Strange tales of the Net

Advert

Strange tales of the Net

Home Forums Soapbox Strange tales of the Net

  • This topic is empty.
Viewing 25 posts - 1 through 25 (of 28 total)
  • Author
    Posts
  • #67885
    Bob Abell 2
    Participant
      @bobabell2

      Hello chaps

      I often find unexplained happenings connected to the Net appearing on my Email pages and wonder if other members out there have similar ?

      Got an uneasy feeling that the Net workings are not fully understood?

      For instance…….Where do Emails go, when sent?…….Some don`t appear for some time……….Where are they in the meantime?

      It`s quite common for my Emails to arrive at the intended recipient…..Days later!

      Yesterday, although I erase all post almost daily, a "Sent message" appeared in my sent box, dated…….12th April 2016

      Is that spookie or what?

      I once erased a photograph by mistake and needed it restoring

      Found a programme on the net, that can restore any photo etc, from years earlier and it found my pictures ……All 26000 of them!

      Any comments please?

      Bob

      Advert
      #8136
      Bob Abell 2
      Participant
        @bobabell2

        Unexplained events

        #67889
        Dodgy Geezer 1
        Participant
          @dodgygeezer1
          #67891
          Bob Abell 2
          Participant
            @bobabell2

            Thank you, DG

            Will the appearance of the April message be explained somewhere on your list?

            Of course, you realise. you`ve taken away all the mysteries of the Net!

            At least, I can sleep at night now

            Bob

            #67892
            Dodgy Geezer 1
            Participant
              @dodgygeezer1

              Ah, Bob – we're just gently pulling your leg, of course…!

              To really find out what is going on you need to do a lot more work.

              This is, of course, a very small subset of all the RFCs which apply to internet communications generally. There must be the best part of 10,000 by now,

              Once you have read and understood all the RFCs, you then need to examine all the different software packages which incorporate them and are used by the different service providers. Finally, you need to find out how these are set up and used at the different nodes through which your message passes, and what glitches have recently been experienced which may have caused a rejection or resend…

               

              Alternatively, you could just trace the paths of the emails you are curious about. Here are a couple of links which give you a bit more information:

              **LINK**

              **LINK**

              ..and, if you want some automated help: **LINK**

               

              As an aside things that are erased on any computer system are rarely actually erased.  Data on a computer is usually held like a poem in a book – written on a page somewhere, with a pointer to it written in the index.  To delete an item, the pointer is the only thing that is usually deleted, and the space that the pointer pointed to is reclassed as 'usable'. Only when that space is overwritten with something new does the original data disappear (though even then you may be able to get something back if you are willing to do something clever, technical and highly expensive..)

              The reason for this is that data is only deleted if it is overwritten, and overwriting takes as long as it did to write the item in the first place. For a big file that can take many minutes – much easier simply to mark it as 'gone'.

              If something has been deleted and lost all its indexing, since photos, Word files, and many other bits of data have standard headers, you can read across a whole disk and find these headers – then read along until you find an 'end-of-file' marker, and recreate that as a new file. Often that will be an original file 'deleted' years ago.  If you have only just deleted the file, it might even be possible to recover the original index data from a local store, which would be even quicker.  Forensic tools use this facility to recover deleted data, which is why Hilary Clinton has been using a specific overwrite facility –  BleachBit – on emails she didn't want the FBI to find…

               

               

               

               

               

              Edited By Dodgy Geezer on 28/09/2016 12:02:05

              Edited By Dodgy Geezer on 28/09/2016 13:16:16

              #67893
              Bob Abell 2
              Participant
                @bobabell2

                My word, DG…….You certainly know all about it!

                Don't know why you call yourself……Dodgy Geezer………..Clever Clogs would be more appropriate!

                Thanks anyway, CC…………..We'll take your word for it

                Bob

                #67917
                Paul T
                Participant
                  @pault84577

                  Bob

                  The problem with your computer is easily solved.

                  Remove the back cover with one of those tiny screwdrivers and carefully remove the dead hamster then replace with a fresh one………….problem solved.

                  Paul

                  #67987
                  Bob Abell 2
                  Participant
                    @bobabell2

                    Further to my Digital Naivety, I wish to add the following….

                    Is it safe, security wise, simply the take a defunct PC or Mobile Phone to the tip?

                    I'm concerned that the Hard Disc is still full of Data?

