Posted 10 Jul 2015 Crackers get into my computers. Below, I provide evidence of this and ask for help....Several days ago when I was using Safari to look at the T-online web site, I got a telephone call. The phone rang but no caller spoke. Later, I noticed source code ln part of the browser window. The source code blocked much of the web page I had been viewing. Clicking the source code accomplished nothing. I clicked a link on part of the the web page which was not blocked by the source code. That click took me to a new page at that site, and the problem was gone. I saw no more source code. Very roughly half an hour later, the same problem occurred: source code blocking part of the web page. I solved the problem the same way I had solved it earlier, by clicking a link on part of the page not blocked by source code, to go to a different page at the site.The caller had called me, I simultaneously had two phone connections, one to my ISP and one to the mystery caller. I guess that the caller then put malware into my computer, and that the source code I saw was from the malware, not from the web page I had been looking at.When I try to log into T-online using Safari, the home page has a "ZUM LOGIN" link to a separate log in page which requires my user name (not my email address) and password. When I try with Firefox, the log in information required is email address (not user name) and password, and the information is required on the home page. not on a separate log in page. With both browsers, I logged in but suspect that at least one of the sites I logged into, perhaps the one I logged into using Safari, is fake.These versions have been each observed by someone else, who spent hours exploring them.I guess that the problem source code I had seen twice earlier later caused me to see at least one fake site. Perhaps the files for the fake web page(s) are somewhere on the web or in my computer.Notice that there are three phenomena: the telephone call (which came when I was using Safari online and which I guess introduced malware into my computer), twice seeing source code which blocked the view of web pages, and fake web page(s). The phone calls have been occurring for years. I once got an email message about them. The source code which blocks part of a web page, is new. I have encountered fake web pages occasionally for as long as I've been in Germany. They only apear for sites I visit much just before the fake one appears. I never get a fake version of a real site the first time I ever try to go the real site. I never get a fake version of a real site when trying to go to a real site I have not been at for months. If I'm at the same web site for a few hours daily for about three days in a row, especially if I visit that site during normal business hours, I have the highest probability of getting a fake version of that site the fourth day. I guess that someone somehow learns what sites I visit, perhaps by real-time observation or by reading logs of my web activity. I guess that the fake version s of sites are in my computer, perhaps in Safari software.For example, I spent much time for a few, consecutive days at the mailbox.org web site, then encountered a fake version of the mailbox.org site which, among other things, initially did not let me log in. I sent email to the site to try to resume being able to log in. I got spoof email, pretending to be from mailbox.org. The spoof email response did not come from mailbox.org. I had never been unable to log into the real site (but did not realize that I was at a fake version of the site).Once, someone told me that the cracker had dared me to report the problem. I think that reporting the problem may accomplish nothing because other people cannot replicate the problem because their computers lack the malware which causes the fake site to appear.I think that the problem occurs because of intense hostility to me. Has anyone else noticed this phenomenon, a fake version of a real web site (which site perhaps is in the browser's computer rather than really on the web despite the seeming URL which appears in the browser's address bar)? I guess that one of the pages, probably Safari, is phishing or other misconduct directed at me.I called T-online support two days ago. I got a German-speaking person. I asked him if he knows English. He briefly answered in English that he didn't. Then I heard a recording in English. I waited. Suddenly, the connection went silent and stayed silent.I called again. Normally, when one waits for T-online support, one frequently hears an appropriate message over the phone, then eventually talks with a support person. However, when I called support after the silence problem, I was never able to reach a tech support person. Each time I called, I connected to T-online but later got some kind of signal that clearly indicated that something had gone wrong with the connection, perhaps some kind of busy signal or disconnect signal. I called yesterday and got that signal again. Before the past two days, I was always able to talk with a tech support person at T-online. I mention the unusual telephone support problem (the problem being that, except for my first call, it was impossible to reach a tech support person) because it may be a clue. The cause of the browser problem may prevent me from reaching both my web account, and the phone problem prevents me