

Mahone
Members-
Posts
2087 -
Joined
-
Last visited
Everything posted by Mahone
-
Haha. The first few times are a bit scary actually. The first time you have an escort, so you feel as though you can make mistakes but are nervous of doing something you know absolutely nothing about. The second time you are on your own... at least it feels thay way. I was nevous enough on my second time to let the officiator know it was only the second time I had done it and to bear with me I went through over 200 endowments in a period of 10 months, which was about a year ago. I've already forgotten a lot of what happens For those whos non-member husbands eventually decide to join the church... just make sure they don't push him. It's happened too many times in my ward. One guy was on the bishopric within a year of him being baptised - of the course the ward were desperate for priesthood holders hence why they did it, however he hasn't been to church now in a few years.
-
Haha, I learnt a lot from that - thanks.
-
are you sure that wasn't said in jest? It's a common thing to print on sa advertisments around here and is meant as a joke - the joke being that it is obvious.
-
The persons crotch was not visible and what happened was not done on purpose. The dog simply bit where the laser pen was pointing at the time. Had the same thing happened in front of me, I would not have said a vulgar act had just taken place. Funny, but not vulgar. Having said that, I am aware that there is a well known difference between the general British and American sense of humour. This may very well be a result of that. I apologise to anyone who saw the video and considered it to be vulgar.
-
Fair enough. I certainly can't see it being perceived as dirty humour, it's very similar to a video I saw on a childrens entertainment show quite recently. Or were you referring to whether it was actually funny or not?
-
Out of curiosity, is there a reason a recent post of mine in this thread was removed? It's been almost two hours since it disappeared and I've not been informed of why - I was not aware of it breaking any rules. Thanks.
-
I think they way you said it made it sound like you had to be married for eternity for all three levels of the celestial kingdom when in fact it's just the first degree. Which brings up an interesting question in my mind. Do we have any other information regarding these three different degrees of "celestial glory"? When I first read that, my immediate impression was that it was referring to the telestial, terrestrial and celestial; clearly most people don't interprete it that way. It's not clear as to what it means at all - can we be sure there are definately three different degrees in the celestial kingdom?
-
Update on this: Microsoft drops Windows 7 E - Yahoo! News UK
-
Just 56% are women. I wish I could access the churches official membership database. I may have to ask some people I know who work for church offices in the MLS department. I'm sure they are aware of the general statistics.
-
Out of curiosity, what is the advantage of an LDS business over a non-LDS business? It is because people think they can trust them more? In my experience of businesses that are run at the top by LDS members, they are no more trust worthy than non-LDS businesses regardless of the initial impression you may get from them. I think it'd actually be more dangerous to assume you can trust them more.
-
The only valid source I could find regarding the gender gap in mormonism is an unofficial one, by means of a survey of 35,000 Americans. I don't think the church releases information like gender in its public statistics. Anyway, the survey I found was here. That suggests from the limited data they have that about 56% of American mormons are female.
-
Lol. I've heard that too, though have no figures to back it up. A general glance around my ward also supports that notion though. The relief society, while lacking in numbers itself, is considerably larger than the priesthood session is.
-
Yes it is and no they won't, but there are alternatives to most windows programs and most of the alternatives are free (open office as opposed to microsoft office for instance). At least windows programs won't work with linux distros out of the box, they can work if you install programs like wine onto the linux operating system (wine is a windows emulator program). Of course using linux is unnecessary if you can be sure all external media is free of his trojan and follow all steps I stated in the post above this. There are several ways he could have infected any external media, but if you are going to pay a visit to a local expert who will have the considerable advantage over us of being able to physically see everything that is going on, then he can check any external hard drives or USB sticks as well for infection(EDIT: Do you have an IT department at work? IT folk are generally quite friendly and usually willing to help out with things like this, and they will likely be cheaper and more reliable than your local backstreet store). Also, remember that just because anti virus software says it is clean, it doesn't necessarily mean it is - but I'm sure you've discovered that already Oh, and obviously if he has given her any CDs or DVDs (or anything similar) don't use them again - those could also be a source of infection.
-
That entirely depends on how he got the trojan on there in the first place. If he had access to the computer by being able to sit in front of it, then obviously that is how it got on there. He could have sent it in an attachment via e-mail which your daughter inadvertently opened at some point. He could have infected one of her USB sticks which will in turn reinfect the machine as soon as it is inserted. He could also have hacked into her computer via the internet. Unlikely, but entirely possible for someone with the right skill set and a computer which hasn't been appropriately secured. If either of the last two, it's possible he could reinfect it. Generally, for home computers, a software firewall or hardware firewall, up to date virus scanner and fully up to date operating system is sufficient. I know people would (and have in this thread) disagree with me on what is necessary to protect a computer, and if it was a corporate system I'd agree and obviously implement much more protection, that is because the high profile hackers (the ones who are much more than just script kiddies and actually hack for money) target corporate systems and not home computers. Your daughers ex is nothing more than a script kiddie. That suggests to me, he did not break in via the internet, unless he actually had physical access to the system before hand. At this point I just want to suggest she uses linux. Whatever program he may have installed on her computer will not work on a linux machine anyway and there are very few trojans around that claim to be able to infiltrate linux computers. So even if he did infect her usb pen sticks, it won't reinfect her computer. I've had quite a positive response from my friends who I have gotten to use linux. It depends on what she uses her computer for. Yes, that would be a good idea.
