Computer Info Compromised?

A

AlexB

This is my interpretation.

The original documents are in an archive. They could have stayed there for
another three hundred years. However, lo and behold the family with ancient
roots got this obsessive-compulsive and nosy youngster who decided that he
(or perhaps she) should dedicate her life to uncovering everything about the
family history. She (or perhaps he) wrote to the Library of Congress in
Washington DC and asked for some information. They have rows and rows of
boxes nobody ever touched. They said: we don't have stuff.

The youngster went to college and became a licensed historian and got a
permission to peruse some portions of the archive. It took her (or him)
another two years to burrow thru the materials. She found all family related
letters. The Library copied the letters for a fee. She paid quite a bit for
them all plus her time, the whole affair must have cost a bundle.

When she began to read the letters carefully it turned out that some other
figures were mentioned as if they came out alive: George Washington, Adams,
Jefferson and a host of others. Naturally it is a gold mine. She stored all
her files on her HDD and began waiting for a time when she can take a break
from her tedious and hateful job at an office of a computer parts
distributor to start writing a book.

At this curtail moment her machine broke down. The rest is "history."

"RalfG" <itsnotme@ladeda.deda> wrote in message
news:8B68F019-597F-44CC-BCB5-FBAC0B4BF11C@microsoft.com...
> You don't state how your friend acquired these letters in the first place
> or if he has originals or just the .doc file. It is possible that both
> copies of the letters are fakes, sold to assorted people as allegedly
> genuine heirlooms. Genealogy scams are common enough. It is also possible
> that the documents are real but your friend wasn't the only one to
> legitimately receive copies of them. The second party could be a distant
> relative for instance. That's also not unheard of.
>
> "ColTom2" <noemailaddress@nomail.com> wrote in message
> news:%235p%23MIUZIHA.5980@TK2MSFTNGP04.phx.gbl...
>> Hi:
>>
>> Someone else has passed on to me that for really sensitive records
>> i.e.online banking records etc the best way to protect is by storing them
>> on
>> a "Jump or Flash Drive". This way you use it and remove it when you are
>> through.
>>
>> However, in this case, as I originally mentioned these were not really
>> sensitive records per se, but records of a personal nature. Therefore
>> it's
>> hard for me to believe they were accessed from the internet, but from
>> possibly a local source (repair shop).
>>
>> As someone has stated sourcing from the internet appears mainly to be
>> targeted towards passwords, user names. etc to access financial data. Doc
>> files of 1800's letters seems out of context for internet sourcing, but
>> then
>> I certainly could be all wrong.
>>
>> I am just trying to determine at this point what would be the most
>> logical
>> source of this compromise and any other pertinent info in this regards.
>>
>> Thanks for all the "constructive" comments....
>>
>>
>> "ColTom2" <noemailaddress@nomail.com> wrote in message
>> news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
>> Hi:
>>
>> I have a friend who had some old letters of one of his kin in a .doc
>> file
>> in his My Documents folder in his computer. The letters were enough to
>> have
>> formed a book about the 1800's written by this kin.
>>
>> He Googled the letters info and found some data applicable these letters
>> which he has never shared with anyone. Also the .doc file string is
>> exactly
>> as that in his computer. In fact, he has found a copy of these letters
>> for
>> sale on the internet and the seller appears to be from the same area of
>> the
>> state where he lives if not the same city. His name is referenced in as
>> the
>> author of these letters.
>>
>> So my question is how did someone acquire this data from his computer,
>> as
>> apparently his computer has been compromised. It would appear to me that
>> it
>> had to happen in one or two scenario's. First someone somehow accessed
>> his
>> computer through the internet or second when he had taken his computer to
>> a
>> shop for repair. Since it appears that the seller is from the same area
>> of
>> state as he is, then my first inclination would be that this info was
>> taken
>> from his computer during a repair. I just really have don't have the
>> expertise in this area to try and make a good determination.
>>
>> If anyone has any comments, suggestions, and/or recommendations as to
>> how
>> all this could have happened I would be most appreciative to read them.
>>
>> I apologize if I have posted this in the wrong newsgroups.
>>
>> Thanks
>>
>>
>>
>>
>>

>
 
A

AlexB

>They said: we don't have stuff.