from reaching the same company's tech support people by phone.Does anyone know what caused the Safari-Firefox discrepancy and how I should respond to it? I guess that T-online is not causing the problem.A similar browser discrepancy exists at Google's gmail. If I use Safari to the page to change my password, thatpage is blank, preventing me from changing my password. If I go the page withFirefox, the page is correctly displayed and I can change my pasword. This discrepancy should not exist....I used to have problems uploading a certain text file by ftp; then, later, uploading a certain graphics file. The file would be uploaded but someone would not stay. I t changed the name of each slightly, which solved the problem. I think that there is or was a malware script in my computer or destination directory, and the script caused the problem....I think that it is possible for crackers, if they know when I am working on a computer, to introduce files into it, and to read or copy files in it when I am not connected to the Internet. I am certain that they can do this when I am connected to the Internet. I don't know how it is done. Perhaps Bluetooth or Airport is active although my computer indicates that they are not active. Perhaps there is a cell phone in my computer and criminals can reach my computer through that phone.Perhaps my computer has a remote access server which I don't know about. I can't find one and I've tried to block access to any clients of such a server. Such a server would nicely explain the seeming ease with which crackers can observe my computer and put files into it.I think that, with one of my computers, crackers can observe what is in front of the computer. The computer is on a table. I think that crackers can see what is on the part of table in front of the computer even when the computer is not online. I don't know if the computer has to be turned on. I put tape over a spot on the video monitor to try to block FaceTime. That didn't work. Maybe there is a second FaceTime which uses a different spot on the monitor. Maybe the observing camera has nothing to do with FaceTime....Are there two drivers in the computer, one for me and one for crackers?...I don:t think that passwords protect my computer much. Perhaps my computer has a secret administrator account which I don't know about, and crackers know its password.There are some times of the day when it seems to be far more likely that crackers will observe what is in my computer....Did a vendor sabotage me? Was I sold a sabotaged product or service? These are true questions, not accusations....Once, while I was flying from Boston to Frankfurt, while the plane seemed to be over Europe, someone told me that a passenger had said three things about me, which my source repeated to me. Most people would consider two of those things severely derogatory. My source pointed out the speaker to me. Later, another person came to me, seemingly believing, or at least hoping, that one of the three statements was true. The young, white man accused of making the statements seemed to be traveling alone. I did not recognize him. He looked physically fit. His seat was closer to the front of the plane, and to the right of the plane, than mine. I vaguely guessßremember that he had an aisle seat.In Germany, I took a course. With only one exception I shall now write, I never saw anyone in the room for that course except the teacher and students taking that course. I customarily waited in a hallway near the classroom until class was about to begin, then entered the classroom. One day, despite my custom, I entered the classroom much earlier than my usual entry time. A woman whom I had never seen before or after, made a severely derogatory statement about me to a female student with whom I often chatted in the classroom. The statement was not one one of the three statements about me which had been made to the plane's cabin crew. The denouncer then left the room. Perhaps it was a coincidence that the listener was one of the few students with whom I often chatted....Occasionally, I get information about the computer crackers who cause problems for me.Once, I got what seemed to be a letter from a Scottish city's police department, on what seemed to be that department's letterhead. The letter concerned a thoroughly documented crime done by an Internet domain registrar in Britain. Later, someone else told me that the letter was fake. I have reason to believe that the letter was fake. I do not know if the supposedly counterfeit letter, or the subject that the letter dealt with, is related to the fake web sites problem.I was told that my malefactor is Russian, which I guess means someone in Germany who either is from Russia or is a Russian-speaking immigrant to Germany. I don't know if the statement, that the person is Russian, is true.In America, just before my last trip from America to Germany, I was warned in a kind way that I would receive severe mistreatment in Germany.In the small town in which I live in Germany, I often have been hostilely told to go. The most common places I have been told to go are away, home, Israel, and Spain. A few, friendly people in Germany have suggested to me that it might be better for me if I left....A few people have told me that I would get less mistreatment if I commmunicated nice things about Germany or my town in Germany. I think