Hello, I'm not writing in the right place, but I really need help and I do not know where to report (ultimately to the police) I have a problem: from what 3 years old stalker gnebi, a long story but the main problem were deaf phones at work and at home. A month ago I changed my job (about which I wrote to a few people on Facebook) and in this new again deaf phones started. And the calls to the house increased. I suspect that this person is breaking into my account on fb and reading my messages. Recently I noticed a new login and an IP address was given. My question: can you check it? The website pops up the message that the address is too long, namely: 2a00: f41: 1cd0: 128f: 8ca8: dd74: ea5: db75. Is it possible to check it out, do not want to get into paranoia, but I can not sleep at night anymore. I also know that this man has a policeman friend, can he track my account? I would also not like to delete my account on fb, unless, as a last resort. Please help.
I recommend VPN No one pushes in, now you can ask UKE to check who spreads IP, if the ISP client has to provide the person's details, because he violated the privacy rules, simply saying, he borrowed the video tables and cameras he has recorded, he is making you problems and this is punished.
I will add to dispel any doubts if it will be like our beloved Neostrada has a dynamic IP, but .... have address pools and LOGI just need to check and after the topic
A bit like this is not exactly how a colleague winiar2014 writes there or winiar777. VPN as a virtual network protects you, exactly your computer's IP number before identifying what data you view and download, you connect to sites by a substituted IP address. It will not give much to the current situation. Techniques for hacking on Fb are different: phishing, sniffing, or brute force. If they are already hacking, change the password to Fb, then to OTHERS to the e-mail which is connected to the Fb account. It will give you privacy, but if you do not take care of it, the situation will happen again. Phishin is a type of attack consisting in sending fake e-mails and an offer that will interest you to the extent that you open the file attached to it, eg pdf, it opens the backdoor for another computer with full access. Sniffing is a kind of eavesdropping of data that you send to the router, you can take over your data from this level of hacking, you can avoid this by applying the principle of self-discipline, i.e. I WILL NOT WANT ON THE SITE WITH ENCRYPTED BASIC (eg: HTTP, POP3, IMAP, FTP). Brute force hmmmm, this is a quick method to crack the password with a dictionary. Knowing your e-mail, you can crack a password to it, a simple program for generating passwords and entering them into the loading field: password. If you have a password: stasio11 then you have 8 hours of privacy (for 8 characters it falls out). You must use the new STRONG password with 20 characters (exaggerated). My router password is 18 characters long (roottruewy3malosci). The more characters there are, the more computing for the computer, a good example here is mathematics: the engine. Breaking such a password is a puzzle of all characters in all possible places, how to give a 5-character password, we have 1x2x3x4x5 = 120 different combinations - 5 minutes for a computer (I omit that all numbers of alphabets and numbers from 0-9 are in place of each character) and special characters), but for stasio11 it's 40320 combinations, and give a password of 20 characters (2432902008176640000 combinations *). If they have your phone number, they call you at work and take into account that you wrote a few people on Fb (that is, you suspect them) write them all that you changed your job to some other, how your phones will break you, you have a range of suspects. You can also go to the police, on troublesome phones, check the billing and place of calling and the identity of the person (owner of the sim card). This description is superficial and I turn to the whole post, there are many other methods, I described those that can be done in home conditions and for a fan, and there are more surveillance methods that approach much more serious matters such as ordering blackmail. If you have any more serious questions, write to me privately. greetings
I have this problem: from what 3 years I was stalker gnebi
Collect all of your harassment data, the date of the time it rings, send messages if you send it, make screenshots, etc. and report it to the prosecutor's office. The more that you write that this someone has a "friend" policeman. Only not every policeman can establish and access data that allows you to track you online. Unless a "friend colleague" provides this kind of "service".
In my opinion, it is only the prosecutor's office or the police. Collect data that can be collected on your own, ie mainly dates and times of harassing calls and possible messages from FB or e-mail if this is your way of contact and go to the prosecutor's office. Possibly describe everything in the form of a letter and send it by registered mail to the prosecutor's office, but they will still call for the notification and the hearing for the report.
You do not do anything, you'll have the IP number of the computer (phone) of the stalker and will you go to the operator to share his data with you? Nobody will make them available to you, but to rule law enforcement agencies like that.
In the case of private mobile phones, there are applications for blocking unwanted and restricted callers. Also, some landlines have similar possibilities.
how do you give a 5-character password then we have 1x2x3x4x5 = 120 different combinations
Is there a friend sure that's how it matters? For me only 100,000 combinations come out for the numbers 0-9 alone, and where do the letters and special characters come from?
for stasio11 there are 40320 combinations
Here, similarly ...
Dude, read my post again and delete your unnecessary ... (10 line *)
I see that specialists in connecting graphics cards are speaking here ... Prosecutors Office? I worked, for some time at the prosecutor's office, people have 20 million (department, real estate) fraud or murder protocols there, it's punishable, it does not mean that they deal with it as another priority matter. For a month, they will find out that someone is calling, and that someone connects to the author (who is, for example in Warsaw) via the Internet from Silesia, Poznan or Albania. After two years they will not collect any more evidence, the matter will be allowed ..., it is not worth sacrificing time if there is no hard evidence and the IP and telephone number are pictures of the thief's boot in those times. "(...) someone calls me and broke me on the faccebook Pany policemen" And what are they supposed to track, IP number? Phone number? Read, but I do not know if you will find something on this truncated Internet with Chrome (xD) what are Socks, backdoor of botnet comps.
So far, there are law enforcement agencies and you need to turn to them for help if necessary. The effectiveness of their operation is another fairy tale. Possibly a private detective stays. It's difficult to take matters into your own hands because you can get yourself into trouble, for example by trying to get the stalker data from the operator. Then law enforcement agencies may prove effective in punishing a person trying to obtain this type of data.
