If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Display Modes |
#1
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws
Be it known to all that would conspire with John Wolf to hack into privaely owned computer systems (specifically mine, you will be charged with conspiracy to violate US Federal Anti-Hacking laws. In addition to the above, Wolf will be charged with violation of Federal Hate Crimes. To wit; Wolf has been acting in violation of Public Law 101-275 by committing bias-motivated offenses based on hatred of victims because of their religion. Documentation to support the charges was submitted to the FBI at 10:38 AM EST, this date. Anyone desiring to file a complaint against John Wolf may fill out the form provided by the FBI at the following location: http://www.ic3.gov/complaint/ According to the FBI web site: The FBI Civil Rights Program The Federal Bureau of Investigation takes a very aggressive approach to investigations regarding violations of Civil Rights. The primary areas of investigations are listed below: 1. Color of Law (Excessive Force and/or Misconduct) 2. Hate Crimes: Racial, Religious 3. Housing Discrimination 4. Violence against Reproductive Health Clinics 5. Involuntary Servitude and Slavery According to my firewall log 6,965 port attacks have occured over the past two days and all were refused. Of course most of them are the usual ones out of Amsterdam and Australia but there are bunches of US IP addresses. A copy of the log has been forwarded to the FBI. Anyone knowing the IP adress of John Wolf or www.cerm.info please let me know. My software does not ID "info" web sites. ...... BB http://www.biblebob.net |
#2
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and ConspiracyTo Violate US Federal Anti Hacking Laws
Bible Bob wrote:
Anyone knowing the IP adress of John Wolf or www.cerm.info please let me know. My software does not ID "info" web sites. 207.213.216.100 SBC Internet Services PBI-NET-3 (NET-207-212-0-0-1) 207.212.0.0 - 207.215.255.255 Coastside Net, Inc. PBI-CUSTNET-1269 (NET-207-213-216-0-1) 207.213.216.0 - 207.213.217.255 Domain ID13485309-LRMS Domain Name:CERM.INFO Created On:20-May-2006 07:48:23 UTC Last Updated On:19-Jul-2006 20:31:17 UTC Expiration Date:20-May-2007 07:48:23 UTC Sponsoring Registrar:MIT (R141-LRMS) Status:CLIENT TRANSFER PROHIBITED Registrant ID:C114805831326044 Registrant Name:John Wolf Registrant Organization:John Wolf Registrant Street1:Box 584 Registrant Street2: Registrant Street3: Registrant City:Shasta Lake Registrant State/Province:CA Registrant Postal Code:96019 Registrant Country:US Registrant Phone:+1.5302090352 Registrant Phone Ext.: Registrant FAX: Registrant FAX Ext.: Registrant Admin ID114808093275216 Admin Name:John Wolf Admin Organization:John Wolf Admin Street1:Box 584 Admin Street2: Admin Street3: Admin City:Shasta Lake Admin State/Province:CA Admin Postal Code:96019 Admin Country:US Admin Phone:+1.5302090352 Admin Phone Ext.: Admin FAX: Admin FAX Ext.: Admin Billing ID:C114805831326043 Billing Name:YahooDomains BillingContact Billing Organization:Yahoo! Inc Billing Street1:701 First Ave. Billing Street2: Billing Street3: Billing City:Sunnyvale Billing State/Province:CA Billing Postal Code:94089 Billing Country:US Billing Phone:+1.6198813096 Billing Phone Ext.: Billing FAX: Billing FAX Ext.: Billing Tech ID114808093275217 Tech Name:YahooDomains TechContact Tech Organization:Yahoo! Inc Tech Street1:701 First Ave. Tech Street2: Tech Street3: Tech City:Sunnyvale Tech State/Province:CA Tech Postal Code:94089 Tech Country:US Tech Phone:+1.6198813096 Tech Phone Ext.: Tech FAX: Tech FAX Ext.: Tech Name Server:YNS1.YAHOO.COM Name Server:YNS2.YAHOO.COM |
#3
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws
Bible Bob wrote:
Be it known to all that would conspire with John Wolf to hack into privaely owned computer systems (specifically mine, you will be charged with conspiracy to violate US Federal Anti-Hacking laws. ------------------- You're a ****ing idiot. He's too stupid to ever be able to do that. And you're too stupid to ever know if he did. Steve |
#4
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws
"Bible Bob" wrote in message ... Anyone knowing the IP adress of John Wolf or www.cerm.info please let me know. My software does not ID "info" web sites. ..... BB http://www.biblebob.net Bob ! If you have Win Xp go to the windows directory with notepad, find pfirewall.txt, open it and go to the last entry on the bottom and copy it to notepad then email it to me. If if you do not have Xp let me know what you do have. A person that has his own server and network also KNOWS how to HACK ! Rod Posted Via Usenet.com Premium Usenet Newsgroup Services ---------------------------------------------------------- ** SPEED ** RETENTION ** COMPLETION ** ANONYMITY ** ---------------------------------------------------------- http://www.usenet.com |
#5
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws
On Tue, 06 Feb 2007 13:53:06 -0800, "R. Steve Walz"
wrote: Bible Bob wrote: Be it known to all that would conspire with John Wolf to hack into privaely owned computer systems (specifically mine, you will be charged with conspiracy to violate US Federal Anti-Hacking laws. ------------------- You're a ****ing idiot. He's too stupid to ever be able to do that. And you're too stupid to ever know if he did. Steve Steve, Kinda over reacted didn't ya? Did you read the first line "to all that would?" According to the laws of grammar "to all that would" are not John Wolf. ...... BB http://www.biblebob.net |
#6
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws
On Tue, 6 Feb 2007 16:08:01 -0600, "Rod" wrote:
"Bible Bob" wrote in message .. . Anyone knowing the IP adress of John Wolf or www.cerm.info please let me know. My software does not ID "info" web sites. ..... BB http://www.biblebob.net Bob ! If you have Win Xp go to the windows directory with notepad, find pfirewall.txt, open it and go to the last entry on the bottom and copy it to notepad then email it to me. If if you do not have Xp let me know what you do have. A person that has his own server and network also KNOWS how to HACK ! Rod Posted Via Usenet.com Premium Usenet Newsgroup Services ---------------------------------------------------------- ** SPEED ** RETENTION ** COMPLETION ** ANONYMITY ** ---------------------------------------------------------- http://www.usenet.com Rod, I have XP but my computer is also my business computer so it is protected with Outpost Firewall; not the XP firewall. The file you spoke of is not in my windows directory. I can send you the log file in csv format; but I do't know what good it will do. This morning the log showed 20,000 port attacks all defeated by the firewall. A little window pops up over in the right bottom of my screen every time a port attack occurs. And I have virus software running continually with a complete scan of all drives every morning. Besides, there is an old trick I can use that will defeat every attacker - disconnect the modem cable. The FBI will have a copy of it. Weatherly posted Wolf's IP address this morning. I've already contacted Wolf's ISP to have his account canceled for criminal conduct. And I will sending the IP info to them as well. He says he lives in San Francisco but his web site info indicates he lives in Shasta. He may be in violation of domain name registration rules. You have to take a childs toys away from him when he wants to use them to hurt others. ...... BB http://www.biblebob.net |
#7
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws
On Tue, 06 Feb 2007 20:37:04 -0500, "127.0.0.1"
wrote: Bible Bob wrote: On Tue, 06 Feb 2007 13:53:06 -0800, "R. Steve Walz" wrote: Bible Bob wrote: Be it known to all that would conspire with John Wolf to hack into privaely owned computer systems (specifically mine, you will be charged with conspiracy to violate US Federal Anti-Hacking laws. ------------------- You're a ****ing idiot. He's too stupid to ever be able to do that. And you're too stupid to ever know if he did. Steve Steve, Kinda over reacted didn't ya? Did you read the first line "to all that would?" According to the laws of grammar "to all that would" are not John Wolf. Bob, chances are a real hacker isn't going to leave behind his real IP-Number. I use an IDS (Intrusion Detection System) Called 'Snort' That runs in the background as a daemon. I get all kinds of break in attempts daily, these aren't portscans but programs like Nikto, Nessus and Metasploit searching for vulnerabilities and misconfigurations. It's possible that script kiddies like Roger are running ping sweeps on a range if IP's looking for open ports. I get scanned all the time (Most of the time its harmless) Sometimes its not. Last week, I got some moron trying to run Medusa and Brute Force my ssh login. That was a real break in attempt. The best way to stop hackers is the make sure your software is up to date. There is a reason that Buffer Overflow is the whipping boy of vulnerabilities. Thanks, I am Bible Bob, not Puter Bob (sounds kewl maybe I could be). I don't understand the terminolgy but I think I know what you mean. I use Outpost for my firewall and AVG for virus protection plus Adaware for spyware, etc. I went to the snort website, I don't recognize the file extension on the download. Will Snort run on XP? Would I have to dump Outpost to use Snort? ...... BB http://www.biblebob.net |
