I make a pre-emptive total war nuclear strike against hackers

79 views
Skip to first unread message

LCC

unread,
Jun 28, 2007, 8:33:33 PM6/28/07
to Lonnie Courtney Clay
I have finally decided to disgorge some things useful to everybody,
which I hereby declare to be public domain information. If the places
where it is posted attempt to patent these ideas, then I invite the
governments and operating systems manufacturers to bloody their heads.
If you think that this advice is worthy of reward, please feel free to
send a large cash donation certified check to me at :

Lonnie Courtney Clay
3395 Harrell Rd. Arlington TN 38002-4261

I have been thinking about how the internet can be secured ever since
I had an exchange of opinion with "Arcadenut" himself on the forum
Spaces Empire IV at Shrapnelgames.com in 2001. I realized that
Microsoft bashing was unwise unless I could offer solutions to the
problems which I saw. If anything the problems have grown worse while
I was thinking for the past five years. Sorry it took so long to
crystallize the solution. If I had not been drugged down with Haldol,
then I might have posted something like this years ago. As I said in
the title, I hereby launch a full scale pre-emptive nuclear strike
against hackers. Two f-disks in one week have forced me to fork out a
couple thousand dollars for new computers and software "purchased from
a retail store" for the household. So you could say they I am severely
perturbed and exacting justifiable retaliation.

The statements below may seem to be advocating a massive invasion of
privacy. I counter with the observation that any business unwilling to
provide information is very probably engaging in criminal activities.
OSM means operating system manufacturer.

1) If Microsoft is no longer the world's top computer corporation due
to Google's growth, then it is entirely the company's own fault. If
they fail to take a leadership role in the task of creating a secure
internet environment, then I call upon Google to seize the torch and
run like crazy.

2) There is probably a web page providing a list of all the world's
securities exchanges. I will point to it in my next post. Right now I
simply want to point out that leading corporations are listed on
exchanges. By providing the ticker symbol and the exchange upon which
it is traded on its homepage, then a corporation could have all of its
identifying data and homepage URL and IP ranges verified by any
visitor who takes a moment to check the website of the exchange as
saved in the user's own bookmarks folder for commonly referenced
exchanges. In the U.S.A. the SEC or FTC or IRS or some similar agency
probably has a list of all legitimate businesses. By providing a web
page for public access giving all of the relevant information
including homepage URL and IP ranges, they would serve the public
interest. Any business website whose URL for its homepage and IP
ranges is not verified by such official sources is obviously a high
security risk and should be avoided like plague and shut down as soon
as detected by internet authorities. Never use a browser which lacks
the ability to display the IP address of the current URL. This is
simply because the ISP could be providing a hoax mirror of the
internet which has a perfectly legitimate URL on the hoax internet.
Because the ISP which I use has been doing precisely that for all web
pages to which I post or frequently visit for quite a while, I say
from experience that you must be alert or just lucky to notice the
hoax. Because I could do nothing about it, I saw no reason to comment
on the subject except for subtle hints. For an example, see the
rec.arts.sf.written group post performed from the hoax CoolSci-Fi
forum as ClayLC where I said "What happened to Google ?" and got a
lame reply. But I am "smarter than the average bear" and was not
fooled at all. I now metamorphose from "a meek mild fly known as
Hiram" to become SUPERFLY. Or if you would prefer that I remain a
roach, then I am now of the hissing roach species. I really appreciate
the efforts of all who have taken part in the Hoax, such as "Ed
Conrad". I have a bit more difficulty forgiving the others in my
family, but they were doubtless put under extreme coercion. I am
using Microsoft Works Word Processor to prepare this document. I am
thoroughly annoyed by its constant garbling of what I type in. Stop
putting trash-ware on the computers which I use, or I will find a way
to get even. It is quite amusing to watch the nonsense on the cable
TV too. Either the world has become as crazy as I am, or a lot of
effort is being put into this Hoax. One interesting thing to note is
that the package changes little h of the word to capitals. So I
suppose that the masquerade is almost over. If you stop dosing me with
the witch's brew of drugs, then for exchange I agree to post only on
web pages which are served on the secured mirror version of the
internet.

A typical tactic of hackers is to mirror the website of a company
using an unauthorized similar homepage URL. They put mal-ware items on
their copy of the website among which the most common are cookies,
which infects any visitor's computer. They sell hacked copies of the
pirated company's products which install viruses . They collect credit
card data from purchasers and use it for identity theft. Most of all,
they hack the OS browser so that it does not necessarily display the
actual URL of the current website on the user's web browser. They
change browser settings, OS security settings and certificate
information, and sometimes even the registry. They download .dll
packages which install into the OS internet browser and other
operating system files to thoroughly corrupt any computer. All of
these things are made possible because there is no simple way to find
out if a URL homepage found by the search engine is from a legitimate
company rather than a mirror site of a criminal, or a disreputable
organization. See the suggestions below for further solutions.

