Computer Info Compromised?

  • Thread starter Thread starter ColTom2
  • Start date Start date
C

ColTom2

Hi:

I have a friend who had some old letters of one of his kin in a .doc file
in his My Documents folder in his computer. The letters were enough to have
formed a book about the 1800's written by this kin.

He Googled the letters info and found some data applicable these letters
which he has never shared with anyone. Also the .doc file string is exactly
as that in his computer. In fact, he has found a copy of these letters for
sale on the internet and the seller appears to be from the same area of the
state where he lives if not the same city. His name is referenced in as the
author of these letters.

So my question is how did someone acquire this data from his computer, as
apparently his computer has been compromised. It would appear to me that it
had to happen in one or two scenario's. First someone somehow accessed his
computer through the internet or second when he had taken his computer to a
shop for repair. Since it appears that the seller is from the same area of
state as he is, then my first inclination would be that this info was taken
from his computer during a repair. I just really have don't have the
expertise in this area to try and make a good determination.

If anyone has any comments, suggestions, and/or recommendations as to how
all this could have happened I would be most appreciative to read them.

I apologize if I have posted this in the wrong newsgroups.

Thanks
 
"ColTom2" <noemailaddress@nomail.com> wrote in message
news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
> Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
> in his My Documents folder in his computer. The letters were enough to
> have
> formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
> which he has never shared with anyone. Also the .doc file string is
> exactly
> as that in his computer. In fact, he has found a copy of these letters for
> sale on the internet and the seller appears to be from the same area of
> the
> state where he lives if not the same city. His name is referenced in as
> the
> author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
> apparently his computer has been compromised. It would appear to me that
> it
> had to happen in one or two scenario's. First someone somehow accessed his
> computer through the internet or second when he had taken his computer to
> a
> shop for repair. Since it appears that the seller is from the same area of
> state as he is, then my first inclination would be that this info was
> taken
> from his computer during a repair. I just really have don't have the
> expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
> all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
> Thanks


It's hard to say from here how this happened, but there is very likely a
simple way to establish it with certainty.

If these items are wrongfully listed as for sale (i.e. they are stolen
property), legal action will quickly disclose the method.

The friend should contact a lawyer and law enforcement *immediately*.
There are probably both civil and criminal proceedings available. Law
enforcement officials will likely have the power to seize the materials to
immediately prevent any further distribution.

Hope this helps, and best of luck.
-pk
 
You have cross posted to groups that have no relevence to the subject
therefore its assumed to be spam

"ColTom2" <noemailaddress@nomail.com> wrote in message
news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
> Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
> in his My Documents folder in his computer. The letters were enough to
> have
> formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
> which he has never shared with anyone. Also the .doc file string is
> exactly
> as that in his computer. In fact, he has found a copy of these letters for
> sale on the internet and the seller appears to be from the same area of
> the
> state where he lives if not the same city. His name is referenced in as
> the
> author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
> apparently his computer has been compromised. It would appear to me that
> it
> had to happen in one or two scenario's. First someone somehow accessed his
> computer through the internet or second when he had taken his computer to
> a
> shop for repair. Since it appears that the seller is from the same area of
> state as he is, then my first inclination would be that this info was
> taken
> from his computer during a repair. I just really have don't have the
> expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
> all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
> Thanks
>
>
>
>
 
You should read my last sentence before you fire off such curt remarks such
as this. Go find something constructive to do.


"DL" <address@invalid> wrote in message
news:OcWV7fSZIHA.4476@TK2MSFTNGP06.phx.gbl...
You have cross posted to groups that have no relevence to the subject
therefore its assumed to be spam

"ColTom2" <noemailaddress@nomail.com> wrote in message
news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
> Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
> in his My Documents folder in his computer. The letters were enough to
> have
> formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
> which he has never shared with anyone. Also the .doc file string is
> exactly
> as that in his computer. In fact, he has found a copy of these letters for
> sale on the internet and the seller appears to be from the same area of
> the
> state where he lives if not the same city. His name is referenced in as
> the
> author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
> apparently his computer has been compromised. It would appear to me that
> it
> had to happen in one or two scenario's. First someone somehow accessed his
> computer through the internet or second when he had taken his computer to
> a
> shop for repair. Since it appears that the seller is from the same area of
> state as he is, then my first inclination would be that this info was
> taken
> from his computer during a repair. I just really have don't have the
> expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
> all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
> Thanks
>
>
>
>
 
ColTom2 wrote:
> You should read my last sentence before you fire off such curt
> remarks such as this. Go find something constructive to do.
>


Apologizing in advance doesn't mitigate the definition of spam.
 
