Study: Your Personal Info Leaked by 61% of Websites
- Posted on October 12, 2011 at 4:07pm by
Liz Klimas
- Print »
- Email »
- Reviewing 185 largest websites, 61 percent release usernames.
- Previous study found 56 percent of 120 websites reviewed released some sort of information.
- Usernames, thanks to social networks, give people easy access to full names, photo and other information.
- Just by clicking on a Home Depot ad, 13 different sites received user first name and email address.
- Expert says this study isn’t indicative of lack of anonymity on the web, but identifying technical issues.
According to a study conducted by Stanford University Law School, 61 percent the top websites reviewed were passing on your user ID to third-parties without tell you — sometimes they didn’t even know they were doing it.
In an initial study released in July, the authors reviewed signup and interaction of 120 popular sites, finding 56 percent leaked some sort of private info.
A more recent study of website leaking practices was conducted as a follow-up including more websites and specific analysis of username or user ID leakage.
PC World has more:
Many websites ”leak usernames to third-party advertising networks by including usernames in URLs that the ad networks can see in referrer headers, said the study. [...] While there’s a debate in legal circles whether usernames are personal information, there’s a growing consensus among computer scientists that Web-based companies can use usernames to identify their owners, said Jonathan Mayer, a Stanford graduate student who led the study.
“The vast majority of usernames are unique,” he said. “Given the prevalence of social networking, often times, once you have a username for a social network, you then also have a person’s real name, possibly a photo, possibly more.”
Here are some examples of other information leaked from specific sites from the study:
- Viewing a local ad on the Home Depot website sent the user’s first name and email address to 13 companies.
- Entering the wrong password on the Wall Street Journal website sent the user’s email address to 7 companies. [...]We identified the Wall Street Journal leak in a different browsing session from the one reported in the spreadsheet – and by accident. In the interest of consistency – we did not test logging out and logging back in on other sites, nor logging in with the wrong password – we decided to discuss the leak in our post but not our spreadsheet.
- Changing user settings on the video sharing site Metacafe sent first name, last name, birthday, email address, physical address, and phone numbers to 2 companies.
- Signing up on the NBC website sent the user’s email address to 7 companies.
- Signing up on Weather Underground sent the user’s email address to 22 companies.
- The mandatory mailing list page during CNBC signup sent the user’s email address to 2 companies.
- Clicking the validation link in the Reuters signup email sent the user’s email address to 5 companies.
- Interacting with Bleacher Report sent the user’s first and last names to 15 companies.
- Interacting with classmates.com sent the user’s first and last names to 22 companies.

Is adding your information into a sign-in page like this sending your email address to other sites as well?
The study authors go on to state the concept of anonymity does not exist in third-party web-tracking, but PC World reports the Information Technology and Innovation Foundation questioning this assertion. Daniel Castro, a senior analyst at the foundation, said that the report “identified some technical issues that websites can address to improve privacy.” He states that majority of businesses do not abuse user information and have the appropriate policies and privacy practices in place.



















Submitting your tip... please wait!
TouchStoneMT
Posted on October 13, 2011 at 12:01amMy advice to my teenaged daughter:
NEVER PUT ANYTHING ON THE INTERNET YOU WOULDN’T WANT ME TO PUT ON THE TAILGATE OF MY TRUCK.
Report Post »bunnybeads
Posted on October 13, 2011 at 10:09amGood Advice
Report Post »DanWesson455
Posted on October 13, 2011 at 10:38amDitto. and for good measure: Ditto again.
Report Post »WeDontNeedNoSteeeenkinBadges
Posted on October 16, 2011 at 12:36am(continued)
On one of their more recent shows, called entitled “Ghostery”, Steve & Leo review this highly recommended, multi-OS, multi-browser extension that reveals all of the tracking bugs and cookies websites use to track us, and optionally allows them to be blocked. Once installed, Ghostery will expose, for example, that TheBlaze is tracking you (YES, YOU) through 6 different companies:
Google Analytics
Quantcast
Omniture
Doubleclick
Revenue Science
ChartBeat
Time for some SECURITY NOW.
