* * * * *
Shhh, don't let them in on it …
> From the Internet's perspective, your computer was never on the Internet at
> all. If someone traces the connections back, the packets will all look like
> they came from the hijacked connection. This is especially useful when
> dealing with monitored conversations (see Echelon, Carnivore, the ultra-
> secret level-3 DeadMan monitoring stations that pepper the globe like
> icepick wounds in Trotsky's skull).
>
> Note that I'm talking about taking over lower-level connections, *not*
> impersonating users to make it look like they sent an email or a Usenet
> post. That sort of stuff is relatively trivial. I'm talking about physical
> and data-link OSI-level takeover. I was going to use this very technique to
> send this post, but it takes finding a physical close computer that is
> running Win9x or “Win2K”, and the scanning program to find such a computer
> has not been ported to Windows 2000 (which is the program I am using to
> compose this article).)
>
Alien Internet Conspriracy [1]
Uh, yea. Right.
[1]
http://www.hardcorelinux.com/alien.htm
Email author at
[email protected]