TER General Board

Re:Thanks.... this is helpful and can never be emphasized too much...
Crusr 1447 reads
posted

#1, I don't want to get caught.

I shower before AND after a session.

I use a throw away cell that can't be traced to me and I still replace it after 60 minutes use.
The hobby phone is kept in a safe at work that only I have access to.

The chink in the defenses is going through provider investigations of my real identity. Some are thourough, some don't do much of anything.

Thanks for the cleanup info, I do most of that already but will add the missing elements...

So I thought I would start a helpful post and invite anyone familiar with internet and computer security to join in.

The topic, what are you doing to clean up after yourself???

The internet is a wonderful thing, but unless proper precautions are taken, a history of the sites you visit is readily accessible to others who may use your computer.  Temporary internet files capture information on sites you visit.  History also does the same thing.

If you are e-mailing from your employment, be aware, most IT departments monitor the websites employees visit.  They also can monitor your personal e-mail if you access it from your office.  This can be grounds for dismissal.

First of all, have you cleaned your browser history AND your search history?  If not, the next individual who uses your PC can have access to every site you have visited including provider sites.  Do not think that setting your history to delete immediately will suffice.  Sometimes it does.. other times it doesn't.  You should manually clear it through "tools" before signing off.

1.  Click on "tools" in your headers

2.  Click on "internet tools"

3.  Click on "delete files" and be sure to check "delete all offline content"

4.  Click on "delete cookies"

5.  Click on "clear history"

Also, do you know that your login information may be saved as well?  That means that the next person who tries to login to the internet may get your ID (and possibly password) when they try to sign in to their own account.  

1.  Again, using the tools option, Click on tools.

2.  Then a pull down menu will appear, click-on "internet options".

3.  Click on the "content tab"

4.  go to "autocomplete"

5.  First click on "clear forms."

6.  Second click on "clear passwords".

Another surprising glitch that I know holds true with SBC DSL.  If you enter the internet through the DSL log-in and follow all the steps above, you may not have cleared everything.  For DSL you can also access the internet simply by clicking on the Internet Explorer icon on your desktop.  I have found, at least with SBC DSL, that often the history has to be removed by following these same steps through the screen on internet explorer.  Why?  Beats the heck out of me.  So, I generally access the internet only through internet explorer.  

Also be aware that there are other ways to find out what you are doing.  There is software available that can "capture keystrokes."  In other words, if your SO suspects something, they can download this hidden software on your PC and have a record of everything you type??  Maybe the techies here can address this.

Finally, another dear client of mine thought he was safe.  Unfortunately his internet saavy teenage daughter found out the sites he was visiting, managed to access his e-mail account and printed out copies of his correspondence to providers and left them for her mother to see.  Needless to say, his extra curricular activites were curtailed for 6 mos.

The best advice, delete, clean and delete.  Delete any e-mails that contain correspondence with providers.  As much as you are tempted to save them to relive hot erotic moments, they can be your downfall and jeopardize you and the provider.  And clean up after yourself by cleaning any history of your visits to TER and other sites.  Finally, do not access these sites from your work.  

For those techies out there.. please feel free to chime in with any additional info!

SINfully sinthia



My belief is that those who get caught, secretly wish to get caught.  But that may not always be the case.  Often, the signs are there, in plain sight, it is the other partner who, consistantly chooses to "selectively be blind"  --- in a lot of families, who would notice a "late night" at the office 2-3 times a month (with 1-2 of those actually being a work night)?  and the 300-500 a month in fees?  who would notice?  Certainly not me.

I would ask, what is it that you do, that causes the suspicion in the first place?  That is more important.  And while on that topic, what do you do to keep your laptop in a  safe place?   cell phone?  do you clear that as well?  How about odors... I swear, women can smell another woman's scent a mile or two away...

Lots of things go into raising the issue of "is he" or "isn't he."  

My solution - get a divorce... then it is less of a bother!

I didn't have the cajones.

How about this idea?

Get a mini lap top and find a safe hiding place for it.

Only plug it in (or go wireless) when you need to use it and keep it out of sight and mind every other time.  Just a thought.

Crusr1448 reads

#1, I don't want to get caught.

I shower before AND after a session.

I use a throw away cell that can't be traced to me and I still replace it after 60 minutes use.
The hobby phone is kept in a safe at work that only I have access to.

The chink in the defenses is going through provider investigations of my real identity. Some are thourough, some don't do much of anything.

Thanks for the cleanup info, I do most of that already but will add the missing elements...

I do this every time I log out of the Internet, especially after visiting TER or my website. I also check for viruses twice a day, etc.

Hugs,
ciara

followme1076 reads

You have a viruse I Strongly suggest you see DrFollowme......He can give you an injection..Wink

Thank You

I have gotten a couple of calls from wives and both times I handled the situation with finese and a great cover story.