that that advice is because the motive of some of my enemies is a desire to help Germany or their town, combined with their belief that I am a liability of, not a helper of, Germany and their town.Angela Merkel recently spoke about the NSA having tapped her phone calls. She did not say that it is unusual to electronically violate privacy in Germany. If I correctly remember what I heard about her remarks, she complained that America, an ally, had violated her privacy. Perhaps, if I praise Germany or Niedersachsen's Oldenburg, the crackers will think of me as their ally....I could have posted this message in a computer forum instead of a German forum. I am trying to find out (1) the criminals' names, street addresses, and other contact information, (2) the computer techniques they use, (3) whether any of the criminals have ever sold me any products or services, (4) how I should respond and defend myself. I want to completely solve the crimes and harassment, and be able to give a detailed, factual report to police. I guess that at least some of the criminals are in or near Niedersachsen's Oldenburg, which is the main reason I post in this forum.Do you know something I might appreciate learning? 0 Share this post Link to post Share on other sites
Posted 10 Jul 2015 This is got to be the biggest load of BS from the worlds most clueless computer user I've seen in a long while... 7 Share this post Link to post Share on other sites
Posted 10 Jul 2015 I like the relationship of the supposed "cracking" coinciding with the telephone call. Must have been that 2.8k dial up modem security issue. 1 Share this post Link to post Share on other sites
Posted 10 Jul 2015 Really if's not a copy-pasta then somebody put a lot of effort into this, please respond to the troll, he/she really needs attention and wasted a lot of time for this post.. 0 Share this post Link to post Share on other sites
Posted 13 Jul 2015 I started this thread, which is not a troll. I gratefully read the responses. None of you is a yes man. Thank you for your blunt, expert opinions. 0 Share this post Link to post Share on other sites
Posted 14 Jul 2015 It seems you may have malware on your PC. Malware comes in many different forms but it is usually distributed generally in the hope of catching as many people as possible. Every computer used on the internet can be a target - not just yours.Make sure you are using good antimalware software and check your computer regularly.Make sure you are using the latest version of browsers and browser plugins. 1 Share this post Link to post Share on other sites
Posted 14 Jul 2015 You sound paranoid. If some strangers made derogatory statements about you, what does that have to do with your computer getting hacked? How will your computer get hacked by somebody who is calling you on the phone? I too have had phone calls where nobody was on the line. It usually means a telemarketer was trying to reach you but by the time the computer picked your number, the person who was supposed to talk to you had gone on break or ended their shift, hence nobody on the line. Not once was my computer hacked because of such a phone call. I have also had it happen that Telekom cut me off after I had been waiting on their hotline. Maybe it's a glitch in the system or maybe they've marked your number as a non-German speaker and automatically kick you out if they have no English speaker available to talk to you. If you are having problems or a security issue with Safari, why do you keep using it? You probably have a virus or malware on your computer. Either you try to clean it up yourself or you take it to the shop and have them do it. It is possible that somebody might write a program/virus that watches you with the built in camera. Why they would want to escapes me. The only case I know of was the police doing it and trying to hack the computers of criminals in order to watch them. If you are worried about this, a tape over the eye of the camera will solve the problem. 2 Share this post Link to post Share on other sites
Posted 14 Jul 2015 Denkyo from looking at his/her posting history has had similar problems with computer crackers starting in 2012. But they are getting worse, and now talk of secret cameras, peculiar complicated accounts of strangers bad mouthing him, and talk of "enemies".,,, does not sound too good. 1 Share this post Link to post Share on other sites
Posted 14 Jul 2015 @DenkyoYou do seem to be in a very stressful situation. Perhaps you should tell your doctor what has been happening. He/she may be able to prescribe something to help you deal with the problems you face 1 Share this post Link to post Share on other sites
Posted 14 Jul 2015 Denkyo, if you started a blog itemizing these events, I would read it, faithfully. Each entry should be about each instance of these things happening to you, and be cross referenced with similar events in your logs. How did you get to be in Germany? What do you think the crackers want from you? Why do you think people are speaking derogatorily about you, what is their motivation? What would happen, if say, you chalked these events up to a fact of life and pretended they weren't happening? Maybe you could still live your life normally, so long as the computer is behaving the way you'd like. Maybe taking your computer to the Apple store and getting it wiped clean with a new OS will help you do that. 1 Share this post Link to post Share on other sites
