Did I obfuscate my usenet newsreader & who I am in this posting?

Did I obfuscate my usenet newsreader and who I am in this posting?

I've read up on how to remain anonymouse on the internet and one way they say is to obfuscate my usenet postings.

I wonder if you can help me to tell me if you can easily figure out what newsreader, operating system or whatever else you can figure out from this post.

I hope you can't figure out anything about me but that is why I am asking. I will monitor this thread to see if anyone can figure out anything about me and my newsreader, os, isp, whatever so that I can learn more.

Reply to
Tamara
Loading thread data ...

NNTP-Posting-Host: 69.110.4.48

In short, no.

Reply to
old777salt

# ARIN WHOIS database, last updated 2007-07-01 19:10 # Enter ? for additional hints on searching ARIN's WHOIS database.

Reply to
Allan Smith

old777salt@yahoo hath wroth:

shows San Jose, CA.

RDNS at:

formatting link
adsl-69-110-4-48.dsl.pltn13.pacbell.net. Your DSL DSLAM is PLTN13 and is in Pleasanton.

I'll resist the temptation to probe your IP address directly for additional information.

Reply to
Jeff Liebermann

Your IP address can be pinged, so you aren't using a router or effective firewall. A visit to , especially the ShieldsUP! site might be educational.

Reply to
Ernie B.

Ernie B. in a fit of rage spewed

Gibson is a joke waiting for a punchline.

Reply to
FrozenNorth

You can do better? What's the URL for your site?

Reply to
Ernie B.

Ernie B. in a fit of rage spewed

nmap

Reply to
FrozenNorth

You trying to say you can't accept a ping if you use a router or a firewall?

Reply to
hmfic

Ernie B. hath wroth:

My routers can be pinged. However, all have "no ip redirects" to prevent Smurf attacks. Responding to ICMP ping is not necessarily a security risk or indication of cluelessness.

Steve Gibson is a mixed bag of useful and useless information. Much of what he says is quite interesting. His tools are also quite good. However, much of his alarmist rantings and incorrect conclusions are rubbish. He's such a good writer, that I often have trouble making the distinction. Tread carefully.

(to 2004).

ShieldsUP is fine for looking for open ports. There are other online firewall checkers and port scanners that will do the same thing. I prefer to run my own (offline) test using NMAP.

The problem I have with GRC is his analysis of the collected information and what he considers a vulnerability. Using his criteria, all open ports are evil, dangerous, and a security risk. That's not the case as it really depends what is running on the open port.

The orginal had nothing to do with wireless, and nothing to do with security. It has to do with whether "Tamara?" can be identified. However, topic drift is always fun.

Reply to
Jeff Liebermann

hmfic in a fit of rage spewed

Ernie isn't too bright.

Reply to
FrozenNorth

You're pregnant?

Reply to
Ernie B.

Nope. I'm saying that a router, if it's doing its job, or an effective firewall will reject pings. Try pinging my IP address and see what happens.

Reply to
Ernie B.

So educate me please. I'm willing to learn.

Reply to
Ernie B.

Ernie B. in a fit of rage spewed

Ernie, you clueless idiot, your IP isn't in your headers, how the fsck is someone going to ping it.

BTW, I reject pings too, but at least I know when I post that my IP is blocked too.

Reply to
FrozenNorth

I've used Gibson's tools before, but I'm not familiar with Omicron. Can the *average* user handle those tools [i.e. won't do more harm than good trying them]? bj

Reply to
chicagofan

Well it is, sorta, but I'll make it easy for you. Try IP 68.103.243.44.

Good for you. ;-þ

Reply to
Ernie B.

chicagofan hath wroth:

Huh? It's a simple menu driven web page. Click here to test your security. I think even a below average user can handle that. Same with Shields UP and other port scanners. They're easy to use. Hmmm... the one on DSLReports.com is offline. There are also commerical "test your security" services.

The problem is in interpreting the results. Most scanners will find holes in the firewall installed by UPnP. Is that safe or a problem? Well, that depends on your level of paranoia. Same with open ports on

8080 for remote admin or various ports for remote control. *YOU* determine if it's safe or not. If in doubt, there are security mailing lists and newsgroups that can help. Think of it like the diagnostic scanner for your automobile. It gives you a number that tells you what it finds. What you do with the number is your problem.

None of the scanners make any changes to your router, so I think it's fairly safe to run them. My big worry is if the site run by some hacker that later comes back and uses the reports to attack the scanned systems.

Incidentally, try running:

on your router. I've seen a few routers that hang on some of the tests.

Reply to
Jeff Liebermann

Thanks for reminding me, I meant to disable UPnP when I got this laptop.

That's why I was looking for what sites the regulars here use. :)

Thanks, will do! bj

Reply to
chicagofan

I know. I just prefer to be invisible to pings, etc. so my router is set to "Block Anonymous Internet Requests".

Interesting sites. Like anything else, one must separate the wheat from the chaff. Steve seems to have a lot of knowledge on his site, I've learned a few things from visiting it.

I tried that site. It ran a scan but didn't show any results past "Scan Finished", just an icon for a broken connection. Maybe that's because I have my hosts file set to read only.

True.

Well, we've located her in Southern California but haven't found her name, SSN, etc.

Reply to
Ernie B.

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.