A wife called me , saying she saw my phone number repeatedly on his cell phone bill and was asking questions about who I was and how I knew her husband.
Well, he mentioned his career and workplace to me and I made up a story about my live-in boyfriend was a friend of his from work. And she bought it. I immediatedly e-mailed him to let him know what the cover story was.

Another wife called and I think she was a bit more savvy because she asked "Is this an agency?" Well, to cover this one I said I wasn't sure who her husband was, but perhaps he was a client of mine. However, my business was personal concierge services and I probably was just planning a party, getting tickets to a game or something like that. She said he never told her. Then I said "Is your anniversary coming up?" And it was. I then mentioned that a lot of guys use my services to help plan for special nights out with their wives and girlfriends, and that she should act suprised when the night came.
Again, I e-mailed him with his cover story. And I even (for a fee) did plan a nice night out for their anniversary. I bet he got some good loving that night too.

-Vanica

Another way to keep your actions secert is to use Windows XP Pro and create a seperate user account.  Which you can set the security so that no one can see the files.  This way you can download filees, search the web etc.

Note: Windows XP Home does not allow the setting of security on user files.

I use software that ALWAYS "scrubs" and "bleaches" (overwrites) my browser every time I exit the browser.  There are several such "clean your tracks" programs available.  The one I picked (but there are others equally good) is by Webroot and is called "windowswasher."

As one who was married for many years, but now widowed, I can appreciate both sides. While married, the hobby was out, period!  The consequences of getting caught were simply too much to wager. Today, I have fun with reckless abandon.  Don't care who knows...

You also need to watch for a series of hidden files named index.dat.  Index.dat are files hidden on your computer that contain all of the Web sites that you have ever visited. Every URL, and every Web page is listed there. Not only that but all of the email that has been sent or received through Outlook or Outlook Express is also being logged. The file names and locations depend on what version of Internet Explorer you have. If you are running IE version 4.0 or above, the file name is "index.dat".  Microsoft has not supplied an adequate explanation as to what these files are for or why they have been hidden so well.

According to Microsoft, these files are used to cache visited Web sites to help speed up the loading of Web pages in Internet Explorer. Obviously this cannot be the case because when you clear the Temporary Internet Files the "index.dat" files remain behind and continue to grow. If you delete or clear the Temporary Internet Files, there is absolutely no need to index the URL cache because those files no longer exist.

In Windows 2000 and Windows XP there are several "index.dat" files in these locations:


\Documents and Settings\Username\Cookies\index.dat

\Documents and Settings\Username\Local Settings\History\History.IE5\index.dat

\Documents and Settings\Username\Local Settings\History\History.IE5\MSHist012001123120020101\index.dat
\Documents and Settings\Username\Local
Settings\History\History.IE5\MSHist012002010720020114\index.dat

\Documents and Settings\Username\Local
Internet Files\Content.IE5\index.dat


Index.dat files can be very hard to find. If you are in Windows, even with "Show hidden files and folders" enabled, index.dat files are not visible and cannot be found if you do a search for index.dat files. The reason that these files are so invisible is that they are not just hidden, they have been designated as "system" files. System files and folders are treated differently in DOS and Windows and are effectively cloaked from casual searches.

And BTW if someone is suspicious of you there are all manner of keyloggers that are basicaly undetectable so you need to keep your own PC very secure in terms of knowing what may be loaded.  I other words if you share the PC, even with separate accounts, assume it may not be secure.

Good luck
 


I normally give my clients a few minutes to relax and unwind.  I talk a few minutes , no snuggling or major petting, at first.  Especially if they are wearing a white dress shirt.  But, actually any shirt can be a problem.  

Then when they are relaxed, I ask them to remove their shirt.  When they ask why, I tell them that while I try to keep makeup to a minimum, some may rub off onto their shirt.  I usually kid that they get "one get out of jail (domestic jail or in the dog house) free card" with this one as they can always pass it off as someone's birthday at the office and everyone chipped in for a present and a party, or someone had a promotion at work (always a female).. and she gave everyone a hug.  Sometimes I get some resistance, "I send my shirts to the drycleaners?"  I say "great, who takes them there?"  Normally they get the message and remove the shirt.

If they have a white t-shirt under it, I tease "well, you get "no get out of jail cards for makeup on a t-shirt.  It was someone's birthday at the office, and I was only wearing my t-shirt..."

My clients generally relax, realize I have their best interests at heart and appreciate my approach and humor.  

So guys remember, white shirts and white t-shirts and makeup.. are NO NOs.. lol

-- Modified on 6/9/2006 3:09:04 PM

I have developed an increasingly keen sense of "Operational Security" in trying to keep my hobby activities out of my SOs notice - NOT easy now that she suspects what's up.  I have made some of the usual internet explorer blunders.  I'm getting better but if you have a real detective in your house it is NOT easy.  I have found some advise on this site but it gets buried in old posts.  I wish we could accuymulate and review this stuff more easily...

