Why does yahoo allow hackers to run the show at yahoo chat, let alone the exploits they use towards the rest of yahoo?
At what point will yahoo actually fix something that is not working?
I have screen shot spanning 7 years. The most recent today 10-24-07. This with complaints unanswered run the same period all on the same ID's on Yahoo. This with the malicious code used captured on the in coming packets. Most time with the exploiter taking bragging rights to making claim to the felonious acts. How is it that I can record this court submissable data and get convictions from it 15 times, up till 2003. But now with Law Enforcement dragging it's feet these last 4 months (the FBI). Yahoo still does nothing about criminal proven activity ?....
Yahoo has not even allowed a place to submit such evidence, Yahoo Abuse (a file 13 box) has space, (%26amp;is always) limited below what a recorded log would be. Yet even with the small amounts yahoo does nothing about these individuals, WHY?
Why does yahoo allow hackers to run the show at yahoo chat....?
maybe they're figuring it out. or maybe they can't. It's not possible to ban hackers(crackers) because you can never know who is a hacker, someone can create a normal username like yourself and then hack chat rooms.
*With a stolen laptop and a wi-fi connection(someone using someone elses wireless connection since some people don't put a password) no one can understand who he really was, unless they find someone with that laptop.
I don't think anyone would hack a bank or government agency using his home computer and his own connection.
Reply:Jes, 'Answer One' or should I call you '...' (as you leave no name to respond to). Did you read the part about the 15 previous convictions? How did I find them. How were they identified. Seems you speak of a subject you know not about. These criminals are like any other. Think of it like the preverbial 7/11 bandit, only you have a high tech store camera.. In the point of catching criminals they follow certain traits. Or as it is called in the world of Law Enforcement, a Profile. Also Yahoo does record IP addresses entering any chat room these days. This to back that up, proxy's are a imaginary sheild. This since a point in technology passed by Congress well over 10 years ago for Federal use, at that time. But now even that point of technology has become out dated and replaced by a faster means. This where the old, Alogrythms are frequencies and Frequencies can be triangulated. Alogrythms are created of the MAC Address. Only one Alogrythm per computer just like a finger print or voice print to a human. This just one small part of the arsenal to catching a criminal online. Esspecially localized to a chat room. ( I wish I was still in a position to learn of the new means, being used. But it has been 14 years since I was cleared for such.)
The point is here, they have been identified, and in seven years I have experienced, yahoo has taking a back seat to their own TOS in the point of these hackers that are most defiantly not only breaking the Yahoo TOS, they are also breaking the federal law in Malicious Coding (in a Felonious Activity). Catching Criminals is never a breeze, but it is more than possible, it's fact.
Looking for the answers from Yahoo Inc.! This that has not been answered in too, too long a time.. Hello Yahoo?????
((((Guess I have to add to your add to, 2nd coment. We can take this round and round on the what if's.. Bottom line it is a crime, and we as a people are more and more loosing our freedoms to those that commit crimes.. Even with the elusive laptop you speak of. Which is indeed a point again that can be proven rather it occurred or not. through the logs kept by a WiFi router . If someone does not set that instance, that leaves them liable. Like if you left your keys in your car. Some steals your car and returns it without you seeing it gone. Your liable for the person they ran over with your car, This where all the witnesses got your license plate at the scene. Business are now responsible for what takes place on their computers, servers and such,, If those records are not kept,, oh well you are there in found guilty anyway.. This here is actually recent news.. See it is not only recorded to the victims system, it's a tracable link of transmissions. Hence the level 3..
Again, I state to you "IDENTIFIED INDIVIDUALS", in which nothing is being done about from yahoo! I don't believe that point can be made any clearer to you in the point of being Identified.. And in the point of these supposive allusive Booter types. They take to bragging rights. And a Voice print of someone bragging in the point of their own voice is conclusive evidence when the computer forensics backs up the words. And they were told they were being recorded in voice when they were flaunting their booting prowress. As these criminals actually try to convience the public at large in chat that this type of malicious coding is not a criminal offense. Also recorded... the Truth of the question to Yahoo still remain solid intact.))))
No comments:
Post a Comment