• Watch Out for Scammers!

    We've now added a color code for all accounts. Orange accounts are new members, Blue are full members, and Green are Supporters. If you get a message about a sale from an orange account, make sure you pay attention before sending any money!

This idiotic crap, right here

Use all these in 1 paragraph if you’d like the home visit:
Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

You forgot Buttsex
 
If someone is curious about a lil safety...
Copy/paste this into an admin level power shell window and hit enter....will probably require enter about 6-8 times.
If you have any clue about programming you can see it does zero harm but forces a much higher level of security and forces refusal of *some* tracking connections.
It's very well written.

Code:
$hostsPath = “$env:windir\system32\drivers\etc\hosts”

IF ([System.Environment]::OSVersion.Version.Major -ge 10){
Get-Service DiagTrack | Stop-Service
Get-Service DiagTrack | Set-Service -StartupType Disabled
Get-Service dmwappushservice | Stop-Service
Get-Service dmwappushservice | Set-Service -StartupType Disabled

# RegFix ##############################################################33

New-ItemProperty “HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection” -Name “AllowTelemetry” -PropertyType DWord -Value 0 -Force
New-ItemProperty “HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack” -Name “Start” -PropertyType DWord -Value 4 -Force
New-ItemProperty “HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack” -Name “Type” -PropertyType DWord -Value 10 -Force
New-ItemProperty “HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack” -Name “ServiceSidType” -PropertyType DWord -Value 1 -Force
New-ItemProperty “HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack” -Name “ServiceDllUnloadOnStop” -PropertyType DWord -Value 1 -Force
New-ItemProperty “HKLM:\SYSTEM\CurrentControlSet\Services\dmwappushservice” -Name “DelayedAutoStart” -PropertyType DWord -Value 0 -Force
New-ItemProperty “HKLM:\SYSTEM\CurrentControlSet\Services\dmwappushservice” -Name “Start” -PropertyType DWord -Value 4 -Force
New-ItemProperty “HKLM:\SYSTEM\CurrentControlSet\Services\dmwappushservice” -Name “Type” -PropertyType DWord -Value 20 -Force
New-ItemProperty “HKLM:\SYSTEM\CurrentControlSet\Services\dmwappushservice” -Name “ServiceSidType” -PropertyType DWord -Value 1 -Force
New-ItemProperty “HKLM:\SYSTEM\CurrentControlSet\Services\dmwappushservice\Parameters” -Name “ServiceDllUnloadOnStop” -PropertyType DWord -Value 1 -Force
New-ItemProperty “HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo” -Name “Enabled” -PropertyType DWord -Value 0 -Force
Remove-ItemProperty “HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo” -Name “Id” -Force
New-ItemProperty “HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo” -Name “Enabled” -PropertyType DWord -Value 0 -Force
New-ItemProperty “HKCU:\Control Panel\International\User Profile” -Name “HttpAcceptLanguageOptOut” -PropertyType DWord -Value 1 -Force
New-ItemProperty “HKCU:\SOFTWARE\Microsoft\InputPersonalization” -Name “RestrictImplicitTextCollection” -PropertyType DWord -Value 1 -Force
New-ItemProperty “HKCU:\SOFTWARE\Microsoft\InputPersonalization” -Name “RestrictImplicitInkCollection” -PropertyType DWord -Value 1 -Force
New-ItemProperty “HKCU:\SOFTWARE\Microsoft\InputPersonalization\TrainedDataStore” -Name “HarvestContacts” -PropertyType DWord -Value 0 -Force
New-ItemProperty “HKCU:\SOFTWARE\Microsoft\Personalization\Settings” -Name “AcceptedPrivacyPolicy” -PropertyType DWord -Value 0 -Force

