Jump to content

I Need A Security Expert For A Consult And I'm Willing To Pay.


exploited
 Share

Recommended Posts

Hello,

I need a consultation from a security expert and am willing to pay. I don't want to bother anyone on the team if they do not have time for something like this but the consult is much needed.

Is there anyone on the team that can either help me directly, or, maybe point me to a good person for a consult?

It would be much appreciated.

Thanks in advance,

Exploited

Link to comment
Share on other sites

You may get more responses if you gave an idea of what type of information you are looking for.

I run a website that makes money from answering emails.

A person I know does the same thing and does not want me in business.

They have been in all of my computer systems for over 2 years now and I am not sure how they are doing it.

I have figured out some of the ways they have been getting in, but not all of them.

I have caught them outside of my house a few times after reloading my systems.

I have had to remove wifi and bluetooth cards from my systems (mainly apple).

I am now doing all of my emails on my iphone but believe they are in it as well, and I am not sure how they are doing it to be honest.

Please feel free to ask questions and I'll do the best I can to answer them.

UPDATE

I have wifi in my house--but I do not have any of my computer systems on that network. In fact, I have a separate internet connection altogether for the systems in my house that I use for business and it is on a wired only router.

Also, I do not allow my iphone on ANY wifi network. It is 3G/4G only.

Edited by exploited
Link to comment
Share on other sites

Are you running your own mail server from home? They may not be in your actual computer but just have passwords/access to your email provider.

They have for sure been in my computers. I can tell when they are in by checking the sharing preferences within the System Preferences pane. The remote login, AND the remote management gets turned on and greyed out so that I cannot turn it off.

To answer your question directly--I am not currently running my mail server from home. There was a time that I had a mac mini collocated and I ran my mail server from it. However, it was hacked into by these sucka's and I had to switch.

The mail is currently being hosted at google for apps. I use two step verification AND application specific passwords.

I have remote images turned off within my iPhone, so I know that is not how they are doing it.

Why do I suspect they are in the iPhone? Well, I believe they have my serial number/imei number. I was thinking it was probably a clone of my iphone.

However, I also get this suspicion due to the way the iphone checks for mail.

I get two things that happen when I hit refresh from within the mail app--at the bottom of the screen it shows checking, and then updated, but the spinning wheel at the top of the screen keeps going for a while and I don't actually get my emails until after the spinning wheel stops spinning. but this delay is only prevalent when I haven't revoked the application specific password for a while and issued a new one. After a new password is provisioned, the issue goes away (for a little while). I also get a bunch of emails after the password is revoked that are obvious to me not real clients. But I cannot be sure so I have to reply.

Maybe sniffing the password over 3g?

These guys do have money for equipment.

Link to comment
Share on other sites

No offense, but you sound uber paranoid. It seems like a pretty big over kill for someone to honestly put all that effort into just getting into your system.

No offense taken. However, I've had no choice but to become "uber paranoid". They've been in my systems for a long time and I've lost a lot of hard work. It has been costly and time consuming to deal with and is ongoing.

Some of these guys do it for the thrill, and he is one of them. However, there is also money and personal vendetta involved. So, he has put that much effort into "getting into my systems".

I'd appreciate help if anyone here can actually provide it.

Link to comment
Share on other sites

If they are as good as you make it seem, they wouldn't be bugging one guy just for "the thrill". Most likely they would be working for a big security firm somewhere. I would say delete all of the trusted app passwords and don't use them. Only login through web with 2 factor auth. If you see them outside your house with laptop screens glowing in their faces, call the authorities.

Also, scan all your comptuers with a rescue disc.

F-secure

Kaspersky

etc.

http://www.techmixer.com/free-bootable-antivirus-rescue-cds-download-list/

Link to comment
Share on other sites

If they are as good as you make it seem, they wouldn't be bugging one guy just for "the thrill". Most likely they would be working for a big security firm somewhere. I would say delete all of the trusted app passwords and don't use them. Only login through web with 2 factor auth. If you see them outside your house with laptop screens glowing in their faces, call the authorities.

