Gateway  Gateway  Gateway  Gateway ...

 

”Get away with gateways”

 

“Gateway, the best way for hackers to fuck suckers

 

4 White hats, Black hats, Elite skills... Special4u

 

Some useful basic and interesting stuff about

proxies and gateways from 2004 on, and by 2009.

 

 

 

The URL  internet  address of this GATEWAY

web page is:

 

https://www.angelfire.com/planet/jo/gateway.html

 

 

 

For anonymity, check also pages such as

 

Computers, Antivirus, Audio, Music, Site Music...

 

and the About page for the “Philosophy of this site”...

 

 

 

Proxy from 2006 and by 2008

 

 

 

http://www.usatoday.com/tech/news/computersecurity/2004-09-08-zombieuser_x.htm

 

Posted 9/8/2004 12:54 AM - Updated 9/8/2004 11:04 AM

 

Are hackers using your PC to spew spam and steal?

 

By Byron Acohido and Jon Swartz, USA TODAY

Betty Carty figured she ought to be in the digital fast lane.

Last Christmas, Carty purchased a Dell desktop computer, then signed up for a Comcast high-speed Internet connection. But her new Windows XP machine crashed frequently and would only plod across the Internet.

Dell was no help. The PC maker insisted — correctly — that Carty's hardware worked fine.

But in June, Comcast curtailed Carty's outbound e-mail privileges after pinpointing her PC as a major source of e-mail spam. An intruder had turned Carty's PC into a "zombie," spreading as many as 70,000 pieces of e-mail spam a day.

The soft-spoken Carty, 54, a grandmother of three from southern New Jersey, was flabbergasted. "Someone had broken into my computer," she says.

Since early 2003, wave after wave of infectious programs have begun to saturate the Internet, causing the number of PCs hijacked by hackers and turned into so-called zombies to soar into the millions — mostly in homes like Carty's, at small businesses and on college campuses. And, much like zombies of voodoo legend, they mindlessly do the bidding of their masters and help commit crimes online.

Personal computers have never been more powerful — and dangerous. Just as millions of Americans are buying new PCs and signing up for ultrafast Internet connections, cybercrooks are stepping up schemes to take control of their machines — and most consumers don't have a clue.

"We thought things were bad in 2003, but we've seen a sharp uptick in 2004. I'm worried things will get much worse," says Ed Skoudis, co-founder of consulting firm Intelguardians

Carty's PC could have been taken over in myriad ways. She could have been fooled into opening a virus-infected e-mail. She might have innocently surfed to a Web page bristling with contagious code. Or she may have done nothing at all. One of dozens of network worms, voracious, self-replicating programs that pinball around the Web searching for security holes in Windows PCs, may have found one on her new PC.

Profitable attacks

Cyberintrusions traditionally have been the domain of socially inept males launching electronic attacks for fun and bragging rights, often creating a huge, if transient, nuisance for companies and consumers. But things are changing: More PCs are being taken over purely for profit.

Over the past eight months, USA TODAY interviewed more than 100 tech-industry executives, consultants, analysts, regulators and security experts who say top-tier code writers now create malicious programs mainly to amass networks of zombie PCs. They then sell access to zombie networks to spammers, blackmailers and identity thieves who orchestrate fraudulent for-profit schemes.

Most consumers are slow to grasp that an intruder has usurped control of their PC. "We have a large population that is easily tricked," says Dave Dittrich, senior security engineer at the University of Washington's Center for Information Assurance and Cybersecurity.

One measure of the swelling tide of zombie PCs: E-mail spam continues to skyrocket, with zombies driving the increase. In July, spam made up 94.5% of e-mail traffic, nearly double from a year before, says e-mail management firm MessageLabs. Postini, another big e-mail handler, estimates nearly 40% of spam now comes from zombie networks.

Using zombies to broadcast spam for Viagra or quickie loans has emerged as a huge business. Yet spreading ordinary spam is actually one of a compromised computer's more benign tasks. Bigger spoils lie in using zombies in elaborate phishing scams, in which e-mail directs consumers to bogus Web pages to trick them into surrendering personal information.

And zombie networks are perfectly suited to flood targeted Web sites with data requests, in so-called distributed denial-of-service, or DDoS, attacks. Cybercrooks use the threat of a DDoS attack to extort protection money from businesses keen to keep their Web sites running.