Report Post »WeDontNeedNoSteeeenkinBadges
Posted on October 16, 2011 at 6:23am(Beginning)
TouchStoneMT: “NEVER PUT ANYTHING ON THE INTERNET YOU WOULDN’T WANT ME TO PUT ON THE TAILGATE OF MY TRUCK.”
Sorry, that’s NOT good enough. EVERYTIME you even SURF the Internet, you are giving any information like on a Goodyear Blimp’s bright flashing neon-sign! But it doesn’t HAVE to be that way.
Steve Gibson of the Gibson Research Corporation has a public service website where he helps LOCK-DOWN your WIDE OPEN computer system from sending out information all about you EVERY TIME YOU CLICK A LINK to any and every website!
http://www.grc.com/default.htm
“ShieldsUP!” is where you can see what information your computer system sends to every visited website. Steve Gibson then explains what is necessary for the Internet to work and what you can do to eliminate all the extra information leakage to maximize your privacy.
https://www.grc.com/x/ne.dll?bh0bkyd2
“Security Now!” is where you can listen to and/or read transcripts of the weekly Steve Gibson & Leo LePorte hosted podcast (Internet radio show), which they’ve been broadcasting since 2005. They discuss security issues, explain how things work, how you can further protect yourself, and highlight new developments and solutions. All audio & transcripts are freely available for your education and safety.
https://www.grc.com/securitynow.htm
On one of their more recent shows, called entitled “Ghostery”, Steve & Leo review
Report Post »WeDontNeedNoSteeeenkinBadges
Posted on October 16, 2011 at 9:23pmtesting 1
TouchStoneMT: “NEVER PUT ANYTHING ON THE INTERNET YOU WOULDN’T WANT ME TO PUT ON THE TAILGATE OF MY TRUCK.”
Sorry, that’s NOT good enough. EVERYTIME you even SURF the Internet, you are giving any information like on a Goodyear Blimp’s bright flashing neon-sign! But it doesn’t HAVE to be that way.
Steve Gibson of the Gibson Research Corporation has a public service website where he helps LOCK-DOWN your WIDE OPEN computer system from sending out information all about you EVERY TIME YOU CLICK A LINK to any and every website!
Report Post »http://www.grc.com/default.htm
WeDontNeedNoSteeeenkinBadges
Posted on October 16, 2011 at 9:26pmtesting 2
“ShieldsUP!” is where you can see what information your computer system sends to every visited website. Steve Gibson then explains what is necessary for the Internet to work and what you can do to eliminate all the extra information leakage to maximize your privacy.
Report Post »https://www.grc.com/x/ne.dll?bh0bkyd2
WeDontNeedNoSteeeenkinBadges
Posted on October 16, 2011 at 9:27pmtesting 3
“Security Now!” is where you can listen to and/or read transcripts of the weekly Steve Gibson & Leo LePorte hosted podcast (Internet radio show), which they’ve been broadcasting since 2005. They discuss security issues, explain how things work, how you can further protect yourself, and highlight new developments and solutions. All audio & transcripts are freely available for your education and safety.
Report Post »https://www.grc.com/securitynow.htm
WeDontNeedNoSteeeenkinBadges
Posted on October 16, 2011 at 9:31pmtesting 4
On one of their more recent shows, called entitled “Ghostery”, Steve & Leo review this highly recommended, multi-OS, multi-browser extension that reveals all of the tracking bugs and cookies websites use to track us, and optionally allows them to be blocked. Once installed, Ghostery will expose, for example, that TheBlaze is tracking you (YES, YOU) through 6 different companies:
Google Analytics
Quantcast
Omniture
Doubleclick
Revenue Science
ChartBeat
Time for some SECURITY NOW.
Report Post »WeDontNeedNoSteeeenkinBadges
Posted on October 16, 2011 at 9:38pmtest results
One CAN post on TheBlaze! Who’d a thought?
Report Post »paulusmaximus
Posted on October 12, 2011 at 10:53pmThose with serious intent here had a lot of good advice. (of course the trolls always try to use up as much space as they can!) But I believe the only way to truly be invisible is to rid your self of everything and I do mean everything and grab you rifle then head for the hills!
