tag:blogger.com,1999:blog-3521346669122869757.post8649466060741085013..comments2023-03-24T01:48:58.493-07:00Comments on Julie Amero: Persecution of the InnocentJamhttp://www.blogger.com/profile/16935342990967098468noreply@blogger.comBlogger106125tag:blogger.com,1999:blog-3521346669122869757.post-35997664298701463342008-04-29T13:00:00.000-07:002008-04-29T13:00:00.000-07:00So for all of us who blogged in support of Julie.....So for all of us who blogged in support of Julie.... We would like to know how things are going? We would like to know if they finally dropped the whole thing? And we all hope you are sueing the pants off the school, police department, etc for your losses.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-46421656140453313862007-11-28T01:09:00.000-08:002007-11-28T01:09:00.000-08:00Julie and I would like to wish everyone a safe and...Julie and I would like to wish everyone a safe and happy holiday season. Waiting for other news is all we can do.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-29815621147879127802007-11-19T15:40:00.000-08:002007-11-19T15:40:00.000-08:0011-18-07I am a substitute teacher also. Today was...11-18-07<BR/>I am a substitute teacher also. Today was the Nightmare From Hell. I never had such misbehaved students. They were grades 10, 11 and 12, mixed. They were rude, loud and disrespectful not only to me and to each other, but to the principal and vice principal, and to veteran teachers I called on for help. It was the absolute worst day of my entire life, and nobody was able to help me. When threatened with detention and suspension, the students laughed. Julie's job was hard to begin with, and then this other thing had to happen to make it worse. It could happen to any teacher. God bless you Julie, you are not alone. Everybody's on your side.<BR/>- Sub. from New JerseyAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-90108599154005935732007-06-14T12:41:00.000-07:002007-06-14T12:41:00.000-07:00Dear Julie, how do you ?I was astonished by the ne...Dear Julie, how do you ?<BR/><BR/>I was astonished by the news about your trial ! Well, I surmise that it might exist some place in the U.S. where freedom actually exist (as here in Brasil where I live), thus why don't you move from there to another state or, even so, to another country ?<BR/><BR/>I hope you are well, and have faith - the most important thing.<BR/><BR/>Best wishes,<BR/><BR/>Antonio<BR/><BR/>dcli1@hotmail.comAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-90111863284865535882007-06-07T18:26:00.000-07:002007-06-07T18:26:00.000-07:00I read with interest and great concern about your ...I read with interest and great concern about your case. I run an IT Security company and have no doubt that you cannot be singled out for the presence of "pornographic" data on this insecure PC. If there was inaedquate firewall protection, lack of effective anti-spyware protection, out-of-date anti-virus protection, and times when the PC was accessible by others without your agreement or knowledge, it simply cannot be proven BEYOND REASONABLE DOUBT that you are to blame. The incompetence and sheer ignorance of the investigators and prosecutors is equally shocking. I wish you well and hope justice serves to point the finger fairly and squarely at the feckless school administration for failing to adequately safeguard and protect the children and staff of the school.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-57985741139289217842007-06-07T17:01:00.000-07:002007-06-07T17:01:00.000-07:00what is exactly wrong with the naked body anyway? ...what is exactly wrong with the naked body anyway? it's how we were born!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-84869933593924983732007-03-24T08:27:00.000-07:002007-03-24T08:27:00.000-07:00It's quite possible for a virus or other malware t...It's quite possible for a virus or other malware thing to show porn. Why, I was in high school once and I was visiting a game website and some ad scripts launched a new window with a banner of a naked women advertising some porn. <BR/><BR/>But what I want to say is that I'm appalled that there's such a big deal over this---some kids perhaps saw some sexually explicit pics. Hell, there's nothing wrong with that. They weren't scarred for life. I'm sure all of them have seen naked people a thousand times over. This is ridiculous. It's normal to want to see naked people and nothing will happen. I mean, they see themselves naked when they take a shower. And by that time they're already interested in sex. I can't believe how ridiculous this is.Jasonhttps://www.blogger.com/profile/05801588487514775021noreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-49383250254882873102007-03-18T13:24:00.000-07:002007-03-18T13:24:00.000-07:00After reading through the many comments and geting...After reading through the many comments and geting a feel for this case I have two concerns in regarding the so called evidence.<BR/>First: Malware<BR/>As an IT expert I am no starnger to Maleware and the many ways it can affect / infect a windows based PC.