#8
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws
"Bible Bob" wrote in message news On Tue, 6 Feb 2007 16:08:01 -0600, "Rod" wrote: "Bible Bob" wrote in message .. . Anyone knowing the IP adress of John Wolf or www.cerm.info please let me know. My software does not ID "info" web sites. ..... BB http://www.biblebob.net Bob ! If you have Win Xp go to the windows directory with notepad, find pfirewall.txt, open it and go to the last entry on the bottom and copy it to notepad then email it to me. If if you do not have Xp let me know what you do have. A person that has his own server and network also KNOWS how to HACK ! Rod Posted Via Usenet.com Premium Usenet Newsgroup Services ---------------------------------------------------------- ** SPEED ** RETENTION ** COMPLETION ** ANONYMITY ** ---------------------------------------------------------- http://www.usenet.com Rod, I have XP but my computer is also my business computer so it is protected with Outpost Firewall; not the XP firewall. The file you spoke of is not in my windows directory. I can send you the log file in csv format; but I do't know what good it will do. This morning the log showed 20,000 port attacks all defeated by the firewall. These files can be read with a text editor. The last 20,000 entires are the ones needed to be seen. The port #'s and ip addresses, and the protocol used. The thing is, UDP is a transport protocol for short distances (local networks), at long distances udp is unreliable. If udp was used the attacker had to be in the same domain block to use this protocol. If it was tcp, it could come from anywhere. Do you have a packet sniffer or packet capture program ? If so, run it in promiscuous mode on the next attack, for 5 minutes, then save the info into a file. A good sniffer will tell you what is at the front of the packet header, an e0000070h or an x means a forged packet, an anonomous server. A little window pops up over in the right bottom of my screen every time a port attack occurs. And I have virus software running continually with a complete scan of all drives every morning. Besides, there is an old trick I can use that will defeat every attacker - disconnect the modem cable. The FBI will have a copy of it. Weatherly posted Wolf's IP address this morning. I've already contacted Wolf's ISP to have his account canceled for criminal conduct. And I will sending the IP info to them as well. He says he lives in San Francisco but his web site info indicates he lives in Shasta. He may be in violation of domain name registration rules. You have to take a childs toys away from him when he wants to use them to hurt others. ..... BB http://www.biblebob.net He will likely have help. They all need to be caught and jailed. I would consider it a rare pleasure if you would allow me to assist you in this ! I have a physical location on Johns machine, I need to compare it to a California map to know what town or suburb he is in, if it IS him. The wonderful thing about a network is that ip addresses are actually a tcp filter; remove the filters and you know everyone's data. If people knew how unsecured they really are on the net they wouldn't transmit ANY information on it at all. But thy don't. Rod Posted Via Usenet.com Premium Usenet Newsgroup Services ---------------------------------------------------------- ** SPEED ** RETENTION ** COMPLETION ** ANONYMITY ** ---------------------------------------------------------- http://www.usenet.com |
#9
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws
On Tue, 06 Feb 2007 21:27:22 -0500, "127.0.0.1"