Should read: They said: we don't have staff.

"AlexB" <alexb@comcast.net> wrote in message
news:et4Lv3aZIHA.1532@TK2MSFTNGP04.phx.gbl...
> This is my interpretation.
 
A

AlexB

>At this curtail moment

Should read "At this crucial moment"

I am making all these corrections which I otherwise would have never
bothered to make because we ALL who touched this thread as well as ALL
trolls who touched the OP in other NGs will soon testify in court on behalf
of the OP and give interviews to the media.

Just kidding:)

My speller and the sun glare are responsible for some of my grammatical
errors:)

"AlexB" <alexb@comcast.net> wrote in message
news:et4Lv3aZIHA.1532@TK2MSFTNGP04.phx.gbl...
> This is my interpretation.
 
C

ColTom2

Hi:

Once again I appreciate all the replies that were in fact informative. No
comment on the others....

I spoke with a local friend about this matter who is very computer savvy
and he gave me what seems to be the most logical explanation as to how my
friend could Google and find this info on his computer.

Simply put he has Google Desktop on his computer which of course will find
all files by the name involved. This is the reason that he could find it on
his computer when I nor no one else could Google the data and find it on the
internet.

This to me resolves the Google issue, but does not resolve who nor how
these files were compromised other than by a local source.


ColTom2" <noemailaddress@nomail.com> wrote in message
news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
 
X

Xandros

Does you friend have filesharing programs installed and if so does he have
his Shared folder set as My Documents? If so all of the subfolders are wide
open.

--

Xandros


"ColTom2" <noemailaddress@nomail.com> wrote in message
news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
> Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
> in his My Documents folder in his computer. The letters were enough to
> have
> formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
> which he has never shared with anyone. Also the .doc file string is
> exactly
> as that in his computer. In fact, he has found a copy of these letters for
> sale on the internet and the seller appears to be from the same area of
> the
> state where he lives if not the same city. His name is referenced in as
> the
> author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
> apparently his computer has been compromised. It would appear to me that
> it
> had to happen in one or two scenario's. First someone somehow accessed his
> computer through the internet or second when he had taken his computer to
> a
> shop for repair. Since it appears that the seller is from the same area of
> state as he is, then my first inclination would be that this info was
> taken
> from his computer during a repair. I just really have don't have the
> expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
> all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
> Thanks
>
>
>
>
 
C

ColTom2

Good point.

Thanks


"Xandros" <arron.neus*remove*@gmai.lcom> wrote in message
news:uP$eIEeZIHA.4448@TK2MSFTNGP03.phx.gbl...
Does you friend have filesharing programs installed and if so does he have
his Shared folder set as My Documents? If so all of the subfolders are wide
open.

--

Xandros


"ColTom2" <noemailaddress@nomail.com> wrote in message
news:e8x5XUSZIHA.5896@TK2MSFTNGP02.phx.gbl...
> Hi:
>
> I have a friend who had some old letters of one of his kin in a .doc file
> in his My Documents folder in his computer. The letters were enough to
> have
> formed a book about the 1800's written by this kin.
>
> He Googled the letters info and found some data applicable these letters
> which he has never shared with anyone. Also the .doc file string is
> exactly
> as that in his computer. In fact, he has found a copy of these letters for
> sale on the internet and the seller appears to be from the same area of
> the
> state where he lives if not the same city. His name is referenced in as
> the
> author of these letters.
>
> So my question is how did someone acquire this data from his computer, as
> apparently his computer has been compromised. It would appear to me that
> it
> had to happen in one or two scenario's. First someone somehow accessed his
> computer through the internet or second when he had taken his computer to
> a
> shop for repair. Since it appears that the seller is from the same area of
> state as he is, then my first inclination would be that this info was
> taken
> from his computer during a repair. I just really have don't have the
> expertise in this area to try and make a good determination.
>
> If anyone has any comments, suggestions, and/or recommendations as to how
> all this could have happened I would be most appreciative to read them.
>
> I apologize if I have posted this in the wrong newsgroups.
>
> Thanks
>
>
>
>
 