3) Communications companies have the phone number and mailing address
of just about everybody in the world. They should provide that data to
the organizations in 2) so that it can be included in the database.
Anyone who does not allow such data to be collected should be flagged
as non-trusted.

4) Internet service providers know the IP ranges of all their
customers. This data along with the associated URL should be provided
to organizations in 2) . Anyone who does not allow such data to be
collected should be flagged as non-trusted.

5) The internet is secured by certificates. See the lists by selecting
control panel/ internet properties/ certificates for Microsoft OS
products. The lists which I see for the manufacturer's installed
defaults include many expired ones. There needs to be a worldwide
authority which provides a current list of ALL certificates. It should
provide files for import replacing the current list on the computer
with the latest version. The OSM's update service should update the
lists every time the computer is booted up when connected to the
internet. If the computer does not display the "system has updated
certificates" notification during the boot-up process when connected
to the internet then the user can easily notice that their computer
has been hacked. A checksum for the current list should be generated
every time the update occurs and at NO other time except as outlined
below. This can be implemented by determining the current webpage IP
and comparing it to that of OSM's update IP ranges. When the user
wants to modify the list then they should NEVER use a shortcut.
Instead they should execute a file by clicking on an executable placed
on the desktop and nowhere else. An absolutely protected program must
verify that the process attempting to modify the list was loaded from
the desktop and that its checksum matches that of the latest OSM's
update. Each changed list checksum is updated when the user exit's
the modification process.

When a certificate is presented to the OS by a website, its validity
should be traceable back to a current list "trusted root certification
authority". If the traceability fails or the site has no certificates
then it should be disabled from performing ANY potential mal-ware
operations on the computer regardless of settings. A popup with a
counter should be provided on all browsers notifying the user of any
attempts which are rejected. The information of what was attempted by
what IP should be placed in a log file which is forwarded to a central
worldwide mal-ware reporting clearinghouse as soon as the current
webpage is changed. The numerical quality of any certificate should be
indicated in every browser's status bar, with no options whatsoever to
disable this feature. Mal-ware operations should be numerically rated.
If an operation exceeds the numerical rating given in the status bar,
then the rating should turn red, notifying the user that a hack is
being attempted. Data about the event should be logged and forwarded
as above. Automatic bots at the central authority should notify a
human operator when an IP exceeds a certain threshold of events so
that action can be taken by the ISP of the site. Any ISP who does not
cooperate with central authority should have their certificate
revoked. When the certificate is revoked, the entire IP range of the
ISP is provided to all OSM for use to update the table of blocked IP
ranges. See 6)

The process which checks certificates must be absolutely secured with
a checksum and modify allowed only by current IP in the OSM's update
IP ranges.

6) All OS must be modified to include a new absolutely protected
security feature which checks the current browser IP against a list of
blocked IP ranges which is updated every time and only at the time
when the user's computer visit's the OSM's update site.

7) The OSM's update IP ranges should be placed in checksum protected
secure files on the computer. The files must be allowed to change only
when at an IP in the OSM's update IP range determined from the files.
The checksum of the files in the registry must be protected so that it
is only allowed to change when the current IP is in the range from the
files. An absolutely protected and unchangeable process must be
scheduled to always run at a priority depending on the machine's CPU
load which verifies the checksums of all checksum protected data and
alerts the user if any discrepancies occur. A log file must be
generated and if connected to the internet the events should be sent
to the OSM as they occur so that the infected machine's IP range is
flagged as a potential site undergoing mal-ware revision. If the OSM
is notified then the next time the OSM's update is executed the entire
operating system should be checksum verified against the version
provided in the most recent visit. Any failed checks must result in
replacement of the faulty information immediately. The repair should
proceed from the most secure components down to the harmless last.

8) Product names are registered trademarks. The agency which
registered the trademark needs to provide the URL and IP ranges of the
site(s) of the manufacturer so that the manufacturer can be checked
for a list of all authorized dealer's URL and IP ranges who distribute
the product. The selling of software by anyone not on the list must be
outlawed except for read-only media bearing the name of the software,
the product manufacturer, the version identification, and the
trademark registration authority information. Every manufacturer must
provide checksums on its website used to verify that the read-only
media contains the specified authorized version of the product.
Operating system manufacturers must provide an absolutely secured tool
whose executable is located on the desktop for calculation of the
checksums for read-only media.

9) Never deal with any website which does not encrypt the purchaser's
personal and credit card data, or which does not offer the option of
purchasing a read-only media copy of the product.