OK, listen here.

My vote is 99.98% for the repair shop, especially if it is a small one. They
have the time to examine what is on the disk. It is possible to steal
documents via the Internet but in my judgment the person who does such
things and I want to tell you, there are quite a few in this group, and
perhaps that snutty and cruel DL is one of them, by the virtue of the jobs
they do have to deal with a huge amount of material. They are after specific
pieces of information, like passwords to PayPal or credit card numbers. They
have a rough guess where that can be found. I don't think it is a part of
their job description to go after historical documents.

The other person, Patrick, gave you a very good advice. But before you
contacted your lawyer try to make a statement to the Police. It may not be
possible, they may say: it is not in our district, not in our jurisdiction
or whatever but you will make a mark.

Also, keep a diary of every step you (or your friend) do.

This is why people should switch to Vista and never take their computers to
a repair shop. It is much more difficult to poach a Vista machine and on
Business and Ultimate you can completely encode all files you want.

"ColTom2" <noemailaddress@nomail.com> wrote in message
news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
> Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
> in his My Documents folder in his computer. The letters were enough to
> have
> formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
> which he has never shared with anyone. Also the .doc file string is
> exactly
> as that in his computer. In fact, he has found a copy of these letters for
> sale on the internet and the seller appears to be from the same area of
> the
> state where he lives if not the same city. His name is referenced in as
> the
> author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
> apparently his computer has been compromised. It would appear to me that
> it
> had to happen in one or two scenario's. First someone somehow accessed his
> computer through the internet or second when he had taken his computer to
> a
> shop for repair. Since it appears that the seller is from the same area of
> state as he is, then my first inclination would be that this info was
> taken
> from his computer during a repair. I just really have don't have the
> expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
> all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
> Thanks
>
>
>
>
 
I was searching for some good information about a subject which I
admittedly know little about and with the exception of Patrick Keenan's
reply all I have gotten is replies such as yours and DL's.

I can assure you that my posting was NOT spam and was well intended to find
creditable information regardless of the manner of my posting.


"HeyBub" <heybub@gmail.com> wrote in message
news:ua6i4oSZIHA.1532@TK2MSFTNGP04.phx.gbl...
ColTom2 wrote:
> You should read my last sentence before you fire off such curt
> remarks such as this. Go find something constructive to do.
>


Apologizing in advance doesn't mitigate the definition of spam.
 
I appreciate your informative reply and recommendations.

Thanks


"AlexB" <alexb@comcast.net> wrote in message
news:eoDVhySZIHA.3880@TK2MSFTNGP05.phx.gbl...
OK, listen here.

My vote is 99.98% for the repair shop, especially if it is a small one. They
have the time to examine what is on the disk. It is possible to steal
documents via the Internet but in my judgment the person who does such
things and I want to tell you, there are quite a few in this group, and
perhaps that snutty and cruel DL is one of them, by the virtue of the jobs
they do have to deal with a huge amount of material. They are after specific
pieces of information, like passwords to PayPal or credit card numbers. They
have a rough guess where that can be found. I don't think it is a part of
their job description to go after historical documents.

The other person, Patrick, gave you a very good advice. But before you
contacted your lawyer try to make a statement to the Police. It may not be
possible, they may say: it is not in our district, not in our jurisdiction
or whatever but you will make a mark.

Also, keep a diary of every step you (or your friend) do.

This is why people should switch to Vista and never take their computers to
a repair shop. It is much more difficult to poach a Vista machine and on
Business and Ultimate you can completely encode all files you want.

