Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: LayoutGuru2
I've glanced at the message in Arabic - looks like it has a PGP encrypted message embedded. Tarjim doesn't know what to do with the PGP encryption. Let me get the kids off to school and get a cup of coffee and I'll get started translating shortly.

9,482 posted on 01/12/2004 4:27:01 AM PST by StillProud2BeFree
[ Post Reply | Private Reply | To 9474 | View Replies ]


To: Revel; LayoutGuru2; Sean Osborne Lomax; Calpernia; Cindy; JustPiper; FairOpinion
Translation post 14 from Call19 Yahoogroup (Sun 1/11)

In the name of Allah Most Gracious Most Merciful

As we promised, this is part 2 of the lecture address of the taped message, thanks be to Allah.

Jihad is your path to immortality: A wonderful lecture and effective instructions for infiltrates (agents).

Advise on the listening to it and its distribution
Not present in all markets. Rush towards the hidden groups of sheikhs among them Suleiman Boo Ghaith

Part 1 sound file size 5.3 MB
Press here

Part 2 sound file size 5.2 MB
Press here
9,483 posted on 01/12/2004 4:46:37 AM PST by StillProud2BeFree
[ Post Reply | Private Reply | To 9482 | View Replies ]

To: StillProud2BeFree; All
OK, I have been absent for the last 500 post or so,my mother and my kids all visited this past weekend and it has been busy.Three birthdays to celebrate and a lot of catching up to do. My oldest got back from Iraq in august and he and his wife are on there way to Oregon for school.With out having to read the last 500 post or so could someone give me a short synopsis of any meaningfull events for the last three days, please, thanks.
9,484 posted on 01/12/2004 4:54:05 AM PST by eastforker (The color of justice is green,just ask Johny Cochran!)
[ Post Reply | Private Reply | To 9482 | View Replies ]

To: Revel; LayoutGuru2; Sean Osborne Lomax; Calpernia; Cindy; JustPiper; FairOpinion
OK I stand corrected - I was looking at a different post. This one does NOT have PGP embedded in it. My apologies.

Post 15 from Call19 is basically a guide to protecting your computer on the internet. If I were a DHS analyst I would be considering the possibility of a cyberattack - this posting seems to be warning people what steps to take to protect themselves on the internet. I would be concerned about timing.

I've read this and I am going to defer doing a full typed human translation at this point due to time constraints. I have run it through a software translator and am posting that translation for everyone to read. The wording may seem a little strange but I think it's for the most part understandable.

BEGIN TRANSLATION Message 15 Call19, Jan 12, 2004

The security of the Internet

In an atmosphere of the suppression and the silence and the closure and the official masses media failed about the satisfaction of the people needs to the information and the opinion that the Internet became a refuge to who searches for the information and the comment and the bare analysis distant from the interference of the system . And the people resorted to the Internet also because they want the safe platform that makes in it their word a read and their sound heard away from the influence of the ruler . He changed this feeling is with the safety not necessarily in its place then the Internet became not an entrusted network after the arts of the electronic penetration developed and in it the drawing means became numerous . And response to the brothers demands in this side we allocate this bulletin to the Internet security case and postpone our comments on affairs this week to a special appendix that spread it soon God willing . And which the notification for it is necessary that the talk about the securit
y in the Internet the assertion does not become possible in it by a thing a cutting decisive from towards the artistic and therefore the human caution remains a top in this side .

The penetration forms

The Internet user is exposed to several forms from the penetration some of it technical and some of it is human .

The human penetration depends throughout the wit of the user and its confidence in the others and the permission for them with the knowledge of its privacies .

The technical penetration related to three kinds of the penetration,

(1)My system from the authorities in a declared way or not declared, and all of the countries approximately in it are a penetration from this kind including America and Europe countries .

(2)A direct and momentary penetration from power the hackers in it the hacker finds a hole in the user contact outlets and can the wander between files and the user programs and its copying or its reading or the sabotage of the user system or the work of any other grilling .

(3)A penetration by the espionage viruses and he is the more seriousness from the previous where an Alhakr manages the stabilization of espionage virus in the user system and the virus carries out sending information according to the way that was programmed by it .

The browsing

That the provider of the service can theoretically that they follow the employees so that it is about to that turns the application of this service periodically on all . And a reason of the non following the country is its discovery that this following is not practical and therefore the concerned authorities to a deduction early arrived that she abandons the follow-up of the people concerning the void browsing . As an example of an impossibility that follows the movement site readers it became clear that the movement site that tens of thousands visits daily and the hundred thousands from the surfaces its opening take place for example then how does the following of this terrific issue from the people become possible ?

Lowering the files

There are many sites in the Internet displaying files from as different kinds free programs or flashes or books or pictures or other matters . And what these sites were not known and trusted then he prefers not to lowering files takes place from it because some of it full of the espionage viruses .

The partnership is in the sites

The safety depends in the participation in some of the sites ( the forums and what he resembled ) throughout the security of the site and the penetration of the Saudi authorities of it . There are some of the forums that for example the Saudi Arabia Alstat managed its penetration whether an electronic or with employment who shows them its details . In these sites enables the Saudi authorities that she proves on the verses me to the user and perhaps the recognition of it is personally by a more effort few . As for the sites that can not that the country arrives to it then he assumes that it is safe for the participation . And we can that we assert God willing that the reform site is very safe and no danger at all on the participants in it is from that the recognition of Al Ay Bi Ou takes place any information about them . And the movement is ready that she shows who requests from the public information about the safe forums and not safe but we do not prefer that we declare it here .