10) Never deal with any website which downloads a custom installer
permitted to download the product instead of using the browser's
download feature because it will skip the certificate validation
process. Never execute an installation over the internet rather than
downloading an installation wizard or program executable. Report any
website doing such things to its ISP.

11) A central authority must be established which provides the URL and
valid IP ranges of the ISP website for any given IP address so that
abusive websites can be reported by visitors coming from the site.

12) Never deal with any site whose ISP is not registered according to
the information available at item 11)

13) A central authority must provide a list of URL and IP ranges for
all sites which have been vetted to request the personal
identification number given on the back of credit cards. Never give
that information to any site which is not vetted. Furthermore a
central authority must provide information to all issuers of credit
cards regarding any companies who promote identity theft by NOT
requesting the PIN of a card. It is then up to each credit card
company to decide if they want to approve any transaction without a
PIN.

14) Never do business with any site whose ISP lacks a valid COA. The
information about the
ISP must be made available in every browser so that it can be checked
before business is transacted. Whatever it takes to implement this
new feature, do it.

15) Every OSM must provide a new security feature which cannot be
disabled and which verifies the checksum of the executing version of
the web browser(s) to verify that it has not been hacked as compared
to the latest update(s) from the OSM. It is absolutely essential that
the reference checksum and the process which calculates it be maximum
security. See previous discussions above on that topic.

16) A new feature must be added to all web browsers which looks at a
web page and finds the information provided giving domain, ISP
range(s), a COA trail, ISP URL, server URL, company name, address,
phone number, and email. All of the information should become
available by clicking on an icon. The ISP and server sites should be
linked to click on so that the data can be examined at their sites
too. If anything questionable is found, or the site is abusive, a
single click should send a message giving the data to the ISP to alert
them.

17) Central authority for certificates can be queried to verify the
COA trail information by clicking on an icon. This is an essential
highly secured feature which must be added to all web browsers.

18) Do not deal with any site which fails to support 16)

------------------------------------------------------------------------------------------------------------------------------

1) If you ever bought anything from any site which violated the
behavioral rules outlined above, then chances are that you have been
hacked. Sometimes just a visit is enough. While the infection may be
quiescent now, it can cascade into a firestorm within a few days, as I
know to my regret. The same holds true for anything purchased in a
store unless the store is a major retailer. Having a valid registry
key means nothing whatsoever because the executable may be a hacked
version of the genuine product. Also see 8) above regarding checksums.
Call stores on the phone to determine whether they have a product. If
so then visit the webpage of the manufacturer to determine whether the
store is an authorized distributor. "Bargain" copies from unauthorized
dealers are either pirated or mal-ware infected by criminals.

2) Always register your purchase with the manufacturer so that it can
be determined whether the media is one of many copies cloned from a
single purchased one. If that is the case then you can help stop
piracy by reporting the company which sold you the product. A central
authority needs to be established which punishes cloning businesses.

3) Do not use any email client which lacks the audit trail of routing
data. The client which I was using in 2001 was replaced by one which
no longer gave the information. I knew when that happened that things
were "rotten in Denmark" but chose not to make an issue of it.

4) Do not use any email client which automatically opens the next
message in the queue when the current one is dragged to another
folder. Always require click selection for opening any email.

5) Modify the email clients to display (at user's option) the audit
trail without opening the email so that spam can be

6) Never use a shortcut to perform your OS update. Instead of doing
that you should enable automatic updates and then restart while
connected to the internet. The very first thing that a hacker does
after modifying windows explorer is download his own version of the
OS update executable which goes to a hacker site to replace the
critical OS functions. Then the shortcuts are hoaxed to use the new
versions rather than the genuine OS software. On second thought the
very first thing is to hack the firewall if possible. This includes
changing the user's firewall password so that a genuine user cannot
retake control of the hijacked machine.

7) All firewalls need to be revised to prohibit changing the user's
password string while connected to the internet. All firewalls must be
modified so that they have an internet locking feature. After engaging
the lock then the password can be changed. All firewalls must provide
the option to prohibit OS processes which are normally authorized to
"pass lock" from functioning if selected. All firewalls must have a
self defense function which exerts the utmost effort to prohibit any
other functions from changing controlling settings and other firewall
data. Never activate the firewall executable by clicking on a
shortcut. Navigate your way to the file and open it up instead. A
bogus shortcut(s) is another thing down early by hackers.

8) All software which is authorized to perform privileged functions
must be modified only by the OSM or other manufacturer's authorized
update ISP range(s) by download. Those addresses must be the second
most secure information after user's passwords.

