|
Posted by Sycho on 11/14/32 11:27
Today Chairman Cow <covvtsetung@hotmail.com> opened a dead sea scroll
and found these words written therein..
>In article <43320d94.15311807@things-thatmakeyougohmm.com>,
>ontheroad@the-break-of-dawn.com says...
>> Today Chairman Cow <covvtsetung@hotmail.com> opened a dead sea scroll
>> and found these words written therein..
>>
>> >In article <4331cf1a.47893579@things-thatmakeyougohmm.com>,
>> >ontheroad@the-break-of-dawn.com says...
>> >
>> >> Today Chairman Cow <covvtsetung@hotmail.com> opened a dead sea scroll
>> >> and found these words written therein..
>> >>
>> >> >In article <43311ba9.1949406@things-thatmakeyougohmm.com>,
>> >> >ontheroad@the-break-of-dawn.com says...
>> >> >
>> >> >> Today Chairman Cow <covvtsetung@hotmail.com> opened a dead sea scroll
>> >> >> and found these words written therein..
>> >> >>
>> >> >> >In article <43319525.15509064@things-thatmakeyougohmm.com>,
>> >> >> >ontheroad@the-break-of-dawn.com says...
>> >> >> >
>> >> >> >> Today Chairman Cow <covvtsetung@hotmail.com> opened a dead sea scroll
>> >> >> >> and found these words written therein..
>> >> >> >>
>> >> >> >> >In article <43306bba.1301344@things-thatmakeyougohmm.com>,
>> >> >> >> >ontheroad@the-break-of-dawn.com says...
>> >> >> >> >> Today Perfect Reign <theperfectreign@yahoo.com> opened a dead sea
>> >> >> >> >> scroll and found these words written therein..
>> >> >> >> >>
>> >> >> >> >> >On Mon, 19 Sep 2005 19:12:17 -0700, someone posing as Fly Cooter pretended
>> >> >> >> >> >that someone gave a rat's ass and spewed out:
>> >> >> >> >> >
>> >> >> >> >> >< drivel snipped>
>> >> >> >> >> >
>> >> >> >> >> >> to have these disgusting homo composites removed from Petitmorte.net for
>> >> >> >> >> >> more than a year. Fly comes along and saves the day for Tom. Fly comes
>> >> >> >> >> >> along and makes a fool out of PJR and the irresponsible goons at
>> >> >> >> >> >> Petitmorte.net that let him keep that shit on their virtual server.
>> >> >> >> >> >>
>> >> >> >> >> >> --
>> >> >> >> >> >> Fly Cooter
>> >> >> >> >> >> http://fly-cooter.tripod.com
>> >> >> >> >> >
>> >> >> >> >> >Oh fuuk! This dude's a local!
>> >> >> >> >> >
>> >> >> >> >> >(From the fly-cooter website...)
>> >> >> >> >> >
>> >> >> >> >> >Hey there. I'm Terrence Cooter. I live in San Bernardino, California and my
>> >> >> >> >> >friends call me Fly. Welcome to my home page.
>> >> >> >> >> >
>> >> >> >> >> >My Favorites
>> >> >> >> >> >
>> >> >> >> >> >Favorite Band or Musician: Motley Crue, Dokken, Ratt & Twisted Sister
>> >> >> >> >>
>> >> >> >> >> Fuckin glam bands! I gotta admit tho, Dokken did have a few decent
>> >> >> >> >> tunes. "Alone Again" and "Dream Warrior". As did Twisted Sister.
>> >> >> >> >> "We're Not Gonna Take It", "Captain Howdy", "The Price", "Burn in
>> >> >> >> >> Hell" and "I Wanna Rock" to name a few.
>> >> >> >> >>
>> >> >> >> >> Try death metal. It's not for the faint of heart.
>> >> >> >> >>
>> >> >> >> >> >Favorite TV show: Buffy the Vampire Slayer
>> >> >> >> >>
>> >> >> >> >> HAHAHAHAHAHAHA!!!! Sissy!
>> >> >> >> >>
>> >> >> >> >> >Favorite Talk-Radio host: Art Bell, Sean Hannity, Matt Drudge
>> >> >> >> >> >Favorite Movie: Friday the 13th
>> >> >> >> >>
>> >> >> >> >> zzzzzz... Robert Englund as Freddy Krueger and Angus Scrimm as the
>> >> >> >> >> "Tall Man" rules!
>> >> >> >> >>
>> >> >> >> >> >Favorite Book: The Anarchist's Cookbook
>> >> >> >> >>
>> >> >> >> >> Uh huh.. Sorry, but that book doesn't consist of purdy popup pictures
>> >> >> >> >> or scratch and sniff pages.