The electronic mail

If the electronic mail was recorded that in the kingdom ends by a sa. Then this a post open necessarily and its protection does not become possible at all and the Saudi authorities can the arrival at it at any time . As for the registered mail in the other side and specially an Alhotmil or Alyaho then the origin is that the authorities can not the arrival at it but no escape from the measures next its protection from the hackers that may be among them many they do for the sake of the regime .

(1)The post himself prefers not to he declares and if he declares in the forums or another, the advertiser uses except to official matters for it a relation by the forums and a last post arises related to the special use .

(2)He is preferred that she uses a long and difficult Basoord and a change between a moment and other .

(3)He prefers not to the messages remain in the post wallet ( the mentioned box ) and the user maintains its deletion always .

(4)He prefers not to the user corresponds any to the side of he does not know it and do not accept any message and specially the messages laden with the files and takes the initiative in its deletion before its opening .

(5)The user avoids at all the use of its true name or the situation of any information in recording the post that shows its character but the post is declared and known to reasons that concern the work kind .

An Almsangr

The use of an Almasngr spread largely very and an effective tool became to the hackers in the recognition of the employees secrets . And for the safety from Almasngr dangers we advise on the next steps :

(1)If the user is forced that an appointed Masngra is declared then it should assumes that this declared is subject to the penetration and maintains the possession of another Masngr not declared .

(2)Almsangr user avoids the acceptance of the addition of any person or an authority that do not know it because the penetration chance after the addition increases and a more increases after the entrance into a talk .

(3)Almasngr user avoids the acceptance of the files transfer from an Almasngr because the transfer of the file from Almsangr executor does not pass by the operation of the examination on the viruses that take place in the Internet .And this applies until on the persons who trust they them because a person trusted in it its system may be penetrating or injured with the viruses and he do not know

(4)Almasngr user avoids the entrance into a sound talk or the operating of a special camera with the one(s) who do not know them because this service opens holes that the protection programs can not its closure .

(5)The user avoids at all the use of its true name or the situation of any information in an Almasngr that shows its character . Also the indication of any side avoids from its character in its talks to who do not know .

(6)The attention becomes necessary that Almasngr name do not suffice for the judgement on the character of the return but the attention to the post becomes necessary himself because the post is the one that defines Almasngr personality .

(7)The user avoids the pressure on the links that is put to it in an Almsangr because it is with the possibility the knowledge of many of the information about the user system through the pressure on any a connection .

The mind is your just

In the sentence your just applies to the mind what applies on an Almasngr what are except the next points :

(1)For to the general chambers there is no any danger from the merely of these rooms attendance and all what it is said that is for frightening the people from the participation in the mind your just .

(2)For to the participation in the talk in the general chambers the matter depends on the knowledge of the speaker sound only and he is not for it a relation by what is said about the knowledge of the verses by me .

(3)For to the special rooms the technology in it is still not complete and the penetration of these rooms becomes possible if she was clear in the list then therefore he advises who uses these rooms by that he puts it in the list of languages rooms other than the Arabic .

(4)For to the direct talk on a form similar to the telephone in the mind your just there is still in it some of the holes and the safety percentage in it he is not complete .

(5)In the mind your just is found a problem becomes obscure to some of the peoples she is a possibility that the user appears in the name of totally a name resembles another person then the return is deceived by it that where one of them carried out for example the use of a name resembles doctor Saad 's name totally .

The protection culture

He is necessary on all using and keen on the safety of its personal information and on its system and on its contacts and its correspondents that he learns and if a simple thing about the penetration ways as its above clarified it . And with the abundance of saboteurs and corrupt and the spies that follow different sides then is the origin in the interaction with the others is the caution and the non donation of any information she shows the personality or the residence or details about the work kind or the study kind which lead to the recognition of the personality . And the post user or an Almsngr or the mind should abstain your just from the declaration of its name or the facilitation of the arrival of the other employees to it except if the nature of its work was requiring that .

The programs of the direct protection

The programs of the direct protection are from the direct momentary penetration a many and the companies that between it a big competition in the protection power and each user produces he prefers a kind that appeals to it from the programs . But perhaps was is Althon the ÇáÅÑã who the easiest use may be considered from another from the programs and prove its ability for the effective protection from the direct penetration . From the other programs the program of Sikoriti Internet belonging to group Alnortn and do not prevent that the user rides the programs both of .

The protection is from the viruses

Its execution becomes possible by the programs opposite to the viruses and that from a more famous my groan 's Alnortn program is a virus and also the new copies from Althon the ÇáÅÑã . And to who can not the acquisition of an Alnortn with its ability that he gets programs an effective and strong protection he enables its lowering sites in the Internet ( an as I answer Si two torrents ) free copies to limited periods give .

The continuous modernization and a knowledge are the way of the preparation of the protection programs

He is preferred that the Internet user holds a periodic modernization of the protection programs as prefers that dressing and roses that use it in the post change a Walmasngr and the mind your just . And we notify of the necessity of the preparation of the protection programs the preparations suitable to the acquisition at the utmost the safeties degree .

END TRANSLATION







9,486 posted on 01/12/2004 5:25:38 AM PST by StillProud2BeFree
[ Post Reply | Private Reply | To 9482 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson