READERS

25 Dec 2012

Detecting the Fakes in an Online World of Femdom



Every day I am confronted by friends, acquaintances and those recommended to seek Me out with questions regarding a person (or people) that they feel may be perpetrating a scam against them. I don't mean the common E-Mail scams (such as “Viagra Cheep” or “Lose 40 pounds by Summer”) but the much more insidious scam involving the creation of one or more fake personalities. The scammer then uses the pseudo-persona's to deceive, hurt or abuse their victim or victims.

Because the internet offers so many easy ways to hide, to become someone fake, or to even impersonate a whole group of people, it is often very difficult for those that are not “Net Savvy” to detect and defend themselves against such scams. The purpose of this page will be to help those needing general info .. or just wanting a little more knowledge .. to recognize the common scams before they can become dangerous or injurious.

Common Techniques

Before we can get into how to recognize a scam, we should review the most common tricks that scammers use. We will explain what makes a person “Real” and how scammers use the various Internet programs to appear real.

Email Accounts

The popular “Portal Sites” (such as Yahoo, MSN, Google, etc.) all offer free or low-cost E-Mail accounts these days. In recent years they have all taken steps to prevent automated systems (such as those used by Spammers) from signing up for these accounts. However they do allow a single person to create multiple accounts with no trouble. This is a common “exploit” (or trick) used by the fakes. They will create one or more fake E-Mail accounts and then flesh them out with personal details to make it appear that each account belongs to a separate person. Fortunately for us, the big-name E-Mail services store information in every message sent that can help us narrow down the real sender and detect when one person is sending out E-Mail under multiple different names. A little further down, I will show how to find and use that information.

Chat Names

We all use various Internet Chat programs (or “Instant Messengers”) these days. Fakes will routinely use the various bogus E-Mail accounts they've created to create companion Chat Names (or “handles”). While it is possible to have multiple handles on any one computer, it is generally not possible to log in to more than one at a time. This is important to remember since it requires a faker to log out of one handle before logging in to another.

However, since the faker can run many different chat programs at once (and most of us do have more than one program installed), they will sometimes have different handles for each type of chat program. This is also important to note. Because most of us do have handles for many different chat programs, someone that only has one program installed and refuses to (or claims to not be able to) install another chat program may be suspicious.

Chat Profiles and Pictures

Most (if not all) of the common programs allow the user to fill out information about themselves. This information is called the “Profile”. Most fakes will take extra care to put real sounding info in the Profile as a way to lend credibility to their fictitious persona. But the problem is they can't use a “real photo”, so they will borrow one from the Internet or leave it blank. Be extra cautious of anyone who uses a “commercial grade” photo in their profile. While it does not necessarily mean they are a fake, if the photo isn't a real person (usually taken with a webcam or digital cam) then your level of caution should be a bit higher.

Also make note of their geographic location in the profile. If not listed there (and it often isn't for basic 'net security reasons) then be sure to find that out during your conversations with them. Fakes that create more than one persona will often scatter them around the world or the country … and that bit of fabrication will help you “out” them a little later on.

Pictures Sent Via E-Mail or IM

Fakers will often need to (or want to) send pictures of “themselves” in order to prove their existence and reality. However, as with Profiles, they must find a source for the pictures they send out. Fortunately for us, most commercial sources (and many picture sites) will “watermark” or put digital information into their pictures that indicate the true source. Fakers can't easily remove this information and thus it will be visible to you after you receive the picture. All you need to know is how to look at it and what it means.

If the Faker sends a picture file as an attachment to an E-Mail, you should also keep the E-Mail for use in determining the real origin. The information stored in the “Headers” can be compared with those in E-Mails from other people to determine if they are indeed from separate computers and regions, or in fact from the same one.

Internet “Connections” During a Chat

Most chat programs will create a “connection” between the two computers engaged in a chat. While the connection may be only temporary and exist just when the chat starts, certain types of chat activities (such as sending files or viewing a webcam) can establish a connection that lasts much longer. On computers running Window 2000 and Windows XP, there are programs you can use to list all the connections, both the “IP Address” (similar to a street address) and the “Port” (similar to an apartment number). While the program and function you are using controls the Port, the IP Address can help you determine the other person's general location, or at least let you determine if it is the same as another persona in the Faker's “community”.