wrote: Bible Bob wrote: On Tue, 06 Feb 2007 20:37:04 -0500, "127.0.0.1" wrote: Bible Bob wrote: On Tue, 06 Feb 2007 13:53:06 -0800, "R. Steve Walz" wrote: Bible Bob wrote: Be it known to all that would conspire with John Wolf to hack into privaely owned computer systems (specifically mine, you will be charged with conspiracy to violate US Federal Anti-Hacking laws. ------------------- You're a ****ing idiot. He's too stupid to ever be able to do that. And you're too stupid to ever know if he did. Steve Steve, Kinda over reacted didn't ya? Did you read the first line "to all that would?" According to the laws of grammar "to all that would" are not John Wolf. Bob, chances are a real hacker isn't going to leave behind his real IP-Number. I use an IDS (Intrusion Detection System) Called 'Snort' That runs in the background as a daemon. I get all kinds of break in attempts daily, these aren't portscans but programs like Nikto, Nessus and Metasploit searching for vulnerabilities and misconfigurations. It's possible that script kiddies like Roger are running ping sweeps on a range if IP's looking for open ports. I get scanned all the time (Most of the time its harmless) Sometimes its not. Last week, I got some moron trying to run Medusa and Brute Force my ssh login. That was a real break in attempt. The best way to stop hackers is the make sure your software is up to date. There is a reason that Buffer Overflow is the whipping boy of vulnerabilities. Thanks, I am Bible Bob, not Puter Bob (sounds kewl maybe I could be). I don't understand the terminolgy but I think I know what you mean. I use Outpost for my firewall and AVG for virus protection plus Adaware for spyware, etc. This is good. A firewall will stop the majority of people, it does nothing to stop hackers from writing malicious code to your buffers. Ever noticed that when you look at the 'windows patches' it may say something like; Without this patch a hacker could take controll of your operating system remotely? Programming errors inside of the operating system are known as buffer overflows. A program like Metasploit will scan your system for these programing errors/overflows find them - and then feed code to your memory buffer and drop a payload and give a person remote access. Metasploit is just one such program. Matter of fact here is a video you can watch on this very subject. http://video.google.com/videoplay?do...sploit&h l=en Verdy intaresting Programs like Nikto won't deliver a payload but it will find the slightest misconfiguration and give the user a programing exploit number to get into the system. The best way to stop this is to make sure you keep your software updated. I went to the snort website, I don't recognize the file extension on the download. Will Snort run on XP? Would I have to dump Outpost to use Snort? Snort will only run on Nix systems. I haven't used windows in years. "Google Windows Intrusion Detection System". I'm sure they have something. Or check out Linux, FreeBSD. Some of the new Linux distros have become just as user friendly as Windows. ..... BB http://www.biblebob.net I think it would be easier to shut the machine down when I'm not using it. So much for me becoming Puter Bob. Thanks a million for your help. ...... BB http://www.biblebob.net |
#10
|
|||
|
|||
John Wolf To Be Charged With Religious Hate Crime and Conspiracy To Violate US Federal Anti Hacking Laws
On Tue, 6 Feb 2007 20:30:49 -0600, "Rod" wrote:
"Bible Bob" wrote in message news On Tue, 6 Feb 2007 16:08:01 -0600, "Rod" wrote: "Bible Bob" wrote in message .. . Anyone knowing the IP adress of John Wolf or www.cerm.info please let me know. My software does not ID "info" web sites. ..... BB http://www.biblebob.net Bob ! If you have Win Xp go to the windows directory with notepad, find pfirewall.txt, open it and go to the last entry on the bottom and copy it to notepad then email it to me. If if you do not have Xp let me know what you do have. A person that has his own server and network also KNOWS how to HACK ! Rod Posted Via Usenet.com Premium Usenet Newsgroup Services ---------------------------------------------------------- ** SPEED ** RETENTION ** COMPLETION ** ANONYMITY ** ---------------------------------------------------------- http://www.usenet.com Rod, I have XP but my computer is also my business computer so it is protected with Outpost Firewall; not the XP firewall. The file you spoke of is not in my windows directory. I can send you the log file in csv format; but I do't know what good it will do. This morning the log showed 20,000 port attacks all defeated by the firewall. These files can be read with a text editor. The last 20,000 entires are the ones needed to be seen. The port #'s and ip addresses, and the protocol used. The thing is, UDP is a transport protocol for short distances (local networks), at long distances udp is unreliable. If udp was used the attacker had to be in the same domain block to use this protocol. If it was tcp, it