Report Post »o0o0lllll0o0o
Posted on October 12, 2011 at 9:46pmPRO TIP —> It is quite easy to remain anonymous and prevent companies from obtaining your “information”. Just follow these three steps:
1) Put the wireless router that is in your home on a timer, and have the timer shut it off at night. Shutting off your router, even for just 5 minutes, forces the system to re-issue you a new IP address. Changing your IP address daily keeps anyone from tracking you.
2) Use software that allows you to empty the “index.dat” file (if you are using Windows) on your PC. My personal favorite is Webroot Window Washer, but there are others. Microsoft keeps a record of EVERY website you have ever visited, every search you have ever done and your email activity…and they store that information in your “index.dat” file on your PC. You can not delete this file, Windows will not let you…but you can empty it’s contents daily. (You can bet your a$$ that every time Windows does an automatic “update”, it retrieves all of the information in your “index.dat” file)
3) Use software that wipes away all of your personal information on a daily basis. My personal favorite is Privacy Mantra, but there are many others.
Glary Utilities is another good software package that will do both of the above. I use all three, just to be safe.
Privacy Mantra and Glary Utilities are both FREE…and can be downloaded from cnet.com.
Warning: You are NEVER completely anonymous on the internet unless you’re using the TOR Network….so don’
Report Post »o0o0lllll0o0o
Posted on October 12, 2011 at 9:51pmPart 2
Warning: Following my suggestions will keep your PC clean and make it difficult for marketing companies to know anything about you, but you are NEVER completely anonymous on the internet unless you’re using the TOR Network….so don’t be stupid.
Report Post »Rational Man
Posted on October 13, 2011 at 1:03amThanks!!
Report Post »o0o0lllll0o0o
Posted on October 13, 2011 at 7:21amAll three, Webroot Window Washer, Glary Utilities and Privacy Mantra delete all cookies every time you use them.
Report Post »MrObvious
Posted on October 14, 2011 at 9:47pmTOR is not truly anonymous either.
Bit-torrent and other services bypass it; or, manage to track your ip and actions anyway.
Rather than worry about total anonymity it’s better to live on the up n up to begin with.
Life Lock is a good service to prevent identity theft.
Running Ad Block and Ghostery, in browsers like FireFox (that support those addons), to prevent trackers and ads, is also a good idea.
WOT and other addons can warn you about suspicious and/or inappropriate websites; before, you go to them; by, showing ratings next to you search results and/or links.
Spam can be automatically dealt with in a number of ways: through junk controls on you e-mail program, using a service, using an anti-spam firewall, using spam blocking anti-virus software, or just using through-away accounts when signing up for things on line (IE get a gMaill, aol, MSN, Yahoo, … e-mail account, then us it when signing up for things, instead of using the Facebook button, or your primary e-mail account.
No matter how many times you IP changes, you can still be found. Think about it, you accessing from the same physical device, and the IP is issued under an account tied to you billing address and/or cell number.
If you break the law online, you can be caught. It’s just a matter if/when those doing the enforcing, deem you actions worthy of attention.
Report Post »Rational Man
Posted on October 12, 2011 at 8:46pmThis is my internet rant from another forum. Too lazy to type it again…..
There is no such thing as anonymity on the internet anymore. If there ever was! Yahoo admits that if you choose their new email, they will read your emails to find out things about you, “for advertising purposes”, to target you with the ads you would be most interested in.
Oh ya! Internet Explorer 9 does the same thing and is very intrusive. I HATE IT!!
One of my emails got hacked and whoever did it used it to send spam to everyone on my contact list. And the spam emails contain a link. It is said that if you click on the links you risk being hacked or getting a virus. High school kids know how to hack emails these days.
I have heard too much bad stuff about Google and their privacy issues and connections with the government, ( net neutrality), to ever have anything to do with them.
I am also plagued with tracking cookies wherever I go. They know what I’m interested in, (like guns), and where I live. Sometimes the ads have my name in it. The Norton 360 security I have is constantly blocking “attacks” and “intrusions” into my laptop.
Forget social networks. I have a facebook account just to check in on my daughter once in a while. But I don’t have any information on it at all,…nothing! And I don’t post anything on it either and have no friends…..(continued)
Report Post »Rational Man
Posted on October 12, 2011 at 8:48pmEver hear of girls getting raped because some freak got enough info about her from a social network to find her and rape her? Same thing happens to people who get their house robbed. Never tell anyone your going on vacation on a social networking site.