Also, scan all your comptuers with a rescue disc.

F-secure

Kaspersky

etc.

http://www.techmixer.com/free-bootable-antivirus-rescue-cds-download-list/

I never said they were bugging one guy just for the thrill, and one of his "guys" does work for a security firm.

They are clearly professionals and there is a personal vendetta and money at stake.

I have called the authorities and reported them. These things are very hard to prove, and with them being as good as they have been I can only imagine how hard it would be to trace it back to them.

Nevertheless, could you please explain why you suggest to stop using the trusted app passwords and only login with 2 factor auth? I only ask for my own personal knowledge. I appreciate the advice whole heartedly. I have a few friends but they are very busy people and I don't like to bother them too much with this stuff, but they have helped alot along the way and I'm sure they'd like the "why" question answered when I tell them what the suggestion was.

Keep in mind that this suggestion of yours is going to complicate my life a bit. I will have to switch from using an iphone to using an ipad or laptop with 3g service to answer emails. I won't be so readily available without a device I can fit in my pocket and carry around. I've gotten pretty good at using siri to get the typing done. Sure, an ipad has dictation but it is not small enough to carry in my pocket and using the web browser to answer emails with an iphone is not easy--nearly impossible in my opinion. Especially when you consider the amount of emails I do on a daily basis.

I'm in no way complaining. I will do what I have to do. I just like to know why you suggest this and how it will help if you don't mind.

Also, thanks for the tip on the scanner. Although, I do not believe they are currently in my computers at the moment. I very carefully removed all of the wireless cards within them and have cleanly formatted my machines. I've also changed the ip address on my business network prior too doing the format, and since I haven't been answering emails on the computers I can't imagine how they'd find their way in. I only use the computers for developing and building my websites and software.

I will however, do the scan anyway just to be sure.

Thanks a bunch.

Edited by exploited
Link to comment
Share on other sites

I never said they were bugging one guy just for the thrill, and one of his "guys" does work for a security firm.

They are clearly professionals and there is a personal vendetta and money at stake.

Most professionals have ethics. I know a lot of pen testers and they would not harass someone like you are describing.

I have called the authorities and reported them. These things are very hard to prove, and with them being as good as they have been I can only imagine how hard it would be to trace it back to them.

Nevertheless, could you please explain why you suggest to stop using the trusted app passwords and only login with 2 factor auth? I only ask for my own personal knowledge. I appreciate the advice whole heartedly. I have a few friends but they are very busy people and I don't like to bother them too much with this stuff, but they have helped alot along the way and I'm sure they'd like the "why" question answered when I tell them what the suggestion was.

If they do have access to your system somehow, the trusted app password is all they would need to get into your email.

Keep in mind that this suggestion of yours is going to complicate my life a bit. I will have to switch from using an iphone to using an ipad or laptop with 3g service to answer emails. I won't be so readily available without a device I can fit in my pocket and carry around. I've gotten pretty good at using siri to get the typing done. Sure, an ipad has dictation but it is not small enough to carry in my pocket and using the web browser to answer emails with an iphone is not easy--nearly impossible in my opinion. Especially when you consider the amount of emails I do on a daily basis.

I'm in no way complaining. I will do what I have to do. I just like to know why you suggest this and how it will help if you don't mind.

Also, thanks for the tip on the scanner. Although, I do not believe they are currently in my computers at the moment. I very carefully removed all of the wireless cards within them and have cleanly formatted my machines. I've also changed the ip address on my business network prior too doing the format, and since I haven't been answering emails on the computers I can't imagine how they'd find their way in. I only use the computers for developing and building my websites and software.

I will however, do the scan anyway just to be sure.

Thanks a bunch.

I doubt these guys are all that good. There is something else that has to be going on. If you are using fully patched systems with a decent (upgraded) firewall, antivirus, etc; there is a doubt in my mind that they are able to find vulnerabilities or 0-day. Of course if they are somehow getting on your network (use a long, complex password and disable WPS and test with reaver to make sure it's still not vulnerable to that type of attack.), then DNS spoofing you to their evil site where you click a java applet to run.