The Nitty-Gritty Techno Babble Stuff

Now that we have a general idea of what sort of things can expose a faker, it's time to get into the dirty details of how to get the information we need. Primarily the data comes from a few different sources and types:

1.IP Address - The unique address (or location) on the Internet assigned to every computer.
2.E-Mail Headers - The digital fingerprint of every computer that an E-Mail passed thru on its way to you, and the fingerprint of the true sender.
3.Digital Signatures or Watermarks - The digital numbers stored inside a picture or document file that indicates its true source.
The following will discuss some simple ways to find the information you need, how to interpret it (or websites that can interpret it for you) and other details you might like to know about what it all means.

IP Address - Where Are You Really?

Every computer that talks on the Internet has a unique address called its “IP Address”. Different Internet Service Providers (or ISPs) have blocks of addresses that they use for their customers. Often times the IP Address can even identify a general location too. A Faker that has more than one bogus persona may remember to log into the right account, but they seldom if ever can change their IP Address too. Thus the IP Address can be compared between two “people” to see if they are in fact the same person (or at least using the same computer). Some programs (such as IRC chat sites and programs) convert the IP Address into a unique “Ident”; thus while you may not know the exact IP Address, you can at least be sure that two people with the same Ident are in fact using the same computer.

Techno-Geek Note: Some ISPs (such as AOL dial-up) use “connection farms” that totally obscure the origination IP Address. However, since Fakers often do not disconnect and reconnect when switching persona, you can usually find the same IP Address from two of their persona. Techno-Geek Note 2: The more savvy will notice that there are cases where the same IP Address will be shown for two different computers. The most common reason for this is home-based networks where a “Router” is used. However, if the same IP Address shows up for two people who claim to be miles or continents apart, it's a safe bet they are fakes and liars.

Turning an IP Address Into a Location

Finding the real location of an IP Address is not such a simple thing. While there are special databases that convert an IP Address to an Internet Name and vice versa (the so-called “DNS” process), there isn't an “official” database to find the location of a specific IP Address. However there are a few companies that have created their own databases … and they even provide access to them over the Internet. Some of them even provide free access to their database (but on a limited basis though). One of the databases that I use periodically is from a company called www.IP2Location.com . When you open the website you will see a list of the services and products they offer along the left-hand edge.

Near the bottom of that list is a section called “Free Resources”. Their main page also includes a “Live Product Demo” section on the upper right-hand side as shown to the left.

Note that “your” IP Address is automatically filled in for you when you open their website. You can highlight the entry and replace it with any IP Address you desire, then press the “Find Location” button to view the location information they have on file. When I clicked the button, the results I received are shown here:

IP Address Country Region City Latitude/Longitude ZIP Code Time Zone *deleted for site safety* AUSTRALIA Victoria Melbourne 35.283-149.217 - *edited*

Net SpeedISP Domain

CCADIALPOOLS2-CCCONNECT.NET.AU
it shows that I live in Australia, that my Internet Service Provider (ISP) is CCADIALPOOLS2-CCCONNECT.NET.AU and that my Time Zone is +10 hours GMT (“Greenwich Mean Time”; the universal home base of Internet Time services).I have deleted some of my details for site safety. Right here is all the information you need to determine approximately where I live. If I had been telling you that I actually lived in Minnesota USA (for example), this one test would prove to you that I'm lying thru my teeth. Clearly I am not in Minnesota, USA, I live in Victoria, Australia. (Or at least I am connected to the Internet from Australia. But since most fakes are cheapskates and freeloaders too, it's a safe bet they are not making tons of long distance calls to other states or countries just to disguise their real location.)

Techno-Geek Note: As can be seen from the example above, the actual physical address of an IP Address does not absolutely pin down a house address. You cannot use an IP Address to find someone's house, workplace or other highly accurate location. The best you can do is narrow it down to a region of the country or world. So if you're concerned that your IP Address will lead stalkers to your house, don't be. Bad guys can no more find your home address from your IP Address than you can.

Let's do another example test. Suppose we find the IP Address of 207.46.248.67 for someone that we often chat with. (The IP Address is actually that of a Microsoft E-Mail server, but this is just an example.) After you do your first “Find Location”, the page where the results are shown will include an entry box and some brief instructions on how to perform another test (as shown below).

