GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
This is a security question not directly related to Linux, so I am posting it in the General forum.
I have been reading some articles about RF exploitation and I am wondering if it is possible to hack/exploit a laptop or desktop PC. In case it is, I wonder if some special equipment/devices are necessary to accomplish it and how does it work. For instance, what is the distance range of a RF signal from a laptop or PC. Just curious about it.
Thank you for the explanation, rtmistler; it clears things up somehow.
I just wonder if it is possible to use RF exploitation on a laptop or PC CPU. I ask this because I have been hacked repeatedly by someone. Since this has been going on and on and on, I finally decided to open my laptop, remove the Wi-Fi card and the Bluetooth module and format/reinstall everything from scratch (with my router turned off). However, the signs intrusion still persist: the laptop makes noises that come from the speakers (not the usual HDD noises; these are ticks and creaks), some programs lock up or behave weird, there are website redirections (for instance, I write "www.youtube.com" on the web browser and it redirects me to a totally different webpage), etc.
Apart from that, on a previous format/fresh reinstall without being connected to my router, some icons that don't come with Win 10 appeared on my desktop (I doubt Booking and Avast come with the Win 10 DVD).
By the way, my old user is Hungry ghost. These are some threads for reference:
I forgot to add that I live in a third floor, so it is possible that the person who's hacking me has some equipment hidden outside (for instance, in a car). In fact, sometimes I have seen my SSID name outside even with my router turned off.
One, I see a lot of weirdness on computers but relatively little cracking/hacking, even in the old days when I was using Windows 95. Are you certain you're seeing something malicious rather than a bad install?
Two, I've no great experience with Avast, Windows 10 or Booking, but I do know that a recent install of Win 10 can include some "news" channels so I wouldn't be surprised if it included advertising as well, in the form of icons on the desktop.
Three, what would a cracker gain by (a) installing Avast on your machine or (b) making it obvious that your machine had been compromised?
Thank you for the explanation, rtmistler; it clears things up somehow.
I just wonder if it is possible to use RF exploitation on a laptop or PC CPU. I ask this because I have been hacked repeatedly by someone. Since this has been going on and on and on, I finally decided to open my laptop, remove the Wi-Fi card and the Bluetooth module and format/reinstall everything from scratch (with my router turned off). However, the signs intrusion still persist: the laptop makes noises that come from the speakers (not the usual HDD noises; these are ticks and creaks), some programs lock up or behave weird, there are website redirections (for instance, I write "www.youtube.com" on the web browser and it redirects me to a totally different webpage), etc.
Apart from that, on a previous format/fresh reinstall without being connected to my router, some icons that don't come with Win 10 appeared on my desktop (I doubt Booking and Avast come with the Win 10 DVD).
By the way, my old user is Hungry ghost. These are some threads for reference:
You're using Windows 10: go to a Microsoft forum for help
Seek help yourself; again, as with your other user names and threads, you have zero evidence of anything.
You keep claiming to have evidence, the police have a 'case' open, etc., etc., but keep throwing out technical terms that don't make sense. This thread is a great example. Now it's wifi/bluetooth 'hacking'; and 'they' have previously gotten into your BIOS, 'cracked' your cell phone (because there was a new feature in Google maps), and your 'psychotic' ISP was hacking you too.
Sorry, no...just don't believe any of it, and you've certainly not posted any evidence to indicate that anything is going on, even though you supposedly have it. Is it *POSSIBLE* to get into a system via wifi/bluetooth? Absolutely....is it LIKELY? Nope....not unless you enable wifi direct, or share your bluetooth connection, both of which are manual processes that you have to enable, then give the connection secrets to them.
One, I see a lot of weirdness on computers but relatively little cracking/hacking, even in the old days when I was using Windows 95. Are you certain you're seeing something malicious rather than a bad install?
Two, I've no great experience with Avast, Windows 10 or Booking, but I do know that a recent install of Win 10 can include some "news" channels so I wouldn't be surprised if it included advertising as well, in the form of icons on the desktop.
Three, what would a cracker gain by (a) installing Avast on your machine or (b) making it obvious that your machine had been compromised?