Few laws, few arrests

Until recently, little has been done to stop such attacks. The Justice Department's Operation Web Snare netted 160 arrests in August that could lead to more busts, offering encouraging news to cybersecurity experts who have criticized law enforcement for not doing enough. Still, detractors point out there are few federal cybersecurity laws with stiff penalties.

Federal, state and local law enforcement officials face daunting jurisdictional hurdles trying to corner, much less extradite, suspects. Chasing bad guys equipped to commit virtual crimes in several countries simultaneously has proved problematic, as has the sheer volume of incidents.

"It's easier trying to catch Osama bin Laden," says Steve Jillings, CEO of e-mail security firm FrontBridge Technologies.

Zombie victim Carty took matters into her own hands: She did research on how to clean up and protect her PC and diligently updates programs that scan her computer for various types of malicious code. Her PC now runs clean. "I had no clue at Christmas that I would become a security expert," she says.

Consumers remain seduced by the Internet's convenience. E-commerce is bigger than ever, and most casual computer users overlook safety practices. The vast majority don't use firewall software to block intruders, patch vulnerabilities or keep anti-virus subscriptions current.

"Consumers seem almost bizarrely unconcerned by security in general," says James Governor, founder of research firm RedMonk. "People will practically give out their Social Security number as easily as their phone number."

Low and slow thievery

Heather Hall can trace the start of her online banking nightmare to the day she received what she thought was a legitimate e-mail request from Bank of America asking her to click a link to a bank Web page. The 27-year-old health services worker typed in her login, password and account number.

Not long afterward, Hall noticed an unauthorized withdrawal on her banking statement for $6.50. The withdrawals increased in frequency and amounts, to as much as $108. Hall was the victim of a "low and slow" phishing scam, in which cybercriminals purposely steal small amounts of cash — sometimes as little as 20 cents at a time — to avoid detection.

Though data are scarce, experts estimate millions of dollars are being skimmed from thousands of online banking accounts. About 23.6 million people had online accounts at the nation's top 10 banks in the second quarter of 2004, up 28% from the year before, says ComScore Networks.

Sneaky cybercrooks are finding it profitable to "be patient and nick an account for a long time," says Dan Larkin, unit chief of the FBI's Internet Crime Complaint Center.

Bank of America agreed to reimburse the money stolen from Hall's account, but only after she badgered them. "They wanted me to believe it was my fault," says Hall.

Bank of America does not comment on specific cases. It reimburses victims of fraud and changes their online name and password, spokeswoman Betty Riess says.

First seen more than a year ago, phishing scams begin with e-mail messages broadcast to potential victims. The e-mail directs them, often under the guise of doing a security check, to a bogus Web page with the identical look and feel of an authentic page.

A network of zombie PCs e-mails the original request to tens of thousands of potential dupes. A separate zombie, usually a more powerful PC, often sitting in a remote country, perhaps in an obscure nook at a university, serves up the counterfeit Web page. Another zombie, in yet another country, perhaps in the basement of a small shop, stores the stolen account details and conducts the theft.

"Computer networks make this easy to do since they form a virtual world in which footprints and fingerprints are easily erased at a distance," says the University of Washington's Dittrich.

Experts say clues point to loosely organized crime syndicates, probably in Russia, Latvia, Kazakhstan and China, coordinating phishing scams with other schemes to quickly turn stolen account information into tangible booty. In what feds call one of the biggest phishing busts, a Romanian man was arrested last year and convicted for using an elaborate network of bogus Web pages and escrow accounts to fleece Americans out of $500,000.

Typically, filched financial information, such as credit card numbers, is sold on Web sites. Buyers often use card numbers to make long-distance phone calls, sign up for pornographic sites and buy computers over the Internet.

Unique phishing attacks have surged more than 10 times since January, to 1,974 in July, and show no sign of slowing. In early August, MessageLabs intercepted more than 125,000 phishing e-mails containing links to a replica of a well-known U.S. bank's Web site within the first five hours of its appearance.

U.S. banks are in a delicate position. Their customers lost an estimated $2.4 billion from phishing in the 12 months ending in April, according to market researcher Gartner. Citibank, a frequent target, warned users of a dozen examples of phishing solicitations on its Web sites in the first half of June.