                    Bob

                    #67988
                    Banjoman
                    Participant
                      @banjoman

                      Bob,

                      It is indeed still full of data — and fairly easliy recovered data even without tons of expertise or expensive tools — unless you have done a true delete.

                      When you empty the wastebin of your computer, all you really do is remove links to the underlying file. For a full delete, the disk space used to store the data in question must also be overwritten with new, random data, ideally several times.

                      On a Mac, which is what I use, the system comes with such a possibility inbuilt; I don't know what goes under Windows, but if it is not included, there should be freeware available out there that will do the job for you.

                      Of course, if you are talking truly sensitive data (like the secret inner workings of the Abell drive for example) you should probably also expose the hard disk to some very serious magnetic fileds and then have it physically shredded (yes, there are services that will shred a hard disk for you!) but for the common or garden variety of data, a number of dlete-and-rewrites should be mpore than sufficient.

                      It can take half a day or more, though, if the hard disk is large, but for peace of mind, I've done it for the last few times that I upgraded my 'puter and gave the old one away to a charity shop or similar.

                      Mattias

                      #67989
                      Banjoman
                      Participant
                        @banjoman

                        I should add that what I just wrote goes for computers. What the case might be for phones, I don't really know, although I think that a full reset on at least an iPhone also overwrites all the old data …

                        Mattias

                        #67990
                        Dave Milbourn
                        Participant
                          @davemilbourn48782

                          I'm concerned that the Hard Disc is still full of Data?

                          That's about as safe as opening your front door wide and having a flood-lit sign saying "Help yourself to anything valuable here", Bob. Even erasing all of the files with a Windows command won't do much except make them a little more tricky to recover i.e. ten minutes work instead of five.

                          Remove the hard drive and either smash it to pieces with a hammer or drill three or four times vertically right through it. Before you do that, however, see if there are any useful little screws, springs, motors etc which you can salvage.

                          As regards the phone, I'm led to believe that all of the personal data is held on the SIMM card – but I'm happy to be corrected.

                          Dave M

                          #67995
                          Ray Wood 3
                          Participant
                            @raywood3

                            Hi All

                            I find a grandson with a screw driver and a club hammer can achieve this result in 15mins, I ask him to save anything that looks useful as he does the dissection then the hammer. Laptops only take 5mins

                            Regards Ray

                            #67996
                            Colin Bishop
                            Moderator
                              @colinbishop34627

                              I don't hold sensitive information on my phone but a complete reset will usually erase everything. plus, as Dave says, remove and destroy the SIM card (preferably after you have transferred your contacts to the new phone).

                              As far as hard disks are concerned, they are remarkably robust when you want to destroy them. I drill holes into the casing and pour old paint or something corrosive into the innards, I then use a club hammer on the case.

                              Similar methods applied to your own memory could result in a murder charge for someone.

                              Colin

                              #67997
                              Bob Abell 2
                              Participant
                                @bobabell2

                                When breaking into defunct PC's………..Is there any danger of electric shock from charged up capacitors………..To the unwary?

                                Or am I scare mongering?

                                Bob

                                #67999
                                Dodgy Geezer 1
                                Participant
                                  @dodgygeezer1
                                  Posted by Dave Milbourn on 05/10/2016 15:53:48:

                                  Remove the hard drive and either smash it to pieces with a hammer or drill three or four times vertically right through it. Before you do that, however, see if there are any useful little screws, springs, motors etc which you can salvage.

                                  Hitting things hard wiv an 'ammer can be a dangerous activity if things break off, and drilling can be an arduous activity if you hit the hard internal magnets…but try it if you like. My approach is:

                                  1 – Do a risk analysis. What might have ever been put on that drive? Who is likely to attack it? If it's NATO crypto key material and you know there are dodgy geezers with snow on their boots going through your trash, go to 5

                                  2 – Does the disk still work? If it works, and you don't want to use the computer any more, run an overwriting package. After you have done this the entire disk will be cleared, so don't expect to boot it again unless you do a rebuild. DBAN is a (free) favourite of mine – **LINK** . Hillary Clinton uses BleachBit – **LINK** . You only need to set these to one overwrite PLUS a validation read (to be sure it worked. After that you can sell the machine or give it away as a working machine (with no O/S) if you want.