<BR/>One method and probly one of the least know is what it called a Drive by download. This is a process whereas Maleware software downloads its self to an uprotected PC using a web spider. This little known process will install shortcuts and links throughout your desktop and Favorites without any user interaction or consent. To the un-educated novice PC user this would appear as it was done by a user. <BR/>More information on this here: http://whatis.techtarget.com/definition/0,,sid9_gci887624,00.html<BR/><BR/>http://en.wikipedia.org/wiki/Drive-by_download<BR/><BR/>Secondly:The law reqiures that "it be proven beyond a resonble doubt"<BR/>With all the tech tools available to techincal support groups, one of the best wats to esure your employee's are not conducting in a comprimsing manner,is to run a Keylogger.<BR/><BR/>A Keylogger is a stealthy monitoring spy software which allows you to secretly track all activities of computer users in total stealth mode, and automatically deliver logs to you via Email or FTP, including all areas of the system such as email sent, Web sites visited, file operations, every keystroke, username and password, online chat conversation (ICQ, MSN, AIM), and take screen snapshot at set intervals just like a surveillance camera directly point at the computer monitor. Features include start and stop scheduling, logs remote delivery, stealth mode, user account filter, password protection, suspend on idle, powerful key logger, HTML report, logs sorting and searching. With this amazing monitoring software you will be able to see exactly what people have been doing online and offline just like you are looking at the computer monitor over their shoulders.<BR/><BR/>I fully support this style of prevention and would think that education system would have this sort of system in place because without it it would be virtually impossible to know what was typed or clicked.<BR/><BR/>Without this type of tracking software you would be hard pressed to convince me to point of "beyond resonable doubt".<BR/><BR/>In this day and age this sort of trial in pure negligence on the IT department's behalf and the forensic legal department to do thier jobs properly.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-2133913176845527782007-03-15T22:23:00.000-07:002007-03-15T22:23:00.000-07:00I am a security software engineer at Microsoft. I...I am a security software engineer at Microsoft. It is absolutely possible that any user with administrator credentials could get her machine compromised when visiting innocuous websites. I am horrified that this prosecution succeeded. From what I have read of the case, the prosecution should have been thrown out of court. I have contributed to your legal defense fund and just wrote an email to the prosecutor. Best of luck on your appeal.Unknownhttps://www.blogger.com/profile/08262264515050099304noreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-66213953725767354802007-03-11T08:50:00.000-07:002007-03-11T08:50:00.000-07:00First of all the computer administrator for this s...First of all the computer administrator for this school should be in court as your co defendant.<BR/><BR/>Secondly if there is no computer administrator then the Principal should be sitting besides you as a co defendant.<BR/><BR/>Thirdly the school board should all be sitting with you in the defendants chairs. While I don't pretend to know if you are in fact innocent or guilty the crux of this case goes well beyond your personal innocence or guilt.<BR/><BR/>Perhaps if Principals and the school board were held accountable for what goes on with district computers they might spend a little extra time overseeing their fifedom.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-8653161255870438032007-03-07T18:12:00.000-08:002007-03-07T18:12:00.000-08:00Hi Wes..sorry for what you and especially your wif...Hi Wes..sorry for what you and especially your wife are going through. I am a producer for a radio show. The show's host, Ed Norris is also a victim of misjustice and has been following your story. We'd like to have you on the show and help put some more attention on your cause. Please contact me at 410-828-7722. God bless. <BR/><BR/>-Stacey<BR/><BR/>www.ednorris.comAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-36362989052421033082007-03-07T18:09:00.000-08:002007-03-07T18:09:00.000-08:00Hi Wes..sorry for what you and especially your wif...Hi Wes..sorry for what you and especially your wife are going through. I am a producer for a radio show. The show's host, Ed Norris is also a victim of misjustice and has been following your story. We'd like to have you on the show and help put some more attention on your cause. Please contact me at 410-828-7722. God bless.<BR/><BR/>-StaceyAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-40377168008140672172007-03-07T12:14:00.000-08:002007-03-07T12:14:00.000-08:00My thoughts are with you both. I hope that all the...My thoughts are with you both. I hope that all the grave errors made throughout this entire thing are finally rectified. Stay strong.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-71271104336673676112007-03-06T16:58:00.000-08:002007-03-06T16:58:00.000-08:00Wes & Julie, I can't believe this is happening in ...Wes & Julie, I can't believe this is happening in today's world.