Few, however, are willing to discuss such matters in detail out of fear of scaring customers and undercutting trust in online banking, in which they've invested hundreds of millions of dollars, says John Pironti, a security consultant at Unisys.

Now, free, do-it-yourself phishing kits are surfacing on the Internet. Would-be cybercrooks can choose from a dozen kits containing bogus Web sites, programming code and spam tailored toward customers of Citibank, eBay and PayPal, says analyst Chris Kraft of security firm Sophos.

The same zombie network used in phishing scams can also bombard a Web site with data requests. When that happens, no one else can get to the targeted Web site, effectively shutting it down.

Such an assault is known as a distributed denial-of-service, or DDoS, attack. Cybercrooks threaten DDoS attacks just as racketeers wave truncheons. Last January, a series of such attacks began against major Internet gambling operators in the United Kingdom. The attacks were preceded with e-mail messages demanding $10,000 to $40,000.

Some operators paid — and were immediately attacked again, according to a report from the Association of Remote Gambling Operators. The blackmail attempts continue. LadbrokesCasino.com, one of the UK's largest online gambling Web sites, recently reported coming under attack from 518,000 zombie computers.

New methods of attack

Seattle screenwriter Alex Tobias figured her laptop was immune to attacks. After all, she and her husband, Martin, a venture capitalist, worked from home a lot. To protect their home network, Martin installed top-notch firewall and anti-virus software.

Yet last fall, Alex's laptop slowed until she couldn't use e-mail or the Internet. It took extensive troubleshooting to determine that it had been turned into a spam-spreading zombie, and it took half a day to clean it up. "I don't know what she got or how she got it," says Martin. "The bottom line is she got it."

Their experience underscores the notion that there are many ways for malicious code to slip past firewalls and anti-virus programs. E-mail viruses, for instance, rely on tricking the victim into opening an infectious attachment. Another widely used tool is harder to fight: direct planting of contagions, known as "come-and-get-it" viruses, on popular Web sites.

Such contagions commonly lurk on peer-to-peer sites, where music and movies are exchanged. They trick the computer user into giving up personal information, and they can activate other invasive programs unseen by the PC owner.

Web contagions are turning up on high-traffic Web pages across the Internet. Most do the basics: plant a back-door Trojan horse and turn over full control to an intruder who might be sitting half a globe away.

Some have begun implanting spyware called keystroke loggers, which are designed to notice whenever the PC user types anything that looks like account information. It grabs the information and sends it to a zombie computer for storage and risk-free access by the crooks.

The scariest type of attack is one most consumers aren't aware of. Scores of sophisticated programs, called worms and bots, continually scour the Internet for Windows PCs with security holes. There are hundreds of Windows vulnerabilities, and new ones turn up regularly. Microsoft issues software patches, or fixes, each month for the most troublesome. But most home users, and many businesses, don't keep up to date on patches.

Consumer outrage needed

Not long ago, securing the Internet meant cleaning up after so-called script kiddies, youths who use pre-written malicious code, available free on the Web, to pull digital pranks. But security has metastasized into an almost fatalistic endeavor. "Hackers can do almost anything with a compromised PC, and there isn't much we can do about it," says Keith Lourdeau, deputy assistant director of the FBI's Cyber Division.

That will change only as tech suppliers who profit from the Internet simplify networks and collaborate on implementing universal security standards that may run counter to their current business strategies. Many experts say such a shift is at least five years away. The one thing that could make tech suppliers move more quickly is consumer outrage.

"Consumers should demand what they do of other utilities," says Kip McClanahan, CEO of security firm Tipping Point. "When I pay my water bill, I expect my water to be drinkable out of the tap. Today, when you pay your Internet bill, the data you get is not consumable."

Tomorrow: The tech industry begins to fight back

 

 

 

A Gateway is a link between two computer programs

or systems such as Internet Forums. A gateway acts

as a portal between two programs allowing them to

share information by communicating between protocols

on a computer or between computers. A gateway can

have tremendous negative effects on personal computers

if not used properly. Retrieved from

http://en.wikipedia.org/wiki/Gateway_(computer_program)

 

Computer viruses  Computer security

 

 

 

From SearchNetworking.com

A gateway is a network point that acts as an entrance to

another network. On the Internet, a node or stopping point

can be either a gateway node or a host (end-point) node.