                                  Note that overwriting MUST be for the WHOLE DISK. Don't fiddle with trying to overwrite just the sensitive bits. There will always be some scrap of data unaccounted for somewhere…

                                  3 – If the disk does not work, use a screwdriver to separate the two halves of the disk. Undo the central disk mount and remove the platters – there will be 1-4 of them. The inside of the disk also contains two strong magnets, a nice low-friction pivoting arm and some other goodies. If you don't want them, throw them into the bin.

                                  4 – If the platters are a glass substrate, tapping them with a hammer will make them shatter. If they are a metal substrate, a blow-lamp (or any fire) will make them vaporise. Try it – it's fun. You can then bury the ashes or fragments…

                                  5 – The above is fine for any data which is not targeted by a skilled attacker. For such a person/organisation, at considerable cost, it may be possible to extract data from an overwritten disk or a hammered and drilled disk, depending on a large number of variables. For such data, the disk platters need destroying in the controlled area where they reside. See me for further details!

                                  Do not do what GCHQ used to do back in the 1980s, which is store all the sensitive data on site until they had a lorry load that they could take to the secure furnaces at Llantrissant (The Hole with the Mint in it). That way, disks go walkies from the store, and the lorry is an obvious target. Last I heard, they were using an acid bath at Rolls Royce, Derby… Oh, and none of the above applies to Solid State Disks…..

                                  An old computer is full of useful bits. After it has been unused for a day or so, there is unlikely to be any juice left in the capacitors. Turning the system on when it's not plugged in frequently flattens any charge still left. The only ones which are big enough to store anything you would notice are going to be in the power supply, which is in a separate box.

                                  The sheet metal sides of the power supply box are often a thin gauge, and really useful for modelling. The PCB inside has useful power diodes. If you are concerned about the capacitors, touch an old (insulated) screwdriver across the terminals. That will short it out.

                                  #68002
                                  Dave Milbourn
                                  Participant
                                    @davemilbourn48782

                                    Hitting things hard wiv an 'ammer can be a dangerous activity if things break off, and drilling can be an arduous activity if you hit the hard internal magnets…but try it if you like.

                                    Works for me, Dodgy Dude. There's no hard-drive I've found that can withstand a HSS 6mm bit in a pillar drill, and flying garbage can be 'de-risked' by wearing safety goggles….it's a lot quicker and more fun, too!

                                    DM

                                    #68003
                                    Colin Bishop
                                    Moderator
                                      @colinbishop34627

                                      Driller Killer Dave.

                                      Colin

                                      #68004
                                      Dodgy Geezer 1
                                      Participant
                                        @dodgygeezer1
                                        Posted by Dave Milbourn on 05/10/2016 23:04:17:

                                        Hitting things hard wiv an 'ammer can be a dangerous activity if things break off, and drilling can be an arduous activity if you hit the hard internal magnets…but try it if you like.

                                        Works for me, Dodgy Dude. There's no hard-drive I've found that can withstand a HSS 6mm bit in a pillar drill, and flying garbage can be 'de-risked' by wearing safety goggles….it's a lot quicker and more fun, too!

                                        DM

                                        Aha – point 1! What have you got on your hard drive? If you are really worried that someone might sneak a look, remember that drilling a few holes leaves a lot of the surface undisturbed, and even denting it simply means that the reading heads have to move up and down a bit. Forensic surface readers at a disk fab plant do not spin disk platters – they hold them in a vacuum chuck and move the head, so surface damage is not so much of an issue…. But perhaps you're not as dodgy as I am?

                                        Damaging the case does not stop the platters being read, of course – you have to damage the platters. Ideally completely. I find it easier to disassemble the case and use the goodies inside. And if you think drilling is more fun, you have obviously never watched a magnesium alloy platter coated in iron oxide burning. Try it sometime – Nov 5 is getting closer!

                                        Of course, you could also use them as coasters…

                                        #68005
                                        Dave Milbourn
                                        Participant
                                          @davemilbourn48782

                                          Yeah, DG….whatever.

                                          DM

                                          #68007
                                          Paul T
                                          Participant
                                            @pault84577

                                            There is a sure method of guarantee data protection providing that you never intend the hard drive to be used again so listen carefully as I will say this only once!

                                            Use a data destruction software package, this is called 'data sanitation' and overwrites everything on the hard drive.

                                            Then remove the drive from the computer, open up the case and remove the platters and expose them to a strong magnetic field.

                                            Next burn the platters……. a bbq is ideal but a blow lamp will do just as well.

                                            Finally shred any remnants with shears box up the bits and bury them with quick lime in a deep hole….the deep hole isn't ideal but a lot cheaper than blasting them off into deep space.

