Gateway Gateway
Gateway Gateway ...
“Gateway, the
best way for hackers
to fuck suckers”
4 White hats, Black hats, Elite skills... Special4u
Some useful basic and
interesting stuff about
proxies and gateways from 2004 on, and by 2009.
The URL internet address
of this GATEWAY
web page is:
https://www.angelfire.com/planet/jo/gateway.html
For anonymity, check also
pages such as
Computers,
Antivirus,
Audio, Music, Site Music...
and the About page for the “Philosophy
of this site”...
http://www.usatoday.com/tech/news/computersecurity/2004-09-08-zombieuser_x.htm
Posted 9/8/2004 12:54 AM - Updated
9/8/2004 11:04 AM
Are hackers using your PC to spew spam and steal?
By Byron
Acohido and Jon Swartz,
Betty Carty
figured she ought to be in the digital fast lane.
Last
Christmas, Carty purchased a Dell desktop computer, then signed up for a
Comcast high-speed Internet connection. But her new Windows XP machine crashed
frequently and would only plod across the Internet.
Dell
was no help. The PC maker insisted — correctly — that Carty's hardware worked
fine.
But
in June, Comcast curtailed Carty's outbound e-mail privileges after pinpointing
her PC as a major source of e-mail spam. An intruder had turned Carty's PC into
a "zombie," spreading as many as 70,000 pieces of e-mail spam a day.
The
soft-spoken Carty,
Since
early 2003, wave after wave of infectious programs have begun to saturate the
Internet, causing the number of PCs hijacked by hackers and turned into
so-called zombies to soar into the millions — mostly in homes like Carty's, at
small businesses and on college campuses. And, much like zombies of voodoo
legend, they mindlessly do the bidding of their masters and help commit crimes
online.
Personal
computers have never been more powerful — and dangerous. Just as millions of
Americans are buying new PCs and signing up for ultrafast Internet connections,
cybercrooks are stepping up schemes to take control of their machines — and
most consumers don't have a clue.
"We
thought things were bad in 2003, but we've seen a sharp uptick in 2004. I'm
worried things will get much worse," says Ed Skoudis, co-founder of
consulting firm Intelguardians
Carty's
PC could have been taken over in myriad ways. She could have been fooled into
opening a virus-infected e-mail. She might have innocently surfed to a Web page
bristling with contagious code. Or she may have done nothing at all. One of
dozens of network worms, voracious, self-replicating programs that pinball
around the Web searching for security holes in Windows PCs, may have found one
on her new PC.
Profitable attacks
Cyberintrusions
traditionally have been the domain of socially inept males launching electronic
attacks for fun and bragging rights, often creating a huge, if transient,
nuisance for companies and consumers. But things are changing: More PCs are
being taken over purely for profit.
Over
the past eight months,
Most
consumers are slow to grasp that an intruder has usurped control of their PC.
"We have a large population that is easily tricked," says Dave
Dittrich, senior security engineer at the
One
measure of the swelling tide of zombie PCs: E-mail spam continues to skyrocket,
with zombies driving the increase. In July, spam made up 94.5% of e-mail
traffic, nearly double from a year before, says e-mail management firm
MessageLabs. Postini, another big e-mail handler, estimates nearly 40% of spam
now comes from zombie networks.
Using
zombies to broadcast spam for Viagra or quickie loans has emerged as a huge
business. Yet spreading ordinary spam is actually one of a compromised
computer's more benign tasks. Bigger spoils lie in using zombies in elaborate
phishing scams, in which e-mail directs consumers to bogus Web pages to trick
them into surrendering personal information.
And
zombie networks are perfectly suited to flood targeted Web sites with data
requests, in so-called distributed denial-of-service, or DDoS, attacks.
Cybercrooks use the threat of a DDoS attack to extort protection money from
businesses keen to keep their Web sites running.
Few laws, few arrests
Until
recently, little has been done to stop such attacks. The Justice Department's
Operation Web Snare netted 160 arrests in August that could lead to more busts,
offering encouraging news to cybersecurity experts who have criticized law
enforcement for not doing enough. Still, detractors point out there are few
federal cybersecurity laws with stiff penalties.
Federal,
state and local law enforcement officials face daunting jurisdictional hurdles
trying to corner, much less extradite, suspects. Chasing bad guys equipped to
commit virtual crimes in several countries simultaneously has proved
problematic, as has the sheer volume of incidents.
"It's
easier trying to catch Osama bin Laden," says Steve Jillings, CEO of
e-mail security firm FrontBridge Technologies.
Zombie
victim Carty took matters into her own hands: She did research on how to clean
up and protect her PC and diligently updates programs that scan her computer
for various types of malicious code. Her PC now runs clean. "I had no clue
at Christmas that I would become a security expert," she says.
Consumers
remain seduced by the Internet's convenience. E-commerce is bigger than ever,
and most casual computer users overlook safety practices. The vast majority
don't use firewall software to block intruders, patch vulnerabilities or keep
anti-virus subscriptions current.
"Consumers
seem almost bizarrely unconcerned by security in general," says James
Governor, founder of research firm RedMonk. "People will practically give
out their Social Security number as easily as their phone number."
Low and slow thievery
Heather
Hall can trace the start of her online banking nightmare to the day she received
what she thought was a legitimate e-mail request from Bank of America asking
her to click a link to a bank Web page. The 27-year-old health services worker
typed in her login, password and account number.
Not
long afterward, Hall noticed an unauthorized withdrawal on her banking
statement for $6.50. The withdrawals increased in frequency and amounts, to as
much as $108. Hall was the victim of a "low and slow" phishing scam,
in which cybercriminals purposely steal small amounts of cash — sometimes as
little as 20 cents at a time — to avoid detection.
Though
data are scarce, experts estimate millions of dollars are being skimmed from
thousands of online banking accounts. About 23.6 million people had online
accounts at the nation's top 10 banks in the second quarter of 2004, up 28%
from the year before, says ComScore Networks.
Sneaky
cybercrooks are finding it profitable to "be patient and nick an account
for a long time," says Dan Larkin, unit chief of the FBI's
Bank
of
Bank
of
First
seen more than a year ago, phishing scams begin with e-mail messages broadcast
to potential victims. The e-mail directs them, often under the guise of doing a
security check, to a bogus Web page with the identical look and feel of an
authentic page.
A
network of zombie PCs e-mails the original request to tens of thousands of
potential dupes. A separate zombie, usually a more powerful PC, often sitting
in a remote country, perhaps in an obscure nook at a university, serves up the
counterfeit Web page. Another zombie, in yet another country, perhaps in the
basement of a small shop, stores the stolen account details and conducts the
theft.
"Computer
networks make this easy to do since they form a virtual world in which
footprints and fingerprints are easily erased at a distance," says the
Experts
say clues point to loosely organized crime syndicates, probably in
Typically,
filched financial information, such as credit card numbers, is sold on Web
sites. Buyers often use card numbers to make long-distance phone calls, sign up
for pornographic sites and buy computers over the Internet.
Unique
phishing attacks have surged more than 10 times since January, to
Few,
however, are willing to discuss such matters in detail out of fear of scaring
customers and undercutting trust in online banking, in which they've invested
hundreds of millions of dollars, says John Pironti, a
security consultant at Unisys.
Now,
free, do-it-yourself phishing kits are surfacing on the Internet. Would-be
cybercrooks can choose from a dozen kits containing bogus Web sites,
programming code and spam tailored toward customers of Citibank, eBay and
PayPal, says analyst Chris Kraft of security firm Sophos.
The
same zombie network used in phishing scams can also bombard a Web site with
data requests. When that happens, no one else can get to the targeted Web site,
effectively shutting it down.
Such
an assault is known as a distributed denial-of-service, or DDoS, attack.
Cybercrooks threaten DDoS attacks just as racketeers wave truncheons. Last
January, a series of such attacks began against major Internet gambling
operators in the
Some
operators paid — and were immediately attacked again, according to a report
from the Association of Remote Gambling Operators. The blackmail attempts
continue. LadbrokesCasino.com, one of the
New methods of attack
Yet
last fall, Alex's laptop slowed until she couldn't use e-mail or the Internet.
It took extensive troubleshooting to determine that it had been turned into a
spam-spreading zombie, and it took half a day to clean it up. "I don't
know what she got or how she got it," says Martin. "The bottom line
is she got it."
Their
experience underscores the notion that there are many ways for malicious code
to slip past firewalls and anti-virus programs. E-mail viruses, for instance,
rely on tricking the victim into opening an infectious attachment. Another
widely used tool is harder to fight: direct planting of contagions, known as
"come-and-get-it" viruses, on popular Web sites.
Such
contagions commonly lurk on peer-to-peer sites, where music and movies are
exchanged. They trick the computer user into giving up personal information,
and they can activate other invasive programs unseen by the PC owner.
Web
contagions are turning up on high-traffic Web pages across the Internet. Most
do the basics: plant a back-door Trojan horse and turn over full control to an
intruder who might be sitting half a globe away.
Some
have begun implanting spyware called keystroke loggers, which are designed to
notice whenever the PC user types anything that looks like account information.
It grabs the information and sends it to a zombie computer for storage and
risk-free access by the crooks.
The
scariest type of attack is one most consumers aren't aware of. Scores of
sophisticated programs, called worms and bots, continually scour the Internet
for Windows PCs with security holes. There are hundreds of Windows
vulnerabilities, and new ones turn up regularly. Microsoft issues software
patches, or fixes, each month for the most troublesome. But most home users,
and many businesses, don't keep up to date on patches.
Consumer outrage needed
Not
long ago, securing the Internet meant cleaning up after so-called script
kiddies, youths who use pre-written malicious code, available free on the Web,
to pull digital pranks. But security has metastasized into an almost fatalistic
endeavor. "Hackers can do almost anything with a compromised PC, and there
isn't much we can do about it," says Keith Lourdeau, deputy assistant
director of the FBI's Cyber Division.
That
will change only as tech suppliers who profit from the Internet simplify
networks and collaborate on implementing universal security standards that may
run counter to their current business strategies. Many experts say such a shift
is at least five years away. The one thing that could make tech suppliers move
more quickly is consumer outrage.
"Consumers
should demand what they do of other utilities," says Kip McClanahan, CEO
of security firm Tipping Point. "When I pay my water bill, I expect my
water to be drinkable out of the tap. Today, when you pay your Internet bill,
the data you get is not consumable."
Tomorrow:
The tech industry begins to fight back
A Gateway is a link between two computer programs
or systems such as Internet Forums. A
gateway acts
as a portal between two
programs allowing them to
share information by
communicating between protocols
on a computer or between
computers. A gateway can
have tremendous negative
effects on personal computers
if not used properly.
Retrieved from
http://en.wikipedia.org/wiki/Gateway_(computer_program)
Computer viruses Computer security
From SearchNetworking.com
A gateway is a network
point that acts as an entrance to
another network. On the
Internet, a node
or stopping point
can be either a gateway node
or a host
(end-point) node.
Both the computers of
Internet users and the computers
that serve pages to users
are host nodes. The computers
that control traffic within a
company's network or at your
local Internet service
provider (ISP)
are gateway nodes.
In the network for an enterprise,
a computer server
acting
as a gateway node is often
also acting as a proxy
server
and a firewall
server. A gateway is often associated with
both a router,
which knows where to direct a given packet
of data that arrives at the
gateway, and a switch,
which
furnishes the actual path in
and out of the gateway for a
given packet. Last updated 19 Dec 2005
Read more about gateway:
RELATED CONTENT
Properties of Windows Management Instrumentation: Managing Windows
networks using scripts, Part 12
Learn
how to display all properties of any Windows
Management
Instrumentation (WMI) class in this tip
on
how to manage Windows networks using scripts.
Windows XP network performance tuning tweaks using TCP RFC 1323
Learn
how to tweak Windows XP registry parameters
for
tuning, improving and optimizing network performance
with
the RFC 1323 protocol, the TCP...
More remote scripting tricks: Managing Windows networks using scripts,
Part 11
Learn
a remote scripting trick and how to use Windows
Management
Instrumentation Command-line (WMIC) to
remotely
query for local administrators in...
RELATED GLOSSARY TERMS
Terms from Whatis.com
the technology online dictionary
four-way server
(SearchNetworking.com)
A
four-way server is a server that incorporates a multi-core
processor
for increased performance... (Continued)
mail
user agent (SearchNetworking)
NETWORKING RELATED LINKS.