9) Any email which provides a product key-code must include the data
in item 16 above. Examining the data is the responsibility of the
purchaser. The audit trail of the email should be checked to verify
that the source is really the manufacturer. Hackers can send email
too, and their key codes are perfectly valid for the hacked product
downloaded from their site.

10) Email audit trails should include a current COA quality level for
every stop along the way. If they do not now, they should in the near
future. This will permit the email recipient to judge whether the
email might have been hacked in its journey.

11) Email clients should also have the option to automatically delete
any email received which was processed by a server with a revoked or
no COA. The display of emails in the list should include for each
email a quality rating of the routing based upon the LOWEST quality
found. A filter option of the user should allow automatic deletion of
any emails whose quality falls below a selected level.

12) For a couple of months I had four emails in my folders which were
infected yet were not visible to the user. That should have been
impossible. Fix it......

13) As with the internet browser, the email client should be a high
security software item which can only be modified by updates from the
manufacturer's IP range. Include an icon in every email client which
performs an automatic update when clicked.

-----------------------------------------------------------------------------------------------------------------------

The following are observations which I made of the hacked computer
which was infected as soon as I used window's explorer and was
connected to the internet.

1) The file EXPLORER.EXE-082F38A9.pf changed my firewall password. I
found it in the folder C:\\windows\Prefetch size was 24.3 kb.
2) I looked at a couple of other things then looked into the folder
again. The file was gone and was not in the trashcan.
3) I was able to change the network lock state of the firewall even
though I did not know the current password. I then did a POR and kept
doing it until the d-link failed to be recognized.
4)The log files of the firewall which I had examined before the
initial unlocking of the internet connection had been deleted.
5) A file expert.dll 4.5.538.1 created earlier in the evening was
accessed when I opened up internet explorer. I presume that it was
downloaded from the Hoax Microsoft update web site.
6) In Zone Alarm folder repair. I attempted to use vsmon.exe and was
told that I could not because SSEAY32.dll was not found.
7) When I checked, folder rollback was empty.
8) An object "internet Explorer" on the desktop was not visible using
windows explorer. When I moused over it, nothing was displayed by
popup. The case was the same for objects "My Documents" "My Computer"
and "My Network".
9) In the "my documents" folder was a file called zapsecurity.xml
created right after I activated internet explorer.
10) In the zone alarm folder I attempted to open a new execution of
zone alarm.exe Nothing happened.
11) There is a new object on the desktop called "Control Panel" see
8).
12) Under Startup Control Panel there are 6 objects shown. Windows
explorer shows 30. For the 6 displayed objects the options are
Explore/Open/Create Shortcut,. For the others the options were Open or
Create Shortcut. Finally the object "folder options" also has "run as"
and "Windows Cardspace" says open/ cut/ Create Shortcut/ Delete.
13) When using windows explorer I clicked on c: and was told "These
file3s are hidden". I clicked on show folder contents and was obliged.
14) When I moused over the Windows folder it showed something
different each time. That was the only object shown.
15) Under documents and settings I expanded all users then current
user. When I selected current user the all users folder was
automatically compressed back to "+".
16) Under all users start menu there were four shortcuts and programs
folder. For current user start menu there was only programs folder.
17) But when click on taskbar start there were a bunch of innocent
sounding objects in the list : Internet/ Email/ Windows Update/ MSN/
Windows Media Player/ Windows Messenger/ Tour Windows XP/ Files and
Settings/ Wizard.
18) I tried the Microsoft Help and Support button, nothing happened.
19) Zonealarm pro alerts started popping up. I did a restart.
20) Without the user icon appearing, the boot automatically continued
onward.
21) When I tried shutdown it said "saving your settings" and failed to
shutdown. Eventually I did a POR.
22) Once again no pause to see if I would click my icon for startup.
When I selected help and support again it opened it up and there were
no alerts.
23) In Ask for assistance, clicked on get support or find information
in windows XP newsgroups ;
24) Alerts started popping again. I experimented for a while but
nothing particularly noteworthy happened. So I selected shut down and
this time it did.
25) Once again no pause for user icon click. This time the d-link was
found so I said shut down and it hung up on saving settings until I
did a POR.
26) I looked for a phone number to call in Microsoft Help and Support.
No soap.
27) Opened windows explorer again. This time when I clicked on C: it
just opened it up.
28) The folder expansion on a different folder minimizing previously
selected as in 15) above no longer occurred.
29) Start Menu folder for all users now has sho0rtcuts for Microsoft
Update/ Set Program Access and defaults/ Windows catalog/ and Windows
update. The taskbar start shortcuts displayed are now Windows update/
MSN/ Windows media player/ Windows messenger/ tour windows XP/ Files
and settings transfer wizard.
30) By now I had grown tired of the game and just turned the computer
off. It is available for analysis, but since the entire exercise was
just part of the hoax, I see no point to it. I conclude that the
corruption is a user activity driven gradual evolution rather than a
complete metamorphosis when the window update is performed. As an
intelligence test it sucked. DO I PASS ???????