"ColTom2" <noemailaddress@nomail.com> wrote in message
news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
> Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
> in his My Documents folder in his computer. The letters were enough to
> have
> formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
> which he has never shared with anyone. Also the .doc file string is
> exactly
> as that in his computer. In fact, he has found a copy of these letters for
> sale on the internet and the seller appears to be from the same area of
> the
> state where he lives if not the same city. His name is referenced in as
> the
> author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
> apparently his computer has been compromised. It would appear to me that
> it
> had to happen in one or two scenario's. First someone somehow accessed his
> computer through the internet or second when he had taken his computer to
> a
> shop for repair. Since it appears that the seller is from the same area of
> state as he is, then my first inclination would be that this info was
> taken
> from his computer during a repair. I just really have don't have the
> expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
> all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
> Thanks
>
>
>
>
 
"AlexB" <alexb@comcast.net> wrote in message
news:eoDVhySZIHA.3880@TK2MSFTNGP05.phx.gbl...
> OK, listen here.
>
> My vote is 99.98% for the repair shop, especially if it is a small one.
> They have the time to examine what is on the disk. It is possible to steal
> documents via the Internet but in my judgment the person who does such
> things and I want to tell you, there are quite a few in this group, and
> perhaps that snutty and cruel DL is one of them, by the virtue of the jobs
> they do have to deal with a huge amount of material. They are after
> specific pieces of information, like passwords to PayPal or credit card
> numbers. They have a rough guess where that can be found. I don't think it
> is a part of their job description to go after historical documents.
>
> The other person, Patrick, gave you a very good advice. But before you
> contacted your lawyer try to make a statement to the Police. It may not be
> possible, they may say: it is not in our district, not in our jurisdiction
> or whatever but you will make a mark.
>
> Also, keep a diary of every step you (or your friend) do.
>
> This is why people should switch to Vista and never take their computers
> to a repair shop. It is much more difficult to poach a Vista machine


Not necessarily.

> and on Business and Ultimate you can completely encode all files you
> want.


While you can encrypt data on a couple of versions of Vista, I'd have to
say that it would not offer much if any protection in this situation.

I say this because EFS encryption is tied to the account, and if you're
actually in the account - as you would have to be to service the system -
the data is not encrypted to you. It can be simply copied away, and at
worst, the account certificates can be exported and the data copied off
wholesale and decrypted on another machine.

And of course EFS isn't available on any version of Vista or XP with Home in
the name.

EFS encryption is really only of value in cases such as theft or
unauthorised system access. As soon as you give someone access to your
account, EFS protection is just gone.

You could use a 3rd party encryption tool that uses a separate password.
Then only those who need that specific data have access to it, not anyone
who walks up or is given access to the system. The system can be serviced
without giving out that password. This has the added advantage of not
being subject to account damage from Windows reinstalls.

That said, granting access to a system for service or use does *not* grant
ownership of or rights to its contents, and privacy laws probably also apply
(depending on jurisdiction).

Legal action should be initiated as quickly as possible, and whether lawyer
or law enforcement is first should be decided by simple availability. If
the best that can be done right now is to drop by a police station and file
a formal complaint on the record, that's probably the best idea.

Neglecting to take action can be regarded as approval, and result in a loss
of rights.

HTH
-pk

>
> "ColTom2" <noemailaddress@nomail.com> wrote in message
> news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
>> Hi:
>>
>> I have a friend who had some old letters of one of his kin in a .doc
>> file
>> in his My Documents folder in his computer. The letters were enough to
>> have
>> formed a book about the 1800's written by this kin.
>>
>> He Googled the letters info and found some data applicable these letters
>> which he has never shared with anyone. Also the .doc file string is
>> exactly
>> as that in his computer. In fact, he has found a copy of these letters
>> for
>> sale on the internet and the seller appears to be from the same area of
>> the
>> state where he lives if not the same city. His name is referenced in as
>> the
>> author of these letters.
>>
>> So my question is how did someone acquire this data from his computer,
>> as
>> apparently his computer has been compromised. It would appear to me that
>> it
>> had to happen in one or two scenario's. First someone somehow accessed
>> his
>> computer through the internet or second when he had taken his computer to
>> a
>> shop for repair. Since it appears that the seller is from the same area
>> of
>> state as he is, then my first inclination would be that this info was
>> taken
>> from his computer during a repair. I just really have don't have the
>> expertise in this area to try and make a good determination.
>>
>> If anyone has any comments, suggestions, and/or recommendations as to
>> how
>> all this could have happened I would be most appreciative to read them.
>>
>> I apologize if I have posted this in the wrong newsgroups.
>>
>> Thanks
>>
>>
>>
>>

>
 
The better solution, IMO, is to store important info on a CD or DVD kept in
a safe place and not on the hard drive.

