- Joined
- Jul 13, 2012
- Messages
- 2,804
- Reaction score
- 7,798
I read thru this thread not knowing WHAT I was reading most of the time. It might as well be a foriegn language to me. What I did understand, I am having a hard time getting my head around.
I read thru this thread not knowing WHAT I was reading most of the time. It might as well be a foriegn language to me. What I did understand, I am having a hard time getting my head around.
I would be interested in a psych. profile of the type of person who would perpetrate such as freud. I would think that you would have to be
a. SEVERLY disturbed (unbalanced)
or
b. A sociopath with an agenda
In order to go to such elaborate means to decieve people.
Can anybody give me a more complete analysis?
Sorry to quote myself but I wondered PB if there is a more in depth profile of the type of person who portrays themselves online to be several different people. Is it all about control/domination even in the instances that people do it who are not killers?
Sorry to quote myself but I wondered PB if there is a more in depth profile of the type of person who portrays themselves online to be several different people. Is it all about control/domination even in the instances that people do it who are not killers?
definitely ego-driven sociopaths, ALWAYS with a personal agenda(sometimes unrelated to where they are interacting), whose aim is generally some form of disruption--skilled at manipulation and misdirection--it's predominantly a personality that thrives on the ability to control how people perceive an idea or other information, and their ability to over-influence it--they thrive on having "followers" or "minions", and at that fact that they are able to disrupt the normal flow of conversation or correct informational exchange
It's only one aspect and it is a form of manipulation. This amnipulation can serve as a forensic counter measure (for distraction, to confuse investigators) or just as a means to dominate a in the eyes of the manipulator gullible mass. Lets keep in mind, SKs are not the only ones with little ego-issues out there.
Peter
Oh I forgot this. When I hit veiw certificate...
Issused to: common name*.S3.amazonaws.com.organizationamazonaws.com
organization amazon.cominc
So I just want to know if I've been hacked or wt? is going on. I totally trust WS security, but I NEED to understand IN LAYMANS TERMS what this means.
#notparanoidoranything ; )
Im no computer tech but ive had that before. I know the pop up your talking about. I hit the back button to get rid of it. I would have someone look at it.
Maybe we need to ask ourselves, is someone trying to manipulate us? Depending on the answer to this question we need to ask ourselves why. What is the purpose and WHO is behind this game!
Oh I forgot this. When I hit veiw certificate...
Issused to: common name*.S3.amazonaws.com.organizationamazonaws.com
organization amazon.cominc
So I just want to know if I've been hacked or wt? is going on. I totally trust WS security, but I NEED to understand IN LAYMANS TERMS what this means.
#notparanoidoranything ; )
Thanks PB and CM! I use my smartphone to get online. I wasn't even aware it could get a virus! I 'm SUCH a tech tard! Can I do a virus scan on my phone? Is there an app for that?
I copied/pasted into google a part of your warning/error message... and I'm pretty much a tech tard too (I prefer tech tard-ess)... the google results appeared to be related to Amazon cloud. Haven't they had problems recently? Could it be that?
I copied/pasted into google a part of your warning/error message... and I'm pretty much a tech tard too (I prefer tech tard-ess)... the google results appeared to be related to Amazon cloud. Haven't they had problems recently? Could it be that?
I was reading on another thread, the conversation about BTK and his communications. I remembered he had asked LE if they could trace a Floppy Disk. Of course LE said no. And they were able to track the disk to his PC at the church and had his name Dennis. So that got me thinking, if BTK who had little to no computer skills, was using his church PC to write things about his killings and so on. Why not the LISK? If he is so tech savvy, I would bet he has some sort of digital fingerprint out there in the www. So how could we find it? There are millions of personal blogs, online diaries, and videos. How would he "code" key search words, so that something like this is not easily found with a simple google search? It is a needle in a hay stack, but in my down time, I will try to start looking into some blogs and see where the www takes me. Wish me luck.