Then there are the phishing, or phoney web pages that look exactly like your banks web page and tell you your account is in trouble to make you nervous and ask for your user ID and password to log onto your account. Then clean you out and then some.
I feel like I’m peeing in public and dodging bullets every time I get on this thing!
Report Post »bikermama
Posted on October 12, 2011 at 11:10pmDo like I do, go to so many different stes, you confuse the hell out of them. I go to sites and research stuff just for fun. If it weren’t for my facebook post they might think me a liberal, haha. Good luck targeting me on advertising. I have only been back on line for less than a year, may decided to go off the grid again. Use to just have pre paid cell, no house phone, no cable. SO, to go back there would be no big deal. I only wanted to get back on line to fight the progressives and try to help spread the truth of our history and what these losers have been doing to us. But, if it all went away tomarrow, that would be alright too, I have thousands of books to occupy my free time.
Report Post »Rational Man
Posted on October 13, 2011 at 12:03amIf my life never got anymore high tech than a tackaberry buckle on my saddle, it would be fine with me.
Report Post »Unfortunately……………………..
Lela
Posted on October 12, 2011 at 7:58pmTnx – TXPILOT – your entry made me laugh. – True but funny anyway :)
Report Post »UpInTheMountains
Posted on October 12, 2011 at 6:55pmOh the irony…here I just read this article. I then proceeded to install some software to block bugs and cookies. I come back to this website and there’s 14 bugs/cookies that are sending out my clicks and whatever else while browsing. LOL. The Blaze website used to always “hang” and slow down my browsing experience but now it’s fast! Woohoo!!!
Report Post »TXPilot
Posted on October 12, 2011 at 7:03pmOh well, look at the bright side…..With what Obama and his buddies are doing, we will all soon be jobless, totally broke and living in cardboard boxes, so the people that want to steal our identities will have much less incentive to do so…..
Report Post »V-MAN MACE
Posted on October 12, 2011 at 7:12pmAnd now you understand the definition of Anonymous and why it is so important.
Now you know the utility of the mask and why it is worn.
Etc.
Report Post »Rational Man
Posted on October 12, 2011 at 8:43pmI complained to The Blaze once because of all the tracking cookies I get loaded with here. I get so loaded down that I have to clear them sometimes to speed it up enough to work.
Report Post »I see ads with the name of the town I live in all the time, and once in awhile, my name.
garbagecanlogic
Posted on October 12, 2011 at 6:06pmDats why I don’t has no name.
Signed: Barry Soetero
The U.S. Out Of The U.N.
Report Post »The U.N. Out Of The U.S.
BMroxy
Posted on October 12, 2011 at 6:13pmhaha..touche!
Report Post »BMroxy
Posted on October 12, 2011 at 6:06pmI feel so much safer now….comfy and cozy. I have warm fuzzies all over knowing this! Group hug anyone?
Report Post »HD Veteran
Posted on October 12, 2011 at 5:32pmConsider using “Private Browsing” in the latest versions of Firefox.
Tools>Start Private Browsing
Check Firefox addons for many security enhancing tools, most are free.
https://addons.mozilla.org/en-US/firefox/extensions/privacy-security/
Get Ccleaner, and check the ‘cookies’ box in the options for IE and FireFox. Run this software after surfing and any banking or purchases on line. Free
Report Post »http://download.cnet.com/ccleaner/
Eliasim
Posted on October 12, 2011 at 5:45pmThere will always be rats in the internet, and it will get worse and worse, and it won’t get better. I saw this coming a mile away.
Report Post »United States of America
Posted on October 12, 2011 at 5:16pmNever have, never will belong to or join a social network site. Or play golf.
Report Post »Eliasim
Posted on October 12, 2011 at 5:47pmInevitably, people will give up the internet for privacy, and life will become localized again.
Report Post »Eliasim
Posted on October 12, 2011 at 5:51pmKnow how I know this thing? Because the human race inevitably always collapses and fades away to a smaller sea of people, and therefore anything created by men has an inevitability of also completely collapses.
Report Post »Eliasim
Posted on October 12, 2011 at 5:53pmThose bound by the laws of nature can only at some point collapse, and since they are created to collapse at some point then they can only build an imperfect thing that will also collapse.