I've done many Windows and Linux installs since many years ago and nothing like this had happened before. The DVD I'm using was downloaded from the MS website, and on other installs using the same DVD these icons have not appeared on the desktop (they appeared even without being connected to any WiFi network, so I guess something outside is somehow interfering with my laptop).
By the way, the noises issue also happens on Linux.
I'm still not sure what these people want, but I guess they just want to tease me or annoy me in some way.
I guess they are exploiting some CPU vulnerability, since it has happened while installing with the WiFi and Bluetooth cards completely removed.
Last edited by jazzy_mood; 01-23-2020 at 12:58 PM.
I've done many Windows and Linux installs since many years ago and nothing like this had happened before. The DVD I'm using was downloaded from the MS website, and on other installs using the same DVD these icons have not appeared on the desktop (they appeared even without being connected to any WiFi network, so I guess something outside is somehow interfering with my laptop).
By the way, the noises issue also happens on Linux.
I'm still not sure what these people want, but I guess they just want to tease me or annoy me in some way.
I guess they are exploiting some CPU vulnerability, since it has happened while installing with the WiFi and Bluetooth cards completely removed.
Again: seek help.
Now they're 'exploiting some CPU vulnerability', somehow....without your computer even being connected to anything??? Right....makes perfect sense.
When a connection is janky due to parts bending/moving around slightly.
If a cracker is actually targeting your computer then don't worry.
If THAT is their definition of fun then let the poor troglodyte keep your computer while you move away posthaste and become a sculptor, or something.
That person is off worse than you, changing websites and making noises, that's some 90s subseven/deepthroat casual levels where some bored individual wants to be a leet haxor, infects themselves (incredibly common occurance) while rocking back and forth, giggling in mirth, clutching their knees because some random housewife in Sheboygan Wisconsin is now seeing a tic tac toe board and a spooky message like 'Mess with the best, die like the rest....that, yeah, you should be pitying them.
(Although, admittedly, it's good fun to mess with people like thatš...Ahh, firewall? What's that? Sounds dangerous. ...troglyfe)
In other words you'll be fine.
šthat's still trog levels cause the actual whizkids turned into pentesters and all that (Okay, social skills matter there too, hehe) , or at least used the internet and things like this to actually make some good dosh otherwise.
When a connection is janky due to parts bending/moving around slightly.
If a cracker is actually targeting your computer then don't worry.
If THAT is their definition of fun then let the poor troglodyte keep your computer while you move away posthaste and become a sculptor, or something.
That person is off worse than you, changing websites and making noises, that's some 90s subseven/deepthroat casual levels where some bored individual wants to be a leet haxor, infects themselves (incredibly common occurance) while rocking back and forth, giggling in mirth, clutching their knees because some random housewife in Sheboygan Wisconsin is now seeing a tic tac toe board and a spooky message like 'Mess with the best, die like the rest....that, yeah, you should be pitying them.
(Although, admittedly, it's good fun to mess with people like thatš...Ahh, firewall? What's that? Sounds dangerous. ...troglyfe)
In other words you'll be fine.
šthat's still trog levels cause the actual whizkids turned into pentesters and all that (Okay, social skills matter there too, hehe) , or at least used the internet and things like this to actually make some good dosh otherwise.
Geist, please check the OP's other posts under the several user ID's they've made. Apparently it's between a psychopathic ISP person, a government official, the cybercrimes unit, etc. These aren't your ordinary hackers, either...they can (apparently) break a system in under ten seconds, even when it's not connected to any network. They can overwrite and re-flash the BIOS without it being connected either, and cause CPU's to overheat as well. And they're so skilled that they leave an absolute *TON* of evidence on their system, including desktop icons.
This isn't anything that needs technical help...but it does require help.
When a connection is janky due to parts bending/moving around slightly.
If a cracker is actually targeting your computer then don't worry.
If THAT is their definition of fun then let the poor troglodyte keep your computer while you move away posthaste and become a sculptor, or something.
