Techware Labs Header

Forums have moved

See this announcement for more details, or just go directly there.

  #1  
Old 06-29-2007, 04:22 PM
bello bello is offline
Junior Techie
 
Join Date: Jun 2007
Posts: 5
Default email breakin

my ex broke into(hacked) my yahoo email via business web site I was working on for myself through dreamweaver application- I'll spare you the drama...
but does this sound feasible to anyone? and I'm worried that they're still
accessing my account.
also, it would be great to return the favor- it may not be right but it would be just...if anyone knew where i could find an app. or recipe to do so it
would be great to show them how it feels to be violated- and make possibly them stop breaking in.
thanks for your time-
Reply With Quote
  #2  
Old 07-02-2007, 04:24 PM
Napster Napster is offline
Golden Techie
 
Join Date: May 2004
Location: Chicago
Posts: 442
Send a message via AIM to Napster
Default

I would say, "Do not repay evil for evil."

Peace is the best answer, but if she will not cooperate, bring out the big guns.

I'd install Bonzi Buddy 3x on her computer hahahaha

I'll give you an answer but you must explain the situation. How does one go about using dreamweaver to hack into a yahoo email account? Can you just elaborate a little more? The story doesn't make sense.
Reply With Quote
  #3  
Old 07-03-2007, 01:03 PM
R4D10Active's Avatar
R4D10Active R4D10Active is offline
Electronics Veteran
Techie
 
Join Date: Jun 2007
Location: Orlando, FL
Posts: 37
Send a message via AIM to R4D10Active Send a message via MSN to R4D10Active Send a message via Yahoo to R4D10Active
Default

I know a way to make them feel violated.... turn them in to the police if they hacked anything.... then they would definitely "feel" violated hahah
__________________
R4D10Active

That which is to emit light must first endure the flame.

"The 'C' students run the world" - Harry S. Truman
Reply With Quote
  #4  
Old 07-07-2007, 11:54 PM
bello bello is offline
Junior Techie
 
Join Date: Jun 2007
Posts: 5
Default email breakin

Hi-
thanks for your consideration-
lets see if I can make this make sense...
I was working on my website using the dreamweaver app.-
and yahoo hosts my site (i thought it was cheap at the time- what
can I say). Anyway I was having trouble indexing the pages so she suggested I send them to her i.e. give them access to them so them (i think it was via Dreamweaver)- what came out (during later altercation) was that she used
Dreamweaver to de-encrypt my yahoo password...
this is supposedly what happened- I dunno... does this make sense to you?
thanks again for your time-
Reply With Quote
  #5  
Old 07-08-2007, 05:54 PM
Napster Napster is offline
Golden Techie
 
Join Date: May 2004
Location: Chicago
Posts: 442
Send a message via AIM to Napster
Default

first off, why is your ex more nerdy than you are with computers? Second off, is your yahoo hosting password the same as your yahoo email password?
Reply With Quote
  #6  
Old 07-08-2007, 08:37 PM
vee_ess's Avatar
vee_ess vee_ess is offline
Super Moderator
 
Join Date: Aug 2001
Location: Phoenix, Arizona
Posts: 2,781
Send a message via ICQ to vee_ess Send a message via AIM to vee_ess Send a message via MSN to vee_ess Send a message via Yahoo to vee_ess
Default

It is feasible for someone to steal a username/password stored in dreamweaver fairly easily. It had nothing to do with Yahoo!'s services, so blaming them for being 'cheap' is an invalid assertion; any service you went with would be accessible to anyone who you've basically handed the password to.

First thing to do should be obvious, change your damn password!
Second, if you think you have credible proof that your ex is accessing your email, get a lawyer, and the lawyer may be able to legally attain your ex's system to analyze data on the system that would prove they accessed your account, though it is unlikely that you have or will be able to attain such proof.