--
Leo

"If you think health care is expensive now,
wait until you see what it costs when it's free!"







"David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message
news:eHW99GTZIHA.5612@TK2MSFTNGP06.phx.gbl...
> From: "ColTom2" <noemailaddress@nomail.com>
>
> | I appreciate your informative reply and recommendations.
> |
> | Thanks
> |
>
> I doubt using Vista would make any difference in this situation as you an
> Encrypt data on
> Win2K and WinXP as well as Vista.
>
>
> --
> Dave
> http://www.claymania.com/removal-trojan-adware.html
> Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp
>
>
 
Hi:

Someone else has passed on to me that for really sensitive records
i.e.online banking records etc the best way to protect is by storing them on
a "Jump or Flash Drive". This way you use it and remove it when you are
through.

However, in this case, as I originally mentioned these were not really
sensitive records per se, but records of a personal nature. Therefore it's
hard for me to believe they were accessed from the internet, but from
possibly a local source (repair shop).

As someone has stated sourcing from the internet appears mainly to be
targeted towards passwords, user names. etc to access financial data. Doc
files of 1800's letters seems out of context for internet sourcing, but then
I certainly could be all wrong.

I am just trying to determine at this point what would be the most logical
source of this compromise and any other pertinent info in this regards.

Thanks for all the "constructive" comments....


"ColTom2" <noemailaddress@nomail.com> wrote in message
news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
Hi:

I have a friend who had some old letters of one of his kin in a .doc file
in his My Documents folder in his computer. The letters were enough to have
formed a book about the 1800's written by this kin.

He Googled the letters info and found some data applicable these letters
which he has never shared with anyone. Also the .doc file string is exactly
as that in his computer. In fact, he has found a copy of these letters for
sale on the internet and the seller appears to be from the same area of the
state where he lives if not the same city. His name is referenced in as the
author of these letters.

So my question is how did someone acquire this data from his computer, as
apparently his computer has been compromised. It would appear to me that it
had to happen in one or two scenario's. First someone somehow accessed his
computer through the internet or second when he had taken his computer to a
shop for repair. Since it appears that the seller is from the same area of
state as he is, then my first inclination would be that this info was taken
from his computer during a repair. I just really have don't have the
expertise in this area to try and make a good determination.

If anyone has any comments, suggestions, and/or recommendations as to how
all this could have happened I would be most appreciative to read them.

I apologize if I have posted this in the wrong newsgroups.

Thanks
 
ColTom2 wrote:
> I was searching for some good information about a subject which I
> admittedly know little about and with the exception of Patrick
> Keenan's reply all I have gotten is replies such as yours and DL's.
>
> I can assure you that my posting was NOT spam and was well intended
> to find creditable information regardless of the manner of my posting.
>


Again, no. Spam is in the eye of the beholder, not the composer. Virtually
everyone who lauches missives into the ether is convinced in their own mind
that their post is timely, useful, and will lighten the hearts of all who
read it. In gratitude, sometimes money even comes back to the sender.

Point is, you don't get a vote on whether your composition is spam.

Now if the majority of responses to your posts are not to your liking - and
if some even accuse you of spamming - for you to maintain that your
communications are as pure as the baby Jesus is symptomatic of some
pathology.

Your assurances notwithstanding, an abject apology and an act of contrition
would probably reinstate your reputation (though only probationary). I
recommend you purchase three Kernal Sanders chicken dinners and give them to
the poor.

It will be good for your soul.
 
We lose track of how important we are.

There are those interested in history that do use other venues of research
than the internet. The computer probably works fine. The security is
probably ok. If it’s really historical information then maybe someone did
the labor to do the research and wants to get some rewards. Your local
library contains more information than Goggle can provide in a useable way.