Posted 6 Sep 2015 -- I'm the original poster. I got more responses, for which I am grateful.-- It was suggested that I use good antimalware software and check my computer regularly. I have been doing that for years. For example, years ago I got an email message written specifically to me, not a message broad cast to many recipients, which had an attachment my antiviral software showed contained a virus.-- It was suggested to put a piece of tape over the hat for the computer's factory-installed camera. I did that immediately after getting the camera. I know a bit about cameras attached to computers. Many years ago, before USB I think, I bought a camera, then attached it to a computer so that I could see on the monitor what the camera lens was pointed at. Then, I did that with a second, different kind of canera instead. Then, I attached a video camera to a computer. That camera had a lens allowing me to see on the monitor events far from the camera. At present, my computer has a second camera installed, a camera in addition to the factory-installed one. I am now trying to find the name and contact infirmation of the person who installed it.-- It was suggested that I do a clean install of the OS. I did that a long time ago, and that included a clean install of the browser.-- When my computer is not connected to the Internet, a cracker can read what is in the computer. Maybe the computer was mechanically changed to allow WiFi or other radio entry to te computer by a cracker. If the camera was mechanically changed, it may have been done by the same person who installed the second camera in it.-- In my opening post in this thread, I wrote about whether the fake web site was in my computer. There is no need to have an entire, fake web site in the computer. The browser might merely have cached, fake pages that a cracker previously had observed thatI use. -- If all you have is computer expertise, you probably can't help me although I much appreciate your posts, which I carefully read. If computer expertise alone were enough, I would have posted in a computer forum, not a Germany forum. The second camera was installed in Oldenburg. Closely related crimes were done in or near Oldenburg. In the past, I have sometimes paid computer consultants for their computer expertise. In this thread, I ask who did these crimes and how, not general information about how.-- In some legal systems, police confiscate things used to do crimes. For example, police might confiscate a crowbar used by a burglar to criminally break in. I want to know who did the crimes to get police to confiscate all computers, and everything else used to do the crimes. If a building's owner did computer crimes in that building, perhaps police will confiscate that building. I'm trying to accomplish arrests and confiscations that I think will be done in or near Oldenburg if they are done at all.-- One person may have modified the computer to allow others to getin, and some of the others may be far from Oldenburg. 0 Share this post Link to post Share on other sites
Posted 6 Sep 2015 https://en.m.wikipedia.org/wiki/List_of_crackers 0 Share this post Link to post Share on other sites
Posted 6 Sep 2015 Posted 10th July The mother of all miracles, A friday Putting a tinfoil hat on might solve the problem 0 Share this post Link to post Share on other sites
Posted 28 Feb 2016 I am the original poster, denkyo. This post has two purposes. Earlier, I asked for information. Some people gave me information. Thank you very much. Thanking them, not all of whom posted in this forum, is my first purpose. ... My second purpose is to give more examples of harassment of me. ... ... I. TRASH 1. Suitcase ... I am an American living in Niedersachsen. ... I flew from Bremen to Boston. Although there generally seems to have been prompt transfer of luggage from my plane to a luggage carousel, my suitcase was much delayed. Just before I was going to submit a missing luggage claim, I got my suitcase. Then I went from the airport to a hospital to visit my mother, and finally to a motel. In the motel, I found that the zipper on my suitcase had been tied shut. I had given the suitcase untied to the airline. Furthermore, the tying could have been done well with only one or two quickly tied knots. However, the tying was extremely elaborate. It obviously had been done by someone with much time to do it. Many criminals work as quickly as possible to minimize the risk of being caught. This criminal wanted me to know that he worked with impunity. He was certain that no one would punish him for tampering with luggage. ... I cut through the string which kept the zipper closed. Then, I opened the suitcase. In the suitcase, I found many pieces of black, plastic trash that were added after I gave the suitcase to the airline. ... I will now describe the pieces of trash. Imagine that a person dropped a black bowling ball, of the kind customarily used in America, onto hard concrete from a great height. I guess that the ball woud break into many, irregularly shaped pieces. A person might then take pieces each of which is about the same volume as a chicken egg. My suitcase contained irregularly shaped pieces each of which had about the volume of a chicken egg. ... I guess that the pieces were put into my suitcase to tell me that I am black trash. I do not know who did it. Later, I returned to Niedersachsen. ... Above in this thread, I described an incident in which a stranger did his best to denounce me to cabin crew on a flight. The flight was from a non-German city's airport. That was the same airport in which I earlier had gotten the black trash suitcase. Flying out of Germany to that city, I got black trash. Flying out of that city to Germany, I was denounced to cabin crew in the plance. ... 