MishMagnet wrote:Thank you, gentlemen, for providing me relief from holiday shopping, baking and wrapping. I spend a few hours on the holidays, then check up on 'How the Josh Turns' is progressing.
Heh-heh - that describes my day today pretty well, too!
I may be going to hell in a bucket, babe / But at least I'm enjoying the ride.
-Grateful Dead (lyrics by John Perry Barlow)
MishMagnet wrote:Thank you, gentlemen, for providing me relief from holiday shopping, baking and wrapping. I spend a few hours on the holidays, then check up on 'How the Josh Turns' is progressing.
Make sure you tune in during the New Year for the hottest new soap, "The Bond and the Beautiful". Critics have panned it but I hope you'll judge it on its own merits.
"Whatever appears to be against the Book of Mormon is going to be overturned at some time in the future. So we can be pretty open minded."-charity 3/7/07
Infymus wrote:Hey, this thread is supposed to be all about me.
Me Me Me Me Me Me Me!
What have I got to do, respond to every thread, every reply and attack every line?
/me storms off to make dinner.
Sorry Infymus.
I'm sorry too, Infymus. Your goatee isn't that disguisting and now that you've popped back in, this thread is somewhat less disguisting.
Hey, you're a TI-99/4A guy too?
10 CALL CLEAR 20 PRINT "DO YOU LIKE THE SQUABBLE? (Y\N)" 30 INPUT A$ 40 IF A$ = "Y" GOTO 70 50 IF A$ = "N" GOTO 90 60 GOTO 20 70 PRINT "FIGHT, FIGHT FIGHT" 80 GOTO 70 90 PRINT "GOOD. LET'S TALK ABOUT GOATEES INSTEAD." 100 BYE
Absolutely I'm a TI guy. Was my first and I've still got it with the intentions of mounting it on the wall above my computers. At least with TI basic you didn't have to DIM your A$ before you used it. :)
MishMagnet wrote:I've never read Mr. Scratch's blog before. I love it! I've never been to Infy's site either until today. (I should be making cookies.)
Instead of reading personal blogs? Yes, you can see my personal blog at http://www.infymus.com .
jskains wrote:"<Ahem> Is Mister Scratch a member of MDB? You are so full of crap your breath stinks."
Good spin. You are good. We established that you didn't do it. I never then said "we found out it was a member of the MDB". The implication is that when I found out who it was, I first said it was a member of the MDB.. Now your playing mind games.
JMS
Do you not know how to read? You said above, and I quoted you, verbatim, "I never said it was someone from MDB." Well, let me remind you: the first person you pointed your finger at was me. So you *DID* say it was someone from MDB. Your story is leaking water by the minute, it is so full of holes.
jskains wrote:
Mister Scratch wrote:Many of the tech people on the board have said this is a complete load of bull.
First off, spammers do it all the time. Second, the only thing that was said is you don't have the technical capacity to pull it off. Most even said it was easy to do.
No; rather, they said it was easy to trace. A couple people offered to do it for you. More holes; more leaking.
There is no such thing as an untraceable email. You just have to have the right tools and you can track down anything. I worked as a professional online investigator for years. In a four year period (and thousands of cases) I was able to gather and compile evidence for a mere four physical threat cases that were deemed enforceable by law enforcement - police/FBI (excluding fraud which the law would accept cases if the amount of fraud was $20,000 or more). Two of them were bomb threats with very specific details about time and date. The other two were threats of physical violence against a person. In these cases, the aggression was insistent, regular and had to meet a criteria of very specific details including the type and place of threatened violence before law enforcement would even consider looking at them.
This case here? Not even a blip on the compelling case screen.
Crude tools include Geobytes and NexisLexis. You have to put down some serious money for more sophisticated tools. You cannot hide in the internet. You just can't. Weeee'rreeeee waaatttttttttccccccchhhhhhhiiiinnnnnggg youuuuuuuuuuuuu.