could come from anywhere. Do you have a packet sniffer or packet capture program ? If so, run it in promiscuous mode on the next attack, for 5 minutes, then save the info into a file. A good sniffer will tell you what is at the front of the packet header, an e0000070h or an x means a forged packet, an anonomous server. A little window pops up over in the right bottom of my screen every time a port attack occurs. And I have virus software running continually with a complete scan of all drives every morning. Besides, there is an old trick I can use that will defeat every attacker - disconnect the modem cable. The FBI will have a copy of it. Weatherly posted Wolf's IP address this morning. I've already contacted Wolf's ISP to have his account canceled for criminal conduct. And I will sending the IP info to them as well. He says he lives in San Francisco but his web site info indicates he lives in Shasta. He may be in violation of domain name registration rules. You have to take a childs toys away from him when he wants to use them to hurt others. ..... BB http://www.biblebob.net He will likely have help. They all need to be caught and jailed. I would consider it a rare pleasure if you would allow me to assist you in this ! I have a physical location on Johns machine, I need to compare it to a California map to know what town or suburb he is in, if it IS him. The wonderful thing about a network is that ip addresses are actually a tcp filter; remove the filters and you know everyone's data. If people knew how unsecured they really are on the net they wouldn't transmit ANY information on it at all. But thy don't. Rod Posted Via Usenet.com Premium Usenet Newsgroup Services ---------------------------------------------------------- ** SPEED ** RETENTION ** COMPLETION ** ANONYMITY ** ---------------------------------------------------------- http://www.usenet.com I don't gang up on Christians. I don't even stand against them; just their behavior. Standing against them is standing against Christ and myself because we are all of the one body. But John Wolf is evidently not the real John Wolf, just a mummy that contains the spirit of God. Mummy's can preserved for a long time. Even when I rebuke and reprove or speak against our mutual acquaintance; I am speaking to the evil manifested through the carcase that hosts the demon. The body ain't nothin but the hammer the demon uses to pound on the children of God. Here is what I have. I assume your acttions will be in acordance with applicable laws; if not then no thanks but thanks for the offer. John says he lives in SF, used to live in Redding, but his IP points to Shasta Lake. 207.213.216.100 SBC Internet Services PBI-NET-3 (NET-207-212-0-0-1) 207.212.0.0 - 207.215.255.255 Coastside Net, Inc. PBI-CUSTNET-1269 (NET-207-213-216-0-1) 207.213.216.0 - 207.213.217.255 Domain ID13485309-LRMS Domain Name:CERM.INFO Created On:20-May-2006 07:48:23 UTC Last Updated On:19-Jul-2006 20:31:17 UTC Expiration Date:20-May-2007 07:48:23 UTC Sponsoring Registrar:MIT (R141-LRMS) Status:CLIENT TRANSFER PROHIBITED Registrant ID:C114805831326044 Registrant Name:John Wolf Registrant Organization:John Wolf Registrant Street1:Box 584 Registrant Street2: Registrant Street3: Registrant City:Shasta Lake Registrant State/Province:CA Registrant Postal Code:96019 Registrant Country:US Registrant Phone:+1.5302090352 Registrant Phone Ext.: Registrant FAX: Registrant FAX Ext.: Registrant Admin ID114808093275216 Admin Name:John Wolf Admin Organization:John Wolf Admin Street1:Box 584 Admin Street2: Admin Street3: Admin City:Shasta Lake Admin State/Province:CA Admin Postal Code:96019 Admin Country:US Admin Phone:+1.5302090352 Admin Phone Ext.: Admin FAX: Admin FAX Ext.: Admin Billing ID:C114805831326043 Billing Name:YahooDomains BillingContact Billing Organization:Yahoo! Inc Billing Street1:701 First Ave. Billing Street2: Billing Street3: Billing City:Sunnyvale Billing State/Province:CA Billing Postal Code:94089 Billing Country:US Billing Phone:+1.6198813096 Billing Phone Ext.: Billing FAX: Billing FAX Ext.: Billing Tech ID114808093275217 Tech Name:YahooDomains TechContact Tech Organization:Yahoo! Inc Tech Street1:701 First Ave. Tech Street2: Tech Street3: Tech City:Sunnyvale Tech State/Province:CA Tech Postal Code:94089 Tech Country:US Tech Phone:+1.6198813096 Tech Phone Ext.: Tech FAX: Tech FAX Ext.: Tech Name Server:YNS1.YAHOO.COM Name Server:YNS2.YAHOO.COM ...... BB http://www.biblebob.net |
Thread Tools | |
Display Modes | |
|
|