Welcome to Mistress Leyla’s Blog Here you’ll find in-depth articles to help create a real BDSM lifestyle. Obedience, submission and loyalty essential requirements.
READERS
25 Dec 2012
10 Questions & Answers about BDSM
This summary is not available. Please
click here to view the post.
Detecting the Fakes in an Online World of Femdom
Courtesy of: MissBonnie © collarncuffs.com
Every day I am confronted by friends, acquaintances and
those recommended to seek Me out with questions regarding a person (or people)
that they feel may be perpetrating a scam against them. I don't mean the common
E-Mail scams (such as “Viagra Cheep” or “Lose 40 pounds by Summer”) but the
much more insidious scam involving the creation of one or more fake
personalities. The scammer then uses the pseudo-persona's to deceive, hurt or
abuse their victim or victims.
Because the internet offers so many easy ways to hide, to
become someone fake, or to even impersonate a whole group of people, it is
often very difficult for those that are not “Net Savvy” to detect and defend
themselves against such scams. The purpose of this page will be to help those
needing general info .. or just wanting a little more knowledge .. to recognize
the common scams before they can become dangerous or injurious.
Common Techniques
Before we can get into how to recognize a scam, we should review
the most common tricks that scammers use. We will explain what makes a person
“Real” and how scammers use the various Internet programs to appear real.
Email Accounts
The popular “Portal Sites” (such as Yahoo, MSN, Google,
etc.) all offer free or low-cost E-Mail accounts these days. In recent years
they have all taken steps to prevent automated systems (such as those used by
Spammers) from signing up for these accounts. However they do allow a single
person to create multiple accounts with no trouble. This is a common “exploit”
(or trick) used by the fakes. They will create one or more fake E-Mail accounts
and then flesh them out with personal details to make it appear that each
account belongs to a separate person. Fortunately for us, the big-name E-Mail
services store information in every message sent that can help us narrow down
the real sender and detect when one person is sending out E-Mail under multiple
different names. A little further down, I will show how to find and use that
information.
Chat Names
We all use various Internet Chat programs (or “Instant
Messengers”) these days. Fakes will routinely use the various bogus E-Mail
accounts they've created to create companion Chat Names (or “handles”). While
it is possible to have multiple handles on any one computer, it is generally
not possible to log in to more than one at a time. This is important to
remember since it requires a faker to log out of one handle before logging in
to another.
However, since the faker can run many different chat programs
at once (and most of us do have more than one program installed), they will
sometimes have different handles for each type of chat program. This is also
important to note. Because most of us do have handles for many different chat
programs, someone that only has one program installed and refuses to (or claims
to not be able to) install another chat program may be suspicious.
Chat Profiles and Pictures
Most (if not all) of the common programs allow the user to
fill out information about themselves. This information is called the
“Profile”. Most fakes will take extra care to put real sounding info in the
Profile as a way to lend credibility to their fictitious persona. But the
problem is they can't use a “real photo”, so they will borrow one from the
Internet or leave it blank. Be extra cautious of anyone who uses a “commercial
grade” photo in their profile. While it does not necessarily mean they are a
fake, if the photo isn't a real person (usually taken with a webcam or digital
cam) then your level of caution should be a bit higher.
Also make note of their geographic location in the profile.
If not listed there (and it often isn't for basic 'net security reasons) then
be sure to find that out during your conversations with them. Fakes that create
more than one persona will often scatter them around the world or the country …
and that bit of fabrication will help you “out” them a little later on.
Pictures Sent Via E-Mail or IM
Fakers will often need to (or want to) send pictures of
“themselves” in order to prove their existence and reality. However, as with
Profiles, they must find a source for the pictures they send out. Fortunately
for us, most commercial sources (and many picture sites) will “watermark” or
put digital information into their pictures that indicate the true source.
Fakers can't easily remove this information and thus it will be visible to you
after you receive the picture. All you need to know is how to look at it and
what it means.
