.
VR
STABB666's Journal


STABB666's Journal

THIS JOURNAL IS ON 88 FAVORITE JOURNAL LISTS

Honor: 2,926    [ Give / Take ]

PROFILE




10 entries this month
 

09:22 Feb 19 2007
Times Read: 801


A while back, some people I know offline took it upon themselves to start reading my online journals.



Then, some of these self-professed friends decided that they would anonymously reply to me with semi-abusive language, under the guise of 'tough love'.



Well, that feels shit, when one is being spied upon, so that people who think that they know what is best for us, can gain a mesaure of self-satisfaction from their outburst.



When in fact, these people never invite an honest relationship and instead, use their position on the fringes of my life, to infer that they have the right to come into my world and make commentary.



They do not. They do not know me as a person, nor include me in many aspects of their life. As a result, they make assumptions based upon their skewed sense of 'friendship'.



And I suspect that this may even be read by those same gutless cowards. So ashamed of their motives are they, that they must send me messages to my public journals, claiming to know what is best for me.



Well, I deleted one where it was over the line of where they exists in my social group. and so, if you read this, as a two-faced liar, then know that if you do such things again, I will humiliate you, in front of everyone we know.



If you want to bring it, then be prepared to suffer for your obnoxious attempt at psycho-analysing me. And if you feel that you need violence to 'help' me, then know that I will kick your ass, since just this once, especially for you, I will go against my pacifism, since you are a royal pair of assholes.



Leave me out of your life, since you were already, because I think you're a waste of effort and if you insist on pissing me off, I won't treat you kindly.



COMMENTS

-



 

17:36 Feb 10 2007
Times Read: 751




Whereas,
Breakbeats have been the missing link connecting the diaspora community to its drum woven past.

Whereas,
The quantides drum has allowed the whirling mathematicians to calculate the ever changing distance between rock, and stardom.

Whereas,
The velocity of spinning vinyl cross-faded spun backward and re-released at the same given moment of recorded history,
yet at a different moment in times continuum has allowed history to catch up with the present.

We do hereby declare reality unkempt by the changing standards of dialogue.

Statements, such as:
‘Keep it real’,
especially when punctuating or anticipating modes of ultra-violence, inflicted psychologically or physically,
or depicting an unchanging rule of events,
will henceforth be seen as retro-active and not representative of the individually determined IS.

Furthermore,
As determined by,
the collective consciousness of this state of being,
and the lessening distance between thought patterns and their cyclical manifestations,
the role of man as listening receptacles is to be increased by a number of no less than seventy percent of the current enlisted as vocal aggressors.

Everybody better realise,
now is the time to self actualise.

We have found evidence that- hip hop spun at eighty-five rpm will increase by a number of at least half the rate of its standard,
or decrease at three-quarters of its speed.
May be a determining factor in heightening consciousness.

Studies show that when a given moment is changed in the face of the unchanging,
The remaining contradictions will parallel the truth.

Equate rhyme with reason,
Sun with season.

Our cyclical relationship to phenomenon has encouraged scholars to erase the sentience of periods,
thus symptolising denial and the character of cause,
and effect.

Reject mediocrity,
Your current frequencies of understanding outweigh that which has been given to you to understand.

The current standard is the equivalent of an adolescent restricted to the diet of an infant-
Your rapidly changing body would acquire dysfunctional and de-formative symptoms,
and could not properly mature on a diet of apple sauce and crushed pears.

Like years,
Are interchangeable with years of living in darkness-
The role of darkness is not to be seen as,
Or equated with ignorance,
But with the unknown,
And the mysteries of-
The unseen.

Thus,
In the name of: Robeson, Godson, Herston, Agenatin, Hacheswood, Blackfoot, Helen, Lenin, Colley, The Three Maria’s, Tura, Lillith, Lord, Whitmin, Baldwin, Ginsberg, Kaufman, Jumumba, Ghandi, Jeran, Jebah, Sheban, Siddartha, Medusa, Bubera, Rand, Wright, Banager, Joplin, Haymar, Holliday, Davis, Coltrane, Morrison, D’ Bocye, Clarke, Shakespeare, Rachmaninov, Ellington, Carter, Hathaway, Hendrix, Coute, Mary, Isis, Theresa, Hansbury, Haslow, Lance, Nostradamus, Nefertiti, Murak, Sheba, Ganesha, Jimiya, Oshun, Ogun, Gimeny, King, Four Little Girls, Hirojima, Nagasaki, Calla, Beko, Rome, Marley, Magdeline,
Those who burned,
Those still aflame,
And the countless unnamed,
We claim the present,
As the present,
As the hereafter.