P

Paul Adare

On Sat, 2 Feb 2008 12:08:38 -0500, ColTom2 wrote:

> Simply put he has Google Desktop on his computer which of course will find
> all files by the name involved. This is the reason that he could find it on
> his computer when I nor no one else could Google the data and find it on the
> internet.
>
> This to me resolves the Google issue, but does not resolve who nor how
> these files were compromised other than by a local source.


I'm confused here. Your friend can find the information contained in the
documents using Google but no one else can? If that is the case then the
date isn't actually on the Internet and hasn't been compromised at all.
Your friend (and apparently you as well) simply doesn't understand how
Google Desktop works.

--
Paul Adare
MVP - Virtual Machines
http://www.identit.ca
Code: Virus lasting about three to five days, accompanied by sore throat,
runny nose and fever.
 
C

ColTom2

Hi Paul:

You hit the nail on the head, as he did not realize he had Google Desktop
installed until I called him and found out by checking his computer that he
did in fact have it installed. Believe me he now knows....

Sorta makes me feel like awful, but glad that I found out his computer had
not been compromised.

Thanks


"Paul Adare" <pkadare@gmail.com> wrote in message
news:n5cu94h60ugm.pw86rfbmknsv.dlg@40tude.net...
On Sat, 2 Feb 2008 12:08:38 -0500, ColTom2 wrote:

> Simply put he has Google Desktop on his computer which of course will
> find
> all files by the name involved. This is the reason that he could find it
> on
> his computer when I nor no one else could Google the data and find it on
> the
> internet.
>
> This to me resolves the Google issue, but does not resolve who nor how
> these files were compromised other than by a local source.


I'm confused here. Your friend can find the information contained in the
documents using Google but no one else can? If that is the case then the
date isn't actually on the Internet and hasn't been compromised at all.
Your friend (and apparently you as well) simply doesn't understand how
Google Desktop works.

--
Paul Adare
MVP - Virtual Machines
http://www.identit.ca
Code: Virus lasting about three to five days, accompanied by sore throat,
runny nose and fever.
 
D

DP

Google desktop was my first thought when I read your original post.
But I discarded that possibility when you said the letters were being
offered for sale on the Internet.
Where did that part of the story come from?



"ColTom2" <noemailaddress@nomail.com> wrote in message
news:u2TYLHgZIHA.1132@TK2MSFTNGP06.phx.gbl...
> Hi Paul:
>
> You hit the nail on the head, as he did not realize he had Google Desktop
> installed until I called him and found out by checking his computer that
> he
> did in fact have it installed. Believe me he now knows....
>
> Sorta makes me feel like awful, but glad that I found out his computer
> had
> not been compromised.
>
> Thanks
>
>
> "Paul Adare" <pkadare@gmail.com> wrote in message
> news:n5cu94h60ugm.pw86rfbmknsv.dlg@40tude.net...
> On Sat, 2 Feb 2008 12:08:38 -0500, ColTom2 wrote:
>
>> Simply put he has Google Desktop on his computer which of course will
>> find
>> all files by the name involved. This is the reason that he could find it
>> on
>> his computer when I nor no one else could Google the data and find it on
>> the
>> internet.
>>
>> This to me resolves the Google issue, but does not resolve who nor how
>> these files were compromised other than by a local source.

>
> I'm confused here. Your friend can find the information contained in the
> documents using Google but no one else can? If that is the case then the
> date isn't actually on the Internet and hasn't been compromised at all.
> Your friend (and apparently you as well) simply doesn't understand how
> Google Desktop works.
>
> --
> Paul Adare
> MVP - Virtual Machines
> http://www.identit.ca
> Code: Virus lasting about three to five days, accompanied by sore throat,
> runny nose and fever.
>
>
 
C

ColTom2

And now for the rest of the story.... A copy of his letters are in fact for
sale on the internet, but what he had not told me was that he had published
a book and distributed over 200 copies. Then he found these letters related
to the book and sent them out also which is how someone had obtained a copy
of them and now offers one of them for sale.