<BR/><BR/>Here is a link to someone that has successfully sued the manufacturer and store he purchased his computer from. Now he is going after Microsoft for it.<BR/><BR/>I think it is something you should pass on!<BR/><BR/>http://www.informationweek.com/windows/showArticle.jhtml?articleID=197700861&cid=RSSfeed_TechWebAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-32588511795211949922007-03-06T05:14:00.000-08:002007-03-06T05:14:00.000-08:00Hello from France :)Here the people who read your ...Hello from France :)<BR/><BR/>Here the people who read your story are completly amazed ! One time again America show that justice can be completly crazy !<BR/><BR/>So much things happens to kids actually all around the world (in Africa they die every minutes) and the public money is use for silly persecution like that !<BR/>What a shame !<BR/><BR/>Julie, we are with you !!!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-13224402782007741222007-03-06T03:55:00.000-08:002007-03-06T03:55:00.000-08:00When I first heard about this case, and saw that p...When I first heard about this case, and saw that people were being asked to contribute to an appeal fund, I thought - this has to be a scam. The case is simply not credible. Everyone who has used the internet for more than a month has fallen into one of these cess-pit sites by accident. You couldn't even fire an employee on "balance of probability" on this evidence, let alone find them guilty "beyond reasonable doubt". At the very minimum, you'd have to prove that the defendant had exclusive access to the computer and had actively set out to bypass the school's content filter. If you took this story to Hollywood to sell the movie rights, they'd sling you in the street - nobody is this gullible! The movie audience just wouldn't buy it. <BR/><BR/>And then I searched a bit more. It is true. It really is true. No one at any point stood up and said "this is nonsense, we are going to look complete idiots to the world when this gets out". The DA should have said "I can't prosecute this case, the voters will think I'm a fool". The judge should have said "no case to answer" before the trial ever started. Don't tell me that none of the jury has never experienced this - yet not one of them had the guts to stand up and say "relying on my personal experience, I don't care that the defense attorney is a complete loser - this is a joke". Any one of them could have stopped this farce it its tracks.<BR/><BR/>Surely the Appeal court will rule a complete mistrial and the case will be dropped!Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-4489719468970619662007-03-05T12:02:00.000-08:002007-03-05T12:02:00.000-08:00I work in a school district and monitoring the int...I work in a school district and monitoring the internet, keeping my network secure and keeping all the computers up to date is my responsibility (Thank God it’s a HIGH SCHOOL district) where the kids no more about porn than I do and they aint afraid to show it either. <BR/>Mrs. Amero can and should pursue legal action against the school district, if she can prove they were negligent in not performing proper maintenance to the technical facilities being used by personnel as well as children as per the Districts Technology Acceptance Use Policy, (if they have one). <BR/>HAVING...WINDOWS 98 may or may not be negligent, due to the fact that MICROSOFT stopped supporting it I believe Dec of 2006 (after extending the support deadline TWICE). <BR/>NOT HAVING...ANTI-SPYWARE software installed doesn’t make it negligent, but not keeping the OS (Win 98) updated to help prevent SPY-WARE might be.<BR/>NOT HAVING...ANTI-VIRUS...I think she definitely has a case as it pertains to the lack of an ANTI-VIRUS program. No computer in is WORLD (other than MACS) should be without an anti-virus software and it should be set to automatically update daily (upon booting up) whether it’s from the local network or the internet. <BR/>NOT HAVING...Adequate personnel to perform the tasks of keeping the technology updated, maybe grounds as well for legal action.<BR/>So I think she has options, this is definitely not all her fault, and its funny all the teachers in my district think turning the monitor off is turning the computer off, can't tell you how many times I've walked in monday morning and every monitor off and every computer is on.Eddiehttps://www.blogger.com/profile/09938164934098217486noreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-66332885561218422752007-03-05T09:45:00.000-08:002007-03-05T09:45:00.000-08:00This just goes to show you there's something wrong...This just goes to show you there's something wrong in America.<BR/>Wes: I'm sorry, but hackers & people who program malware & such are NOT terrorists.<BR/>Mike Regan: Why did you WRITE such a long & irrelevant post?