Other advise:
- Don't use Internet Explorer, use Moxilla Firefox as your broser which has a very fast and complete cleaning function "Clear Private Data" with Cntr-Shift-Del.  Bam you are scrubbed.
- Don't forget to clear your clipboard.  If you copy a provider link or phone number and then exit your system you need to copy some other piece of innocuous text.  otherwise the next time someone runs your computer and "paste"s into word or googel, etc. - there is the last thing you copied.

Again, we need to accumulate good advice.  99% is NOT enough.

BTW - Sin, you are great, can't wait to see you later this month  : )

I use Stopzilla as it will scrub history, temp files and cookies everytime I shut down.  I use Zone Alarm Suite for virus protection.  Lastly, having Windows XP, I have created different accounts and mine is password protected

from the SO (don't have one, don't want one).

What if she is savvy enough and many are, that the question then becomes "Roger, why do you feel it is necessary to have your own password protected account on the computer? What is it that you do not want me to see? Your not a pedifile are are?"

I just threw the last question in has humor. lmao

Neither one is good. My excuse for having a passwword-protected account is that it's my 'work' laptop (owned by me) and having a password keeps the kids from adding unnecessary software and sites since I'm the sole administrator

The home computer is password protected to keep the little one away from the "adult stuff" associated with my on-again off-again adult movie business.  The work laptop (home every evening is password protected because it contains sensitive info.  Each family member has their own computer, so they have no reason to need into my profile.  The question has been asked, and answered with "what's wrong with yours?"

WebTerrorist2189 reads

Each user has a limited account so that it reduces the risk of virus, spyware and other malware infection, since limited accounts generally can not install applications or change critical programs or settings.

The accounts are each password protected so that if for any reason one account is compromised the others will have less chgance of being so as well.

Then the accounts which are still "clean" can be used to clean up, repair or even delete any compromised account if necessary, with out themselves being compromised in the process.

Simple security measures in the online world of today...no need to raise suspicions, with seperate password protected accounts.

Hell, most folks should run a limited user account even if they are the only user of the machine, and both the admin and limited accounts should be password protected.

chris37671891 reads

No keyloggers...use safari and kill history and form complete.  Finally, the best cover...get a lawyer and seek a divorce.

When will you people ever learn that windows sucks?

WebTerrorist1956 reads

Whoever told you there were no keyloggers for Mac lied.

There are many software keyloggers for Mac, and harware keyloggers don't have anything to do with what OS you're running.

Also, Firefox, Mozilla suite, Seamonkey, Opera and IE all have functions to clean history and auto complete, so Safari isn't special there.

I will give you that OS X runs great on the limited configurations it is designed to run on...Widows, though far from perfect, runs rather well on the millions of possible configurations for a PC...but if I ever want my ability to choose and control my hardware and configuration, limited to what Apple produces I'll be sure to switch and "Think Different" in one a very few choices that is very constricted in it's design and OS to customise.

as a computer consultant type expert once told me, in computer world, anything is possible give 1) time and 2) money and 2 buys 1!  

Thanks... for those who think that there is some magic computer or software that replaces the human braim!  lol

Mac's are NOT all that! They have there strong points and they have there weak points. With Apple switching to the INTEL platform, the performance difference between the MAC OS X and Windows XP just got smaller. Also Mac does have keyloggers and IE and several Windows browsers do have option of deleting the browser history and form complete!  So I think your statement is a little bit exagerated!

shyguy30003230 reads

I have an old hard drive that has only my windows xp software on it.  I know how to build computers so I just open the case and plug in the old hard drive (disconect the good one) when I want to browse this website and email providers.  This elliminates the need to have password protected accounts and then the suspicious wife questions about why you would need to have one.  

I keep the hard drive with my box of old computer parts.  To add even more security, remove the jumper pin from the hard drive when your not using it.  This way, if for some slim chance your SO can figure out how to hook up that hard drive, it still wont work without the jumper pin.

okay this may sound funny but think about it. He has no Money so he is only out for the freebis that actually work. Thanks to him I went to   Hippofile.com and down loaded  "C Cleaner" for free and It does all the tasks listed . He also directer me to a free antivirus "avast" that works great and is free. Oh and I divorced my wife anyway even though she never had a clue.I figured that if I wasn't happy at home I'd get things right there as a start. Now I'm free to play as I wish, without guilt.I can even get some free lovin when it presents itself.  Play safe and enjoy life....." Life is a Banquet and most poor Bastards are starving to death"

-- Modified on 6/12/2006 5:37:37 PM

Register Now!