Author:
Taxonomy upgrade extras:
I was informed that someone has been spoofing my IP address(s) here to badmouth other members of BC.
THIS IS NOT ACCEPTABLE ! and I do not apologize for shouting,
I may joke, I may kid others here -- ones I know well and who know me -- but I never have and hope I never will attack any one for being themselves or for what they post. I may not like things others might post but it is their post not mine, their opinion/taste not mine and it is not fair for me to criticize others except for when they attack me or someone else unfairly.
Whoever did this thinks they are clever or it is a fun joke to bash others here using MY NAME. This is theft pure and simple and is beyond the pale in net etiquette.
I freely and publically give my permission to Erin, Bob or any of their able assistants to go after this unethical person or persons who are using my reputation, good name, call it what you will to attack others.
And to those who were attacked, rest assured *I* do not agree with the faceless and shameless attacker(s) and I am sorry if you were hurt thinking *I* was behind this. My parents taught me better than *this* one's parents did IMHO.
To whoever did this nonsense, GROW UP.
'Nuf said.
John in Wauwatosa
Comments
Hey John
There's 5 of you logged in right now, maybe it's one a them. I mean how well do you really know yourself huh??
Umm, if that is happening it borders on criminal to my mind and deserves a good stomping. I would not be a happy bunny either
Kristina
We may or may not have a split personalities ...
but as far as we know we all like ourselves.
Did that make sense?
I think it's because I defaulted to not accepting or retaining most cookies in IE.
Thanks, Kristina. I appreciate the sentiments. Poor Erin and her *elves* have enough to deal with maintaining this site without malicious troublemakers who are too afraid to post under their own name that they must *steal* someone else's.
John in Wauwatosa
John in Wauwatosa
There's been a few times
in the last week I've seen my name listed twice or more but also Erin's and a few others. Are we being hacked?
Bailey Summers
it happens all the time
having double listings happens all the time. i think it's glitch in the site code.
one way to make sure nobody else is using an account would be a history of one's activity. in any list of links of requested pages, something not requested by the current user's browser would stand out because it ain't in the browser history.
I have persistent logins ...
... on multiple devices, and that could account for some of the multiple listings I see for me all the time. But if someone was spoofing John's IP, they wouldn't necessarily be logging IN as John -- if they did, all of the nastygrams would be attributed to him. Instead, it sounds like they're just hiding behind his IP address to post as anonymously as they can, given the nature of the Net.
Since I don't know how it's done, I'm not sure how to stop it. But I am sorry, John, that someone is besmirching your good name like this. I can send you a can of Smirch Remover if you'd like? *smile*
*hugs*
Randa
nobody can "spoof someone
nobody can "spoof someone else's IP" as they are assigned by the network. unless someone got a static IP it can't be selected. and in the case of a static IP nobody else can get it assigned.
what this comes down to is someone having the same ISP and is located in the same region. depending on the ISP in question "region" might be same city, or state, or country.
i'd have to have a look at the IP logs to be sure, but that would be my guess anyways.
Ignorance....
Is curable,
Yes, you _can_ spoof IP addresses, especially if you're doing 'write only' sessions.
This is a favoured tactic of DDoS attacks, for example.
type in "ip address spoofing" into any search engine, and you'll find both the Wikipedia article, and a Symantec article - in the first four entries.
BW
I'll get a life when it's proven and substantiated to be better than what I'm currently experiencing.
as the article also states,
as the article also states, it cannot be used to gain TCP access to a site, as would be necessary to post comments here.
well, unless the attacker can intercept the data stream between the client and server.
we're not talking about a flooding DoS attack here.
Wrong.
It is very easy for an attacker to log in as John, from his computer, and post any messages (s)he desires to any website without John's knowledge.
How? By installing a Trojan on his computer. All it takes is a little program which relays keystrokes or data packets somewhere else, and they have all his logins and passwords. The Trojan can then be used as a relay between John's computer and the attacker for him/her to post anything anywhere and make it look as if John did it himself.
Note. I know about these things in the same way I know how a nuclear power plant works. I understand the principles, I don't have the engineering expertise to make it happen!
Penny
i could list a few other
i could list a few other possible ways to achieve it. they all have one thing in common though: the system owner has to allow either remote or physical access to the machine. that's why they are called trojans in the first place. like the trojan horse, the owner of the system has to be tricked into bringing them in.
of course, if you believe the sales talk of the anti-virus companies, any virus, trojan, worm and what else is out there, can get onto your system at any time unless you use their product. anti-virus-programs and to a lesser degree firewalls, have the main purpose of easing the user's mind. and they offer a nice excuse in case a system does get infected: "it ain't my fault, the anti-virus failed." but the truth is: if a virus or whatever even gets to the point that the anti-virus-program has to do something about it, the user has already fucked up.
I support you 100%!
I can't imagine anyone using my name or address, but if you see stuff by me that seems to be done right, It probably ain't me...
Wren