OT: How to be a net-masochist

R

Radium

WARNING: THE FOLLOWING IS ONLY FOR SELF-DESTRUCTIVE NET-IDIOTS. UNLESS
YOU ENJOY BEING TORTURED VIA THE INTERNET, DO NOT -- I REPEAT -- DO
NOT *EVER* DO THE STUFF INSTRUCTED BELOW, CUZ THERE IS A HIGH HIGH
CHANCE THAT IT WILL LEAD TO YOUR UNTIMELY END!!!!!!!!!!!!!!!!!

Okay, net-masochists, do the following AT YOUR OWN RISK!:

1. Use Internet Explorer

2. Slide the privacy meter down to "Accept all cookies"

3. Set all of the following to "enable":
A. Run components not signed with Authenticode
B. Download unsigned ActiveX controls
C. Initialize and script ActiveX controls not marked as safe
D. Run ActiveX controls and plug-ins
E. Access data sources acroos domains
F. Allow META REFRESH
G. Display mixed content
H. Don't prompt for client certificate selection when no certificates
or only one certificate exists
I. Drag and drop or copy and paste files
J. Installation of desktop items
K. Launching programs and files in an IFRAME
L. Navigate sub-frames across different domains
M. Submit nonencrypted form data
N. Userdata persistance
O. Active scripting
P. Allow paste operations via script
Q. Scripting of Java applets

4. Set the "Logon" of "User Authentication" to "Anonymous Logon"

5. Set "software channel permissions" to "low safety"

6. Set "Java permission" to "custom", then click the "Java Custom
Settings" button, and then click on the "Edit Permissions" tab. Now,
for the "unsigned content", set all of the following to "enable" :
A. Run unsigned content
B. Under the "Additional Unsigned Permisssion", set all the following
to enable:
- "Access to all files"
- "Access to all Network Addresses"
- "Execute"
- "Dialogs"
- "System Information"
- "Printing"
- "Protected Scratch Space"
- "User Selected File Access"

7. Don't use any firewall, or any other internet-security, anti-spy or
anti-virus software. If already installed, set all settings to the
minimum or uninstall prior to doing the above 6.

8. Spam chat rooms and newsgroups with provocative messages using
unsecure chat and usenet applications. Use Yahelite, Messenger, IRC,
ICQ, or any other chat client and disable any & all privacy/security
measures. Post to usenet via IE using Google Groups.

9. Install webcam and microphones, keep both of them on. Set your
microphone to the highest sensitivity so that your personal wispers
will be heard. Install webcams on your computer and connect the
cameras and microphones to every corner of every room of your house.
At night, increase the sensitivity of the cameras so that they can
pick up visuals that the human eye can't see in the dark. Be sure that
these cameras give high-quality color, images, and motion signals. Be
sure that your microphone is that of superb quality.
 
R

Radium

WARNING: THE FOLLOWING IS ONLY FOR SELF-DESTRUCTIVE NET-IDIOTS. UNLESS
YOU ENJOY BEING TORTURED VIA THE INTERNET, DO NOT -- I REPEAT -- DO
NOT *EVER* DO THE STUFF INSTRUCTED BELOW, CUZ THERE IS A HIGH HIGH
CHANCE THAT IT WILL LEAD TO YOUR UNTIMELY END!!!!!!!!!!!!!!!!!

Okay, net-masochists, do the following AT YOUR OWN RISK!:

1. Use Internet Explorer

2. Slide the privacy meter down to "Accept all cookies"

3. Set all of the following to "enable":
A. Run components not signed with Authenticode
B. Download unsigned ActiveX controls
C. Initialize and script ActiveX controls not marked as safe
D. Run ActiveX controls and plug-ins
E. Access data sources acroos domains
F. Allow META REFRESH
G. Display mixed content
H. Don't prompt for client certificate selection when no certificates
or only one certificate exists
I. Drag and drop or copy and paste files
J. Installation of desktop items
K. Launching programs and files in an IFRAME
L. Navigate sub-frames across different domains
M. Submit nonencrypted form data
N. Userdata persistance
O. Active scripting
P. Allow paste operations via script
Q. Scripting of Java applets

4. Set the "Logon" of "User Authentication" to "Anonymous Logon"

5. Set "software channel permissions" to "low safety"

6. Set "Java permission" to "custom", then click the "Java Custom
Settings" button, and then click on the "Edit Permissions" tab. Now,
for the "unsigned content", set all of the following to "enable" :
A. Run unsigned content
B. Under the "Additional Unsigned Permisssion", set all the following
to enable:
- "Access to all files"
- "Access to all Network Addresses"
- "Execute"
- "Dialogs"
- "System Information"
- "Printing"
- "Protected Scratch Space"
- "User Selected File Access"

7. Don't use any firewall, or any other internet-security, anti-spy or
anti-virus software. If already installed, set all settings to the
minimum or uninstall prior to doing the above 6.

8. Spam chat rooms and newsgroups with provocative messages using
unsecure chat and usenet applications. Use Yahelite, Messenger, IRC,
ICQ, or any other chat client and disable any & all privacy/security
measures. Post to usenet via IE using Google Groups.

9. Install webcam and microphones, keep both of them on. Set your
microphone to the highest sensitivity so that your personal wispers
will be heard. Install webcams on your computer and connect the
cameras and microphones to every corner of every room of your house.
At night, increase the sensitivity of the cameras so that they can
pick up visuals that the human eye can't see in the dark. Be sure that
these cameras give high-quality color, images, and motion signals. Be
sure that your microphone is that of superb quality.


10. Do all of your internet activites at home.

11. Use a windows OS
 
G

Guest

4Q said:
Wouldn't it just be easier to run
Dustin Cook's BugHunter Trojan?
That's got to be a much easier way to
****up any Internet privacy a user might
hope for.
<snip>

don't forget to accept any filetransfer offered through any IM program,
irc and so on ! Especially those which give you access to free porn !!!
;)
 
R

Radium

Wouldn't it just be easier to run
Dustin Cook's BugHunter Trojan?
That's got to be a much easier way to
****up any Internet privacy a user might
hope for.

4Qhttp://fourq.host.sk/chars/Dustin_Cook/


What exactly does this Trojan horse do?

What is the mechanism? Does it involve transer using scripts?
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top