If the Faker sends a picture file as an attachment to an
E-Mail, you should also keep the E-Mail for use in determining the real origin.
The information stored in the “Headers” can be compared with those in E-Mails
from other people to determine if they are indeed from separate computers and
regions, or in fact from the same one.
Internet “Connections” During a Chat
Most chat programs will create a “connection” between the
two computers engaged in a chat. While the connection may be only temporary and
exist just when the chat starts, certain types of chat activities (such as
sending files or viewing a webcam) can establish a connection that lasts much
longer. On computers running Window 2000 and Windows XP, there are programs you
can use to list all the connections, both the “IP Address” (similar to a street
address) and the “Port” (similar to an apartment number). While the program and
function you are using controls the Port, the IP Address can help you determine
the other person's general location, or at least let you determine if it is the
same as another persona in the Faker's “community”.
The Nitty-Gritty Techno Babble Stuff
Now that we have a general idea of what sort of things can
expose a faker, it's time to get into the dirty details of how to get the
information we need. Primarily the data comes from a few different sources and
types:
1.IP Address - The unique address (or location) on the
Internet assigned to every computer.
2.E-Mail Headers - The digital fingerprint of every computer
that an E-Mail passed thru on its way to you, and the fingerprint of the true
sender.
3.Digital Signatures or Watermarks - The digital numbers
stored inside a picture or document file that indicates its true source.
The following will discuss some simple ways to find the
information you need, how to interpret it (or websites that can interpret it
for you) and other details you might like to know about what it all means.
IP Address - Where Are You Really?
Every computer that talks on the Internet has a unique
address called its “IP Address”. Different Internet Service Providers (or ISPs)
have blocks of addresses that they use for their customers. Often times the IP
Address can even identify a general location too. A Faker that has more than
one bogus persona may remember to log into the right account, but they seldom
if ever can change their IP Address too. Thus the IP Address can be compared
between two “people” to see if they are in fact the same person (or at least
using the same computer). Some programs (such as IRC chat sites and programs)
convert the IP Address into a unique “Ident”; thus while you may not know the
exact IP Address, you can at least be sure that two people with the same Ident
are in fact using the same computer.
Techno-Geek Note: Some ISPs (such as AOL dial-up) use
“connection farms” that totally obscure the origination IP Address. However,
since Fakers often do not disconnect and reconnect when switching persona, you
can usually find the same IP Address from two of their persona. Techno-Geek
Note 2: The more savvy will notice that there are cases where the same IP
Address will be shown for two different computers. The most common reason for
this is home-based networks where a “Router” is used. However, if the same IP
Address shows up for two people who claim to be miles or continents apart, it's
a safe bet they are fakes and liars.
Turning an IP Address Into a Location
Finding the real location of an IP Address is not such a
simple thing. While there are special databases that convert an IP Address to
an Internet Name and vice versa (the so-called “DNS” process), there isn't an
“official” database to find the location of a specific IP Address. However
there are a few companies that have created their own databases … and they even
provide access to them over the Internet. Some of them even provide free access
to their database (but on a limited basis though). One of the databases that I
use periodically is from a company called www.IP2Location.com . When you open
the website you will see a list of the services and products they offer along
the left-hand edge.
Near the bottom of that list is a section called “Free
Resources”. Their main page also includes a “Live Product Demo” section on the
upper right-hand side as shown to the left.