That being said, dont use IE lol. There was just a metasploit 0-day released for it.

As I've mentioned, there has to be something else to the equation.

Link to comment
Share on other sites

Most professionals have ethics. I know a lot of pen testers and they would not harass someone like you are describing.

If they do have access to your system somehow, the trusted app password is all they would need to get into your email.

I doubt these guys are all that good. There is something else that has to be going on. If you are using fully patched systems with a decent (upgraded) firewall, antivirus, etc; there is a doubt in my mind that they are able to find vulnerabilities or 0-day. Of course if they are somehow getting on your network (use a long, complex password and disable WPS and test with reaver to make sure it's still not vulnerable to that type of attack.), then DNS spoofing you to their evil site where you click a java applet to run.

That being said, dont use IE lol. There was just a metasploit 0-day released for it.

As I've mentioned, there has to be something else to the equation.

I'm glad you said "most" professionals have ethics, because not all of them do, obviously.

Oh, and as far as I know--once a trusted app password has been used it cannot be used on another device. So, I'm not sure that is the answer. Also, I did explain that I took wifi out of the equation, so wps couldn't be the problem. I also explained that I have been using mostly apple in my business. There were few times that I used a windows machine. Mainly to change the ip on my cable modem by changing the mac address for my router during one of my many formattings of my systems, and the windows machine that I did use was cleanly formatted as well.

You must keep in mind that I am not a security professional, and catching me and getting me stuck in the snare was not all that difficult. What is difficult is getting out of the snare. For a while I did have my computers on wifi, and was answering emails on my computers, and had java installed. I had found key loggers calling home using little snitch, noticed my flash plugin being downgraded, remote login being turned on, remote management being turned on, os x's firewall being turned off. It wasn't until I started doing my emails on my iphone that I noticed the described delay in receiving emails, and the computer problems stopped after a change in my ip and formatting of my computers and switching to a wired only router.

I am not here posting this question because I am just paranoid. I am paranoid with good reason and asking for genuine help. I understand that you say you don't think these guys are that good but when I was talking with the culprit and the friend status changed from friend to enemy I was told that they are professionals and that this could go on for years (and I didn't believe him when he told me). Yet, I have had my work undone and thrown away for a long time now and I'm tired of it. Which is why I've reached out in a forum like this.

I really need help in a more concrete form. Someone whom is willing to get "paranoid" with me so that I can find some assurance that I'm doing everything I can and is needed to keep these guys out.

Link to comment
Share on other sites

run...RUN..RUN

In all seriousness, document what you beleive to be a break in, get photos of perps in front o fyour house, plates, etc, get a lawyer, and go to the authorities. Don't come to a forum, for legal advice, seek real help, and then have yoru lawyer help you get a forensices expert to assist if you know for sure it is a targetted attack from someone you know or competitor. For all we know, you just got a really nasty virus.

Edited by digip
Link to comment
Share on other sites

run...RUN..RUN

In all seriousness, document what you beleive to be a break in, get photos of perps in front o fyour house, plates, etc, get a lawyer, and go to the authorities. Don't come to a forum, for legal advice, seek real help, and then have yoru lawyer help you get a forensices expert to assist if you know for sure it is a targetted attack from someone you know or competitor. For all we know, you just got a really nasty virus.

I'm sorry but I find this reply absurd.

I did not come to this forum for legal advice. I came to this forum looking for a penetration tester.

If you take the time out to read my postings you will see that I have contacted the authorities.

It might also be beneficial to know that I do have an attorney. It has cost a lot of money.

Nothing has completely stopped them as of yet.

Edited by exploited
Link to comment
Share on other sites

I'm sorry but I find this reply absurd.

I did not come to this forum for legal advice. I came to this forum looking for a penetration tester.

If you take the time out to read my postings you will see that I have contacted the authorities.

