Bad idea - http://people.csail.mit.edu/rahimi/helmet/
To summarize, foil hats amplify signals at frequencies used by the government and multinational companies.
yes, but we're talking about signals from "elsewhere!"
Bad idea - http://people.csail.mit.edu/rahimi/helmet/
To summarize, foil hats amplify signals at frequencies used by the government and multinational companies.
I'm sorry but....what? I don't think people that have had their macbook stolen would monitor the persons activity, then tease them in a conversation basically telling them that they know what they're doing and then not be able to locate the macbook and recover it
Well if he stole a macbook and came on here to find the answer how to avoid the problems of anti theft software, he's obviously already aware of the software, so either he's being precaution cause it might be on there or he's already been caught by it, if he's already been caught by it he's screwed, if he's just being cautious then....he's the one sitting at a starbucks with the tape over the isight lol, and it really would have taken some playing in the preferences for maybe 30 minutes max to find this solution so maybe correct that thread to read
"congrats, you may have just saved someone 30 minutes while trying to steal a macbook"
You werent being spied on. Who's ever network your using simply has a log from the router requesting whatever website anyone on the network is requesting. I had the same log on my linksys and use it to monitor what my kids are viewing.
Is it spying? Not really as they are monitoring THEIR network. If you dont like it, dont use their network.
oh, also...he had access to my macbook.
That makes it easy, just look at history in the browser.
How do you do this? I have a linksys and this seems like a useful feature, is it a third party piece of software?
i mean he had access before this incident, so maybe he installed something?
contrary to so many who demand proof of someone spying on you....i happen to take you seriously.....for example AT&T make up a large part of private companies cooperating with the DHS (or to you dummies out there otherwise known as the SS)(go ahead and laugh) I cannot answer your spying questions, except to tell you AT&T spies on its customers; that mostly EVERY so-called security program sold out there has back doors to it which they will deny till doomsday, but just the same most have programs embedded within their program that "report back" to the owner of the program you are just leasing time from....LexMark is one printer I would totally stay away from because I found out the hard way that they not only monitor who owns their printer and what they are using it for but if they conclude you are less than perfection like them they will install programs into you Lexmark printer--such as anti-FRN copying and other stuff....they ALL might call it something else but its spying just the same.....and about your incidents....when this Leopard was being sold to the public especially how it had changed its way of security (making it crappy and having many open back doors to it INTENTONALLY) I found it very very puzzling just why Apple had to confir with the DHS in making its "new" security for Leopard, and I looked EVERYWHERE for some explanation by anyone just why Apple had to do this..and found absolutely NO articles about this--so I am guessing the DHS has a backdoor access to your Leopard computer-and everyone else's!! Maybe a lot of you guys out there don't mind that but I for one do! When you realize the huge area sized building they have in Colorado, and Brussels and Pine Gap to spy on the entire world a lot of ink is used to deceive many of us into thinking this doesn't happen-BUT IT IS!
Bad idea - http://people.csail.mit.edu/rahimi/helmet/
To summarize, foil hats amplify signals at frequencies used by the government and multinational companies.
*[snip]*
i mean he had access before this incident, so maybe he installed something?
how about reading the thread where someone suggests what you should look at?
contrary to so many who demand proof of someone spying on you....i happen to take you seriously.....for example AT&T make up a large part of private companies cooperating with the DHS (or to you dummies out there otherwise known as the SS)(go ahead and laugh) I cannot answer your spying questions, except to tell you AT&T spies on its customers; that mostly EVERY so-called security program sold out there has back doors to it which they will deny till doomsday, but just the same most have programs embedded within their program that "report back" to the owner of the program you are just leasing time from....LexMark is one printer I would totally stay away from because I found out the hard way that they not only monitor who owns their printer and what they are using it for but if they conclude you are less than perfection like them they will install programs into you Lexmark printer--such as anti-FRN copying and other stuff....they ALL might call it something else but its spying just the same.....and about your incidents....when this Leopard was being sold to the public especially how it had changed its way of security (making it crappy and having many open back doors to it INTENTONALLY) I found it very very puzzling just why Apple had to confir with the DHS in making its "new" security for Leopard, and I looked EVERYWHERE for some explanation by anyone just why Apple had to do this..and found absolutely NO articles about this--so I am guessing the DHS has a backdoor access to your Leopard computer-and everyone else's!! Maybe a lot of you guys out there don't mind that but I for one do! When you realize the huge area sized building they have in Colorado, and Brussels and Pine Gap to spy on the entire world a lot of ink is used to deceive many of us into thinking this doesn't happen-BUT IT IS!
snip NO ONE IS COMING AFTER YOU! Unless your a criminal.