>> >> >> >> >
>> >> >> >> >I'm thinking that with any luck, he'll actually try some of
>> >> >> >> >the 'recipes' in there.
>> >> >> >> >
>> >> >> >> >Without establishing a non-reactive atmosphere first. <eg>
>> >> >> >>
>> >> >> >> As Marvin Martian would say.. "Where's the kaboom??" hehehehe
>> >> >> >
>> >> >> >When is Warner going to bring Duck Dodgers out on DVD?
>> >> >>
>> >> >> I miss Animaniacs. Tiny Tunes wasn't really all that great. Ok,
>> >> >> there's nothing wrong with a 36 year old watching Animaniacs at all.
>> >> >> lol
>> >> >
>> >> >It beats the heck out of most network fare
>> >> >
>> >> >> >I've got three Marvin VHS tapes, but there aren't any DVDs.
>> >> >>
>> >> >> Do they have the Kaboom? Where's the kaboom? lol
>> >> >
>> >> >As I remember, there were several Kabooms. But poor
>> >> >Marvin, as usual, was on the receiving end. What that poor
>> >> >d00d won't do to woo the Martian Queen.
>> >> >
>> >> >Hmmmmm.
>> >> >
>> >> >Y'all might consider establishing some sort of luv sick
>> >> >puppy / hoist on one's own petard k00k award in honor of
>> >> >the little guy.
>> >>
>> >> I can think of a few idjits that can be hoisted up by their nut sack
>> >> or nipples. Namely, Tracker (aka Debbie Gambriel).
>> >
>> >I know a Tracker who has been on Usenet since the early to
>> >mid-90's, but his name is not Debbie
>> >
>> >> She needs to be
>> >> strung up and lowered at half staff.. What with her VPNs, pre-paid
>> >> phone cards and the like.
>> >
>> >Is there a k00k site/page in her honor somewhere where I
>> >could read more? They sound a lot alike. I have a passing
>> >interest, as the "CoT" in my headers = "Cult of Tracker"
>>
>> Right now my web server is down pending my return back to Ohio from
>> Minnesota. That'll be next week. Once I'm back I'll have my web site
>> back online and supply you with a link to a page I set up in her
>> (dis)honor. ;) I think you'll get a big kick out of it.
>
>Thank you, kind sir. I'm always interested in learning
>about the legends in a new town.
Here's some good readin material for you while I'm waiting to get back
home.. :)
Wait'll you see the pics of her that I included. LMAO ;)
This was taken directly from my web site.
==================
The story behind the most notable troll in all of AHMdom
Oh yeah, she's a "babe" alright. If I remember correctly, wasn't
"Babe" a pig? BWAHAHAHAHAHA!!
Tracker.. Best known for her blundering and idiotic rantings via her
posts to news groups pertaining to hacking in all aspects of the word
has been plaguing all of Usenet for the past year or better. (news
groups AKA forums)
Tracker, for all intents and purposes is nothing more than a troll. A
bad one at that. Constantly seeking attention in some form or fashion.
Her constant misuse of the word "VPN" (Virtual Private Networking) and
its meaning is utterly hysterical. She thinks that's how hacking is
done, I suppose.
Her real name is Debbie Gambriell. (In her mid 40's) [Note: There are
some discrepancies as to the actual spelling of her last name. It is
either Gambriel, Gambriell or Gambrielle] She resides in King county
in Des Moines, Washington. Her last known place of residency was 24128
18th Place S - Des Moines, WA - 98198. She's a known troll in a lot of
hacking related news groups and frequents ferret news groups.
According to this idiot, anyone who owns a ferret is a hacker. So,
guys, and gals.. If you're a hacker, you MUST run to your local pet
store and buy one of these animals. At least one. No hacker can be
without them. It's a sin according to Debbie.
Here, for your entertainment is some of Tracker's (Debbie Gambriell's)
most hilarious posts to AHM. (alt.hackers.malicious)
Each time she tells a lie, you can actually see her nose grow. What's
up, Pinocchio!!
That's it, Tracker. Tell your "truth".
Tracker confusing an IRC (Internet Relay Chat) client with an IRC
server..
"The past few days on the MIRC Servers with you hackers has been very
challenging. I've learned that some of my skills might be higher or
elite to some hackers and that is a compliment, not that this babe
cares. Just want to speak to Zimar, we don't need to warn ya but we
will make sure you get butt fucked when you go to prison. Hackers-
don't forget them innocent victim canceled Cable/DSL dial-up account
running a Dial-up Server and them Prepaid Phone Cards."
Tracker thinking she has clout and mutters something about an alleged
"book" she claims she's writing.