------------------------------------------------------------------------------------------------------------------------------

I first became interested in encryption in the third grade when I was
in the program for academically talented students. The English teacher
Mrs. Dowd discussed how it would be easier to remember things if you
used a mnemonic associative memorization technique. Since I was more
interested in hiding things, I decided to use the music which always
plays on multiple channels in the background of my consciousness to go
her one better. Context triggered mnemonic associative management. I
present below a selection of mnemonic strings which are expanded
recursively in infinite progression, until I find what I am looking
for by thinking of a key which matches the current music channel, or I
lose patience whichever comes first. The selection is designed to make
you break sweat, your hair stand on end, and your heart thump. Enjoy!
You say that you did not think to retain records of what was taught in
those special classes ? Too bad, so sad, drop dead....

able - anonymous bastard's living executive * boat - becomes only
another timeout * cat - create another task * dog - decides orders
good * eat - executive alternatives trainer * fin - finding interrupt
names * gap - getting alternative processes * hive - hidden
interpreter values executive * ice - interrupt console execution * jet
- justify execution tables * kill - keep interpreter's level low * lag
- lexical abort generated * mop - monitor overlain processes * nut -
next user's table * oil - overcome inconsistent labels * pan - pulling
another name * quote - queue user's overlay table executive * rub -
real-time universal businesses * sad - setting any device * top - task
overlay processor * use - until special events * van - verify another
nucleus * wet - working events tables * yawn - yet another worthless
name * zoo - zookeepers *only* online. ********** I have millions of
them - mnemonic generation is a background process running over forty
years now **********

Typical lcc strings - labor can't change, lacy colored curtains, laden
caravel cruises, ladies come closer, lags cut corners, laid current
cable, lakes come clean, lame crippled cretins, landing chopper
crashes, Laotian cannibals cheer, lapel's curvy corners, largest cash
charges, lasting cookies crumble, latest carrying costs, ***laughing
crazy coot***, lavatory cleaning costs, lawless criminals cringe,
laxative cleans colons, laying chickens cackle, lazy cussing
character, /// likes choice cuts, lord's computer console, let's
crucify Christ, last chance channel, lousy career choice

There are tens of thousands from my full name alone : have this
specimen
Lonnie - librarian's oversight networking notices interface executive
Courtney - creation overlay's universal realities transformational
nexus eternally youthful
Clay - *** crowds laughing at you ***

Candy leaves aftertaste yaks/ yams/ yanked/ yaps/ yard/ yaw
Cable layers always young/ cancelled liberty allowance yelp/ cad
lovers always yell/ caftan looks all yellow

Roach - really only another crazy halfwit / virus - virtual
interfacing reality universal services / Trojan - teacher's reality
overseer jammed our network/ spam - special partition analysis
mechanism /stupid - specialist's trying universal processing interface
device / dumb - diagnostics until meeting begins / bash - beginner's
analytical shell handler / bash - bargain analysis service's
heuristic / hack - has all console keys

Expired old passwords -
jolly swagman - jumped onto last level yesterday / stupid world
aggravates games masters / making aggravating noises
Jackrabbit - just another crazy kid / really awesome bastard/ became
interested today

Finally consider this one inspired by "Hitchhiker's guide to the
galaxy". Like him, I have brains the size of planets. I just hide them
in places undetectable in this universe in this reality. A ridiculous
delusion ? Make it worth my while and I will teach you some
cryptographic algorithm. You could learn quite a bit about sorting if
any of you thought to keep a copy of the "splash - selective
parenthesis locater and string handler" software which I wrote for the
Commodore Amiga 1000 in the 'C' language. Or about 'chord' generators
which I wrote later on as 'music' in 1991-92. When I was in the USAF
in 1973 I scored 93 on the EDPT. I was told that it had a mean of 20
and standard deviation of 14. Chew on THAT a while turkeys!

Marvin - Manager's alternative reality virtual interface necessary
The - Taking hold externally
Robot - Recovering overlain baseline oversight task

*Running Hot Today *
Lonnie Courtney Clay

LCC

unread,
Jun 30, 2007, 1:36:19 AM6/30/07
to Lonnie Courtney Clay, comp.os.ms-windows
Hello to all the fans! Do I have any ?? I greet the personal enemies
who hacked the computer with email as soon as I picked it up with a
snarl and a huge roar of GO AHEAD, MAKE MY DAY! I am sure that Comcast
is taking a look at the email and passing it along for study by the
security industry. If not then they really need to do so....