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-28978145802996842282007-03-03T20:44:00.000-08:002007-03-03T20:44:00.000-08:00http://www.justice4matt.com/ExecutiveSummary.htmlC...http://www.justice4matt.com/ExecutiveSummary.html<BR/><BR/>Check out the site above , about a boy in Arizona who's family spent a fortune to defend their son in a similar case where porn showed up on the family's person computer . but they finally proved it was caused from a hacker , Wish I had more to offer . Regards Tim StricklandAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-32864883661048243542007-03-03T18:02:00.000-08:002007-03-03T18:02:00.000-08:00What passes for justice in America is a farce. The...What passes for justice in America is a farce. The bush regime can commit numerous crimes and everyone ho hums their way to starbucks. There should be incredible outrage to what is transpiring in this country. This is how fascism works, soviet style dog and pony shows where the outcome has already been predetermined. This could happen to anyone of us, yet the guilty parties (school) go free and the patsy(Ms. Amero) takes the fall. There is no dignity left, no accountability. Greed and treason, lies and deceptions seem to rule the day. The school board , the prosecution should burn in hell. The time has come for another revolution. We have taken our freedom for granted and now that freedom has been distorted and destroyed.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-65573302423215604562007-03-03T15:58:00.000-08:002007-03-03T15:58:00.000-08:00I am from Scotland, UK. I came across Julie's case...I am from Scotland, UK. I came across Julie's case only on Thursday. When I finished reading what Julie and Wes have been going through I sat and cried. <BR/><BR/>I would just like to say, as many others have, that the case should have some sort of Computer Expert looking at the evidence, not a court room full of people who do not even know how to turn one on. <BR/><BR/>If there is no one able with such expertise, then the case should be dismissed. The full case is unfair on Julie, who I regard as an innocent woman, who happened to be in the wrong place at the wrong time.<BR/><BR/>Unfortunately, pop-ups appear on all computers at some time or another. Put a stop to the people who make them and let an innocent women and her family get on with their life. <BR/><BR/>My thoughts are with you both and i hope all turns out for the best. Good Luck and God Bless.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-25490694578443075082007-03-03T13:24:00.000-08:002007-03-03T13:24:00.000-08:00Perhaps I can offer assistance I was reading the T...Perhaps I can offer assistance<BR/> <BR/>I was reading the Times paper making my way to work on the train this morning because I stupidly left my phone at work and came across your predicament and felt so angry about what I was reading I had to log onto my computer and right to you.<BR/><BR/>Where to start?<BR/><BR/>Looking at the date in the paper of October 2004 I couldn’t help but wonder how this sad state of affairs could have happened to you knowing the inherent flaws with the Windows Operating system of the time and the lack of security software preventing pop-ups from appearing when innocently browning the internet.<BR/><BR/>The release of Service Pack 2 (SP2) for Windows XP greatly reduced these issues but still hasn’t eradicated the issue preventing things like these arising but given the year and because you were working for a public school it is highly unlikely that you were using Windows XP and were using either Windows 95, 98, NT or 2000 who all have a very common architecture and share similar behavioral patterns when used meaning that each computer would have been easily exposed to malicious software installs and multiple pop-ups appearing on your computer added to this that your school was negligent in not having the firewall enabled GREATLY ENHANCING a problem like the one you experienced occurring because there was nothing protecting the school’s network, servers and computers from being hacked or transferring malicious malware creating even more pop-ups on the affected computer.<BR/><BR/>What’s even more disturbing, in fact there were a lot of things that disturbed me when reading the small article about your story is that Mr. Lounsbury did not search the computer for malicious software and has not therefore carried out a number or rudimentary tasks to locate any infected files, which I will demonstrate a little later on and the school saying that a situation like the one you experienced had never happened before and has not happened since.<BR/><BR/>My comment to this is that is total rubbish or at least it hasn’t been reported or it has been covered up! One question how long was the firewall de-activated for? springs to mind; the lack of firewall would have greatly exposed there network.<BR/><BR/>I am regarded as an IT professional and have worked for 10 different companies in the last 2 years alone and have worked for a children’s hospital, jewelers, construction right through to investment bankers and am shocked at how slack all of the companies are in certain areas and the levels of incompetence that I witness even now and absolutely stunned how the aforementioned Mr. Lounsbury did not do the required checks because I am quite sure I know away of identifying the difference between the simultaneous pornographic pop-ups that appeared on the computer on the day in question were accidental or deliberate. I have probably supported in excess of 10,000 people in the last 2 years.