"I just listed the proxy owners who are allowing me to use their
servers if I won't list their vulnerability in my book! Do you think a
bank, university, credit union, etc wants to show the world their
systems are being abused by hackers? Have no idea of the remark of
stalking innocent victims! All victims are being contacted by The
Trackers."
Tracker not able to comprehend what VPN means or what it does.
"Hey, I'll give you the VPN IP addresses if you show me how to use
them? /darn. lost them 100 pre-paid phone cards and dialup servers."
Tracker's delusions of grandeur.
"Finally, it happened! Was accepted into the Elite Hacker World!
Maybe this is happening in my dreams! Hope it lasts,but so far so
good! Hey, maybe you luzers might get rid of me sooner then later.
Thanxs for listening."
"Many of you, definately, will learn about 'The Trackers' when the
book comes out. How we have accomplished owning a number of ISP
accounts. Your welcome."
When caught admitting to stealing other Internet accounts to post to
news group, Tracker backpedals.
"I'm not using stolen accounts dude or babe. In my world, friends are
important and when they understand my cause to stop the malicious
hackers, they comply to my wishes. If my friends give me permission to
use their accounts, there is no reason for me to hack and track
anyone. Have found many users believing every word spoken on Usenet,
and they need to learn a few things about social engineering. We found
another FLAW pertaining to an ISP and this is totally sick. When they
are contacted soon, if they don't understand their flaw, it will be
posted to my message board for all to exploit for fun.."
Tracker forgot to take her medication and is now suffering from a
severe case of multiple personality disorder.
"Have found many users believing every word spoken on Usenet, and they
need to learn a few things about social engineering."
Still talking about this so-called "book" , "fame", "wealth" and
"social life" that never was.
"Tracker is glowing and shining right now. My book will be "complete"
tomorrow, after two and a half years in the making. During the
creation of my book, the date "22" or the number "2" is a lucky number
in my family. All events during the making of my book has happened on
either the 22nd or ending in the number 2. My book will help millions
of computer users and I'm so proud of myself. It's been hard
sacrifices my social life to help millions of individuals, but well
worth it in the long run. Becoming famous, the wealth and helping
millions has put me on one powerful trip, to say the least. I'm
awaiting for my attorneys guidance pertaining to my legal liabilities
with the information listed in my book."
[Sycho's note. Today's date is October 13, 2003 which is also the date
this page came into being and the above was posted on or around June
7, 2003. Where's this "book" of yours, Tracker? Saved HTMLs from other
web sites that you did not write or create do NOT constitute a "book"
by any means. See the link for yourself. You be the judge.]
Tracker giving "advice" on how to kno your system was compromised by a
hacker.
THESE ARE SIGNS TO LOOK FOR TO TELL YOU YOUR COMPUTER IS HACKED/OWNED:
A. Hackers disable your Daylight Savings Time.
B. The clock on the desktop can be one hour ahead or one hour behind,
on occasion.
C. Your Network Places Icon on the desktop disappears.
D. If using a Windows platform: when you start your computer, your
original screen will pop up, but since the hackers need to boot into
their Server(s), the system will quickly re-boot and the original
screen will appear twice. But your system may re-boot twice instead
of once when loading Windows OEM versions.
E. If your computer system occasionally re-boots on it's own, the
hacker may need to update their Servers to make their computer system
function properly.
F. If you play Yahoo Games, you may find yourself being kicked out of
the board your playing in. If your winning a game and you're the
host, the hacker may not let you back in to finish. This means you
just lost a game at the hackers expense. When the computer was hacker
safe, I went back to playing games and haven't been booted out of a
game, since.
G. A browser application you install to filter out, or kill file
certain individuals will not function indefinitely. When your
computer system is owned, you aren't able to filter out people in your
browser for more then 1-2 days. A number of computer owners whose
systems have been owned, have advised me they also had the same
problem. Because hackers were using your illegally installed Servers
for posting to the Internet, this is why you are unable to filter or
kill file them. This information was very apparent to myself and
other ferret owners whose computer were owned.
H. When you begin to see Usenet remarks, made on behalf of your
personal life which is private information.
I. Some of your personal files are modified years before they were
created. I have seen a number of personal files modified 7-8 years
before they were even created. How to accomplish this trick: Select
Start, Settings, Control Panel, Date/Time, where the year is, Select
the up or down arrow and, viola. Then open up any file and Select
Save. A new creation date is present.
J. You will find a number of files hidden/readable only, which is
common practice.
K. When you find additional information in your boot.ini file which
relate to a Virtual Private Network, this can be either software,
hardware or device driver oriented.
L. Under Search for Files and Folders, you do a search on any file
modified in the past month, you will see files which just don't need
to be modified, or files you don't even recognize. For the simple
minded, you'll want to focus on the files which you don't recognize.
