115
The Day General Patraeus Betrayed Us : Swingers Discussion 2115581021
Busy Swingers Forum - everything you always wanted to know about swingers.
SwingLifeStyle Swingers Personal Ads. | SwingLifeStyle Swingers Clubs

Busy Swingers Forum

Everything you always wanted to know about swingers.

Create A Free Account

HELP
FORUMSGeneral DiscussionsPoliticsThe Day General Patraeus Betrayed Us
TOPIC: The Day General Patraeus Betrayed Us
GoTo Page: Less ... 3 4 5 6 7 8 9 10 11 12 ... More 
Start   21 to 30 of 185   End
User Details are only visible to members.
LqqK:

""One should always assume that anything released into the ether is public and can be retrieved."

I completely agree. What I would like to know is exactly how."

To go into more depth than what VA has correctly explained, everything that a computer sees is recorded on the hard drive in some manner. This is because the sequence of 1's and 0's must be stored, processed and then sent to its destination.

This is what causes lag and in some cases corruption of signals which result in the message becoming corrupted. Bottom line is, every new computer the data touches, is a recording of that data and everything you send or receive has touched no less than two computers or as many a X computers. (X being every server, switch or other routing computer or process.)

Hazle Township PA
 
 
Username hidden
(6873 posts)
User Details are only visible to members.
It is clear Obama does not have control of the people underneath him, or there would be no media fiasco.

I agree there is something definately wrong with the chain of communication, and not just in this instance.


 
 
Username hidden
(1135 posts)
User Details are only visible to members.
This is really a big fuckup for the FBI. Petraeus and Paula were breaking no laws, as long as they were not active military at the time. From has been gathered from Paula's emails she did not threaten Jill Kelly, there never should have been an investigation to begin with.

But once there was one, the president should have been notified as it concerned a very important and powerful part of government. It is clear Obama does not have control of the people underneath him, or there would be no media fiasco.

Sanford NC
 
 
Username hidden
(19231 posts)
User Details are only visible to members.
Numerous servers are used between point A and point B. Some of those servers keep hard backups of everything that goes through them.

Although I don't know the specifics, I'm pretty sure if one needs it badly enough, one can figure out which servers it's gone through, and then dig through their backups.

I can't go further than this - we'll need a bigger egghead.

Chesapeake VA
 
 
Username hidden
(17571 posts)
User Details are only visible to members.
"One should always assume that anything released into the ether is public and can be retrieved."

I completely agree. What I would like to know is exactly how.

Cape Coral FL
 
 
Username hidden
(4042 posts)
User Details are only visible to members.
Agreed.

An an sort of unrelated note -

I have the rather naughty-looking profile of a woman I know from the lifestyle come up as a suggested contact all the freakin' time. We absolutely have no friends in common. For the life of me, I do not know what it is that causes her to come up as a suggested contact. SOMETHING out there has us tied together.

Chesapeake VA
 
 
Username hidden
(17571 posts)
User Details are only visible to members.
One should always assume that anything released into the ether is public and can be retrieved.

Lakeside CA
 
 
Username hidden
(17225 posts)
User Details are only visible to members.
I wasn't talking about the best way, or a more proactive way. I think the question was "I wrote a potentially embarrassing email X years ago - if someone had the intense interest to get that email, is it possible?"

I think the answer is "maybe". Could even be "probably".

Chesapeake VA
 
 
Username hidden
(17571 posts)
User Details are only visible to members.
VA:

"I imagine the same thing applies with emails. If someone wants it badly enough and is willing to put in the resources to find it, I imagine that almost any email is retrievable. I could be wrong."

You are partly correct. If you have enough rescources and man power... you can overwhelm the security systems and hack in... (so long as the people you are hacking don't pull the plug.) However the best way to hack someone is from the source. You do this by installing a spy ware program and monitoring the persons activities.

This is why the US government outlaws you from using your personal media on their computers. (USB, external drives, CD's, other) As well as going to non-approved sites.

While deployed, Yahoo, hot mail and a few other email systems were blocked... I was lucky enough to have been using a under the radar site which didn't make the blocked site list.

Hazle Township PA
 
 
Username hidden
(6873 posts)
User Details are only visible to members.
The general rule with hacking is that *anything* can be hacked, provided someone wants in badly enough and has the skill, knowledge, resources and time to get in.

I imagine the same thing applies with emails. If someone wants it badly enough and is willing to put in the resources to find it, I imagine that almost any email is retrievable. I could be wrong.

Chesapeake VA
 
 
Username hidden
(17571 posts)
GoTo Page: Less ... 3 4 5 6 7 8 9 10 11 12 ... More 
Start   21 to 30 of 185   End
TOPIC: The Day General Patraeus Betrayed Us