<BR/><BR/>When ever you log onto a computer almost all activity is audited and is found in a number of places on the operating system and is true of all GUI (Graphical User Interface) operating systems.<BR/><BR/>This is done by the computer’s operating system creating a ‘local profile’ when you log onto it for the first time irrespective of whether you have logged onto the school’s network or as in worked ‘offline’ or commonly referred to as ‘logging on locally’.<BR/><BR/>The creation of a local profile is simply a creation of a folder named as the username, for example if you logged on with the username AmeroJ, then the folder would be called ‘AmeroJ’, within this folder you have a series of folders containing information about what you do on the computer also, some ‘hidden’ folders and files which is the default behavior of all GUI-based operating systems, which are easily viewable within Windows Explorer by choosing to view ‘hidden files and folders’ within the folder options revealing 2 very important folders that trace all internet activity called ‘Cookies’ and ‘Temporary Internet Files’.<BR/><BR/>The purpose of the cookies folder is to create an index of web-sites accessed as a reference in the form of a basic text file to allow you to access the same website quicker next time.<BR/><BR/>The temporary internet files folder works with the cookies folder but is more advanced because it breaks down the internet pages into a whole host of files containing every image contained within all internet pages viewed and every time you access the same site it cross references the locally stored information with the website and reconciles any changes that exist within the website and the locally stored information contained within both the cookies and temporary internet files folders seamlessly (not realised by the user) and re-displays the internet page at a far faster rate. The more images on the website and the fewer changes when going back to it the greater the time will be saved because it is far quicker for the computer’s operating system to access and re-arrange data saved locally on your computer’s hard-drive than to download new content from a website even on today’s available download and upload speeds!<BR/><BR/>The crucial bit here that I am leading to is that all internet activity is HEAVILY AUDITED by the computer’s operating system because of what is contained in these 2 folders and also absolutely everything is TIME-STAMPED with a ‘modified’ (accessed) and ‘created’ (The date pertaining to the file being first created even if you access the website with the same picture the created date column will remain the same) date for that file.<BR/><BR/>I know that there would be a very obvious difference that would be clearly indicated here if you were to look with a good eye to see some correlation between genuine activity and separating those from the automated activity as in pop-ups appearing without you selecting anything or if you make repeated attempts to close a window of Internet Explorer containing the pornography for it to instantly load one or as is generally the case with pornographic websites often have half a dozen plus more Internet Explorer windows in it’s stead quickly finding yourself with in excess of over 50-plus instances of Internet Explorer on your screen and you will notice the computer start grinding to a halt because of the amount of simultaneous requests created by the multiple web pages loading up making it almost impossible to do anything because the computer’s operating system is struggling to remember what the malicious web pages are instructing it to do by caching that information and separating it from your request to cancel it and will simply ignore any effort you make to stop the web pages loading beyond your control.<BR/><BR/>There are utilities called msconfig that identifies any applications running - including those that you don’t know and something else called psservice, which shows even more information about what your computer is running ni the background that you don’t know about and these could still be used on that hard-drive even now!<BR/><BR/>I imagine that the police have the hard-drive from the computer that experienced these pop-ups that you are being charged for and can still identify these files to prove your innocence even today because a computer won’t delete the 2 aforementioned folders unless a person specifically with the user account used on the day, which I believe was your colleagues manually deletes them, or requests the operating system to do it for him.<BR/><BR/>Provided nothing has been tampered with the proof of your innocence is on that hard-drive which I am sure I could show!<BR/><BR/>If I can be of any assistance I will try to help you in any way that I can. I really feel for you because it disturbs me how easy it is to fall foul of computers and as I say I have supported thousands of people in the last 2 years alone and know that most people know next to nothing about what there computers are doing in the background when the user is using a computer, and that includes senior management, directors and even IT personnel would you believe!