The results I received for our test IP Address are shown here:

IP Address Country Region City Latitude/ Longitude ZIP CodeTime Zone 207.46.248.67 UNITED STATES WASHINGTON REDMOND 47.6738 -122.089 98052 edited due to publish time

So now we have a handy (and free) tool to help us locate the real location of someone, once we have their IP Address.

Finding a Location from E-Mail Headers

One of the best resources provided by IP2Location is a tool that uses their database and some nifty programming to analyze the headers of an E-Mail message. this service is free and easy to access; simply click the “IP2Location™ Email Header Tracer (Free)” button. At the top of the page you will see some brief instructions on what to do as well as links to specific instructions on how to find the E-Mail Headers for some of the more common E-Mail services

I use Microsoft normally, but I also use Yahoo and gmaill as well. Just remember that the techniques you will use to find the E-Mail Headers depend on YOUR E-Mail service and not those of the person that sent you the message.

There are a lot of cryptic computer details included in the headers, but you needn't worry; the IP2Location tool will figure out which of the header lines it needs and ignore all the rest.

Very Important Note: The last entry is of no significance to you; it shows the E-Mail server that you use and will almost always be the same. It does not show any useful information about the sender. Only the first entry shown above contains that information.

In the case of the email, I just last checked there is only one E-Mail Server “fingerprint” in the message headers. This is because Spammers often send their crap directly to your E-Mail server in hopes that their real location won't be visible. Of course, they are stupid because such tricks not only uncover their true IP Address, but also identifies the E-Mail message as “bulk”; a trait easily identifiable by Spam scanner and protection programs.

Picture and Image Files

One of the common problems that fakes encounter is the need to put a face on the “people” they create. Since they obviously cannot use their own pictures, they will often “mine” the Internet looking for pictures that they can use. Sometimes you can spot the fakes just by the pictures they provide; for example if the people or places don't match from picture to picture. However sometimes you have to dig a bit deeper.

Techno-Geek Note: You should NEVER accept files of ANY kind from someone you don't know unless you are very well protected by good antivirus software and you know how to use it properly. IMPORTANT WARNING: Always, always, ALWAYS check the full name of the file you've received. A lot of evil wicked people will send you a file claiming it is a picture when in fact it is a program that can harm your computer (or worse yet, allow them to spy on your computer). Before opening ANY file you received, scan it with a good antivirus program first and then double-check the file name by right-clicking on the file and choosing “Properties”. If you see a lot of spaces in the name, usually followed by ”.EXE” or ”.COM”, then delete the file and immediately cease communication with the sender.

Techno-Tools for digging deeper

Many times you will have to look “inside” a file to find out its true source. Two of the better of these free file viewers is called “V” and is available from www.FileViewer.com the other is www.Irfanview.com If you don't have one of these programs and feel they might be too difficult for you to operate, then by all means find someone you can trust that is able to help you dig some.

EXIF Data - The Extended Information Details

Most digital cameras and many of the picture editing programs available today will add additional details to any image file they create. This information, called the Extended Information (or EXIF data) is stored in the data bytes of the image file itself. Using a file viewer (such as “V”) you can easily find this data and possibly learn a bit more about how the picture originated and when it was taken.

You can see the name of the manufacturer and the model number of the camera itself When you receive a number of pictures from a faker and they claim they are all taken using their own camera, compare the EXIF data from each image file to make sure they really do all come from the same camera. If they don't match, or if some have the EXIF block and some don't, be prepared to ask more detailed questions and listen closely to the answers.

We've all heard this one “I just took this for you with my digital camera” This can be very useful statement when someone makes this claim… check are the date and time or are they from days, months or even years ago. Once again, you've caught them in a lie; a good reason to run away as fast as you can.

Copyright Notices in the EXIF Data

Most commercial photography studios and services will also add a Copyright Notice to the EXIF data in their image files. If you see such a notice in any of the images you receive from someone, be sure to ask them why they are distributing copyrighted works under false pretenses. Chances are pretty good they will be the ones to cut off communication … and quickly too.