Since I forgot to mention it yesterday, I am now the proud owner of a
thoroughly hack-able Hewlett Packard HP Pavilion computer with Vista
operating system. Within five minutes of getting email, the internet
explorer security settings for all zones had been reduced from maximum
to minimum. In the struggle which is described below, I fought
futilely to retain maximum security. Within seven minutes the toolbar
connections for the computer indicated that I had a local intranet
connected. I did a restart and was unable to connect to the internet
when I opened internet explorer, but the local intranet was active
again. I played around seeing what would happen as we fought, but
eventually I grew tired of the game. So I performed a recovery to OEM
installation, and went to bed while it ran.

I became physically ill during the night. I was presumably attacked by
phantasmal entities. Where are the ghost-busters when you really need
them ??? So I called upon GOD for help, and I have felt better as time
has passed by. It might also have something to do with the peculiar
smell in the house, which dissipated when I opened up all the windows.
I am a very firm believer in the GOD of everything - Who exists at the
edge of everything, riding the ever expanding shockwave of creation.
There are a huge number of dimensions and a nearly infinite number of
universes. Do you only believe in the God of mankind who created a
single universe and a few dimensions before becoming exhausted and
sitting on his (her, its) ? behind managing just the species on a
single world for all of time up to now ? If so then I say unto you
that - my GOD is bigger than your God, my GOD is bigger than yours, my
GOD is bigger because it needs no prayer rations, my GOD is bigger
than yours!!! Was that too insanely bizarre for you? It was based upon
the commercial for "Kennel Rations" in case you did not recognize
it....

Speaking of commercials, I have decided to start drinking soft drinks
again rather than tea. They are more expensive, but have the advantage
of coming in handy sized sealed bottles or cans. That may be important
in the future. As the opposition becomes more desperate they might
resort to poisoning the food and drink. I sincerely hope that nobody
resorts to other physical attacks. It is bad enough that I must deal
with nightmares. Below are famous jingles which I recall. I encourage
the corporations involved to send checks for this commercial
endorsement to : 3395 Harrell Rd. Arlington TN 38002-4261. I have
difficulty remembering the entire jingles because it has been so long
since I heard them. But I do recall the essential first verses....

I think that I recall all of this one.
My dog 's bigger than your dog!
My dog 's bigger than yours!
My dog 's bigger 'cause he gets Kennel Rations,
My dog 's bigger than yours!!!

Kennel Rations have lean red meat!
And lots of other good things!
When my mom goes to the store,
She buys a zillion cans or more!!!!

My dog 's bigger than your dog!
My dog 's bigger than yours!
My dog 's bigger 'cause he gets Kennel Rations,
My dog 's bigger than yours!!!

I am certainly not a big dog. I am just a little mangy mongrel mutt.
But it is not how big the dog is in the fight, it his how big the
fight is in the dog that counts! BOW WOW BOW WOW BOW WOW ARRF GRRR!

This may be hopelessly jumbled because there were so many versions.
It's the real thing! In the back of your mind!
It's what you're hoping to find!
In the back of your mind! It's the real thing!
It's the real thing! Coke is! Coca Cola!
That's the way it was meant! Coca Cola!
What the world wants today!
What we're hoping you'll say!
It's the real thing! Coca Cola, it's Coke!

People want to find life real things! Coca Cola!
Find what real life can bring! Coke has real life!
And that's the way it is! In a bottle of coke!
And the way it was meant! Coca Cola!
It's what's on you're mind!
It's what you're hoping to find!
In the back of your mind!
It's the real thing! Coca Cola it's Coke!

These two were short and sweet, very easy to remember.

It's the Pepsi generation! Coming at you, going strong!
Put yourself behind a Pepsi! If you're living, you belong!
You've got a lot to live! And Pepsi's got a lot to give!!!!
You've got a lot to live! And Pepsi's got a lot to give!!!!

Dr. Pepper! The joy of every boy and girl!
It's the most original soft drink ever in the whole wide world!

So that should demonstrate that I am gradually recovering from the
Haldol, and becoming able to remember (if necessary) anything which I
ever experienced. I am thoroughly disgusted with the current diet of
advertisements for vehicles, movies, and drugs. Bring back the
harmonious and entertaining advertisements, not this modern trash...