<BR/><BR/>I can be contacted at mike07957@yahoo.co.uk.<BR/><BR/>Yours sincerely,<BR/><BR/><BR/>Mike ReganMike Reganhttps://www.blogger.com/profile/03150705599884760819noreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-66246550503597294402007-03-03T05:16:00.000-08:002007-03-03T05:16:00.000-08:00I was reading the Times paper making my way to wor...I was reading the Times paper making my way to work on the train this morning because I stupidly left my phone at work and came across your predicament and felt so angry about what I was reading I had to log onto my computer and right to you.<BR/> <BR/>Where to start?<BR/> <BR/>Looking at the date in the paper of October 2004 I couldn’t help but wonder how this sad state of affairs could have happened to you knowing the inherent flaws with the Windows Operating system of the time and the lack of security software preventing pop-ups from appearing when innocently browning the internet.<BR/><BR/>The release of Service Pack 2 (SP2) for Windows XP greatly reduced these issues but still hasn’t eradicated the issue preventing things like these arising but given the year and because you were working for a public school it is highly unlikely that you were using Windows XP and were using either Windows 95, 98, NT or 2000 who all have a very common architecture and share similar behavioral patterns when used meaning that each computer would have been easily exposed to malicious software installs and multiple pop-ups appearing on your computer added to this that your school was negligent in not having the firewall enabled GREATLY ENHANCING a problem like the one you experienced occurring because there was nothing protecting the school’s network, servers and computers from being hacked or transferring malicious malware creating even more pop-ups on the affected computer.<BR/><BR/>What’s even more disturbing, in fact there were a lot of things that disturbed me when reading the small article about your story is that Mr. Lounsbury did not search the computer for malicious software and has not therefore carried out a number or rudimentary tasks to locate any infected files, which I will demonstrate a little later on and the school saying that a situation like the one you experienced had never happened before and has not happened since.<BR/><BR/>My comment to this is that is total rubbish or at least it hasn’t been reported or it has been covered up! One question how long was the firewall de-activated for? springs to mind; the lack of firewall would have greatly exposed there network.<BR/><BR/>I am regarded as an IT professional and have worked for 10 different companies in the last 2 years alone and have worked for a children’s hospital, jewelers, construction right through to investment bankers and am shocked at how slack all of the companies are in certain areas and the levels of incompetence that I witness even now and absolutely stunned how the aforementioned Mr. Lounsbury did not do the required checks because I am quite sure I know away of identifying the difference between the simultaneous pornographic pop-ups that appeared on the computer on the day in question were accidental or deliberate. I have probably supported in excess of 10,000 people in the last 2 years.<BR/><BR/>When ever you log onto a computer almost all activity is audited and is found in a number of places on the operating system and is true of all GUI (Graphical User Interface) operating systems.<BR/><BR/>This is done by the computer’s operating system creating a ‘local profile’ when you log onto it for the first time irrespective of whether you have logged onto the school’s network or as in worked ‘offline’ or commonly referred to as ‘logging on locally’.<BR/><BR/>The creation of a local profile is simply a creation of a folder named as the username, for example if you logged on with the username AmeroJ, then the folder would be called ‘AmeroJ’, within this folder you have a series of folders containing information about what you do on the computer also, some ‘hidden’ folders and files which is the default behavior of all GUI-based operating systems, which are easily viewable within Windows Explorer by choosing to view ‘hidden files and folders’ within the folder options revealing 2 very important folders that trace all internet activity called ‘Cookies’ and ‘Temporary Internet Files’.<BR/><BR/>The purpose of the cookies folder is to create an index of web-sites accessed as a reference in the form of a basic text file to allow you to access the same website quicker next time.<BR/><BR/>The temporary internet files folder works with the cookies folder but is more advanced because it breaks down the internet pages into a whole host of files containing every image contained within all internet pages viewed and every time you access the same site it cross references the locally stored information with the website and reconciles any changes that exist within the website and the locally stored information contained within both the cookies and temporary internet files folders seamlessly (not realised by the user) and re-displays the internet page at a far faster rate. The more images on the website and the fewer changes when going back to it the greater the time will be saved because it is far quicker for the computer’s operating system to access and re-arrange data saved locally on your computer’s hard-drive than to download new content from a website even on today’s available download and upload speeds!