The prosecutor's office will send a case to run the police anyway. I wrote about the prosecutor's office because sometimes the police have "reluctance" to accept these types of applications.
It can not be ruled out that a stalker is a normal internet user or phone user who simply feels "confident" and perhaps does not use any "masking" of his activity. Sometimes checking the computer and telephone of such a person may bring interesting information, e.g. images of the harassed person from FB. I will not mention other data. You do not always need to have access to the suspect's phone and computer. All you have to do is check with the operator or service provider of the history of websites visited, call records, etc. The stalker phone, especially if it is a new smartphone with GPS, can be easily traced. If it is a rural area or a small town - the periphery can indicate the place of residence of the stalker. Only someone has to want to take care of it.
You can also write to your friends officially on FB, "someone is plaguing me, I reported law enforcement" and see if it changes anything. I know of cases that such a simple operation has helped.
There is a way that you can perform by catching its true IP and the functions of the aggressor computer. Think about it, especially with the police, your unlicensed programs, etc. You can laugh now but not everyone in this country feels safe in the police environment. If you want to catch a guest, write and if you want to push him away, just go to the police and put in a hard password.
In my opinion, it is only the prosecutor's office or the police.
If there is a policeman somewhere in the perpetrator, it is only the prosecutor's office.
Prosecutors Office? I worked, for some time at the prosecutor's office, people have there protocols from frauds for 20 million (department, real estate) or murders, the fact that it is punishable does not mean that they deal with this as another priority matter
Whether this is justified or not the PROCURATOR will assess - and he will take it seriously, because it is a PERSONAL attack on a particular person.
Notices to the prosecutor's office can be submitted by anyone in all circumstances. We even have an obligation to report a crime if we know something about it.
Stalking is prosecuted at the request of the victim, and so it should be included in the documents submitted to the prosecutor's office.
Other illegal acts, such as punishable offenses, may occur on the occasion of stalking.
There is a way that you can perform by catching its true IP and the functions of the aggressor computer.
This approach to the matter is to ask for trouble - art. 267 CC - unlawful obtaining of information. Let us assume that the victim will receive some information, will go to law enforcement agencies, and there will be a question where do you get it and how did you get it? In addition, if the perpetrator has a "familiar" policeman, then they can get the victim's information to turn against her.
Leana can "acquire" only data received from the stalker, for example, text messages, e-mails, dates and times of telephone calls, etc. Serious collection of evidence on your own may prove to be a violation of the law.
The first post shows that the victim may know who the stalker is, so it may narrow down the search for the perpetrator.
That's why I wrote that only the police if you want to scare and to catch it you have to use other means, moreover ... ech. What are the comments of my posts if you do not understand them? Posts are for the author, How do you want to know Chrostophours how to do so 'stalker''i so went out on the criminal and the injured person gained some evidence thanks to criminals you also better write to me, and nonsense print and spam do not make sense any more. If someone here is given, he / she has something specific to write and is aware that every unofficial way of determining the aggressor's identity is FLAMBED if it is publicly available here.
@koszelka Start with the basics: a) change passwords to all online portals that you use, just remember that this password was not a password word for example "Password12g!" b) enable two-step verification, then after entering the correct password you must enter the code received by SMS and this makes access much more difficult. c) it's best not to use your accounts on public computers, if you already do (you have to) make sure that your computer does not remember passwords and it's best to do it in private browsing mode. d) all social networks have privacy settings - secure as much as possible. e) check the list of contacts - maybe you added someone you do not know? maybe a friend's account from a decade ago is not his account anymore and someone else is playing with it?
Look at the computer at home, do you use it yourself? did not you run any news on it from a friend? Do you have WIFI? If so, change the password.
What you write now may sound strange but - you entered your phone number in google? Maybe someone deliberately or by mistake typed your number to some advertisement on the internet or in a profile on a dating site. Have you contacted your telephone operator? Maybe you are in some foreign base and the computer calls your number by terminating the call counting that you call back, I had it myself and the problem was solved in a few minutes by blocking calls from abroad to my number.
And the last thing, think about whether you did something (deliberately or not) some harm? Did not these three years ago change anything that changed your life, or maybe someone else?
Remember that if this person has all the data about you and it is practically on the spot, he probably has it directly from you.
Dude, read my post again and delete your unnecessary ... (10 line *)
Ad.1 I did not "collate" and you do not "dude" Ad.2 Silnia! it's not a formula for calculating the number of combinations without repetition ... And if your friend from the forum insists, please ask your method to calculate the number of combinations of "six" in the lotto. And if I'm wrong, apparently I was learning a different "lower" mathematics.
If I were to describe the whole process that occurs during a brute force attack, they would report me that they were spam and that they were not on the subject. I described superficially, they also cling to ... Now it turned me off. As someone who is interested in security audits, I have a designated action process, usually logical. In this case, before I wrote anything, I considered this topic serious and checked what posts the new author of the topic added, I learned thanks to the fact that he does not have much idea about computers. So I tried to describe as far as the advantage of the imagination, it is not bad but unfinished, in such a way that the author understands how the level increases with the next sign. I do not know what you want to do, but I guess. I have been tutoring students of electrical engineering and I know how people think what they use as a basis to use exhaustive vocabulary (read definitions), it's a pity that also in the company of people who do not have too much idea about it. This is the electrode's policy, unfortunately if you do not understand it, use the search option or go to five-year studies related to your topic because you lower the forum level (xD what ??). So if you want to help someone, then you must also be able to translate, "What do you want? Gasak?", Create a new topic, then I will write the elaborate. Or give me your e-mail, I will make it available in your (user) person here, the so-called TuT from password generators and brute force password cracking methods. (I will add something about the CUDA power for e-mail). I greet all the guys