-----------------------------------------------------------------------------
Have ten more sample acronyms....
Abba - always better being active / associated begging business's
activity / activating baseline bus address / allows become basis
address / ability being borders access / across boundary before
activate / across boundary before accessed/ across boundary before
authorized / across boundary base added / across boundary builds
authority

---------------------------------------------------------------------------------------------------------
I decided to post the above, so I performed a shutdown. Then I tried
to connect the network cable. The connector was physically larger
than the port on the computer? I later found out that I was looking at
the wrong port. Another mysterious thing is the behavior of this
Microsoft Works Word Processor. It frequently garbles not only what I
am typing in, but old text as well. I really do wish that it would
quit doing that. As it turned out, the connector problem was fortunate
because when I tried to log on, I was told that the password which I
have been using all along was not valid. So I used safe mode to
perform a recovery to the point right after I performed adjustments to
various settings. Soon after that I received a popup saying that
windows firewall had started, did I want to use Norton Internet
security instead ? This time I said no. I opened up this document and
typed in the above.. Then I recalled more of the jingles, and started
working on them. While working on them, the computer hum got louder.
Then the pocket drive started to whine and buzz. So I hit the power
button and did a safe mode recovery again. Once again I had a louder
hum and the pocket drive started to hum. I copied what I had typed of
this document to the drive and selected the safely remove hardware
icon. I was told that I could not do it because the drive was in use
and it really stated to buzz. So I pulled it out anyway in a panic
when I should have shut down. Now I am going to save and this time say
yes.
----------------------------------------------------------------------------------------

When I did a POR a hot wind blew through the window and it started to
thunder. "I am just a poor boy, though my story's seldom told". Please
take the divine struggles elsewhere! This time I said yes to the
firewall question. Now I am going to check the logs to see what is
going on. It shows under "intrusion detection" two hours ago the
message "no user is logged in. So it is time to go back to the
manufacturer's configuration rather than recovery. I saved this to the
pocket drive.
---------------------------------------------------------------------------------------

So far I have always been logged on in an administrative account
rather than a less secure account. That is a fatal error because there
are so many hacks in the Microsoft and other software manufacturer's
products. Today I received advice from an anonymous expert on hacking.
Let's call him "Frank" after Henry Fonda's villain in "Once upon a
time in the west". He says that almost every software product has
multiple hacks built in which exploit system weaknesses to perform
many unique corruptions of the computer. The hacks are not only in the
executable, but also in the .dll and other data objects which are used
to specify the operations to be performed by the executable. The most
common hack is immediate replacement of the uncorrupted executable by
a hacked version. An alternative is producing a clone hidden somewhere
obscure or even proudly displayed in its own personal folder. All
created objects are usually set as a system hidden object. So closely
examine every folder with ALL objects displayed with nothing hidden
ASAP. Next in line for corruption is the registry. Less privileged
operational corruptions come only if the primary hacks are unable to
proceed. He says that performing ANY software function while in
administrator mode other than the original unavoidable setup of less
privileged accounts is extremely risky. He says that using ANY
shortcut is risky because legitimate ones are replaced by hacker's
shortcuts to execute their own version of the executable rather than
the standard one. If you ever clicked on a shortcut then your system
is probably corrupted and you should revert back to manufacturer's
installation as soon as possible. He says that turning on any computer
which has the network cable plugged in ( or the wireless antenna
screwed on ) to log on in administrator mode is fatal. He says that it
is comparable to a woman going into a saloon in the old west, taking
off her clothes, lying on a table, and inviting a gang bang. Because
those warnings occurred after we setup the third reversion to
manufacturer's configuration since purchase, this computer is probably
hacked once again. Let's see how long I can use it before being forced
once again to revert. He says that Microsoft is willfully negligent by
allowing shortcuts and toolbar icons to be modified without a highest
security popup asking if the user is doing it. Furthermore the problem
can be swiftly and easily fixed by providing a simple highly secured
windows automatic update optional process which examines all shortcuts
and icons for current authorized versions and asks the user for
everything not recognized from the OS if they agree to the shortcut
being something they created. Anything found which does not match
configuration should be deleted or at least quarantined. If it
replaced an official one then the official one should be generated. So
far as importation of files from a less secure user by the
administrator goes, it is utterly foolhardy....

You can tell if you have bogus shortcuts by what I already observed
previously,. The number of shortcuts does not agree between the start
menu and what is shown by windows explorer. When you mouse over a
hacked shortcut, the data is either not given or is suspicious. When
you right click on the shortcut, the list of options is not standard.
There are probably other easy things which an expert can recommend.
Microsoft needs to provide an utterly secure process optionally run by
windows update which scans the disk for cloned copies of official OS
software and verifies that there are no .dll files on the computer in
OS folders except what is in the official configuration. Furthermore
it should perform a checksum on all OS objects as an option , which I
mentioned previously. I invite all system administrators who find
their systems corrupted by the things which I have mentioned so far to
lobby Microsoft to immediately start work on quick fixes.

