2009
08.20

I am still updating the Computer and Cell phone pages. I spent Friday April 18, 2008 in the county jail. Based on mockery and lies. Updates will be here soon.

A quick look at the company’s officers gives an indication that they are qualified to successfully hide a program and circumvent the security built into your computer. They came from some of the the various companies that developed that security!

Who better to subvert your computer’s security?
atitop

Verisign
atidave

Search Engine Optimization
atiron

Search Engine Optimization
atimike

atitom

Internet Searches
atijason

atimichael

Quick Notes on WebWatcher

It is as invisible as a program can get.

It plays the limitations of the Windows Registry very well.

If you go to a subdirectory where a file is, it moves.

It replaces the shell program your computer uses.

No Uninstall Program listed

No named entries in the Registry

No indication it is installed.

Disables your security programs.

Once security is disabled, you are completely exposed to all viruses/spyware.

Program files hide in the subdirectories of programs you are not likely to delete.

Program reinstallation hooks are embedded inside pictures.

It would appear one place they embed their reinstall code is inside the security pictures in your security programs.

Installed Via Email – It wasn’t necessary to open the email, the install routine launched on delivery to my machine from the mail server. It crashed the Windows Mail program and indicated to contact Microsoft to check for an available fix. After it hung for a bit longer than I expected, I crashed the laptop, pulled the plug and battery. On Reboot, it had been downloading the executable file and setting it to run on reboot.

If you suspect it is installed, AWARENESS TECHNOLOGIES will deny it.

If you are certain it is installed AWARENESS TECHNOLOGIES will deny it.

When you purchase the program yourself and IT tells you that IT is already installed on your computer, AWARENESS TECHNOLOGIES will deny it… and become hostile.

When you attempt to reason with them and you answer all of their questions about how you detected their program, AWARENESS TECHNOLOGIES will deny it. AND THEN, they will update the program so the methods you discussed will no longer work.

If you eventually get to someone there who confirms what you are reporting and wants to help you, she will be fired.

If you post anything about the program on a forum, someone will follow behind you and either delete your entry (they have every one of your passwords) or post an accusation that you are a child trying to get around his parents protections. A very effective method, because no one will assist a child trying to get around their parent’s protection. It doesn’t matter that your parents are in their 70’s, they are protecting you from the evil things on the internet. Well all but one of the evil things because they didn’t protect you from WebWatcher.

McAfee does not detect it. Their EMPROXY program will run all the time, as the program thinks the outgoing data is email or instant messages and it is scanning them.

Symantec does not detect it. ( BUT trust them to secure the data as it is stolen from your computer and delivered to the servers where it is being illegally stored. )

Kaspersky does not detect it, BUT the tools available provide the indication that data is being transmitted.

ZoneAlarm does not detect it, but it does have methods to slow the transmission of data down.

WebWatcher has routines that DISABLE your anti-virus/anti-spyware programs – without those programs even noticing they have been disabled.

Once your anti-virus/anti-spyware programs are disabled, you are more likely to get infected with a virus.

The program hides among the viruses, and your computer appears to be infected with a virus. Should you remove that virus, you may not notice WebWatcher is still there.

The program files are hidden among your security program files. If you change security programs, the files are renamed to your new one, or any of about a dozen other popular program naming conventions.

You may notice that Java updates are running fairly often, it is part of the update/reinfect routine.

2009
08.20

Judge Bertin’s Order of August 7, 2009 required documents be exchanged on August 20, 2009.

Angst & Angst receptionist refused to accept documents.

Angst & Angst receptionist refused to sign for receipt of documents.

Angst & Angst did not provide true and correct copies of all documents.

On August 20, 2009, at approximately 2:50 PM

1. Receptionist would not agree that she had received the documents, or as an alternative that she had received anything.

2. They would not provide their names.

3. Valerie Angsts assistant refused to sign as well. She would not offer any alternative. She began commenting on the case.

4. Both were informed that I had a court order indicating the exchange was to take place on August 20, 2009.

5. Valerie Angst’s assistant indicated I had no business showing up at their offices, even though the court order indicated the exchange would take place on August 20, 2009.

6. At approximately 3:01PM, I left the documents on their desk and left their office.

Judge Bertin was told of the behavior of the receptionists.

During a court recess, when informed that the telephone bills had not been provided, Bob Angst crumbled the note indicating the missing documents and threw it on the courtroom floor.

When court resumed, Judge Bertin was informed of the behavior of Bob Angst.

There were no consequences for any of their bad behavior, or their violation of court orders, etc.