Ads by Google
Remote Monitoring For
LAN, WAN, 802.11, Gig, 10-GbE.
Fully-distributed
remote probes. www.networkinstruments.com
Network Infrastructure Manage IT systems and teams
across
multiple platforms with BMC. www.BMC.com
Voip Gateway Discover
the benefits of using software
based
VoIP Solutions www.nokiaforbusiness.com
Gateway Drivers Download Update & Fix All Drivers Instantly.
Free
Download. 100% Guaranteed. DriversDoctor.com
Enterprise Voice Over IP Free eBook: 11 Chapters on VoIP.
For
Mid-to-Large Size Enterprises. ShoreTel.com
More:
http://www.google.com/search?hl=en&q=gateway+support&aq=5&oq=gateway
http://www.google.com/search?hl=en&q=gateway+drivers&aq=4&oq=gateway
http://www.google.com/search?hl=en&q=gateway+anonymous+download&btnG=Search
http://www.google.com/search?hl=en&q=gateway+anonymous+upload&btnG=Search
http://www.w3.org/Gateways/DCLServer.html
http://www.download.com/Anonymity-Gateway/3000-2381_4-10543061.html
http://www.brothersoft.com/downloads/anonymity-gateway.html
http://www.freedownloadscenter.com/Network_and_Internet/Proxy_Server_Tools/Anonymity_Gateway.html
http://www.softforall.com/anonymous%20surfing-freedownload.html
http://www.w3.org/Gateways/OQL.html
http://www.w3.org/Gateways/WAISGate.html
http://www.w3.org/Gateways.html
http://www.privacy-gateway.com
http://www.downloadthat.com/windows/Internet/Anonymity-Gateway.html
http://www.download3k.com/Press-Invisible-Browsing-6.5-automatic-anonymous.html
http://www.nowsms.com/discus/messages/485/6473.html
http://www.anonymize.net/glossary.html
http://search.dmoz.org/cgi-bin/search?search=gateway
http://br.youtube.com/watch?v=01oueXOdhlk
http://br.youtube.com/watch?v=VeX1kOCm9DI&feature=related
http://br.youtube.com/watch?v=69fvScMV2vs&feature=related
http://br.youtube.com/results?search_query=hijack+computers&search_type=&aq=f
http://br.youtube.com/watch?v=b77165ykOHM
http://br.youtube.com/watch?v=VS0D5RJHVUU
http://br.youtube.com/watch?v=564LDkCf-Zg&feature=related
http://en.wikipedia.org/wiki/Web_Server_Gateway_Interface
http://en.wikipedia.org/wiki/ColdFusion
http://www.networktutorials.info/networkhowto/internet_access.html
http://tech.yahoo.com/gd/understanding-routers-gateways-and-connection-sharing/153499
http://www.remote-desktop-control.com/remote-online-gateway/
http://www.privacy-gateway.com/hide_ip.html
http://www.ipaddresslocation.org/ipaddress.shtml
http://downloads.zdnet.com/search.aspx?kw=hide+ip
http://whatismyipaddress.com/forum/viewtopic.php?showtopic=12810
http://whatismyipaddress.com/staticpages/index.php/what-is-a-gateway
http://www.google.se/search?hl=sv&q=anonym+server&btnG=S%C3%B6k&meta=lr%3Dlang_sv
https://www.flashback.info/showthread.php?t=271440
http://www.99.se/n-tverk-s-kerhet/223307-hur-surfar-anonymt.html
http://www.freshpatents.com/Virtual-gateway-dt20070524ptan20070115997.php
http://www.google.com/search?hl=fr&lr=lang_fr&q=gateway+anonyme&start=10&sa=N
En français:
A voir également
(Cliquer sur ou touchez les titres)
Surf internet via vodaphone sans payer
Surfing anonyme proxy américain
Telecharger gratuit proxy internet surfer anonyme
Ubuntu se connecter au reseau
via proxy
Check also at Google:
Anonymity,
Anonymous, Proxy...
Gateway
forums, Gateway communities...
as mentioned on normal speed SPECIAL 4u
and High Speed SPECIAL
4u by 2004.
http://search.yahoo.com/search?p=anonymous+email+providers&ei=UTF-8&fr=fp-tab-web-t&n=20&fl=0&x=wrt
Anonymous
email providers.