That person is off worse than you, changing websites and making noises, that's some 90s subseven/deepthroat casual levels where some bored individual wants to be a leet haxor, infects themselves (incredibly common occurance) while rocking back and forth, giggling in mirth, clutching their knees because some random housewife in Sheboygan Wisconsin is now seeing a tic tac toe board and a spooky message like 'Mess with the best, die like the rest....that, yeah, you should be pitying them.
(Although, admittedly, it's good fun to mess with people like that¹...Ahh, firewall? What's that? Sounds dangerous. ...troglyfe)
In other words you'll be fine.
¹that's still trog levels cause the actual whizkids turned into pentesters and all that (Okay, social skills matter there too, hehe) , or at least used the internet and things like this to actually make some good dosh otherwise.
Yes, I'm still wondering what they want, apart from bothering me. The only logical explanation I find, given some other facts, is hate crime.
Geist, please check the OP's other posts under the several user ID's they've made. Apparently it's between a psychopathic ISP person, a government official, the cybercrimes unit, etc. These aren't your ordinary hackers, either...they can (apparently) break a system in under ten seconds, even when it's not connected to any network. They can overwrite and re-flash the BIOS without it being connected either, and cause CPU's to overheat as well. And they're so skilled that they leave an absolute *TON* of evidence on their system, including desktop icons.
This isn't anything that needs technical help...but it does require help.
Oh, well, okay that is on another level, then. Dang. Thankfully all of these entities appear to be harmless, childlike tricksters.
@jazzy_mood
Hate crime? This? Hate is a mighty strong emotion, what kind of milquetoast, mealy mouthed, twinkle toed, sissy ass hate crime is this?
Redirecting your webpage and making noises? I have messed up my computer myself in worse ways and I'm on quite friendly terms with myself.
Grow a thicker skin, and run a hardware test. This isn't gangstalking or anything, nor is it ghosts or some sort of conspiracy. It's probably just faulty hardware.
Maybe seek some counseling and throw your computer in the trash, too. Can't hack what you don't own, and you won't make yourself anxious by reading up articles about extremely niche exploits to commit incredibly pathetic 'hate crimes' against you.
Edit:
After thinking this over a bit, have another angle:
Do you think it's possible that you're simply in a rut? Highly inhibited. It's rather common these days where there is almost no culture and even 'theology' has regressed a bit toward unironic discussions about morality through pop culture characters like Obi Wan Kenobi, or other such things.
Maybe your life is just really dull and you never do anything fun.
You mention hate crimes? Are you perhaps Jewish?
If you are (or, heck, even if you aren't), instead of fretting like this:
Prepare your home first, by moving furniture out of the way so you get a little arena (last thing you want is slamming your hands or arms on a piece of furniture)
Then, blast some bomb ass catchy AF klezmer music from a stereo and have a good old spazz, just go with the flow, dance dance dance, maybe hoot and yell a bit, laugh along the clarinets.
(Don't worry, your neighbors will love klezmer music, everyone loves klezmer music, including the police that might show up, but embrace it, jail is no big deal, it'll be an social adventure and I'm absolutely serious about this. )
Dance and sing (hava nagila and dodi lil are also great) until you're straight up exhausted to the point where you just want to lay on the floor, laugh and gasp and feel your body glowing.
If you also are actually the target of some group, then they'll respect you for having a good time like that. You'll graduate from Meek dweeb whom they can torment with pitiful attacks like that (to the point where you think this is as passoinate as a HATE crime) to a chad who knows how to have a good time.
And, again, I'm actually serious about this. Many people live very suppressed lives and they can get stir crazy in that way too, always gotta be a quiet mouse, bowing and scraping, being a good boy while the media, on the other hand, goes all gloom and doom.
And if you feel persecuted, establish yourself by letting your voice out and having a good time at least once every while, before you ACTUALLY go crazy.
And if this is just a ruse, etc, well, I'm sad to say, Terry A. Davis currently holds the cup of "most interesting tech madman", granted, the guy is dead, but he still had a significant suite of achievements. You'll have to do better than RF exploitation to dethrone him on the grounds of "hehe, this is a fun prank I'll play on this community".
If that all doesn't fit, really do seek counseling, even if it's just to get out of the house, which torments you so with its RF web of danger.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.