them on. Set your
> > microphone to the highest sensitivity so that your personal wispers
> > will be heard. Install webcams on your computer and connect the
> > cameras and microphones to every corner of every room of your house.
> > At night, increase the sensitivity of the cameras so that they can
> > pick up visuals that the human eye can't see in the dark. Be sure that
> > these cameras give high-quality color, images, and motion signals. Be
> > sure that your microphone is that of superb quality.

>
>
> 10. Do all of your internet activites at home.
>
> 11. Use a windows OS


Wouldn't it just be easier to run
Dustin Cook's BugHunter Trojan?
That's got to be a much easier way to
****up any Internet privacy a user might
hope for.


4Q
http://fourq.host.sk/chars/Dustin_Cook/