Report Post »US-First
Posted on October 12, 2011 at 7:33pmDon’t hold your breath. More likely we will give more to get more. You can’t turn back the clock of progress. You simply learn to weed the garden.
Report Post »lodgerat
Posted on October 12, 2011 at 4:52pmA few weeks ago a friend and I were discussing on e-mail that he was taking a trip to some obscure little town in Africa. The next day an advertisement showed up trying to sell airline tickets to that location. After our conversation I looked up that location because I had never heard of it. Well there you go. I worked for USAir for 30 years and am pretty versed in geography. So you can imagine how obscure the location was.
Report Post »Adam
Posted on October 12, 2011 at 5:07pmIt‘s almost completely all Google that’s doing that kind of tracking for advertising. If you check out the background scripts that run on almost every site on the internet, you’ll find that a script runs from google-analytics.com and from googleadservices.com. Those are the scripts that are doing a lot of the tracking discussed here, along with some others.
Report Post »Lemon Party Patriot
Posted on October 12, 2011 at 5:15pmTHIS JUST IN!!!!!
Everyone is out to get you!
You guys live your lives in fear of a man-made big brother government when you live your lives by the guidelines of a man-made big brother Jesus. Irony.
Report Post »The10thAmendment
Posted on October 12, 2011 at 5:30pm@ Lemon Party Patriot
Posted on October 12, 2011 at 5:15pm
THIS JUST IN!!!!!
Everyone is out to get you!
You guys live your lives in fear of a man-made big brother government when you live your lives by the guidelines of a man-made big brother Jesus. Irony.
——————————————————————————————————————————————-
Um, not to be a thorn, but what does this have to do with government or religion? You tell what your fear is through that post, and that’s thinking the government is the tracker.
Hilarious actually. 99.99% tracking is by businesses, and/or criminals with a design on identity theft.
Odd that a person would make that bridge to government. The average person never pops up on a government controlled mainframe. Hell, not even the average criminal pops up on government controlled mainframe.
Can they? Sure, but why? You are as insignificant as the next guy. When this message is concluded, it will automatically appear somewhere in the bowels of the Big 3 credit reporting agencies. If there is a trigger (like how I self incriminated myself with the word trigger) it will automatically go to the FBI or CIA mainframes for remote analytic analysis by a non human forensic auditor (computer program), and maybe eventually if other triggers go active in a sentence or letter end up on some flunkies desk who is probably drinking espresso to stay awake.
Your post is dumb
Report Post »TumbleBumble
Posted on October 12, 2011 at 5:39pmA couple of months ago, my husband had asked me to look up a charity that he had considered donating to and let him know of their rating on CharityWatch.org. Later that week, we received a request in the mail from that charity for a donation. I was creeped out. That move alone stopped us in our tracks.
Report Post »The10thAmendment
Posted on October 12, 2011 at 5:48pm@ TumbleBumble
Posted on October 12, 2011 at 5:39pm
A couple of months ago, my husband had asked me to look up a charity that he had considered donating to and let him know of their rating on CharityWatch.org. Later that week, we received a request in the mail from that charity for a donation. I was creeped out. That move alone stopped us in our tracks.
———————————————————————————————————————————————
The vast majority of keylogger programs have “no” malicious intent. Basically all they’re doing is vetting potential customers. Most websites you visit can‘t go active without 3rd party cookie’s active. You can pretty much create your own white board access to trusted websites, and restrict anyone else from accessing sites not on your list.
Most companies are not malicious.
Report Post »Lemon Party Patriot
Posted on October 12, 2011 at 6:20pmHey, if google or facebook want to track me after l log out then let them. Maybe knowing what I look at while I jerk off will help them sell some ads. It’s win/win.
Report Post »The10thAmendment
Posted on October 12, 2011 at 9:35pm@ Lemon Party Patriot
Posted on October 12, 2011 at 6:20pm
Hey, if google or facebook want to track me after l log out then let them. Maybe knowing what I look at while I jerk off will help them sell some ads. It’s win/win.
Report Post »———————————————————————————————————————————————-
You could really be perverse and set up a web cam show for those dirty little devils who want to peep the show.
watashbuddyfriend
Posted on October 12, 2011 at 4:42pmI have noticed that many of my google and bing searches follow me on other sites! I tried Greasemonkey with Mozilla thinking that would stop some of the following, but seems I have a significant slowdown with my puter speed.