Thanks, Robert


"ColTom2" wrote:

> Hi:
>
> Someone else has passed on to me that for really sensitive records
> i.e.online banking records etc the best way to protect is by storing them on
> a "Jump or Flash Drive". This way you use it and remove it when you are
> through.
>
> However, in this case, as I originally mentioned these were not really
> sensitive records per se, but records of a personal nature. Therefore it's
> hard for me to believe they were accessed from the internet, but from
> possibly a local source (repair shop).
>
> As someone has stated sourcing from the internet appears mainly to be
> targeted towards passwords, user names. etc to access financial data. Doc
> files of 1800's letters seems out of context for internet sourcing, but then
> I certainly could be all wrong.
>
> I am just trying to determine at this point what would be the most logical
> source of this compromise and any other pertinent info in this regards.
>
> Thanks for all the "constructive" comments....
>
>
> "ColTom2" <noemailaddress@nomail.com> wrote in message
> news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
> Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
> in his My Documents folder in his computer. The letters were enough to have
> formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
> which he has never shared with anyone. Also the .doc file string is exactly
> as that in his computer. In fact, he has found a copy of these letters for
> sale on the internet and the seller appears to be from the same area of the
> state where he lives if not the same city. His name is referenced in as the
> author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
> apparently his computer has been compromised. It would appear to me that it
> had to happen in one or two scenario's. First someone somehow accessed his
> computer through the internet or second when he had taken his computer to a
> shop for repair. Since it appears that the seller is from the same area of
> state as he is, then my first inclination would be that this info was taken
> from his computer during a repair. I just really have don't have the
> expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
> all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
> Thanks
>
>
>
>
>
>
 
" He Googled the letters info" which means it`s on the net for anyone
to read and use .



On Fri, 1 Feb 2008 17:52:18 -0500, "ColTom2"
<noemailaddress@nomail.com> wrote:

>Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
>in his My Documents folder in his computer. The letters were enough to have
>formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
>which he has never shared with anyone. Also the .doc file string is exactly
>as that in his computer. In fact, he has found a copy of these letters for
>sale on the internet and the seller appears to be from the same area of the
>state where he lives if not the same city. His name is referenced in as the
>author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
>apparently his computer has been compromised. It would appear to me that it
>had to happen in one or two scenario's. First someone somehow accessed his
>computer through the internet or second when he had taken his computer to a
>shop for repair. Since it appears that the seller is from the same area of
>state as he is, then my first inclination would be that this info was taken
>from his computer during a repair. I just really have don't have the
>expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
>all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
>Thanks
>
>
>
 
You don't state how your friend acquired these letters in the first place or
if he has originals or just the .doc file. It is possible that both copies
of the letters are fakes, sold to assorted people as allegedly genuine
heirlooms. Genealogy scams are common enough. It is also possible that the
documents are real but your friend wasn't the only one to legitimately
receive copies of them. The second party could be a distant relative for
instance. That's also not unheard of.

"ColTom2" <noemailaddress@nomail.com> wrote in message
news:%235p%23MIUZIHA.5980@TK2MSFTNGP04.phx.gbl...
> Hi:
>
> Someone else has passed on to me that for really sensitive records
> i.e.online banking records etc the best way to protect is by storing them
> on
> a "Jump or Flash Drive". This way you use it and remove it when you are
> through.
>
> However, in this case, as I originally mentioned these were not really
> sensitive records per se, but records of a personal nature. Therefore it's
> hard for me to believe they were accessed from the internet, but from
> possibly a local source (repair shop).
>
> As someone has stated sourcing from the internet appears mainly to be
> targeted towards passwords, user names. etc to access financial data. Doc
> files of 1800's letters seems out of context for internet sourcing, but
> then
> I certainly could be all wrong.
>
> I am just trying to determine at this point what would be the most
> logical
> source of this compromise and any other pertinent info in this regards.
>
> Thanks for all the "constructive" comments....
>
>
> "ColTom2" <noemailaddress@nomail.com> wrote in message
> news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
> Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
> in his My Documents folder in his computer. The letters were enough to
> have
> formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
> which he has never shared with anyone. Also the .doc file string is
> exactly
> as that in his computer. In fact, he has found a copy of these letters for
> sale on the internet and the seller appears to be from the same area of
> the
> state where he lives if not the same city. His name is referenced in as
> the
> author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
> apparently his computer has been compromised. It would appear to me that
> it
> had to happen in one or two scenario's. First someone somehow accessed his
> computer through the internet or second when he had taken his computer to
> a
> shop for repair. Since it appears that the seller is from the same area of
> state as he is, then my first inclination would be that this info was
> taken
> from his computer during a repair. I just really have don't have the
> expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
> all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
> Thanks
>
>
>
>
>
 
On EXTERNAL hard drive that you don't take to a repair shop if it comes to
it. Nowadays memory sticks are becoming a viable and practical option.