Thanks for your posting and I am so glad for a positive conclusion...


"DP" <nospam@nospam.com> wrote in message
news:%23u57PNgZIHA.1204@TK2MSFTNGP03.phx.gbl...
Google desktop was my first thought when I read your original post.
But I discarded that possibility when you said the letters were being
offered for sale on the Internet.
Where did that part of the story come from?



"ColTom2" <noemailaddress@nomail.com> wrote in message
news:u2TYLHgZIHA.1132@TK2MSFTNGP06.phx.gbl...
> Hi Paul:
>
> You hit the nail on the head, as he did not realize he had Google Desktop
> installed until I called him and found out by checking his computer that
> he
> did in fact have it installed. Believe me he now knows....
>
> Sorta makes me feel like awful, but glad that I found out his computer
> had
> not been compromised.
>
> Thanks
>
>
> "Paul Adare" <pkadare@gmail.com> wrote in message
> news:n5cu94h60ugm.pw86rfbmknsv.dlg@40tude.net...
> On Sat, 2 Feb 2008 12:08:38 -0500, ColTom2 wrote:
>
>> Simply put he has Google Desktop on his computer which of course will
>> find
>> all files by the name involved. This is the reason that he could find it
>> on
>> his computer when I nor no one else could Google the data and find it on
>> the
>> internet.
>>
>> This to me resolves the Google issue, but does not resolve who nor how
>> these files were compromised other than by a local source.

>
> I'm confused here. Your friend can find the information contained in the
> documents using Google but no one else can? If that is the case then the
> date isn't actually on the Internet and hasn't been compromised at all.
> Your friend (and apparently you as well) simply doesn't understand how
> Google Desktop works.
>
> --
> Paul Adare
> MVP - Virtual Machines
> http://www.identit.ca
> Code: Virus lasting about three to five days, accompanied by sore throat,
> runny nose and fever.
>
>
 
A

AlexB

No big deal, we had good time anyway. Take it easy.

So guys, no media interviews, no court appearance on the plaintiff's side or
the aisle.

Again, life goes on. There will always a next time.

"ColTom2" <noemailaddress@nomail.com> wrote in message
news:u2TYLHgZIHA.1132@TK2MSFTNGP06.phx.gbl...
> Hi Paul:
>
> You hit the nail on the head, as he did not realize he had Google Desktop
> installed until I called him and found out by checking his computer that
> he
> did in fact have it installed. Believe me he now knows....
>
> Sorta makes me feel like awful, but glad that I found out his computer
> had
> not been compromised.
>
> Thanks
>
>
> "Paul Adare" <pkadare@gmail.com> wrote in message
> news:n5cu94h60ugm.pw86rfbmknsv.dlg@40tude.net...
> On Sat, 2 Feb 2008 12:08:38 -0500, ColTom2 wrote:
>
>> Simply put he has Google Desktop on his computer which of course will
>> find
>> all files by the name involved. This is the reason that he could find it
>> on
>> his computer when I nor no one else could Google the data and find it on
>> the
>> internet.
>>
>> This to me resolves the Google issue, but does not resolve who nor how
>> these files were compromised other than by a local source.

>
> I'm confused here. Your friend can find the information contained in the
> documents using Google but no one else can? If that is the case then the
> date isn't actually on the Internet and hasn't been compromised at all.
> Your friend (and apparently you as well) simply doesn't understand how
> Google Desktop works.
>
> --
> Paul Adare
> MVP - Virtual Machines
> http://www.identit.ca
> Code: Virus lasting about three to five days, accompanied by sore throat,
> runny nose and fever.
>
>
 
Back
Top Bottom