Page 2 of 2 FirstFirst 12
Results 26 to 46 of 46

Thread: Panic Mode!

  1. #26
    Member Lisa Gerrie's Avatar
    Join Date
    Sep 2007
    Location
    N. Lower Michigan
    Posts
    439
    Quote Originally Posted by Rachel Morley View Post
    Press "Control and F4 key" at the same time
    They are supposed to, but not all programs respond to that. Alt-F4 is more universal; on Windows systems it closes the current application. If your browser asks "close all tabs?" just press Enter.
    "Don't hate me just for wanting to feel beautiful."

  2. #27
    Banned Read only
    Join Date
    May 2011
    Location
    South Carolina
    Posts
    1,303
    I fear this all the the time, we have several computers in the house, with WI-FI. I have captured web sites from one of my neighbors that I know that my wife and I would never go to. And maybe our neighbors may see this site. I really don't worry about it. If they see my few pics on here, I know they could not tell it's me. But if on the small percentage that I was recognized, and if they spoke to me and said we found out about you and you are freakish cross dresser, I would just say yes I am, so now do you not like me pushing your children on the swing?
    I don't really worry about it anymore.
    And MarinaKirax, I'm so glad for you that all is good or you now.
    Last edited by Tara D. Rose; 04-15-2013 at 04:39 AM.

  3. #28
    AKA Jenni Aly Jenni Yumiko's Avatar
    Join Date
    Jan 2013
    Location
    SW Chicago burbs
    Posts
    1,342
    In reply to the pm's
    Number one, use strong passwords and change them regularly! Never use the same password for more than one login!
    Strong password generator here -> http://strongpasswordgenerator.com/

    Basic wireless security - do all these things
    Disable remote management on router
    Enable MAC addresss filtering
    Disable ssid broadcast
    Wep security (very ineffective, but some older routers only support this, always WPA personal minimally when available)h
    Use firewalls on internal computers
    DMZ nothing, even though manufacturers state use DMZ, ESP for gaming devices.

    better security
    All the Above + WPA security
    Disable DHCP and use static addresses only
    Enable and view access logs regularly

    best practices
    All the above +
    WPA enterprise with signed security certificate
    Proxy all wireless traffic through VPN internally. (Prevents sniffing to procure WPA key - Karrens kids method)
    Guest zone all non certificate securable devices, iPods, iPads, ps3 etc. only give them access to the Internet.
    Any streaming media device, hardwire. Apple TV, Roku, smart TV's, etc. This prevents insecure packets and it reduces jitter and lag watching video.
    Create Separate VLANs based on device. (Kids Macs are on one VLAN, my work computers are on another)
    Create ACL's on your switches to route traffic appropriately.
    Ay device that needs Internet access Inbound change the port to an obscure one. (Ie if you ssh into your home network, map port 3241 to 22)

    Some of these, ESP in the best practices assume better than average consumer grade equipment.
    Last edited by Jenni Yumiko; 04-14-2013 at 10:00 AM.

  4. #29
    Platinum Member Beverley Sims's Avatar
    Join Date
    Nov 2011
    Location
    Lowestoft UK. Beverley was here.
    Posts
    30,955
    All I can say everyone should read this thread and think what might be!
    Jennilay and others have given comprehensive explanations and what is needed now is for you to read and understand what has been said.

    Those that are into social networking be cautious as well without spoiling your enjoyment if the medium.

    It is simple to upgrade your security. Even a little bit gives tenfold what you may have now.

    I had lost 19 posts the other day I assume to bad posts being deleted.
    I was skeptical because nineteen was a lot for one day.
    Work on your elegance,
    and beauty will follow.

  5. #30
    Silver Member
    Join Date
    Feb 2009
    Posts
    3,056
    giuseppina -- signals that aren't broadcast can't be intercepted. Sorry to disappoint you but they can. That is why top secret installations are inside of wire cages. It just isn't as easy.

  6. #31
    Member Lisa Gerrie's Avatar
    Join Date
    Sep 2007
    Location
    N. Lower Michigan
    Posts
    439
    Quote Originally Posted by Tara D. Rose View Post
    I have captured web sites from one of my neighbors that I know that my wife and I would never go to.
    Tara, can you elaborate on "captured"? Were you trying to use your neighbor's WiFi signal, or did those sites just appear in your browser, or...? Have you ever seen "normal" things pop up, like your neighbor's Facebook page?

    All,

    IMO it's like securing your home. If you live in a bad neighborhood, extra locks are a good idea. I live in a residential neighborhood and I can barely get a good WiFi signal from one end of my house to the other, so unless somebody is trying to break it, they won't even know I am here. My neighbors are mostly older people who can barely handle their own computers, much less break into mine.

    I'm much more concerned about protecting myself from identify theft than Mrs. Grumby knowing that I wear panties. That's the reason I use MAC filtering, even though it is inconvenient when a visiting friend just wants to check their email.
    "Don't hate me just for wanting to feel beautiful."