"Leo" <ldontwant@anymail.com> wrote in message
news:uo6pHuTZIHA.1188@TK2MSFTNGP04.phx.gbl...
> The better solution, IMO, is to store important info on a CD or DVD kept
> in a safe place and not on the hard drive.
>
> --
> Leo
>
> "If you think health care is expensive now,
> wait until you see what it costs when it's free!"
>
>
>
>
>
>
>
> "David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message
> news:eHW99GTZIHA.5612@TK2MSFTNGP06.phx.gbl...
>> From: "ColTom2" <noemailaddress@nomail.com>
>>
>> | I appreciate your informative reply and recommendations.
>> |
>> | Thanks
>> |
>>
>> I doubt using Vista would make any difference in this situation as you an
>> Encrypt data on
>> Win2K and WinXP as well as Vista.
>>
>>
>> --
>> Dave
>> http://www.claymania.com/removal-trojan-adware.html
>> Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp
>>
>>

>
 
It is a very good point or rather set of points.

"Patrick Keenan" <test@dev.null> wrote in message
news:eASgipTZIHA.2000@TK2MSFTNGP05.phx.gbl...
> "AlexB" <alexb@comcast.net> wrote in message
> news:eoDVhySZIHA.3880@TK2MSFTNGP05.phx.gbl...
>> OK, listen here.
>>
>> My vote is 99.98% for the repair shop, especially if it is a small one.
>> They have the time to examine what is on the disk. It is possible to
>> steal documents via the Internet but in my judgment the person who does
>> such things and I want to tell you, there are quite a few in this group,
>> and perhaps that snutty and cruel DL is one of them, by the virtue of the
>> jobs they do have to deal with a huge amount of material. They are after
>> specific pieces of information, like passwords to PayPal or credit card
>> numbers. They have a rough guess where that can be found. I don't think
>> it is a part of their job description to go after historical documents.
>>
>> The other person, Patrick, gave you a very good advice. But before you
>> contacted your lawyer try to make a statement to the Police. It may not
>> be possible, they may say: it is not in our district, not in our
>> jurisdiction or whatever but you will make a mark.
>>
>> Also, keep a diary of every step you (or your friend) do.
>>
>> This is why people should switch to Vista and never take their computers
>> to a repair shop. It is much more difficult to poach a Vista machine

>
> Not necessarily.
>
>> and on Business and Ultimate you can completely encode all files you
>> want.

>
> While you can encrypt data on a couple of versions of Vista, I'd have to
> say that it would not offer much if any protection in this situation.
>
> I say this because EFS encryption is tied to the account, and if you're
> actually in the account - as you would have to be to service the system -
> the data is not encrypted to you. It can be simply copied away, and at
> worst, the account certificates can be exported and the data copied off
> wholesale and decrypted on another machine.
>
> And of course EFS isn't available on any version of Vista or XP with Home
> in the name.
>
> EFS encryption is really only of value in cases such as theft or
> unauthorised system access. As soon as you give someone access to your
> account, EFS protection is just gone.
>
> You could use a 3rd party encryption tool that uses a separate password.
> Then only those who need that specific data have access to it, not anyone
> who walks up or is given access to the system. The system can be
> serviced without giving out that password. This has the added advantage
> of not being subject to account damage from Windows reinstalls.
>
> That said, granting access to a system for service or use does *not* grant
> ownership of or rights to its contents, and privacy laws probably also
> apply (depending on jurisdiction).
>
> Legal action should be initiated as quickly as possible, and whether
> lawyer or law enforcement is first should be decided by simple
> availability. If the best that can be done right now is to drop by a
> police station and file a formal complaint on the record, that's probably
> the best idea.
>
> Neglecting to take action can be regarded as approval, and result in a
> loss of rights.
>
> HTH
> -pk
>
>>
>> "ColTom2" <noemailaddress@nomail.com> wrote in message
>> news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
>>> Hi:
>>>
>>> I have a friend who had some old letters of one of his kin in a .doc
>>> file
>>> in his My Documents folder in his computer. The letters were enough to
>>> have
>>> formed a book about the 1800's written by this kin.
>>>
>>> He Googled the letters info and found some data applicable these
>>> letters
>>> which he has never shared with anyone. Also the .doc file string is
>>> exactly
>>> as that in his computer. In fact, he has found a copy of these letters
>>> for
>>> sale on the internet and the seller appears to be from the same area of
>>> the
>>> state where he lives if not the same city. His name is referenced in as
>>> the
>>> author of these letters.
>>>
>>> So my question is how did someone acquire this data from his computer,
>>> as
>>> apparently his computer has been compromised. It would appear to me that
>>> it
>>> had to happen in one or two scenario's. First someone somehow accessed
>>> his
>>> computer through the internet or second when he had taken his computer
>>> to a
>>> shop for repair. Since it appears that the seller is from the same area
>>> of
>>> state as he is, then my first inclination would be that this info was
>>> taken
>>> from his computer during a repair. I just really have don't have the
>>> expertise in this area to try and make a good determination.
>>>
>>> If anyone has any comments, suggestions, and/or recommendations as to
>>> how
>>> all this could have happened I would be most appreciative to read them.
>>>
>>> I apologize if I have posted this in the wrong newsgroups.
>>>
>>> Thanks
>>>
>>>
>>>
>>>