<BR/><BR/>The crucial bit here that I am leading to is that all internet activity is HEAVILY AUDITED by the computer’s operating system because of what is contained in these 2 folders and also absolutely everything is TIME-STAMPED with a ‘modified’ (accessed) and ‘created’ (The date pertaining to the file being first created even if you access the website with the same picture the created date column will remain the same) date for that file.<BR/><BR/>I know that there would be a very obvious difference that would be clearly indicated here if you were to look with a good eye to see some correlation between genuine activity and separating those from the automated activity as in pop-ups appearing without you selecting anything or if you make repeated attempts to close a window of Internet Explorer containing the pornography for it to instantly load one or as is generally the case with pornographic websites often have half a dozen plus more Internet Explorer windows in it’s stead quickly finding yourself with in excess of over 50-plus instances of Internet Explorer on your screen and you will notice the computer start grinding to a halt because of the amount of simultaneous requests created by the multiple web pages loading up making it almost impossible to do anything because the computer’s operating system is struggling to remember what the malicious web pages are instructing it to do by caching that information and separating it from your request to cancel it and will simply ignore any effort you make to stop the web pages loading beyond your control.<BR/><BR/>There are utilities called msconfig that identifies any applications running - including those that you don’t know and something else called psservice, which shows even more information about what your computer is running ni the background that you don’t know about and these could still be used on that hard-drive even now!<BR/><BR/>I imagine that the police have the hard-drive from the computer that experienced these pop-ups that you are being charged for and can still identify these files to prove your innocence even today because a computer won’t delete the 2 aforementioned folders unless a person specifically with the user account used on the day, which I believe was your colleagues manually deletes them, or requests the operating system to do it for him.<BR/><BR/>Provided nothing has been tampered with the proof of your innocence is on that hard-drive which I am sure I could show!<BR/><BR/>If I can be of any assistance I will try to help you in any way that I can. I really feel for you because it disturbs me how easy it is to fall foul of computers and as I say I have supported thousands of people in the last 2 years alone and know that most people know next to nothing about what there computers are doing in the background when the user is using a computer, and that includes senior management, directors and even IT personnel would you believe!<BR/><BR/>I can be contacted at mike07957@yahoo.co.uk.<BR/><BR/>Yours sincerely,<BR/><BR/><BR/>Mike ReganMike Reganhttps://www.blogger.com/profile/03150705599884760819noreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-90467309356844436432007-03-03T01:40:00.000-08:002007-03-03T01:40:00.000-08:00This case is bizarre.Apart from the obvious injust...This case is bizarre.<BR/><BR/>Apart from the obvious injustice, the persecution of an innocent, the case shows the USA in a very poor light.<BR/><BR/>Julie's crime appears to be she doesn't understand viruses and popups.<BR/><BR/>The prosecuters & jury show themselves to be guilty of the same crime.<BR/><BR/>The school didn't have a firewall? The School is guilty of cowardice, sacrificing a teacher to avoid a lawsuit. What teacher would work for such a school.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3521346669122869757.post-67021288605369035362007-03-02T21:29:00.000-08:002007-03-02T21:29:00.000-08:00I just want to let you know that i feel for you. I...I just want to let you know that i feel for you. I am a computer engineer and network designer in Keego Harbor, MI and I see peoples machines ravaged by software that can cause these issues and worse. Were you and the students using idiot explorer? that's how 90% of these infestations occur. Besides. Where was the web filtering software that became prevalent in '95 after the failure of the Communications Decency act led the industry to prove that government regulation was not necessary to keep kids from exposure to this stuff. Bess is a solution one of my clients use and it works great. Please contact me if you need expert testimony on this.<BR/><BR/>Tom Houghtby IVMr Invaderhttps://www.blogger.com/profile/16310615340894515148noreply@blogger.com