$HostsUPD = @()
$HostsUPD += ‘127.0.0.1 vortex.data.microsoft.com’
$HostsUPD += ‘127.0.0.1 vortex-win.data.microsoft.com’
$HostsUPD += ‘127.0.0.1 telecommand.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 telecommand.telemetry.microsoft.com.nsatc.net’
$HostsUPD += ‘127.0.0.1 oca.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 oca.telemetry.microsoft.com.nsatc.net’
$HostsUPD += ‘127.0.0.1 sqm.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 sqm.telemetry.microsoft.com.nsatc.net’
$HostsUPD += ‘127.0.0.1 watson.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 watson.telemetry.microsoft.com.nsatc.net’
$HostsUPD += ‘127.0.0.1 redir.metaservices.microsoft.com’
$HostsUPD += ‘127.0.0.1 choice.microsoft.com’
$HostsUPD += ‘127.0.0.1 choice.microsoft.com.nsatc.net’
$HostsUPD += ‘127.0.0.1 df.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 reports.wes.df.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 wes.df.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 services.wes.df.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 sqm.df.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 watson.ppe.telemetry.microsoft.com’
$HostsUPD += ‘127.0.0.1 telemetry.appex.bing.net’
$HostsUPD += ‘127.0.0.1 telemetry.urs.microsoft.com’
$HostsUPD += ‘127.0.0.1 telemetry.appex.bing.net:443’
$HostsUPD += ‘127.0.0.1 settings-sandbox.data.microsoft.com’
$HostsUPD += ‘127.0.0.1 vortex-sandbox.data.microsoft.com’
$HostsUPD += ‘127.0.0.1 survey.watson.microsoft.com’
$HostsUPD += ‘127.0.0.1 watson.live.com’
$HostsUPD += ‘127.0.0.1 watson.microsoft.com’
$HostsUPD += ‘127.0.0.1 statsfe2.ws.microsoft.com’
$HostsUPD += ‘127.0.0.1 corpext.msitadfs.glbdns2.microsoft.com’
$HostsUPD += ‘127.0.0.1 compatexchange.cloudapp.net’
$HostsUPD += ‘127.0.0.1 cs1.wpc.v0cdn.net’
$HostsUPD += ‘127.0.0.1 a-0001.a-msedge.net’
$HostsUPD += ‘127.0.0.1 statsfe2.update.microsoft.com.akadns.net’
$HostsUPD += ‘127.0.0.1 diagnostics.support.microsoft.com’
$HostsUPD += ‘127.0.0.1 corp.sts.microsoft.com’
$HostsUPD += ‘127.0.0.1 statsfe1.ws.microsoft.com’
$HostsUPD += ‘127.0.0.1 pre.footprintpredict.com’
$HostsUPD += ‘127.0.0.1 i1.services.social.microsoft.com’
$HostsUPD += ‘127.0.0.1 i1.services.social.microsoft.com.nsatc.net’
$HostsUPD += ‘127.0.0.1 bingads.microsoft.com’
$HostsUPD += ‘127.0.0.1 www.bingads.microsoft.com’

$Hosts = Get-Content $hostsPath

foreach ($Line in $HostsUPD)
{
IF ($Line -notin $Hosts )
{ “True: $Line”
$Line | Out-File $hostsPath -Append -Encoding ascii
}
}
}

Now do it for a Mac. I am self-professed IT stupid, and on a labtop over 15 years old (some keys stick, some don't work); it recently did a forced update I didn't ask for, had to change permission settings for access to a state-government level information, and then even more recently it was hacked (including compromised passwords) from downloading something I should have been more aware of. I have gone to questionable (no,not porn) sites for information for y'all and didn't always protect myself properly. I'll take help from anyone who is good at fixing this stuff.

I know I have "a file", "a folder", whatever you want to call it, (thought about doing a FOIA on myself but its likelly too expensive); my reception when I fly and opening/invasion of all private mail is a pretty good indicator I am being "followed closely". I accepted the risk when I started posting in Portajohn in 2020 and didn't make an effort to hide my identity/email/URL etc. back then.
 
Last edited:
I'd rather die in a gunfight than type all that crap.
Copy/paste.
Ctrl+c
Ctrl+v
Is that not something people do these days ?

Doing it for a Mac.....damn near impossible.
I loathe apple products, they force you to do things their way or not at all.
Best cure....install straight up Linux of whatever distro is blowing up skirts this week.
Then you can take control of the Mac.
 
Now that we have established the vast missing areas of your intelligence we can proceed.






This line is awesome. I'm stealing it.
Thank you
 
Copy/paste.
Ctrl+c
Ctrl+v
Is that not something people do these days ?

Doing it for a Mac.....damn near impossible.
I loathe apple products, they force you to do things their way or not at all.
Best cure....install straight up Linux of whatever distro is blowing up skirts this week.
Then you can take control of the Mac.

You sound like Charlie brown's teacher.
Have no idea what you are talking about.

I know tech is easy for many folks. My brain dont be like dat.
 
You sound like Charlie brown's teacher.
Have no idea what you are talking about.

I know tech is easy for many folks. My brain dont be like dat.
Hilight (by clicking on one end or the other and dragging to the opposite end) all the text in the "code" box I created to hold all that text.
Right click then hit copy
Do not miss any of the text
Right click start and choose "Windows PowerShell (admin)"
Right click in that window that just opened and then paste
Hit enter until it stops prompting you.
Close everything out and reboot.
Profit.

I do not have any way of knowing if power shell is available by right clicking your start button,it should be.
If not, right click start, choose "run" type in "powershell (admin)" and hit enter
Follow above stuffs from there.

If you're on a phone....well....fuck off ?
 
Last edited:
Best cure....install straight up Linux of whatever distro is blowing up skirts this week.

My personal preference is Mint Cinnamon for new users.
It has a familiar interface that most can easily find things in and it has one of the better hardware driver support bundles (assuming you allow optional extras installed) and has a very easy software package manager / software browsing library to make things simple.