Unless your a skilled professional, you won't realize which files need
to be present or modified, but give it a try anyways. [To perform the
above you will need to see all Hidden Files and Folders.]
M. Select Start, Settings, Control Panel and Network, and look at,
following network components showing. If you see one AOL adapter and
have never used AOL, then two AOL adapters, two TCP/IP, two Dial-Up
adapters, one or two Virtual Private Network adapters, your computer
could be owned. A Virtual Private Network is widely used by hackers
because it can host up to 254 users. "This applies to the average
Internet user who has one modem, one ISP and isn't running any FTP,
HTTP, NNTP, PROXY, SMTP, SOCKS, SQL, or SQUID SERVER." My skills
working with VPNs is almost zero. Every victims system I've seen had
two VPNs set-up and they were only using a modem to connect to the
Internet.
N. Next, Select Start, Run, type Regedit, Select Registry, Select
Export Registry File, in the box type a name say 4-12-02.txt and
Select save. Then open this file with a text editor, and you might be
shocked to find what really is installed on your computer system.
Check the bottom of this file, hackers love to install a bunch of
applications, Servers files and device drivers.
O. You have to turn your computer off by the power supply on a some
what regular basis.
P. Installing a Network Interface Card will cause problems until the
hackers configure this device into their Servers or Virtual Private
Network they setup on your computer.
Q. You find your cd-rom drive opens and closes without your
permission.
R. You could hear an annoying beep coming from your system speake
S. Your windows screen goes horizontal or vertical.
T. The screen saver picture changes without your permission.
U. On occasion your mouse is out of your control or has an
imagination of it's own. But this could also be caused by a corrupt
mouse driver.
V. All of a sudden, your speakers decide to play you some music.
W. Installing a hardware/software firewall for the first time can
cause a number of different problems for you to set-up and configure.
Considering you didn't have these installed from the beginning of your
computer going on the Internet.
X. Your firewall logs show alerts at 12:00 then 11:22 then 12:16 and
back to 11:59.
Y. If using a dial-up/cable/dsl connection you see a number of pings,
port 0, to your computer. The reason is so that the hackers can see
if your computer is active/alive. A system needs to be online for the
hackers to access these Servers. What the hackers actually do is port
scan your Internet Service Provider Block of IP addresses and find
your computer either with file sharing enabled or a Backdoor/Trojan.
Z. If someone is port scanning your system, in your firewall logs the
port assignment aren't in any type of order. You might see a probe at
port 1,10,9,8,6,12,6,43 etc.
AA. When you find you have to set Zone Alarm firewall on medium
instead of high settings.
BB. Once you can view all Files and Folders search for files named
spool*.*.
CC. You may find another installed version of your software firewall
application on your hard drive. You will need to Show all Hidden
Files and Folders under your Settings, Control Panel, Folder Option
and View, if using a Windows Platform (excluding 2000,NT and XP).
DD. When you see too many, Pings - port 0, HTTP/Proxy - port 80,
8080, 3128, SMTP - port 25, FTP - port 21, NNTP - port 119 port
probes. Your computer is probably running an illegal "VPN server";
"web server"; "proxy"; "mail and news"; "ftp"; which hackers are
attempting to access for their own personal use.
EE. If you don't see your computer node/source IP address on a
consistent basis to the right side of your firewall log, your system
is hacked/owned. (See the firewall logs below.) The hackers are
entering through your system to attack other "Networks and Systems",
so their identity can't be traced.
FF. When you perform a traceroute on an IP address and you lose your
node/source IP address, ISP routers IP. Or when you don't see your
node/source IP address at all.
GG. If you see the following in your Black Ice Defender INI file.
Yes! folks, here are the IP addresses of the owners who took over my
Domains:
a. trust.pair = 168.143.114.50,2000xxx
b. 200.10.69.8,2000xxx
c. 172.149.134.138,2000xxx
d. 12.231.23.99, 2003xxx
e. 12.231.11.119,2003xxx
f. 209.213.79.152,2003xxx
g. [Trusting] = trust.pair=206.134.133.10,2003xxx
I don't think I need to copy and paste anymore, but if you want, here
is the link
(http://groups.google.com/groups?as_q=Tracker&as_oq=Tracker&safe=images&ie=ISO-8859-1&as_ugroup=alt.hackers.malicious&lr=&hl=en)
to a lot of her posts pasted on this page. All archived on Google for
your amusement. And if anyone has a link to anymore pictures of her,
please let me kno so I can include it here.
==================
So whadda ya think? She's also using Windows 95 and is still on
dial-down. LMAO
--
And they said unto Jesus, "How the hell did you do that?!"
Navigation:
[Reply to this message]
|