Chat Handles - The Superman/Clark Kent/ ~wonderwoman/ Diana Prince Conflict

As mentioned earlier, Instant Messenger programs (such as Yahoo, MSN and AIM) allow you to have only one login active at a time. This fact can be especially important when you suspect someone may be using the programs to impersonate two or more people.

Let's assume that you have two of their pseudo-people on your Yahoo. You've probably spoken to both of them at some time or other, but you've never been able to find them both online at the same time. This is because the faker must sign out of one handle and then sign into the other handle in order to chat. Just like no one ever sees Superman and Clark Kent together or at the same time, you will never find both fake people available at the same time either. So how do you use this information? Or better still, what can you do to prove or disprove your suspicions? Simple.

Whenever you are talking to Person A, also open a chat box with Person B and leave them a message that sounds critical or interesting enough to get their attention immediately. It can be especially telling if you use something like “I just found out something really scary about Person A and I need to ask you something right away.” If you don't hear from Person B until after Person A logs out, and then you immediately hear from Person B … well guess what, A=B.

Conclusions

It can be very hurtful to find out you've been deceived by someone. Whether the deceit is in person or on the Internet, the common reaction is to blame yourself in some fashion. However, you must keep in mind that most fakers have honed their skills over many years and many lies. They become expert at what they do and how they do it. Even the best and most paranoid among us has, at one time or other, been duped by a faker. Do not be ashamed. Just take your lumps, learn to be a bit more skeptical, and then get back to living your life in a decent honest way.

If you spot a fake, or if you are suspicious that someone may be “less than honest” about who they really are, do not hesitate to call on other friends and have them help you corner the liar. Because fakes are habitual liars, they will often tell slightly altered versions (or sometimes wildly different versions) of their story to other people. This allows you to compare notes with your friends and hopefully catch the liar red-handed.

And always remember the three basic rules of Internet Chatting:

·Be Cautious and Reasonable - Listen carefully to the stories you hear, take everything with a grain of salt, and try to remain reasonable in your suspicions.
.Never Trust Anyone with Your Money - Never give out money, bank account or credit card information, or any financial details to anyone you cannot touch (and if necessary beat upside the head ).
·Live and Learn - When you find you have been deceived, take your lumps, get on with your life and go into the next experience a little wiser and a little better prepared to protect yourself and your feelings.
Hopefully the above information will help you and others around you stay safe and secure while still having fun and finding happiness in your lives. If you know of someone that could use this information, do not hesitate to pass it along. If at all possible, find a local “computer geek” that you can trust and that can help you understand some of the deeper technical issues you may encounter. And above all else, be ready to forgive. Forgive yourself and forgive others, because carrying anger and spite inside you will never solve any problems.

5 Dec 2012

A scenario...from 'ASH'


It is late afternoon.
I am slowly making my way up the stone stairs to meet the one and only true mistress, Lady Leyla. Just outside the dungeon door, I stop and nervously look around, searching for people who can see me. No-one, good, but in the heart of hearts a bit disappointed. 
The weatherman says it is 2 degrees when I start to take out my jacket. I remove my shoes and socks balancing only on one leg. Now is the dreaded part. Slowly I unbutton my shirt to show a black bra underneath. 
Next I remove my pants to reveal a pair of girlie panties and black stockings. The cold breeze and the excitement is having its effect on me. I am shivering from head to toe. I carefully fold all the clothes and put it on the side. then kneeling in front of the door, in the full present position, I wait for Mistress. it may have been only 5 mins, but felt like an eternity. 
You open the door and look pleased. slowly kicking me on my balls, you order "Come in slut. you have a long day ahead!"

28 Nov 2012

Book Review: The Submissive Activity Book


By lunaKM on March 3, 2010


In January I had a poll in the sidebar asking readers like you what books you’d like to see me review for Submissive Guide. The overwhelming response was that you wanted me to review The Submissive Activity Book: Building Blocks To Better Service by Shannon Reilly. I received the 184 page book without expectations of what I would find within its pages. No one has yet reviewed it on Amazon.

Flipping quickly through its pages it is first and foremost a workbook. There are pages and pages of forms for you to fill out to improve and learn the skills she puts forth in the book. According to Shannon the book was written for submissives not currently engaged in a D/s relationship that are looking to establish a structure in their lives that a Dominant normally would do. It is built to help the submissive learn and improve skills that a potential Dominant might desire.