  7. #32
    Banned Read only
    Join Date
    May 2011
    Location
    South Carolina
    Posts
    1,303
    Hi Mich Salem, Maybe I should have used a different word than "captured". But just a short while back, my wife was on the computer and she hit history. She asked what I was doing looking a such different websites than as is normal for me? After both of us working to figure out why web sites kept popping up as if we were viewing them, while all the while knowing we were not viewing them. The sites would then appear in cookies as we sat there. It was only for that one day as well.
    I would never try to spy on my neighbors.

  8. #33
    AKA Jenni Aly Jenni Yumiko's Avatar
    Join Date
    Jan 2013
    Location
    SW Chicago burbs
    Posts
    1,342
    You probably hit a site that had under pops and it spawned a ton of sites that you clicked off before they loaded. The cookie is usually dropped in before the page fully loads as it is a concurrent request and the cookie data size is much smaller than images.

  9. #34
    Member Lisa Gerrie's Avatar
    Join Date
    Sep 2007
    Location
    N. Lower Michigan
    Posts
    439
    I wasn't implying that Tara, I was thinking more along the lines of "borrowing" an unsecured WiFi signal and seeing something accidentally. IMO what you saw has nothing to do with your neighbors, and nothing to do with WiFi security. Sounds more like unwanted popups ending up in your browser history. But I'm no expert.
    Last edited by Lisa Gerrie; 04-15-2013 at 05:30 AM.
    "Don't hate me just for wanting to feel beautiful."

  10. #35
    Aspiring Member Ceri Anne's Avatar
    Join Date
    Sep 2012
    Location
    Kansas City
    Posts
    809
    That would be freaky. I have my network setup so that can't happen. I have windows, not mac, so can't tell you how to do it there........btw........MAC is for makup

    Glad everything worked out ok.
    [SIGPIC][/SIGPIC]

    Follow me on Facebook
    http://facebook.com/ceri4certain

  11. #36
    Woman and loving it Jennifer Marie P.'s Avatar
    Join Date
    Mar 2007
    Location
    Central Jersey
    Posts
    4,970
    You were in panic mode relax now.
    Pinkessence Transliving Urnotalone

  12. #37
    Just a touch of class Lynn Marie's Avatar
    Join Date
    Feb 2010
    Location
    NW Washington State
    Posts
    2,898
    A good friend from many years ago whose profession was smuggling once told me that sooner or later you're always going to get caught. Be prepared for it. That was good advice. Hiding has always made me very uncomfortable. I now avoid it like the plague.

  13. #38
    AKA Jenni Aly Jenni Yumiko's Avatar
    Join Date
    Jan 2013
    Location
    SW Chicago burbs
    Posts
    1,342
    This wouldn't be hiding, this would fall under security and loss prevention.

  14. #39
    Chelsea Von Chastity gender_blender's Avatar
    Join Date
    Oct 2004
    Location
    New Hampshire, USA
    Posts
    628
    Remain calm. Put on more lipstick. Deep breath. Relax.

  15. #40
    Platinum Member Eryn's Avatar
    Join Date
    Jan 2011
    Location
    SoCal
    Posts
    12,387
    Quote Originally Posted by lingerieLiz View Post
    giuseppina -- signals that aren't broadcast can't be intercepted. Sorry to disappoint you but they can. That is why top secret installations are inside of wire cages. It just isn't as easy.
    Your ordinary hacker won't have the equipment to sniff and interpret the RF that needs Faraday cage protection! There would be no point with so many easier targets out there. That said, I don't think that there would be much interest in the web sites anyone is viewing. They're looking for things that they can steal.
    Eryn
    "These girls have the most beautiful dresses. And so do I! How about that!" [Kaylee, in Firefly] [SIGPIC][/SIGPIC]
    "What do you care what other people think?" [Arlene Feynman, to her husband Richard]
    "She's taller than all the women in my family, combined!" [Howard, in The Big Bang Theory]
    "Tall, tall girl. The woman could hunt geese with a rake!" [Mary Cooper, in The Big Bang Theory]

  16. #41
    Member Stacey Summer's Avatar
    Join Date
    Jul 2011
    Location
    Southeast UK
    Posts
    117
    MAC Address filtering is a good way to go about things but as far as I know they can be spoofed. However, for future reference, on a PC or laptop (And I'm guessing it's the same for Mac) you cannot control another persons computer without either Remote Desktop (Windows) or a third party program such as Teamviewer. In either case you have to give permission for them to control things.

    Of course someone who knows what they're doing could still get in and look around your file system but most people who can do that really don't bother with general household computers unless they know it'll be worth their time. To be honest, WPA/WPA2 encryption is pretty damn good. As long as you've got a good password no one can get on and they won't be able to break it. For instance my wireless password, which is the same for a number of things is 25 characters long and contains letters, numbers and symbols. It would take VERY long time to break, if at all.

    Stacey.

  17. #42
    AKA Jenni Aly Jenni Yumiko's Avatar
    Join Date
    Jan 2013
    Location
    SW Chicago burbs
    Posts
    1,342
    To eryns post, I have a faraday wallet from Think Geek. Last year at DefCon I still got doxed and cover blown. (Not FBI or anything glamorous, just keeping a step ahead of the H/P's!)