2. Friendly Greeting ... When I was in an airport terminal waiting for my flight back to Germany, the denunciation flight, a uniformed police officer walked over to me and briefly greeted me in a friendly manner. This was odd because he and I had nothing to do with each other. I was the only person to whom he spoke. I was not on line or doing anything. I was standing still in a bunch of many people, waiting. Perhaps the police officer was merely trying to be helpful. Two of the reasons I mention this is that the flight from Germany to this airport resulted in black trash in my suitcase, and the flight from this airport to Germany resulted in another passenger doing his best to denounce me to the cabin crew. ... 3. Sidewalk box ... One day, much after the trip to Boston, while walking in my Niedersachsen neighborhood, I saw a small, cardboard box on the sidewalk adjacent to someone's backyard fence. The top of the box was open, permitting me to see the box's contents. The box held the same kind of black, plastic trash that had been put into my suitcase. One morning much later than that walk, I rang the doorbell to ask the resident about the box. There was no response. No one came to the door. I went back a few days later, in the afternoon. Again,, there was no response. No one came to the door. There are innocent explanations for that. For example, perhaps no one was home. ... I think that the box resident, the resident with the box on his sidewalk, works for a local police department in Niedersachsen. I have no idea why the box was there. Perhaps the location is a red herring, a fake clue designed to thwart an investigation. Perhaps the criminal wants me to know that he is for police. I do not know. ... II. PHONE CALL ... 1. Police name ... Between the two days that I went to the box residence, an interesting event occurred. I have a friend, whom I#ll call "Ann," who has a black friend, whom I#ll call "Barbara." Barbara was in a mostly black country in Africa when I twice went to the residence with the box. Ann, in Niedersachsen, called Barbara, in Africa. The call was from a phone I often use. Barbara's phone displayed the caller's name and telephone number. The displayed telephone number was right. The displayed name was, more or less, "Oldenburg Polizei." That name had nothing to do withe call. That name should not have been displayed. Barbara, in Africa, told Ann, in Niedersachsen, about the police name being displayed. Ann then told me. I had never told them, or anyone else, about the black trash in the suitcase or cardboard box. I had kept that entire matter secret. ... 2. Comments ... If a person gets a phone call which seems to come from police, he might not pick up the phone or return the call. Therefore, I would be harmed if calls fron me seemed to came from police. ... I think that the wrong name display was done by someone with access to a German telephone company's computer. ... I don' know how often a police name is displayed for calls from phones I often use. I know only about the one incident I reported above. ... I guess that Oldenburg police did not cause the false display name. ... III.. COMMENTS ... The main purpose of this thread is to identify Internet criminals to get them punished. I guess that I will fail. I got information about other criminals and harassers, and I am deeply grateful. 0 Share this post Link to post Share on other sites
Posted 28 Feb 2016 Is it to ID internet criminals or is it a thread with racial discrimination undercurrents? BTW... I also Have Computer cracker here just NW of Frankfurt! 0 Share this post Link to post Share on other sites
Posted 28 Feb 2016 denkyo, did you keep the bits of black plastic? Did you try to put them together to see what they might have originally been. Can you post a photo? I am just curious as to what it might have been. Next time, go with a suitcase you can properly lock. Even putting a lock on the zipper is not safe because staff can force the zipper to open and then re-close it without you being able to see that anything was done. 1 Share this post Link to post Share on other sites
Posted 28 Feb 2016 Never forget, just because you're paranoid, doesn't mean they're not after you. 3 Share this post Link to post Share on other sites
Posted 28 Feb 2016 It's funny, because I was on a flight once with my broken bowling ball collection (never know when it's going to come in useful) and when I picked up my luggage, someone had replaced my bowling ball bits with frilly pink ladies underwear! 3 Share this post Link to post Share on other sites
Posted 28 Feb 2016 I never found any underwear in my luggage that wasn't mine but I do know a woman whose DL was stolen when she was on an overseas vacation and put it on the bar as she was asked for ID. Months later it turned up in the glove compartment of her car back in her home country. 1 Share this post Link to post Share on other sites