Note that “your” IP Address is automatically filled in for
you when you open their website. You can highlight the entry and replace it
with any IP Address you desire, then press the “Find Location” button to view
the location information they have on file. When I clicked the button, the
results I received are shown here:
IP Address Country Region City Latitude/Longitude ZIP Code Time
Zone *deleted for site safety* AUSTRALIA Victoria Melbourne 35.283-149.217 -
*edited*
Net SpeedISP Domain
CCADIALPOOLS2-CCCONNECT.NET.AU
it shows that I live in Australia, that my Internet Service
Provider (ISP) is CCADIALPOOLS2-CCCONNECT.NET.AU and that my Time Zone is +10
hours GMT (“Greenwich Mean Time”; the universal home base of Internet Time
services).I have deleted some of my details for site safety. Right here is all
the information you need to determine approximately where I live. If I had been
telling you that I actually lived in Minnesota USA (for example), this one test
would prove to you that I'm lying thru my teeth. Clearly I am not in Minnesota,
USA, I live in Victoria, Australia. (Or at least I am connected to the Internet
from Australia. But since most fakes are cheapskates and freeloaders too, it's
a safe bet they are not making tons of long distance calls to other states or
countries just to disguise their real location.)
Techno-Geek Note: As can be seen from the example above, the
actual physical address of an IP Address does not absolutely pin down a house
address. You cannot use an IP Address to find someone's house, workplace or
other highly accurate location. The best you can do is narrow it down to a
region of the country or world. So if you're concerned that your IP Address
will lead stalkers to your house, don't be. Bad guys can no more find your home
address from your IP Address than you can.
Let's do another example test. Suppose we find the IP
Address of 207.46.248.67 for someone that we often chat with. (The IP Address
is actually that of a Microsoft E-Mail server, but this is just an example.)
After you do your first “Find Location”, the page where the results are shown
will include an entry box and some brief instructions on how to perform another
test (as shown below).
The results I received for our test IP Address are shown
here:
IP Address Country Region City Latitude/ Longitude ZIP
CodeTime Zone 207.46.248.67 UNITED STATES WASHINGTON REDMOND 47.6738 -122.089
98052 edited due to publish time
So now we have a handy (and free) tool to help us locate the
real location of someone, once we have their IP Address.
Finding a Location from E-Mail Headers
One of the best resources provided by IP2Location is a tool
that uses their database and some nifty programming to analyze the headers of
an E-Mail message. this service is free and easy to access; simply click the
“IP2Location™ Email Header Tracer (Free)” button. At the top of the page you
will see some brief instructions on what to do as well as links to specific
instructions on how to find the E-Mail Headers for some of the more common
E-Mail services
I use Microsoft normally, but I also use Yahoo and gmaill as
well. Just remember that the techniques you will use to find the E-Mail Headers
depend on YOUR E-Mail service and not those of the person that sent you the
message.
There are a lot of cryptic computer details included in the
headers, but you needn't worry; the IP2Location tool will figure out which of
the header lines it needs and ignore all the rest.
Very Important Note: The last entry is of no significance to
you; it shows the E-Mail server that you use and will almost always be the
same. It does not show any useful information about the sender. Only the first
entry shown above contains that information.
In the case of the email, I just last checked there is only
one E-Mail Server “fingerprint” in the message headers. This is because
Spammers often send their crap directly to your E-Mail server in hopes that
their real location won't be visible. Of course, they are stupid because such
tricks not only uncover their true IP Address, but also identifies the E-Mail
message as “bulk”; a trait easily identifiable by Spam scanner and protection
programs.
Picture and Image Files
One of the common problems that fakes encounter is the need
to put a face on the “people” they create. Since they obviously cannot use
their own pictures, they will often “mine” the Internet looking for pictures
that they can use. Sometimes you can spot the fakes just by the pictures they
provide; for example if the people or places don't match from picture to
picture. However sometimes you have to dig a bit deeper.
Techno-Geek Note: You should NEVER accept files of ANY kind
from someone you don't know unless you are very well protected by good
antivirus software and you know how to use it properly. IMPORTANT WARNING:
Always, always, ALWAYS check the full name of the file you've received. A lot
of evil wicked people will send you a file claiming it is a picture when in
fact it is a program that can harm your computer (or worse yet, allow them to
spy on your computer). Before opening ANY file you received, scan it with a
good antivirus program first and then double-check the file name by
right-clicking on the file and choosing “Properties”. If you see a lot of
spaces in the name, usually followed by ”.EXE” or ”.COM”, then delete the file
and immediately cease communication with the sender.