>>

>
 
Also it occurred to me that even this thread in all its entirety may serve
as a court evidence for you. It is very emotional and vivid.

Copy the entire thread and keep it.


"ColTom2" <noemailaddress@nomail.com> wrote in message
news:%23d%23Y01SZIHA.600@TK2MSFTNGP02.phx.gbl...
>I appreciate your informative reply and recommendations.
>
> Thanks
>
>
> "AlexB" <alexb@comcast.net> wrote in message
> news:eoDVhySZIHA.3880@TK2MSFTNGP05.phx.gbl...
> OK, listen here.
>
> My vote is 99.98% for the repair shop, especially if it is a small one.
> They
> have the time to examine what is on the disk. It is possible to steal
> documents via the Internet but in my judgment the person who does such
> things and I want to tell you, there are quite a few in this group, and
> perhaps that snutty and cruel DL is one of them, by the virtue of the jobs
> they do have to deal with a huge amount of material. They are after
> specific
> pieces of information, like passwords to PayPal or credit card numbers.
> They
> have a rough guess where that can be found. I don't think it is a part of
> their job description to go after historical documents.
>
> The other person, Patrick, gave you a very good advice. But before you
> contacted your lawyer try to make a statement to the Police. It may not be
> possible, they may say: it is not in our district, not in our jurisdiction
> or whatever but you will make a mark.
>
> Also, keep a diary of every step you (or your friend) do.
>
> This is why people should switch to Vista and never take their computers
> to
> a repair shop. It is much more difficult to poach a Vista machine and on
> Business and Ultimate you can completely encode all files you want.
>
> "ColTom2" <noemailaddress@nomail.com> wrote in message
> news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
>> Hi:
>>
>> I have a friend who had some old letters of one of his kin in a .doc
>> file
>> in his My Documents folder in his computer. The letters were enough to
>> have
>> formed a book about the 1800's written by this kin.
>>
>> He Googled the letters info and found some data applicable these letters
>> which he has never shared with anyone. Also the .doc file string is
>> exactly
>> as that in his computer. In fact, he has found a copy of these letters
>> for
>> sale on the internet and the seller appears to be from the same area of
>> the
>> state where he lives if not the same city. His name is referenced in as
>> the
>> author of these letters.
>>
>> So my question is how did someone acquire this data from his computer,
>> as
>> apparently his computer has been compromised. It would appear to me that
>> it
>> had to happen in one or two scenario's. First someone somehow accessed
>> his
>> computer through the internet or second when he had taken his computer to
>> a
>> shop for repair. Since it appears that the seller is from the same area
>> of
>> state as he is, then my first inclination would be that this info was
>> taken
>> from his computer during a repair. I just really have don't have the
>> expertise in this area to try and make a good determination.
>>
>> If anyone has any comments, suggestions, and/or recommendations as to
>> how
>> all this could have happened I would be most appreciative to read them.
>>
>> I apologize if I have posted this in the wrong newsgroups.
>>
>> Thanks
>>
>>
>>
>>

>
>
 
Back
Top