-
It won't hurt to try. I still don't think anything will come of it. Assault is something a regular police officer can understand and deal with, that applies to most domestic crime. Computer crime is the exception, which they know nothing about and have no way of proving it without bringing in computer forensics, which I'm not sure they will do. I have a friend who had problems with an ex boyfriend not so long back, not computer related but he was harassing and threatening her in a similar way to the scenario mentioned. He threatened to call the police about items of his that she had given away to a charity shop after he refused to collect them for several weeks and she didn't have room for them, at which point she called his bluff and went to the police station herself. The police gave him one phone call, warned him to back off and 3/4 of a year down the line and there hasn't been a peep from him (in her own words, "he wouldn't be so stupid", he works in the navy and being in trouble with the police wouldn't go down well). So it may be worth a try, who knows. Something which hasn't been discussed here is evidence. If your daughter is right and he has installed a trojan on her computer, then what she said is right, removing the trojan will also destroy the evidence. In current circumstances, that doesn't matter, she just needs to get rid of the trojan and hopefully this unhappy episode will die away. However if even after she does remove it, the harassment gets worse, you could need the evidence. If she wants to do this, she could take what is known as an "image" of the computer. It basically takes a copy of everything on her hard drive in its current form and turns it into one file, which can then in turn be extracted back onto a hard drive at some point if necessary. There are a number of programs that will do this, including norton ghost. Fog (FOG :: A Computer Cloning Solution - Home) will also do it, and that is free, albeit a little more complicated. If she doesn't know how to do this and/or doesn't have the software to do it, and she wants to keep the evidence, it may be worth a trip to the local computer store and explain the situation and ask them to take an image of the machine - there is a limited amount of things we can explain online, it often requires us to actually be there and see what is happening in real time.
-
Still not sure why it's better - in order for you to use windows 2003 as a router/firewall, it still has to NAT your connection. I've not used UPNP that much, so not that familiar with its ability - I prefer to set things up myself so I know exactly what configuration changes have been made I had smoothwall up and running in 20 minutes - but one mans linux is another mans OS/2 (). I wanted to install windows 2003 on my home network to set up a test domain, but I found other uses for my spare server. Lol, not to mention teenagers working in IT have a bad reputation (I don't think it's warranted, people just don't want to believe a teenager knows more than they do), especially when they own the company . Hmmmm. I apologise about the derailed thread. I promise we'll get right back on track as soon as we get an update!
-
You are 25 and you ran your own business for 7 years? So you were at the oldest 18 when you set it up? Wow. Only computer geeks
-
You are using windows 2003 as a router? That doesn't take NAT out of the equation though? I personally would use linux as a firewall. Windows server 2003 costs money (if used legally of course ) and linux is generally more secure than windows. But smoothwall offers some great functionality out of the box and even more with the addons - I do suggest a look into it. I use it mainly for VPN. That is unless of course you require windows 2003 for something which linux cannot provide?
-
haha, now I know your motive Regarding hardware firewalls - software firewalls can also do everything you specified. After all, a hardware firewall is also a software firewall really - just in the form of firmware. So the primary advantage is that it is seperated from her workstation. I solved this issue at home by taking an old workstation and installing a corporate firewall operating system on it (check out Welcome to Express 3.0! - SmoothWall.org). It's free, has the same advantage of a hardware firewall and runs on old hardware it effectively acts as your router like a hardware firewall would. My previous post referred to basic NAT home routers (which also usually have very basic firewall functionality built in) as you quite rightly stated real hardware firewalls are generally too expensive for home users.
-
The only real advantage of a hardware firewall is NAT. But NAT was never intended as a security feature - it is simply IP translation allowing you to have multiple private IP addresses using one public IP address (the primary idea behind it was to contend with the limited amount of public IP addresses available, and even with NAT we are running out hence the introduction of IPv6). So basically NAT is what I like to call "security through obscurity" - it wasn't designed to be a security feature. If done properly, you shouldn't need NAT to provide security. It sums up a lot of things for us and saves a lot of time. It only takes a few minutes to figure out where all the items on the log came from :)
-
Okay, it now sounds much more likely he does have a trojan installed on her machine. Okay, so these are my suggestions: 1. I can't work out if she said she did reformat and reinstall windows or if she didn't. If she did, the trojan came back? There could be a number of reasons for this; he could have infected a USB pen stick/CD etc. Windows tends to autoload these devices and they can contain an autorun.inf file (often hidden) which will automatically run an excutable as soon as the device loads - when it does this, you are back to stage one. 2. That screenshot containing the results of the netstat command - can I see that too? Two or more heads are better than one. 3. Get your daughter to sign up for an account on here. It's easier if we can converse with her directly than through you as a proxy which just takes longer. We'll need to talk through this with her. 4. Get her to download HiJack This (click on that link for download location), tell her to run it (but don't let the program remove anything without our say so first). When it runs, it will produce a log. Get her to copy and paste that log into this public forum here. We can then direct further.
-
Where do you get this idea from? I live in Europe and I can tell you now 99% of women shave their legs! We are in the 21st century too remember!
-
Haha. He is obviously going to be hurt/angry/upset etc. It doesn't excuse his actions, but it explains them - a hurting ego can make people do some odd stuff.
-
If the guy only knows her password than keyloggers and trojans are irrelevant. She can change her password any way she wishes. Incidently, the on screen keyboard is absolutely no guarentee of bypassing keyloggers. It entirely depends how it works but for most it will make no difference.