It might also be beneficial to know that I do have an attorney. It has cost a lot of money.

Nothing has completely stopped them as of yet.

What do you think a penetration test is going to show you? Because most good penetration testers, if they are hired to break into your system, will and can, doesn't mean thats how they perps got in if at all. What do you want from this is the bottom line? If they were/are in your system FOR TWO YEARS, a computer forensics expert should be able to find evidence of this, and distinguish between a true break in, or some form of malware in your computer(s), or the both if planted by someone. This is a hobbyist hacker forum. Not saying we don't have talented people here(there are a shit ton of talented people on here whom I deeply respect - just throwing that out there) but if you truly are looking for help, I think you are going about it in the wrong manner. There are businesses that do this kind of thing for a living, and without physical access to your machines, not sure what you are going to see from here.

These are not easy things to fix, and I'm not saying that it can't be done from hiring someone off the internet, but you would still need someone to physically take all of your devices and analyze the ones you feel are compromised, and actually be there in person to have your equipment to do the work. Its not some simple remote scan of your system to say, oh, here is what happened and who is doing it. Alternatively if its been going on for 2 years, something is not right about that whole situation. I don;t know what you've done in those two years to try and mitigate the issue, or what you've done to try and gather evidence, but I would have by now, scrapped all equipment, and bought a new phone, computer, network setup, changed all passwords, etc.

If you connect remotely to a site for business, I don't doubt they could have compromised that as the entry point, so you need your host(if you do this online through a web site as well, etc) to have that checked as well. You need more evidence to prove its anything beyond paranoia or even just a virus that you may have been hit with, which is why I said, hire a forensic expert. They could have flashed your routers with rouge firmware, could be as simple as software you have that is infected and every new computer you use it on, brings back the problem. Who knows.

In he meantime, I would shutdown any equipment you believe to be compromised and not use it at all, so that everything on these devices, is kept in tact until someone can analyze them. I would do a search for "computer forensic services" with your zipcode or local, find someone in your area, and get them to your equipment to check your stuff for you. 2 years?? Sorry, but if you run a business that YOU KNOW has been compromised for two years and you have any customer data on these systems, I can see how that can be a reason you would lose business.

By the way, many people find my replies absurd, offensive, or down right rude. They don't like to hear the truth.

Nothing has completely stopped them as of yet.

Who is THEM?

Link to comment
Share on other sites

What do you think a penetration test is going to show you? Because most good penetration testers, if they are hired to break into your system, will and can, doesn't mean thats how they perps got in if at all. What do you want from this is the bottom line? If they were/are in your system FOR TWO YEARS, a computer forensics expert should be able to find evidence of this, and distinguish between a true break in, or some form of malware in your computer(s), or the both if planted by someone. This is a hobbyist hacker forum. Not saying we don't have talented people here(there are a shit ton of talented people on here whom I deeply respect - just throwing that out there) but if you truly are looking for help, I think you are going about it in the wrong manner. There are businesses that do this kind of thing for a living, and without physical access to your machines, not sure what you are going to see from here.

These are not easy things to fix, and I'm not saying that it can't be done from hiring someone off the internet, but you would still need someone to physically take all of your devices and analyze the ones you feel are compromised, and actually be there in person to have your equipment to do the work. Its not some simple remote scan of your system to say, oh, here is what happened and who is doing it. Alternatively if its been going on for 2 years, something is not right about that whole situation. I don;t know what you've done in those two years to try and mitigate the issue, or what you've done to try and gather evidence, but I would have by now, scrapped all equipment, and bought a new phone, computer, network setup, changed all passwords, etc.

If you connect remotely to a site for business, I don't doubt they could have compromised that as the entry point, so you need your host(if you do this online through a web site as well, etc) to have that checked as well. You need more evidence to prove its anything beyond paranoia or even just a virus that you may have been hit with, which is why I said, hire a forensic expert. They could have flashed your routers with rouge firmware, could be as simple as software you have that is infected and every new computer you use it on, brings back the problem. Who knows.