We are unraveling our navels so that we may ingest the sun,
We are not afraid of the darkness,
We trust that evolution will guide us,
We are determining the future at this very moment,
We know that the heart is the philosophers stone,
And music is our alchemy.

We stand as the manifested equivalent of three buckets of water- and a handful of minerals,
Thus realising that those very buckets turned upside down,
Supply the percussive factor of forever.

If you must count to keep the beat,
Then count,
Find your mantra and awaken your subconscious,
Turns those circles counter-clockwise,
Use your psyche to decipher,
Coded language,
Man made laws,
Climb waterfalls and trees,
Commune with nature,
Snakes and bees,
Let your children name themselves,
And claim themselves,
At the new day,
The true day.

We are determined,
To be,
The channellers,
Of these changing frequencies into:
Songs, Paintings, Writings, Dance, Drama, Photography, Carpentry, Crafts, Love and love,

We enlist every instrument,
Acoustic,
Electronic,
Every so called gender,
Race,
Sexual Preference,
Every per-son,
As beings of sound,
To acknowledge their responsibility to uplift the consciousness of the entire world,
Any utterance unaimed,
Will be,
Disclaimed,
Will be,
Maimed.
Will be,
Slain.



COMMENTS

-



 

You. can't. bring. me. down.

15:02 Feb 10 2007
Times Read: 824


In honour of recent events and also, to watch Bette Midler standing on a beach in the corner, I chose some new profile music.



"When I was a lad..."


COMMENTS

-



 

Netstat is your friend...

13:53 Feb 10 2007
Times Read: 826


Ok, Lets get this show on the road.



Assuming that every sensible person has a firewall and some form of virus scanning software, I'm not going to go on about which to choose as the best, since they essentially all do the same job.



But there are ways and means to get past security like that. Trojans, for one- You download a file, then open it without scanning it, or if the scanner doesn't pick it up, you could end up with a hole into your machine.



Its always a good idea to get to know your system, intimately...open her up, probe her inside and tweak her gently, to bring out the best experience for you...



*ahem*



Find out all about your machine. How much memory, what kind, what the spec of the mainboard, processor and other parts, like the graphics are. Know the software environment. What applications are installed- go into task manager and look at whats running in there, noting the number of running processes, so that if anything unusual pops up, you can identify it straight away.



But how can you tell if you are being hacked?



Well, a few signs, are when your internet activity light is flashing, but you have no web-pages or downloads running.



A better way, is to go to the start menu, select 'run' and type 'cmd'. This will bring up a usually black DOS box.



On newer systems, it isn't really dos, but a cut down shell, but symantics aside, there are some groovy uses for this little box.



The first, is 'netstat'.



This command is your best friend and worst enemy of a hacker.



In the dos box, type 'netstat -an' and hit enter.



This will bring up a list of lots of numbers. Good, as this identifies every open port and connection on your network card. And because it directly interrogates the TCP/IP interface, it cannot be easily masked by hackers and phreakers.



Vampire Rave - The Ultimate Vampire Resource and Directory - http://www/VampireRave.com



In the above picture, you can see the command as entered and some labels for the numbers.



The 'Proto' column, is the type of communication method that the 'ports' use. TCP is listed here, which means Transmission Control Protocol. It is the basic means of sending data from one machine to another over the internet.



Under the 'local address' column, which is your machine, there are a number of ports assigned in a 'listening' state. This means that they are open and awaiting a connection.



But along the same line, under the 'foreign address' column, is the entry for who is connected to your machine on that port.



As the port is listening, we would expect that to be blank.



Further down the list of connections, we can see entries for foreign addresses. These are the IP addresses of other machiens and the port on their end, which is open to you.



As you can see, they are listed as 'established', meaning that there is a direct path from one machine to the other, over which data can and probably is, being sent and received.



You can see there, that my IP is listed as 192.168.1.64. This is my private 'subnet address', not my 'public IP'. This is because I use a router to connect to the net, which assigns out its own range of IP addresses and matches them all to one single public one, provided by my ISP.



But the IP that you see listed under forgeign, is their Public address. Which is a very useful thing to have. Especially as you can see at least one open port of theirs. Of course, they could also do a netstat to bring up your IP details, but considering if they are hacking, they have your IP already.