Both the computers of Internet users and the computers

that serve pages to users are host nodes. The computers

that control traffic within a company's network or at your

local Internet service provider (ISP) are gateway nodes.

 

In the network for an enterprise, a computer server acting

as a gateway node is often also acting as a proxy server

and a firewall server. A gateway is often associated with

both a router, which knows where to direct a given packet

of data that arrives at the gateway, and a switch, which

furnishes the actual path in and out of the gateway for a

given packet. Last updated 19 Dec 2005

 

 

 

Read more about gateway:

SearchNetworking.com's Net Admin expert can answer your questions about gateway technologies and protocols.

 

SearchNetworking.com offers a list of white papers about various Internet protocols and technologies.

 

 

RELATED CONTENT

 

Properties of Windows Management Instrumentation: Managing Windows networks using scripts, Part 12

Learn how to display all properties of any Windows

Management Instrumentation (WMI) class in this tip

on how to manage Windows networks using scripts.

 

Windows XP network performance tuning tweaks using TCP RFC 1323

Learn how to tweak Windows XP registry parameters

for tuning, improving and optimizing network performance

with the RFC 1323 protocol, the TCP...

 

More remote scripting tricks: Managing Windows networks using scripts, Part 11

Learn a remote scripting trick and how to use Windows

Management Instrumentation Command-line (WMIC) to

remotely query for local administrators in...

 

 

RELATED GLOSSARY TERMS

 

Terms from Whatis.com

the technology online dictionary  four-way server

(SearchNetworking.com)

A four-way server is a server that incorporates a multi-core

processor for increased performance... (Continued)

mail user agent (SearchNetworking)

 

 

NETWORKING RELATED LINKS. Ads by Google

 

Remote Monitoring For LAN, WAN, 802.11, Gig, 10-GbE.

Fully-distributed remote probes. www.networkinstruments.com

 

Network Infrastructure Manage IT systems and teams

across multiple platforms with BMC. www.BMC.com

 

Voip Gateway Discover the benefits of using software

based VoIP Solutions www.nokiaforbusiness.com

 

Gateway Drivers Download Update & Fix All Drivers Instantly.

Free Download. 100% Guaranteed. DriversDoctor.com

 

Enterprise Voice Over IP Free eBook: 11 Chapters on VoIP.

For Mid-to-Large Size Enterprises. ShoreTel.com

 

 

 

More:

 

http://www.google.com/search?hl=en&q=gateway+support&aq=5&oq=gateway

 

http://www.google.com/search?hl=en&q=gateway+drivers&aq=4&oq=gateway

 

http://www.google.com/search?hl=en&q=gateway+anonymous+download&btnG=Search

 

http://www.google.com/search?hl=en&q=gateway+anonymous+upload&btnG=Search

 

http://www.w3.org/Gateways/DCLServer.html

 

http://www.download.com/Anonymity-Gateway/3000-2381_4-10543061.html

 

http://www.brothersoft.com/downloads/anonymity-gateway.html

 

http://www.freedownloadscenter.com/Network_and_Internet/Proxy_Server_Tools/Anonymity_Gateway.html

 

http://www.softforall.com/anonymous%20surfing-freedownload.html

 

http://www.w3.org/Gateways/OQL.html

 

http://www.w3.org/Gateways/WAISGate.html

 

http://www.w3.org/Gateways.html

 

http://www.privacy-gateway.com

 

http://www.downloadthat.com/windows/Internet/Anonymity-Gateway.html

 

http://www.usenet-forums.com/linux-networking/63241-very-bizarre-vsftp-server-problem-pcs-behind-gateway-cannot-access.html

 

http://www.download3k.com/Press-Invisible-Browsing-6.5-automatic-anonymous.html

 

http://www.nowsms.com/discus/messages/485/6473.html

 

http://www.anonymize.net/glossary.html

 

http://search.dmoz.org/cgi-bin/search?search=gateway

 

http://br.youtube.com/watch?v=01oueXOdhlk

 

http://br.youtube.com/watch?v=VeX1kOCm9DI&feature=related

 

http://br.youtube.com/watch?v=69fvScMV2vs&feature=related

 

http://br.youtube.com/results?search_query=hijack+computers&search_type=&aq=f

 

http://br.youtube.com/watch?v=b77165ykOHM

 

http://br.youtube.com/watch?v=VS0D5RJHVUU

 

http://br.youtube.com/watch?v=564LDkCf-Zg&feature=related

 

http://en.wikipedia.org/wiki/Web_Server_Gateway_Interface

 

http://en.wikipedia.org/wiki/ColdFusion

 

http://www.networktutorials.info/networkhowto/internet_access.html

 

http://tech.yahoo.com/gd/understanding-routers-gateways-and-connection-sharing/153499