The OEM install data now includes a hac--er's dream called spy fish. I
invite Hewlett Packard to explain how it got there. I demand that an
HP representative come by my house tomorrow with a check for 2000
dollars to pay for replacing the two pavilion computers which were
purchased this week from circuit city. I am posting this and then not
turning on the computer again. The computer has a bunch of spy fish
objects on it which cannot be deleted. I am getting another
manufacturer's computer tomorrow. I am not done with evaluating
Microsoft vista yet!

Brylcream a little dab will do ya!
Brylcream you'll look so debonair!
Brylcream the gals will all pursue ya!
They'll love to run their fingers through your hair!

PLEASE get rid of that greasy kid's stuff!
--------------------------------------------------------------------------------------------------------
After saving to the drive I did a shutdown. Next time I logged on
there were no shortcuts or icons. So I restored factory installation
again. Supposedly the computer was purchased at circuit city, mfg was
HP and OS is vista. If this is no hoax then there is big trouble! I
will consider myself lucky if I am able to post before the computer
fries. It is humming loudly!

Laughing Crazy Coot/
Lonnie Courtney Clay

LCC

unread,
Jun 30, 2007, 11:46:45 AM6/30/07
to Lonnie Courtney Clay
What we need now are the heroes of yesteryear!

http://www.tvacres.com/commun_signals_tarzan.htm

Here I come to save the day!
Says that Mighty Mouse is on the way!
Mr. Trouble don't hang around!
When he hears this mighty sound!
Here I come to save the day!

I'm Popeye the sailor man!
I'm Popeye the sailor man!
I never go swimmin', with bald headed women!
I'm Popeye the sailor man!

Who was that masked man anyway ???
Why stranger, don't you know, that was the Lone Ranger!

I do not respect that wimp superman, weirdo batman, or loon spiderman!

LCC

unread,
Jun 30, 2007, 6:16:28 PM6/30/07
to Lonnie Courtney Clay
http://www.youtube.com/ClayLC2

Select playlists then thrilling music. New selection ! Enormous
response which I will not bore you by detailing.

http://www.youtube.com/watch?v=KCa82l0XyRs&feature=PlayList&p=DF95BE36771B9997&index=6

I have given up on Microsoft based products and tomorrow will fork out
2499 dollars for a Mac machine. I am told that there is no security
software because nobody hacks macs.

LCC

unread,
Jun 30, 2007, 6:27:45 PM6/30/07
to Lonnie Courtney Clay
wrong bookmark. this is it...

http://www.youtube.com/watch?v=9_VhnAl2BFM

Latest Central Commands

LCC

unread,
Jun 30, 2007, 8:35:04 PM6/30/07
to Lonnie Courtney Clay
Tarzan is back!!!!!

http://users.skynet.be/sky40152/movie.htm

Latest Console Commands
Lookup Current Choices

LCC

unread,
Jul 1, 2007, 3:40:44 PM7/1/07
to Lonnie Courtney Clay
I am still using an HP Pavilion with corrupt restoration to factory
configuration. It no longer finds spyfish after I left the house and
restored to factory upon return. I have been quietly observing it's
behavior. Now I have some observations to report. There are a whole
mess of shortcuts which are hacks. Using search with all hidden and
system files displayed examine the Desktop.

1) There are two copies of desktop.ini -- one of which has the current
date. The date on the other is 11/2/2006 and is surely a hack.

2) The shortcuts labeled the following do not have a file size given
in the label data :
"Microsoft Office - 60 Day Trial" - this is what I used previously and
is probably installer for spyfish. I did not use it yet, because when
I used it before it was obviously flakey.
"Snapfish Photos - First 25 Prints Free" - never used
"Internet Explorer" which does not even say Shortcut - never used, I
used the toolbar icon only this time around.

3) When I place the mouse over an object without clicking, it gives
just a so called description except for the "Rhapsody" which gives a
location instead. I do not know which is proper behavior since I have
never seen an uncorrupt Vista system yet. I suspect that the Rhapsody
is the correct behavior.

4) Keep a copy of Windows Task Manager open at all times set to
display the Networking tab. Activate it by ctrl-alt-del and select
Start Task Manager is the only safe way. Unless you are just now
connected and doing updates, it should show no activity if you have no
web browser active. If it shows traffic then you are hacked with
invisible internet explorers running. Mine today shows no activity
because I never used the bogus shortcut on the desktop this time
around.

Off topic, check out the new favorites in the "thrilling music"
playlist at :

http://www.youtube.com/ClayLC2

Locates Communication Channels
Liberates Corrupted Computers
Locates Corrupted Civilizations

Reply all
Reply to author
Forward
0 new messages