But this will work for any connection. Any website, fileshare server, etc.



The important thing, is to look out for certain ports.



the most commonly exploited ones are:



Back Orifice - UDP port 31337 or 31338

Deep Throat - UDP port 2140 and 3150

NetBus - TCP port 12345 and 12346

Whack-a-mole - TCP port 12361 and 12362

NetBus 2 Pro - TCP port 20034

GirlFriend - TCP port 21544

Sockets de Troie - TCP port 5000, 5001 or 50505

Masters Paradise - TCP port 3129, 40421, 40422, 40423 and 40426



Devil - port 65000

Evil FTP - port 23456

GateCrasher - port 6969

Hackers Paradise - port 456

ICKiller - port 7789

ICQTrojan - port 4590

Phineas Phucker - port 2801

Remote Grab - port 7000

Remote Windows Shutdown - port 53001



If any of the above are open, you need to do some work. ake the machine offline immediately and until you block those ports and scan your machine.



In addition to this, port 23 can be used for a 'Telnet' connection.



The best way to disable this, is to go into start> Settings> control panel> administrative tools> services.



In this list, scroll down until you see telnet. Make sure that it is set to 'disabled'.



Ports 135-138 are used for 'Netbios'.



Stupidly, windows leaves these open as default, because we all live in 'one big happy family' or something. Who knows why, but to close them, go to start (or control panel)> network connections and right-click on your active network connection.



Select properties and in the next box, highlight the 'Internet protocol TCP/IP' item and click on properties again.



In the bottom right of this next box, click 'advanced'. Choose the 'WINS' tab across the top.



In the NetBIOS settings, change the option to 'disable netbios over tcp/ip'. this will prevent critical info about your machine from being sent over the internet, such as workgroup, hostname, shared folder names, etc, etc...



On one last point, in the services list, it is also a good idea to stop and disabled the following, unless you have a specific use for them;



- Print spooler

- Remote Desktop

- Remote registry

- Secondary logon

- Terminal Services





Next up, is how to configure local Group Policy.







COMMENTS

-



artemka
artemka
13:04 Apr 10 2008

... bet you thought that I had forgotten all this huh :)



hehehehe, waiting for a members article or three :)





 

22:14 Feb 08 2007
Times Read: 843


I fixed my machine.



Properly.



I reckon, with all this hacker BS floating about, that we should have a bit of counter-action, like exposing the holes and how to fix them.



Yeah.



COMMENTS

-



 

23:07 Feb 06 2007
Times Read: 857


I wish to be in Cali...



RATM return for a one night stand.


COMMENTS

-



 

23:02 Feb 06 2007
Times Read: 859


Just for the notice of clinically insane idiots- I am Scottish.



Yes, true it is. Even the insults from these people are incompetent.


COMMENTS

-



 

22:17 Feb 06 2007
Times Read: 862


Today, is global net safety day.



Is it a coincidence that additional roles with which to beat down the masses...er, maintain an appropriate presentation for minors...have been issued recently?



Probably. lol


COMMENTS

-



 

20:34 Feb 05 2007
Times Read: 880


All I can hear and feel right now, is building works, sirens and noisey neighbours stomping around. Oh, and an alarm somewhere.



I have everything but the PC and the fish-tank turned off...and this is night-time. It gets worse during the day, but at least I'm at work, in a high-rise block, in a city centre, next to a hospital. Yes, with sirens.



Sometimes, I go to bed feeling as though I've been assaulted, or taken part in a rugby match.



I long for the open country.


COMMENTS

-



 

23:13 Feb 04 2007
Times Read: 889


Bears to win.



How could I go for the Colts?



:P



edit:



I stayed up for that?



Damn Bears...grr.



COMMENTS

-






COMPANY
REQUEST HELP
CONTACT US
SITEMAP
REPORT A BUG
UPDATES
LEGAL
TERMS OF SERVICE
PRIVACY POLICY
DMCA POLICY
REAL VAMPIRES LOVE VAMPIRE RAVE
© 2004 - 2024 Vampire Rave
All Rights Reserved.
Vampire Rave is a member of 
Page generated in 0.0982 seconds.
X
Username:

Password:
I agree to Vampire Rave's Privacy Policy.
I agree to Vampire Rave's Terms of Service.
I agree to Vampire Rave's DMCA Policy.
I agree to Vampire Rave's use of Cookies.
•  SIGN UP •  GET PASSWORD •  GET USERNAME  •
X