In he meantime, I would shutdown any equipment you believe to be compromised and not use it at all, so that everything on these devices, is kept in tact until someone can analyze them. I would do a search for "computer forensic services" with your zipcode or local, find someone in your area, and get them to your equipment to check your stuff for you. 2 years?? Sorry, but if you run a business that YOU KNOW has been compromised for two years and you have any customer data on these systems, I can see how that can be a reason you would lose business.

By the way, many people find my replies absurd, offensive, or down right rude. They don't like to hear the truth.

Who is THEM?

Look, I don't mind answering questions. In fact, I'd appreciate any help from anyone that is capable. However, this question only tells me that you've not read this thread, but this is clearly not a case where I don't like to hear the truth. It is a case of you "acting like you're reading the posts", but are not. Who them is, is answered in my second post.

Nevertheless, I appreciate the time you took to send this message. I was hoping I'd find a professional here, not just a hobbyist.

I will look elsewhere if nobody else replies but I do not have time for this kind of nonsense from you.

FYI:

I have all of the backups from every format I've ever done.

I have replaced telephones, but not changed numbers as they are important to the business.

Edited by exploited
Link to comment
Share on other sites

Look, I don't mind answering questions. In fact, I'd appreciate any help from anyone that is capable. However, this question only tells me that you've not read this thread, but this is clearly not a case where I don't like to hear the truth. It is a case of you "acting like you're reading the posts", but are not.

Nevertheless, I appreciate the time you took to send this message. I was hoping I'd find a professional here, not just a hobbyist.

I will look elsewhere if nobody else replies but I do not have time for this kind of nonsense from you.

I've read every thread. It only tells me you don't want to hear a solution. Forensic experts help and assist with court cases, can be "expert witnesses" in court, and GOOD LAWYERS will have contacts of people, if the lawyer practices law with specifics in regard to computer fraud, abuse, etc, and should be able to assist you with your problem. If your lawyer hasn't been able to help, time to find one that works in this nitch area of expertise.

These are people I know, who do just that(computer forensics, not lawyers). http://www.securenetworkinc.com/snt/contact-us/ They fly all over the country, to help businesses with problems you are describing. They do pentesting, phone and mobile device forensics, etc. I even happen to know some of the people who work there. Give them a call or send an email. I am serious. Describe to them everything you know about your situation and ask them about their forensics services. They deal with this sort of stuff, and also deal with, lets say, 3 letter government acronyms that require "experts" in this sort of thing that holds up in court. You want retribution, answers, and to be able to take the attacker(S) to court, give them a call.

Link to comment
Share on other sites

I've read every thread. It only tells me you don't want to hear a solution. Forensic experts help and assist with court cases, can be "expert witnesses" in court, and GOOD LAWYERS will have contacts of people, if the lawyer practices law with specifics in regard to computer fraud, abuse, etc, and should be able to assist you with your problem. If your lawyer hasn't been able to help, time to find one that works in this nitch area of expertise.

These are people I know, who do just that(computer forensics, not lawyers). http://www.securenetworkinc.com/snt/contact-us/ They fly all over the country, to help businesses with problems you are describing. They do pentesting, phone and mobile device forensics, etc. I even happen to know some of the people who work there. Give them a call or send an email. I am serious. Describe to them everything you know about your situation and ask them about their forensics services. They deal with this sort of stuff, and also deal with, lets say, 3 letter government acronyms that require "experts" in this sort of thing that holds up in court. You want retribution, answers, and to be able to take the attacker(S) to court, give them a call.

Thanks for the link, but I know how to search google.

My attorney is an expert in the field. However, with you being as sharp as you seem, you'd know that tracing this kind of thing back to the perp is nearly impossible. (this was stated in a previous post).

Retribution? Take the attackers to court? No, not interested. What interests me is closing the holes so that I can keep them out. I'd like to know how to safely and securely do emails. It's not as big a deal as you are thinking.