The book is broken up into sections with activities towards different goals. From establishing a personal protocol with rewards and punishments, goal-setting, schedule making and planning, learning new skills and furthering education as well as budgeting and learning personal finance. The book’s second half has helpers for the submissive in understanding their wants and needs, how to negotiate and establishing limits.

Before each activity form there is a summary of what the activity is supposed to do for you and how it might help you grow. They are well thought out, but leave a lot to self exploration. The number of copies of each workbook activity are sometimes excessive in my opinion and the author encourages the purchase of her companion book to get more blank copies of the forms. In today’s technology age, I would have rather had one copy of each activity page; I can always make copies if necessary. I don’t think the companion book is really needed at all.

My favourite activity section is the personal protocol. Shannon describes this section as a way to feel accountable for your actions even if you aren’t in a relationship. She walks you through behaviours you would want to encourage and discourage as well as a punishment and reward system that you manage yourself to keep your new behaviours in check.  For those submissives with a real desire to control and change their lives this is a valuable section.

I dislike the wasted pages that are used for a calendar. While I can understand that the section is about planning and scheduling, I would rather encourage the submissive to get a schedule book that is small enough to carry around with them in their handbag or shoulder bag.  This way the activity wouldn’t involve either carrying the book everywhere or tearing out the pages. Again this would be a good place to encourage them to make copies of the pages they desire to use instead of giving them an entire year’s worth of calendar pages.

Honestly though, this book is very much in keeping with the purpose of this website and I’d recommend it for those of you who want to experience structure and start working towards your perfect self without a Dominant. You will then be able to enter into a relationship with more preparedness and your personal value may be higher.


The Submissive Activity Book

Paperback: 184 pages
Publisher: CreateSpace (February 22, 2008)
Language: English
ISBN-10: 1440470499
ISBN-13: 978-1440470493

27 Nov 2012

Book Review: Where I Am Led: A Service Exploration Workbook


By lunaKM on May 30, 2012 

 I’ve been hanging on to a fantastic book for review for over a year now because according to all book sellers it is out of print. I would hate to give a review, especially the glowing review this book gets from me, and then you not able to buy it yourself. But, luckily, I found a second edition that is in print! It doesn’t have the same title which is why it took me so long to connect the two, but when I did I was thrilled and you will be too.

The book I’m talking about is “The Path of Service – Guideposts for Excellence” by Christina “slavette” Parker. It has been out of print for years and if you go to the Amazon.com page for this book you can buy a used copy for over $200 right now. But don’t do that. I have a much better solution.

Buy the 2nd edition. Trust me on this, it is well worth it.

Where I am Led: A Service Exploration Workbook is the 2nd edition of the aforementioned book. On the Amazon page it says it’s the 2nd edition of the book that I coveted for a year but I didn’t know until I opened it up and read the introduction to the book. I about squealed with joy. I could now share with you a book that has value to my submission and I knew that it would help you as well.

It is a workbook, and it written in a way that you have space to write in your thoughts to the tasks, questions and projects that you find throughout the book. I’ve reviewed a workbook in the past, but this one is definitely more useful in the organization, inspiration and personal growth potential. Here’s what it has in store for you.

Monthly ProjectsWeekly Writing AssignmentsTwice Weekly Prompts and QuotesThoughts and General Advice

It’s organized quite well and I haven’t found a single page that isn’t worth my time and energy to think about.  You definitely want to read the “How to Use this Book” section at the beginning because it has useful tips for how to get started and to use the book successfully. You can do this book alone or with your Dominant. I even know of several submissives that are working through the book together.

If you only do one thing that I ask from you on this site, please do yourself a favor and buy this book. Where I am Led is an excellent personal growth tool for the submissive arsenal.
Product Details


Where I Am Led: A Service Exploration Workbook
Paperback: 190 pages
Publisher: Alfred Press (October 7, 2009)
Language: English
ISBN-10: 0578035952
ISBN-13: 978-0578035956

Practice makes perfect

Resulting form the lack of effectiveness in work while wearing shackles, I did promise Mistress to practice more at home when I have time an...