Report Post »Anonymous T. Irrelevant
Posted on October 12, 2011 at 4:41pmWhich 22 companies are connected to the Weather Underground? When I find that out, they will no longer get my business. I may provide a username and password, but the rest of my information is garbage, unless I have a little trust in the site.
Report Post »gmoneytx
Posted on October 12, 2011 at 4:32pmI am so sick of these social networking sites, I just deactivated my facebook page!
Report Post »Grandmadar
Posted on October 12, 2011 at 5:30pmGmoneyTx: I have been interested in closing out my FB as I really don’t use it much at all. But…I can’t seem to find anywhere to deactivate my acct. Everytime someone tells me where it is I never find it. Help much appreciated!
Report Post »Rational Man
Posted on October 13, 2011 at 1:19amFB keeps your info after you deactivate your account. Just go to reactivate your account. They still have all the info there that you had before. You don’t have to re-enter anything.
Report Post »Amy
Posted on October 12, 2011 at 4:20pmI‘ve kept a couple ’junk’ email addresses for years – not always easy to keep up with, but my real name is not Barbie. ;)
Report Post »lukerw
Posted on October 12, 2011 at 4:27pmDo you remember when we met… :)
Report Post »stinkybisquit
Posted on October 12, 2011 at 4:31pmDitto.
Report Post »Rational Man
Posted on October 13, 2011 at 1:25amThat is a must do, since we have to give our email address to almost everyone to do anything online.
Report Post »I have started, in the last few days, to un-subscribe all of the junk political emails I get that I never subscribed to in the first place. I delete between 50 and 100 junkmails a day. I’ll clean it up and then let it fill up again.
headbtweenlegs
Posted on October 12, 2011 at 4:18pmHow do we fix it?
Report Post »Exrepublisheep
Posted on October 12, 2011 at 4:20pmAnd does the Blaze do it too?
Report Post »commonsenseguy
Posted on October 12, 2011 at 4:24pm@exrepublicsheep, great question, i wonder when will or will not get that answer.
Report Post »lukerw
Posted on October 12, 2011 at 4:26pmEver go to a Public Restroom? It’s about the same… limit vrs risk!
Report Post »Red Meat
Posted on October 12, 2011 at 4:33pmAnd does the Blaze do it too?
Well yes, yes they do.
Report Post »Everyone should download Ghostery and see who’s tracking you and BLOCK THEM. Right now, I’m blocking 14 sites that BLAZE enables to track you.
The10thAmendment
Posted on October 12, 2011 at 4:54pmYes THE BLAZE keylogs.
If it’s a trusted site, it’s no big whoop. Most times people who register with a website give permission for them to share information. Read the fineprint.
Take encinom. He’s being tracked constantly, and he agreed to it by default!
Report Post »Chr1st14n
Posted on October 12, 2011 at 4:12pmso THIS is why i get so many spam emails
Report Post »ThankBabyJesus
Posted on October 12, 2011 at 8:39pmTax the internet! Just kidding, please don’t.
Report Post »JRook
Posted on October 12, 2011 at 4:12pmIts not the web sites, but the third party cookies they deploy that do the tracking and create the profiles.
Report Post »Firebrand
Posted on October 12, 2011 at 4:28pmI was going to say this as well as bring up the advertising trackers. One problem you can run into is that some sites require you to have cookies turned on in order to access the site. Turn off cookies and make exemptions for specific sites. One problem you can run into is that some sites require you to have cookies turned on in order to access the site.
Report Post »Firebrand
Posted on October 12, 2011 at 4:29pmoops, I “copied and pasted” instead of “cut and pasted”… Call it a “Froodian” slip.
Report Post »The10thAmendment
Posted on October 12, 2011 at 4:35pmPretty much that’s how it works. It’s an open port access once your IP address is logged and anyone with general computer savvy can track a person. Once tracking is established they can then infiltrate your computer with simple hacker programs.