Have you priced "forensics expert companies"? They are not cheap, it is 15,000.00 to get them started, and that won't get the entire job done. The money being made is good, but I'd hate to keep spending it on this. I don't mind paying but I was looking for a smaller time expert as the companies want an arm and a leg to deal with the issues.

Link to comment
Share on other sites

Thanks for the link, but I know how to search google.

My attorney is an expert in the field. However, with you being as sharp as you seem, you'd know that tracing this kind of thing back to the perp is nearly impossible. (this was stated in a previous post).

Retribution? Take the attackers to court? No, not interested. What interests me is closing the holes so that I can keep them out. I'd like to know how to safely and securely do emails. It's not as big a deal as you are thinking.

Have you priced "forensics expert companies"? They are not cheap, it is 15,000.00 to get them started, and that won't get the entire job done. The money being made is good, but I'd hate to keep spending it on this. I don't mind paying but I was looking for a smaller time expert as the companies want an arm and a leg to deal with the issues.

Oh, so it isn't a matter of if they can do the job, its if you want to pay them what they want to charge?

I know what pentesters charge, and no, its not cheap. Neither are lawyers. You came to a "hacker" forum, where for the most part people on this one are honest, and ethical, but we have all kinds here as well too, and for your own protection, 1, never seek the kind of help you are asking from on a hacker forum where you don't personally know the people(hackers aren't criminals but criminals are crimianls and won't think twice about "assisting" you), 2, never seek it in IRC (for damn sure) unless you have friends or people you know and trust and 3, if people give you advice you don't want to hear, get a second opinion. if a Dr said you had a week to live, you damn sure better seek another Dr to get a second opinion. In my opinion, you need professional computer services, not some quick fix, or some 15yr old who will do the job for $100 or something. What kind of budget do you have? What are you truly looking to spend to fix a problem we don't even know exists at this point? (and no, I am not saying you are cheap or only want to pay $100 before you come back with some other reply).

I didn't just search for that link I sent you, I happen to know the company and what they do and would vouch for them, and they do it pretty damn well. No, they aren't cheap, but neither is what you are asking. Tracing this back to the real people isn't impossible, but is difficult if they are as good as you say, but if they are sitting in front of your house AND YOU KNOW THIS, I fail to see how this is hard to track down. You can set traps, logging, monitoring of the situation, and professionals would be able to assist in this.

Anyone else on the forums feel they can help this gentleman, perform a penetration test of his equipment for him and willing to fly/drive to his location to do so, for little to nothing if anything at all? This is partly sarcasm, but also a real question to EVERYONE on this forum who reads this thread, I want a serious answer from anyone willing to form an opinion on the thread and the problem at hand. Some people have already given some suggestions, but I'd like to hear what others truly think of the entire thing. Anyone who works in the field of pentesting or forensics care to take a stance on the topic, offer suggestions(and I know some of you on here do work in these fields for a living).

I may come across as a dick at times, but know that I am trying to help you too. I don't care for the most part what people think of me and never have, so that doesn't really bother me, what does bother me at times is when people are staring the answer in the face and don't like what that answer is. Life is hard, times are hard, no one has money, and no one wants to part with their hard earned cash for something that may be nothing at all. But we know nothing about you, the equipment, the business, the software, hardware, network setup, etc, etc, etc. No one can help you with no information. And I don't suggest spilling all of it here in the public either.

Link to comment
Share on other sites

Don't waste your breath digip, he's into some shady business deals or something, had a small convo with him in PM.

Dude, what you're asking for here is akin to someone going out and selling drugs, making a bunch of enemies, and then going to Brink's to ask for private security. No one is going to want to deal with you, and those that do are probably trying to take advantage of you.

Link to comment
Share on other sites

Oh, so it isn't a matter of if they can do the job, its if you want to pay them what they want to charge?