 

http://www.remote-desktop-control.com/remote-online-gateway/

 

http://search.yahoo.com/search;_ylt=A0geu7qRTw5J9QwAWH5XNyoA?fr2=sg-gac&sado=1&p=gateway%20internet%20connection&fr=yfp-t-203&ei=UTF-8&fp_ip=SE&rd=r1&meta=vc%3Dse

 

http://www.privacy-gateway.com/hide_ip.html

 

http://www.ipaddresslocation.org/ipaddress.shtml

 

http://downloads.zdnet.com/search.aspx?kw=hide+ip

 

http://whatismyipaddress.com/forum/viewtopic.php?showtopic=12810

 

http://whatismyipaddress.com/staticpages/index.php/what-is-a-gateway

 

http://books.google.com/books?id=7xRm1M9bSVsC&pg=PA234&lpg=PA234&dq=topic+selector&source=web&ots=VDFJiq315D&sig=VQR-T_9cpgV7QcaooqZwv2eBfDw&hl=en&sa=X&oi=book_result&resnum=7&ct=result#PPA235,M1

 

http://www.google.se/search?hl=sv&q=anonym+server&btnG=S%C3%B6k&meta=lr%3Dlang_sv

 

https://www.flashback.info/showthread.php?t=271440

 

http://www.99.se/n-tverk-s-kerhet/223307-hur-surfar-anonymt.html

 

http://www.freshpatents.com/Virtual-gateway-dt20070524ptan20070115997.php

 

http://www.google.com/search?hl=fr&lr=lang_fr&q=gateway+anonyme&start=10&sa=N

 

 

 

En français:

 

http://www.commentcamarche.net/forum/affich-992607-surf-anonyme-via-proxy-anonyme-a-100?page=2&section=forum

 

A voir également (Cliquer sur ou touchez les titres)

 

Activer surf anonyme firefox

 

Anonymat firefox proxy

 

Anonymity 4 proxy

 

Comment surfer anonyme

 

 Connexion ftp via proxy

 

Firefox surf anonyme

 

Jap mac surf anonyme

 

Msn via proxy

 

Navigateur surfer anonyme

 

P2p anonyme firewall proxy

 

Proxy

 

Putty via proxy http

 

Surf anonyme

 

Surf anonyme en p2p

 

Surf anonyme sur internet

 

Surf internet via vodaphone sans payer

 

Surfer anonyme americ

 

Surfer anonyme tor

 

Surfing anonyme proxy américain

 

Telecharger gratuit proxy internet surfer anonyme

 

Ubuntu se connecter au reseau via proxy

 

 

 

Check also at Google:

 

Anonymity, Anonymous, Proxy...

 

Gateway forums, Gateway communities...

 

 

 

Anonymous

 

as mentioned on normal speed SPECIAL 4u

and High Speed SPECIAL 4u by 2004.

 

http://search.yahoo.com/search?p=anonymous+email+providers&ei=UTF-8&fr=fp-tab-web-t&n=20&fl=0&x=wrt

Anonymous email providers.

 

Check keywords as:

 

anonymity, anonymous email, surfing, remailer, email forwarder,

mail gateway, browsing, proxy, gateway, private, privacy,

stealth, encrypted connections, messages, nym, file transfer,

document delivery…

 

But no one is really completely anonymous, being asked for

nothing. And “they” always know where you are connecting

from and what you are reading, watching or writing.

 

The only true way is to prepare carefully you web working

sessions on paper, floppy disk, cd, dvd or usb memory,

access the web and work shortly from a new place each time,

where nobody knows you (there are plenty of tricks).

 

Open a first email with a pseudonym or alias name,

an address and references which cannot be checked at once.