One way to go around the general hacker is to get a program that jumps IP address. That won’t work with sophisticated crackers because no matter how many times you jump a trace fingerprint is left behind. A decent computer architect can write programs to route point of origin to every jump an IP solution makes. A good one can do it real time, and the best ones can almost predict based on frequency and types of sites where you will go to next. No such thing as a completely secure PC. Crackers have also been hard at work on MAC’s, so it‘s probably just a matter of a year or so before it’s just as infested with the pandemic scenario that PC’s are. The Military side is a different application altogether and has to be done by internal sabotage.
I can track, you can track any computer with simple tools for keylogging, and dormant monitoring. “Hacking” an individual computer is simple through keylogging. Most elementary school level computer language kids can apply that remote access. Whether they can crack your encryption depends on their skill level and program used. Hackers use programs. Crackers write code solutions to bring down firewalls.
Report Post »J4Y
Posted on October 12, 2011 at 5:19pmThe10thAmendment
A skillful hacker will write his own code when it comes to the tools he/she uses and nine times out of 10 it always starts with gettin a victim to click on a link within a site or email that will install a trojan on to a puter. The trojan will find or open a port on the victims puter which then enables the hacker to send a set of commands to the trojan. For example, goto url and download virus, keylogger and also while ya at it mr trojan, please send me the contents of the victims hdd, thank you!
BTW Crackers are the ppl that crack trial applications to make them free.
Report Post »The10thAmendment
Posted on October 12, 2011 at 5:39pm@ J4Y
Posted on October 12, 2011 at 5:19pm
The10thAmendment
A skillful hacker will write his own code when it comes to the tools he/she uses and nine times out of 10 it always starts with gettin a victim to click on a link within a site or email that will install a trojan on to a puter. The trojan will find or open a port on the victims puter which then enables the hacker to send a set of commands to the trojan. For example, goto url and download virus, keylogger and also while ya at it mr trojan, please send me the contents of the victims hdd, thank you!
BTW Crackers are the ppl that crack trial applications to make them free.
——————————————————————————————————————————————
HUH?
Hackers steal silly little programs like Adobe junk and sell them to computer illiterates, or are employed by criminals to hack into a persons personal applications to steal programs, or identity.
I have about 20 hackers programs and a couple of keylogger programs. What to buy them?
I’m a ******* by trade as a Computer Engineer and Architect. If I want to play fun in the sun games, I’ll sell you a program that I hacked that will have remote commands that will crack any encryption you can dream up, for any purpose I choose.
There are precious few HACKERS who can write their own active deployment script as it brings down firewalls and basically takes command of systems.
Report Post »The10thAmendment
Posted on October 12, 2011 at 6:07pmHey J4Y. How many porn sites can one man visit?
Report Post »J4Y
Posted on October 12, 2011 at 6:25pmThe10thAmendment
I guess one MAN can look at as many as he likes if its legal porn. And you truly are a complete IDIOT LOL … prove yaself big boy and post up my ip you tw@
Report Post »J4Y
Posted on October 12, 2011 at 6:56pmThe10thAmendment or JRook, whichever user name you like to go by. After GBTV is finished i’m popping over to http://www.cybercrime.gov/reporting.htm I was actually going to wait a lil longer for you to incriminate yaself some more about your illegal online activities, but i have to go feed the chickens and then put my kids to bed.
One last thing you mug, always be careful as to what you post online LOL….
Report Post »The10thAmendment
Posted on October 12, 2011 at 7:38pm@ J4Y
Posted on October 12, 2011 at 6:56pm
The10thAmendment or JRook, whichever user name you like to go by. After GBTV is finished i’m popping over to http://www.cybercrime.gov/reporting.htm I was actually going to wait a lil longer for you to incriminate yaself some more about your illegal online activities, but i have to go feed the chickens and then put my kids to bed.
One last thing you mug, always be careful as to what you post online LOL….
Report Post »——————————————————————————————————————————————
Have at it son of a hacker wannabe. I‘ve got much better sites if you’d like to report me. Let me know if I can be of assistance! I already know that the stuff on your computer is worse than the stuff on mine. You should get some things registered BTW.
The10thAmendment
Posted on October 12, 2011 at 7:44pm@ One last thing you mug, always be careful as to what you post online LOL….
——————————————————————————————————————————————
Why?
To be sure. I’m not your mate. You should see some of the stuff that you just posted online. tic toc, tic toc.
Report Post »