MY thread closed because my english is not perfect.My problem hackers attacking via3g
Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Good person, we can easily work with people whose command of the English language is less-than-good.
What's still missing is: "exactly what do you think the problem is, and why?" Then, "what are you doing about it, what have you tried to do, and why?" When you (repeatedly) say, "3G," what makes you think so? (Let's assume, for the sake of argument, that you're right! Why do you think you're right?)
Then ... a call to action for "all the rest of us." What can we do, given what you've told us, to help you understand your problem and/or to steer your way clear of it? A simple, un-emotional, statement of the problem. Something that we can a-c-t upon. A question we can answer. Advice that we can give. A point-of-view to help make things more clear.
This forum exists to help people. Not to close threads. It's been helping people for years.
Even if you posted in your own native tongue, someone could probably translate it and post an English translation as a reply. This is an International forum, and "the language issue" can be dealt with.
Last edited by sundialsvcs; 01-15-2015 at 10:55 AM.
I posted this on one of the many other threads you started in another forum on this site, but if it's true like you mentioned in that thread that they have a PHYSICAL KEY TO YOUR HOUSE and are DESTROYING YOUR PROPERTY, then you need to CALL THE POLICE.
Again, NO FIREWALL is going to prevent them from putting a key in your door and opening it. iptables is not a home security system.
the OP dose indeed sound like my EX. when she gos off her meds ( yes she dose suffer from schizophrenia )
she often starts sounding like the OP on those occasions
It almost sounds like you are a victim of cryptolocker.
I have repeatedly asked for screenshots, which would have made something like this clear.
djnidec, you have an Internet-connected phone (as you've said in another thread), and your systems are intact enough for you to post here. You can take a picture of your computer screen and attach it.
I was thinking about this story and I guess those people (he was talking to the hacker) explained him a lot of things, but they simply misguided the OP. The most important thing is to understand that they did not tell the truth but an unreal tale about those incidences. I don't know why.
the OP dose indeed sound like my EX. when she gos off her meds ( yes she dose suffer from schizophrenia )
she often starts sounding like the OP on those occasions
Some of you posting in ths thread should have noticed by now that I have closed several duplicate threads, moved several replies to separate threads as unsuitable ( https://www.linuxquestions.org/quest...5D-4175531027/, https://www.linuxquestions.org/quest...5D-4175530935/) and have asked the OP to inform us in a way that we can help him. Especially in techically-oriented forums please keep your (repeated) Off Topic banter to yourself.
I was thinking about this story and I guess those people (he was talking to the hacker) explained him a lot of things, but they simply misguided the OP.
I must say that's an excellent remark and definitely something to consider, yes.
@djnidec: please do not create more threads. That is highly inefficient. Post your replies only in this thread. Now let's see if we can speed things up. Since you do not know how to diagnose things let's start the easy way:
- What kind of connection (modem, cable, xDSL, other) does your Internet Service Provider provide?
- Can you reboot 1 machine (laptop or PC doesn't matter) then post contents of running (as root) the following commands:
Also, let's be aware of any potential terminology issues here.
For example, to my ordinary vocabulary, "3G" refers specifically to a form of cell phone networking. These radio signals can't even be intercepted by computer hardware other than a properly enabled portable device such as a cell-phone or some tablets.
On the other hand, the term might be used (incorrectly, but "as slang") to refer to wireless connections in-general. (Which might be what UnSpawn is driving-at by asking for information from iwconfig.)
The post has now been made several times ... so it must be presumed to be serious. It has never yet been clearly expressed, to an English speaker. It has never, so far as I've yet seen, used the relevant technical terminology "correctly."
But terminology, and language, are human-communication obstacles that can be overcome.
(And, when your system is being hacked, and you [think you] know it but you don't know why or how, you can be forgiven for being distraught ...)
If the OP would post a description of the matter, in his/her own words, and in his/her native language, that response could be translated. And maybe, then, the communication obstacles could be overcome and the issue resolved to the satisfaction of all. (A PM from the Moderator team, backed-up by an accompanying e-mail??)
We definitely can't dismiss ... and certainly, are not dismissing or "dissing" ... the very real possibility of, say, someone who is deliberately trying to hijack the RF radio signal. This is actually a very serious vulnerability in public places like airports and coffee shops. If someone in the shop has a more-powerful radio transmitter than the shop does, he can, indeed, "hijack" the communications of other people in the shop such that he becomes the "man in the middle." If this sort of thing is, in fact, what the OP is describing (and, facing), then what he is talking about is, or can be, quite real.
So, let's see if we can find a way to overcome the human-communications issues and get to the bottom of this thing.
Last edited by sundialsvcs; 01-18-2015 at 08:09 PM.
Yeah, but if someone's blocking or interfering with signal near this person, there are no recommendations we could offer except to get away from the area or if the activity is illegal, try to prove it and involve the authorities. For instance, cell phone blocking is illegal in the US, but a person may use that intermittently or in either case, I'm pretty sure if I call the local police, it's not like they'll have DF equipment, they'd probably have to call the FBI or some other agency and then they'd have to be pretty well convinced that something bad was going on; like they'd have to have received several complaints.
And if someone's hijacking signal and providing a replacement network. Similar problem. Solution is to get away and/or don't be a feeder station for their network. If the OP is handicapped and can't get away, I'm very sorry for their situation.
If I was in a situation where I could never trust my network, I'd have to live without being able to use that network and only be able to get back in to using INET services once I'd found a viable alternative that I could trust.
If the signal is cell phone, as "3G" implies, then it would be illegal to interfere with that signal, and (in the United States) a call to the local field-office of the Federal Communications Commission (FCC) would be a good place to start.
But ... "cell phone" implies that the device that's being hijacked is capable of participating on a cell-phone data network in the first place. I don't see clearly that this is the case.
If someone has simply set up "a fake wireless router" with a more-powerful signal strength ... actually quite easy to do ... then this would actually be a fairly familiar(!) attack strategy, especially in (say ...) an apartment building or certainly any coffee-shop.
Just hoping to hear from the OP soon ... in whatever (human) language breaks down the barrier and gets this issue disposed-of.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.