"I think one of the great mysteries of the gospel is that anyone still believes it." Sethbag, MADB, Feb 22 2008
Trinity wrote:There is no such thing as an untraceable email. You just have to have the right tools and you can track down anything. I worked as a professional online investigator for years. In a four year period (and thousands of cases) I was able to gather and compile evidence for a mere four physical threat cases that were deemed enforceable by law enforcement - police/FBI (excluding fraud which the law would accept cases if the amount of fraud was $20,000 or more). Two of them were bomb threats with very specific details about time and date. The other two were threats of physical violence against a person. In these cases, the aggression was insistent, regular and had to meet a criteria of very specific details including the type and place of threatened violence before law enforcement would even consider looking at them.
This case here? Not even a blip on the compelling case screen.
Crude tools include Geobytes and NexisLexis. You have to put down some serious money for more sophisticated tools. You cannot hide in the internet. You just can't. Weeee'rreeeee waaatttttttttccccccchhhhhhhiiiinnnnnggg youuuuuuuuuuuuu.
That is incorrect. I have been an IT pro for for over a decade. One can telnet to an SMTP server and enter the commands direct. Does not require any sophisticated tools.
Whole website on it. Heck I used to script emails for newsletter systems in Perl. The only log is an originating source, 1and1 internet services. A company that provides Linux based shell accounts.
You have to put down some serious money for more sophisticated tools. You cannot hide in the internet. You just can't. Weeee'rreeeee waaatttttttttccccccchhhhhhhiiiinnnnnggg youuuuuuuuuuuuu.
A telnet session still logs an IP address and the hacker sites I've read for my investigation of this case strongly suggest hiding behind multiple proxy servers which might throw off the scent, but would not result necessarily in an untraceable cover-up. Then there is finding a mail server with mail relay turned on in the first place, and so the person doing it would have had to have been a quick study, and motivated or just happen to have the skill set hot and ready to go. In some of the forums I lurked, newbie spammers were having a terrible time getting it to work.
Also note that there are many email forums not to mention at least one RFC that affirms some mailers ostrip headers anyway. So receiving an email without a header doesn't at all guarantee it was spoofed. An investigator wouldn't be as surprised as jskains and give up just because there was no header.
The person doing it would also have to be unsympathetic to Scratch, as that person was clearly trying to frame it on Scratch by referring to his "informants" (though another word was used in its place, demonstrating a fumbling attempt to talk like scratch)
Now, if someone with technical knowledge were trying to bamboozle a forum full of layman by offering technical explanations for an incident where they'd need to, in Carl Sagan's invisible dragon fashion, have excuses ready to go as to why they would not be able to prove their case (as apologists do frequently with missing manuscripts and entire civilizations) then that would also be understandable.
Lou Midgley 08/20/2020: "...meat wad," and "cockroach" are pithy descriptions of human beings used by gemli? They were not fashioned by Professor Peterson.
LM 11/23/2018: one can explain away the soul of human beings...as...a Meat Unit, to use Professor Peterson's clever derogatory description of gemli's ideology.
Infymus wrote:Absolutely I'm a TI guy. Was my first and I've still got it with the intentions of mounting it on the wall above my computers. At least with TI basic you didn't have to DIM your A$ before you used it. :)
Good memories. TI got me into the whole computer thing. I used to make games in Extended BASIC where I could have fun with CALL SPRITE, MAGNIFY, and even CALL SAY. I also still enjoy a good game of Parsec. I don't much miss storing my programs on audio cassette though.
And I had an error in my previous code. I forgot to add, THEN.
To think I was doing BASIC almost as soon as I could read (actually before that too--when I just copied right the letters out of books).
I once taught my TI how to dial telephone numbers for me by making the right tones. I also created a simpl animation program in TI Extended BASIC back in the day (you drew each frame and then it would play it back).
I even used my TI to get extra credit in health and French clsses for some programs I wrote back when I was in Jr. High.
That's General Leo. He could be my friend if he weren't my enemy. eritis sicut dii I support NCMO