Lastly, forget trying to hack them back. It's not easy to do for those with some hacking skills and advanced computer knowledge. It's an intuitive art requiring extensive network security knowledge and experience. It's something that you cannot do.
Reply With Quote
  #7  
Old 07-08-2007, 09:12 PM
bello bello is offline
Junior Techie
 
Join Date: Jun 2007
Posts: 5
Default email breakin

well-
I appreciate your less than implied judgement on my tawdry
computer abilities- you're right what can I say...
she does web design for a living and art on the side-
I do all other kinds of design for a living ( I design and build)
and I do art. Shes a bit better at computers than I am-
and i'm a little futher along art-wise...the lord givith and the lord taketh
away... and in this case he helped her take away my entire email history.
Secondly, email and host password are the same-
third- wasn't casting aspersions on yahoo services-
thanks again
Reply With Quote
  #8  
Old 07-08-2007, 09:41 PM
vee_ess's Avatar
vee_ess vee_ess is offline
Super Moderator
 
Join Date: Aug 2001
Location: Phoenix, Arizona
Posts: 2,781
Send a message via ICQ to vee_ess Send a message via AIM to vee_ess Send a message via MSN to vee_ess Send a message via Yahoo to vee_ess
Default

I apologize for having such a condescending tone.
Quite honestly, the hacking your making reference to is something that I don't believe anyone on this site would be capable of. Hacking Yahoo! or Gmail is a huge feat, and there is no how-to. Plus with their active security algorithms and monitoring would mean you would have to have extremely fast equipment and a big toolbox of hacks.

I did assume you were meaning that Yahoo!'s services were lacking quality, and I am sorry for making such an assumption.

Also, I know it may be a pain to change the passwords for those services but I've seen this before. People hate to change their passwords even once they are compromised, but a compromised password is useless and you will only further your problems by keeping it.
Reply With Quote
  #9  
Old 07-09-2007, 05:56 AM
R4D10Active's Avatar
R4D10Active R4D10Active is offline
Electronics Veteran
Techie
 
Join Date: Jun 2007
Location: Orlando, FL
Posts: 37
Send a message via AIM to R4D10Active Send a message via MSN to R4D10Active Send a message via Yahoo to R4D10Active
Default

Quote:
Originally Posted by bello View Post
Secondly, email and host password are the same
A good security practice to follow is to use different passwords for (if possible) everything. An easy methodology to follow, I have found, is to define two or possibly 3 base passwords and 2 or 3 numeric pins and then mix them all.

For example:
Base 1 = One
Base 2 = Lame
Base 3 = Password
Pin 1 = 1234
Pin 2 = 6789
Pin 3 = 5678

Note: Remember to choose bases and pins that mean something to you but would not be easily guessed by someone else. (i.e. your birthday, your wife or girlfriends name) I mention this only because the sysadmin at my job uses his wifes name as his one and only password. From the backup servers to the finance and accounting database, all the same password. So you can see that if one password is compromised the entire system is compromised.

I digress, so back to this method of password "compilation" as it were. You can then take a combination of the Bases or Pins (OneLamePassword, Password1234LameOne5678, etc.) and as long as you remember your Bases and Pins you shouldn't have a hard time with assigning different passwords for everything.

If you are one of these people who can't remember passwords and usually store them all in a txt file , I hope you can see an advantage to this method. Now you can store the password broken down into Bases and Pins, not the password itself. So you still have to remember the Bases and Pins themself but not the password.
For example:

Your password (using the Bases and Pins described above) to gmail.com is
Password1234LameOne5678
You haven't signed on to gmail in a while and you forget this password, but you have a txt file on your pc with the following information in it.

gmail = Base3Pin1Base2Base1Pin3

As you can see your password isn't in plain text and this "trick" serves only as a reminder. If possible I would stay away from storing any sort information regarding usernames or passwords locally. On that note, whenever your browser prompts to remember passwords select NO. I may get into this in another post or article later but for now I am just saying NO.

Using this method to assigning passwords is only one of many ways I personally choose passwords and is by no means the most secure means of doing so.

Either way, you should change your passwords frequently (every 60 to 90 days if possible) I would also recommend, vehemently, to change your passwords now that you have been compromised.
__________________
R4D10Active

That which is to emit light must first endure the flame.

"The 'C' students run the world" - Harry S. Truman
Reply With Quote
  #10  
Old 07-09-2007, 08:38 AM
Napster Napster is offline
Golden Techie
 
Join Date: May 2004
Location: Chicago
Posts: 442
Send a message via AIM to Napster
Default

Quote:
Secondly, email and host password are the same-
figured.

Learn Networking and Linux. Then, whois.com her, trace her IP, find her open ports, infiltrate, map her machine/network. Take her out.

jk. Wouldn't be ethical. I'd be impressed if you could do it though
Reply With Quote
Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT -5. The time now is 08:01 AM. Powered by vBulletin® Version 3.6.5
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Forum style by ForumMonkeys.