    If you understood anything above, you either work with me, against me or compete versus me :-)

  18. #43
    Platinum Member Eryn's Avatar
    Join Date
    Jan 2011
    Location
    SoCal
    Posts
    12,387
    There is likely a difference in effectiveness between a Honest To DoD TEMPEST enclosure and a Thinkgeek wallet.

    An RFID tag in your wallet is designed to report data in a standard format when queried and therefore is an attractive target. The incidental emissions from a PC are not in a standard format and few non-governmental entities would be equipped to handle them, certainly not the script-kiddie next door. Even if you could analyze these emissions you wouldn't get much in the way of profitable information.
    Last edited by Eryn; 04-15-2013 at 09:58 PM.
    Eryn
    "These girls have the most beautiful dresses. And so do I! How about that!" [Kaylee, in Firefly] [SIGPIC][/SIGPIC]
    "What do you care what other people think?" [Arlene Feynman, to her husband Richard]
    "She's taller than all the women in my family, combined!" [Howard, in The Big Bang Theory]
    "Tall, tall girl. The woman could hunt geese with a rake!" [Mary Cooper, in The Big Bang Theory]

  19. #44
    Lacy Lacyfem's Avatar
    Join Date
    Apr 2010
    Location
    Arizona
    Posts
    432
    Wow I posted a picture of me in my wife's new dress and got chastised by several about wearing her cloths without telling her. Like you I've had some close computer calls but they wouldn't be close if I was out to the family as some have said to do. Easier said than done and think some should be more understanding as we don't all have understanding wives and or are single. Again, like you I've almost been uncovered and afterwards having escaped a stiff drink would be in order.

  20. #45
    Member Christinedreamer's Avatar
    Join Date
    Aug 2007
    Location
    Palmdale, CA
    Posts
    397
    This is one reason why I have decided NOT to buy into all the latest wireless craze and all the silly gadgets. I have a simple cell phone, NEVER text, I have a hard wired LL phone and DSL hardwired router with firewall, and never use automatic update programs. I also still have hundreds of cassettes with the best music ever recorded, a big VHS collection and a simple TV. No worries, no incessant upgrades, they always work and are simple to operate. No handshake issues or hourly format changes.

  21. #46
    Silver Member linda allen's Avatar
    Join Date
    Aug 2010
    Posts
    4,924
    Quote Originally Posted by MarinaKirax View Post
    So I'm browsing the site today, wife is out all day and the kids are elsewhere in the house. We have a wireless network and some teenagers that live next door, pretty tech savvy. All of a sudden my cursor starts not responding to my touchpad. In fact, it's going wherever it wants! I move it right, it moves back left. Oh CRAP! I thought - it's a mac, and it broadcasts its name on the network (so-andso's MacBook Pro) and someone is screen sharing! I cant figure out quite how, but maybe one of my kids has opened a connection from another computer in the house, they might well know the passwords (we have to change them all the time), or WORSE! It might be the teenagers next door who could have eother hacked the password or asked my kids, who are seeing that I am on Crossdresers.com! Oh Shit! No one else at home would be surfing that site, (certainly not my kids - cant blame it on them...) especially if they saw I was signed in!

    I am DONE! The neighbours kids know my secret! I rapidly try to move the mouse up to sever the wireless connection, but the mouse is now moving REALLY fast and trying to stop me. They won't let me sever the wireless connection. They want me to stay on this page so they can take a screenshot or something. I am on the point of powering down in a frenzy, when I get my cursor to hover for just long enough over the icon to sever the wireless connection. I sit still, stunned. Someone knows. Someone thought it would be funny to screen share my computer and they caught me on a crossdressing forum. Will I have explaining to do to my school age kids, or will I face knowing looks from the neighbours kids? Resigned, I change the wireless password immediately, and I contemplate my fate, and possible explanations I might give (But the damned computer is "My"MacBook Pro" - explain THAT! I am well and truly screwed.

    Just then my son comes around the corner holding up the wireless Razor mouse that is paired to this computer, and he says "Hey Dad, what IS this?" He has been playing with the mouse upstairs! My secret is safe. I need a drink, ladies.
    Your computer doesn't have a power switch? A cord you can unplug?

    Have a plan.
    [SIGPIC]http://www.crossdressers.com/forums/image.php?type=sigpic&userid=82706&dateline=137762 0356[/SIGPIC]Linda

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  


Check out these other hot web properties:
Catholic Personals | Jewish Personals | Millionaire Personals | Unsigned Artists | Crossdressing Relationship
BBW Personals | Latino Personals | Black Personals | Crossdresser Chat | Crossdressing QA
Biker Personals | CD Relationship | Crossdressing Dating | FTM Relationship | Dating | TG Relationship


The crossdressing community is one that needs to stick together and continue to be there for each other for whatever one needs.
We are always trying to improve the forum to better serve the crossdresser in all of us.

Browse Crossdressers By State