Techno-Tools for digging deeper
Many times you will have to look “inside” a file to find out
its true source. Two of the better of these free file viewers is called “V” and
is available from www.FileViewer.com the other is www.Irfanview.com If you
don't have one of these programs and feel they might be too difficult for you
to operate, then by all means find someone you can trust that is able to help
you dig some.
EXIF Data - The Extended Information Details
Most digital cameras and many of the picture editing
programs available today will add additional details to any image file they
create. This information, called the Extended Information (or EXIF data) is
stored in the data bytes of the image file itself. Using a file viewer (such as
“V”) you can easily find this data and possibly learn a bit more about how the
picture originated and when it was taken.
You can see the name of the manufacturer and the model
number of the camera itself When you receive a number of pictures from a faker
and they claim they are all taken using their own camera, compare the EXIF data
from each image file to make sure they really do all come from the same camera.
If they don't match, or if some have the EXIF block and some don't, be prepared
to ask more detailed questions and listen closely to the answers.
We've all heard this one “I just took this for you with my
digital camera” This can be very useful statement when someone makes this
claim… check are the date and time or are they from days, months or even years
ago. Once again, you've caught them in a lie; a good reason to run away as fast
as you can.
Copyright Notices in the EXIF Data
Most commercial photography studios and services will also
add a Copyright Notice to the EXIF data in their image files. If you see such a
notice in any of the images you receive from someone, be sure to ask them why
they are distributing copyrighted works under false pretenses. Chances are
pretty good they will be the ones to cut off communication … and quickly too.
Chat Handles - The Superman/Clark Kent/ ~wonderwoman/ Diana
Prince Conflict
As mentioned earlier, Instant Messenger programs (such as
Yahoo, MSN and AIM) allow you to have only one login active at a time. This
fact can be especially important when you suspect someone may be using the
programs to impersonate two or more people.
Let's assume that you have two of their pseudo-people on
your Yahoo. You've probably spoken to both of them at some time or other, but
you've never been able to find them both online at the same time. This is
because the faker must sign out of one handle and then sign into the other
handle in order to chat. Just like no one ever sees Superman and Clark Kent
together or at the same time, you will never find both fake people available at
the same time either. So how do you use this information? Or better still, what
can you do to prove or disprove your suspicions? Simple.
Whenever you are talking to Person A, also open a chat box
with Person B and leave them a message that sounds critical or interesting
enough to get their attention immediately. It can be especially telling if you
use something like “I just found out something really scary about Person A and
I need to ask you something right away.” If you don't hear from Person B until
after Person A logs out, and then you immediately hear from Person B … well
guess what, A=B.
Conclusions
It can be very hurtful to find out you've been deceived by
someone. Whether the deceit is in person or on the Internet, the common
reaction is to blame yourself in some fashion. However, you must keep in mind
that most fakers have honed their skills over many years and many lies. They
become expert at what they do and how they do it. Even the best and most
paranoid among us has, at one time or other, been duped by a faker. Do not be
ashamed. Just take your lumps, learn to be a bit more skeptical, and then get
back to living your life in a decent honest way.
If you spot a fake, or if you are suspicious that someone
may be “less than honest” about who they really are, do not hesitate to call on
other friends and have them help you corner the liar. Because fakes are
habitual liars, they will often tell slightly altered versions (or sometimes
wildly different versions) of their story to other people. This allows you to
compare notes with your friends and hopefully catch the liar red-handed.
And always remember the three basic rules of Internet
Chatting:
·Be Cautious and Reasonable - Listen carefully to the
stories you hear, take everything with a grain of salt, and try to remain
reasonable in your suspicions.
.Never Trust Anyone with Your Money - Never give out money,
bank account or credit card information, or any financial details to anyone you
cannot touch (and if necessary beat upside the head ).
·Live and Learn - When you find you have been deceived, take
your lumps, get on with your life and go into the next experience a little
wiser and a little better prepared to protect yourself and your feelings.