I know what pentesters charge, and no, its not cheap. Neither are lawyers. You came to a "hacker" forum, where for the most part people on this one are honest, and ethical, but we have all kinds here as well too, and for your own protection, 1, never seek the kind of help you are asking from on a hacker forum where you don't personally know the people(hackers aren't criminals but criminals are crimianls and won't think twice about "assisting" you), 2, never seek it in IRC (for damn sure) unless you have friends or people you know and trust and 3, if people give you advice you don't want to hear, get a second opinion. if a Dr said you had a week to live, you damn sure better seek another Dr to get a second opinion. In my opinion, you need professional computer services, not some quick fix, or some 15yr old who will do the job for $100 or something. What kind of budget do you have? What are you truly looking to spend to fix a problem we don't even know exists at this point? (and no, I am not saying you are cheap or only want to pay $100 before you come back with some other reply).

I didn't just search for that link I sent you, I happen to know the company and what they do and would vouch for them, and they do it pretty damn well. No, they aren't cheap, but neither is what you are asking. Tracing this back to the real people isn't impossible, but is difficult if they are as good as you say, but if they are sitting in front of your house AND YOU KNOW THIS, I fail to see how this is hard to track down. You can set traps, logging, monitoring of the situation, and professionals would be able to assist in this.

Anyone else on the forums feel they can help this gentleman, perform a penetration test of his equipment for him and willing to fly/drive to his location to do so, for little to nothing if anything at all? This is partly sarcasm, but also a real question to EVERYONE on this forum who reads this thread, I want a serious answer from anyone willing to form an opinion on the thread and the problem at hand. Some people have already given some suggestions, but I'd like to hear what others truly think of the entire thing. Anyone who works in the field of pentesting or forensics care to take a stance on the topic, offer suggestions(and I know some of you on here do work in these fields for a living).

I may come across as a dick at times, but know that I am trying to help you too. I don't care for the most part what people think of me and never have, so that doesn't really bother me, what does bother me at times is when people are staring the answer in the face and don't like what that answer is. Life is hard, times are hard, no one has money, and no one wants to part with their hard earned cash for something that may be nothing at all. But we know nothing about you, the equipment, the business, the software, hardware, network setup, etc, etc, etc. No one can help you with no information. And I don't suggest spilling all of it here in the public either.

You are an interesting person and this post makes a lot of sense. Although, it is not really helpful, as I needed someone to contact me privately to discuss what was needed.

I do think you are a bit of a blow hole, and that you didn't thoroughly read my postings as questions were asked that were already answered. However, I did notice that your postings became much more elaborate as I pointed these issues out. Which only tells me that you're trying to protect your reputation in these forums.

Nevertheless, this posting is actually off topic and a slight reiteration of what I've been asking for with your twist on words.

Thanks for the replies, I appreciate them and learned a little.

You are a real HOOT, sir or ma'am!

Link to comment
Share on other sites

Don't waste your breath digip, he's into some shady business deals or something, had a small convo with him in PM.

Dude, what you're asking for here is akin to someone going out and selling drugs, making a bunch of enemies, and then going to Brink's to ask for private security. No one is going to want to deal with you, and those that do are probably trying to take advantage of you.

That is not true. Just because I was not willing to tell you the type of business I am in after exchanging only a few private messages doesn't mean my business is shady, or that I've made enemies, and I don't appreciate you trying to hijack the thread with this type of nonsense.

I run a legitimate business. I pay my taxes, have a business bank account, and run a professional organization.

Edited by exploited
Link to comment
Share on other sites

John Gotti used to say that too.

I am not John Gotti, nor do I see the correlation.

How narrow minded of you to think this way. Especially after the short conversation we had. I would think that you would understand that a relationship would need to be formed before disclosing information about the business.

Being in business within a "niche market" does not mean shady business.

You should take some time out to understand others perspectives before forming an opinion like that.

The business I am in does in fact help people.

Link to comment
Share on other sites

Closed. Nothing constructive is happening here. If people are messing with your business, take legal action and use lawyer resources for handling the situation.

We are a community of vast knowledge and (as far as I know) nobody has the grounds to give you legal advise. Handling things outside of a lawyer paper trail for your business, will most likely not end well for your business.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...