Check
keywords as:
anonymity,
anonymous email, surfing, remailer, email forwarder,
mail
gateway, browsing, proxy, gateway, private, privacy,
stealth,
encrypted connections, messages, nym, file transfer,
document
delivery…
But no one is really completely
anonymous, being asked for
nothing.
And “they” always know where you are connecting
from and
what you are reading, watching or writing.
The only
true way is to prepare carefully you web working
sessions
on paper, floppy disk, cd, dvd or usb memory,
access the
web and work shortly from a new place each time,
where
nobody knows you (there are plenty of tricks).
Open a
first email with a pseudonym or alias name,
an address
and references which cannot be checked at once.
Nobody can
know who you are, but the “interested ones”
can know
what you are doing, and can trace your “style”,
“profile”,
“signature”, “finger print”, “touch”, “talent”, “spirit”,
and read
your lips, and mind!
They can
pinpoint your places on a map and possibly ban
some of
your “characteristic signs” from web access if too
specific,
controversial, or “wrong”!
But you
can find new ones, and this game can go on and on!
Successful (never busted) “hacking hackers”, crackers,
of very large organizations, companies, banks, Hollywood lobbies…,
using network, hacker, hack+, virus, worm, trojan, mobile virus,
bugs, bots, botnets, zombies, backdoor, cluster… penetration
and other little-known home-made hacking
techniques, come
often from very small groups building themselves their home-
assembled computers (English Deutsch Nederlands Français
Español Italiano Português 日本語 中文…), gaming a lot, and
learning top programing ** at a young age, often very young.
-CHIL- -BRA- -WIN- -NASA-
-CIA- -文言- -more- -EXIO-
The many non-busted hackers are not known, and
their preys,
especially banks, keep usually their mouth shut
about that.
PAT 2008 規格膠質的4U 頭版 updated 2009.
Anonymity
on the internet is rather an illusion -
unless you
use anonymizing services such as
I2P or Tor - which is for free and in fact grants
more
security than centralized anonymizing
services
where a central point exists that could
disclose
your identity.
Your
anonymity or proxy can be analyzed by using
this free online tool
or similar nym surfing tools.
BoardEx CareerBuilder Monster.com
Ryze
XING
Spoke Linkedin Plaxo...
Conferencing Currency convert Calculator Calendar
Math Math hist Euclid Pol Maths
Algorithm
Leibniz Lichtenberg Weierstrass
Mendeleev Mendel Genetics Your
DNA
Evolution (**) (***) The Missing Link?
Faraday Kirchhoff Boltzmann Max Planck Schrödinger Greene EPR Bell
Heisenberg de Broglie Bohr Born v
Neumann Dirac Pauli Hamilton Hilbert
Many
others Refer directly to contributors when still alive
Quantum cryptography Bennett Brassard Ekert
Caesar Al-Kindi Alberti Trithemius Bellaso
Chappe Campillo v Sömmering
Gauss Weber Schilling Morse Vail Jefferson Kerckhoffs Baudot Bazeries
Bain Caselli
Cooke Meyer Scherbius ENIGMA Lorenz Friedman Rowlett
Różycki Zygalski Shannon… Read about these names, search for more
Onion routing Tor (anonymity network) Degree of anonymity
Cryptology
ePrint Archive Hash HashKeeper
Proxy Gateway Surveillance
Backup
Storage wholinks2me
Network Programming Hacker Hack+ Virus Worm
Trojan Mobile virus
Zombies
Cluster Backdoor Bugs Bots Botnet Protection
More computer
Interactivity virtual cyber
3D
encryption
encription artificial intelligence
Anonymous Peer-to-Peer File-Sharing Systems
Secure communication Anonymity Anonymous proxies Crowds
SNC ES EAS EA FSM Free software Libre
software GNU Hacker
(-*-)
(-**-) Hacker hacker hacking hackers crackers
"Super
Hackers"
Elite
skill computer
programming (**) hackers war fake news
For basic anonymity, check
also pages such as
Computers,
Antivirus,
Audio, Music, Site Music...
and the About page for the “Philosophy
of this site”...
The URL internet address
of this GATEWAY
web page is:
https://www.angelfire.com/planet/jo/gateway.html
Back
to Special4u