                                            It is a long process but the data is totally destroyed and the equipment is put beyond being used again.

                                            This method should satisfy even the most anal of experts so can we please draw a line under this discussion and get back to model boats

                                            #68008
                                            Paul T
                                            Participant
                                              @pault84577

                                              Bob

                                              If you are worried about charged capacitors it would be a good move to unplug the computer from the mains before smashing it to bits with a sledge hammer (wooden handle of course)

                                              #68013
                                              Bob Abell 2
                                              Participant
                                                @bobabell2

                                                Thank you, Paul

                                                There's no reason whatsoever to bring the Thread to a close…….This topic is quite important to most members

                                                Model boats can wait!

                                                Bob

                                                #68016
                                                Paul T
                                                Participant
                                                  @pault84577

                                                  Bob

                                                  Fair enough Bob but is there any more to be gained?

                                                  Paul

                                                  #68024
                                                  Dodgy Geezer 1
                                                  Participant
                                                    @dodgygeezer1

                                                    Many people are completely unsighted about 'security' on computers, and the press doesn't help by spreading wild stories about the issue. In fact, many web sites nowadays (particularly banking ones) have a little sub-section dedicated to security advice, which often includes a free anti-virus download…. so I suspect there is room here for a few simple tips.

                                                    1 – My number one would be risk analysis. Respond to a threat proportionately. The security field is full of people trying to sell you protection from something which will probably never happen. Most (all?) necessary protection can be obtained for free by using standard tools. Don't buy anything extra unless you are sure you will need it. Most modern operating systems have a built-in firewall and other security services. Learn about them and use them.

                                                    2 – Backups. These should be your first line of protection. Storage is cheap – get a USB stick and keep a copy of your pictures and anything else you don't want to lose.

                                                    3 – Anti-virus. There are quite a lot of free tools – I use Avast, we can have interminable arguments about which is best. You might be happier buying one – but use something.

                                                    4 – Passwords. Your password is SECRET. It is how you prove who you are to people. NEVER tell it to anyone. Real Helpdesks and Support people will know this, and will have the privilege to delete and recreate your password if they want to change it, but they should NEVER know it, and NEVER ask for it. It's stored encrypted so even they can't find it out. If there are any problems, or you think someone might know your password, change it immediately. Try to pick a sensible one, not '1234' or 'password'…..

                                                    5 – Scams. There are lots around, on the phone and on the web. Luckily, there are also lots of web sites dedicated to exposing them **LINK** . If you get an odd message, copy a line from it and google that – you will often find that it's a known scam doing the rounds. Snopes is a good site to know about **LINK**

                                                    6 – Disk encryption. Often called password protection – this encrypts a system so you can't read it unless you input the password. If you have any mobile equipment (laptop, smart phone, etc) which you might take out of the house and lose or get stolen, set it up with encryption.

                                                    7 Disposal. We covered this above. Basically, delete files if you are giving a machine to someone you trust completely, overwrite the disk if you are disposing of it to somewhere not trusted, and destroy the disk if you can't overwrite, or if you are working for the intelligence services…

                                                    8 Incident handling. If you ever have an issue, know who to contact. Maybe your bank, maybe the credit card company, maybe the police. One advantage of paying for an AV package is that they usually run a help line providing all sorts of support.

                                                    Or, of course you could always contact Model Boats via this Forum…

                                                    #68026
                                                    Bob Abell 2
                                                    Participant
                                                      @bobabell2

                                                      Many thanks, DG

                                                      Sensible advice

                                                      While browsing the subject, I came across a website that buys all mobile phones!

                                                      If we're talking about the risks of phone disposal……Who in their right mind would want to sell their old phone?

                                                      I did read about people buying second hand IPads……The sellers have somehow gotten round the password problem to enable resale?

                                                      Stop the World……I want to get off!

                                                      Bob

                                                    Viewing 25 posts - 1 through 25 (of 28 total)
                                                    • Please log in to reply to this topic. Registering is free and easy using the links on the menu at the top of this page.

                                                    Code of conduct | Forum Help/FAQs

                                                    Advert

                                                    Latest Replies

                                                    Home Forums Soapbox Topics

                                                    Viewing 25 topics - 1 through 25 (of 25 total)
                                                    Viewing 25 topics - 1 through 25 (of 25 total)

                                                    View full reply list.

                                                    Advert

                                                    Newsletter Sign-up