 

Nobody can know who you are, but the “interested ones”

can know what you are doing, and can trace your “style”,

“profile”, “signature”, “finger print”, “touch”, “talent”, “spirit”,

and read your lips, and mind!

 

They can pinpoint your places on a map and possibly ban

some of your “characteristic signs” from web access if too

specific, controversial, or “wrong”!

 

But you can find new ones, and this game can go on and on!

 

 

 

Successful (never busted) “hacking hackers”, crackers,

of very large organizations, companies, banks, Hollywood  lobbies…,

using network, hacker, hack+, virus, worm, trojan, mobile virus,

bugs, bots, botnets, zombies, backdoor, cluster… penetration

and other little-known home-made hacking techniques, come

often from very small groups building themselves their home-

assembled computers (English  Deutsch  Nederlands  Français

Español  Italiano  Português  日本語  中文…), gaming a lot, and

learning top programing  ** at a young age, often very young.

-CHIL-  -BRA-  -WIN-  -NASA-  -CIA-  -文言-  -more-  -EXIO-

The many non-busted hackers are not known, and their preys,

especially banks, keep usually their mouth shut about that.

PAT  2008  規格膠質4U  頭版  updated  2009.

 

 

 

Anonymity on the Internet

 

Anonymity on the internet is rather an illusion -

unless you use anonymizing services such as

I2P or Tor - which is for free and in fact grants

more security than centralized anonymizing

services where a central point exists that could

disclose your identity.

 

Your anonymity or proxy can be analyzed by using

this free online tool or similar nym surfing tools.

 

Black hat  Blackhatworld

 

 

 

IM  MSN  SMS  MMS  RSS

 

My  Fa  flickr  tw

 

SOCIAL NETWORKS

 

BoardEx  CareerBuilder  Monster.com

 

Ryze  XING  Spoke  Linkedin  Plaxo...

 

Conferencing  Currency convert  Calculator  Calendar

 

 

 

 

Math  Math hist  Euclid  Pol  Maths  Algorithm

 

G  R  L  P  L

 

Leibniz  Lichtenberg  Weierstrass

 

Koch  Sierpinski  Mandelbrot

 

Fractal  Human Fractals  (*)

 

Mendeleev  Mendel  Genetics  Your DNA

 

Evolution  (**)  (***)  The Missing Link?

 

 

 

AE

 

 

 

Quantum mechanics

 

Faraday Kirchhoff Boltzmann Max Planck Schrödinger Greene EPR Bell

 

Heisenberg de Broglie Bohr Born v Neumann Dirac Pauli Hamilton Hilbert

 

Many others Refer directly to contributors when still alive

 

Quantum cryptography Bennett Brassard Ekert

 

 

 

Cryptography Cryptography

 

Caesar Al-Kindi Alberti Trithemius Bellaso Chappe Campillo v Sömmering

 

Gauss Weber Schilling Morse Vail Jefferson Kerckhoffs Baudot Bazeries

 

Bain Caselli Cooke Meyer Scherbius ENIGMA Lorenz Friedman Rowlett

 

Różycki Zygalski Shannon Read about these names, search for more

 

Onion routing Tor (anonymity network) Degree of anonymity

 

Cryptology ePrint Archive Hash HashKeeper

 

 

 

Proxy Gateway Surveillance Backup Storage wholinks2me

 

Network Programming Hacker Hack+ Virus Worm Trojan Mobile virus

 

Zombies Cluster Backdoor Bugs Bots Botnet Protection More computer

 

Interactivity virtual cyber 3D encryption encription artificial intelligence

 

 

 

Anonymous Peer-to-Peer File-Sharing Systems

 

 

 

Secure communication Anonymity Anonymous proxies Crowds

 

SNC ES EAS EA FSM Free software Libre software GNU Hacker

 

(-*-) (-**-) Hacker hacker hacking hackers crackers "Super Hackers"

 

Elite skill computer programming (**) hackers war fake news

 

 

 

For basic anonymity, check also pages such as

 

Computers, Antivirus, Audio, Music, Site Music...

 

and the About page for the “Philosophy of this site”...

 

 

 

The URL  internet  address of this GATEWAY  web page is:

 

https://www.angelfire.com/planet/jo/gateway.html

 

 

 

To top of page

 

 

Back to Special4u