Hopefully the above information will help you
and others around you stay safe and secure while still having fun and finding
happiness in your lives. If you know of someone that could use this
information, do not hesitate to pass it along. If at all possible, find a local
“computer geek” that you can trust and that can help you understand some of the
deeper technical issues you may encounter. And above all else, be ready to
forgive. Forgive yourself and forgive others, because carrying anger and spite
inside you will never solve any problems.
5 Dec 2012
A scenario...from 'ASH'
It is late afternoon.
I am slowly making my way up the stone
stairs to meet the one and only true mistress, Lady Leyla. Just outside the dungeon
door, I stop and nervously look around, searching for people who can see me.
No-one, good, but in the heart of hearts a bit disappointed.
The weatherman
says it is 2 degrees when I start to take out my jacket. I remove my shoes and
socks balancing only on one leg. Now is the dreaded part. Slowly I unbutton my
shirt to show a black bra underneath.
Next I remove my pants to reveal a pair
of girlie panties and black stockings. The cold breeze and the excitement is
having its effect on me. I am shivering from head to toe. I carefully fold all
the clothes and put it on the side. then kneeling in front of the door, in the
full present position, I wait for Mistress. it may have been only 5 mins, but
felt like an eternity.
You open the door and look pleased. slowly kicking me on
my balls, you order "Come in slut. you have a long day ahead!"
28 Nov 2012
Book Review: The Submissive Activity Book
By lunaKM on March 3, 2010
In January I had a poll in the sidebar asking readers like
you what books you’d like to see me review for Submissive Guide. The
overwhelming response was that you wanted me to review The Submissive Activity
Book: Building Blocks To Better Service by Shannon Reilly. I received the 184
page book without expectations of what I would find within its pages. No one
has yet reviewed it on Amazon.
Flipping quickly through its pages it is first and foremost
a workbook. There are pages and pages of forms for you to fill out to improve
and learn the skills she puts forth in the book. According to Shannon the book
was written for submissives not currently engaged in a D/s relationship that
are looking to establish a structure in their lives that a Dominant normally
would do. It is built to help the submissive learn and improve skills that a
potential Dominant might desire.
The book is broken up into sections with activities towards
different goals. From establishing a personal protocol with rewards and
punishments, goal-setting, schedule making and planning, learning new skills
and furthering education as well as budgeting and learning personal finance.
The book’s second half has helpers for the submissive in understanding their
wants and needs, how to negotiate and establishing limits.
Before each activity form there is a summary of what the
activity is supposed to do for you and how it might help you grow. They are
well thought out, but leave a lot to self exploration. The number of copies of
each workbook activity are sometimes excessive in my opinion and the author
encourages the purchase of her companion book to get more blank copies of the
forms. In today’s technology age, I would have rather had one copy of each
activity page; I can always make copies if necessary. I don’t think the
companion book is really needed at all.
My favourite activity section is the personal protocol.
Shannon describes this section as a way to feel accountable for your actions
even if you aren’t in a relationship. She walks you through behaviours you
would want to encourage and discourage as well as a punishment and reward
system that you manage yourself to keep your new behaviours in check. For those submissives with a real desire to
control and change their lives this is a valuable section.
I dislike the wasted pages that are used for a calendar. While
I can understand that the section is about planning and scheduling, I would
rather encourage the submissive to get a schedule book that is small enough to
carry around with them in their handbag or shoulder bag. This way the activity wouldn’t involve either
carrying the book everywhere or tearing out the pages. Again this would be a
good place to encourage them to make copies of the pages they desire to use
instead of giving them an entire year’s worth of calendar pages.
Honestly though, this book is very much in keeping with the
purpose of this website and I’d recommend it for those of you who want to
experience structure and start working towards your perfect self without a
Dominant. You will then be able to enter into a relationship with more preparedness
and your personal value may be higher.
The Submissive Activity Book
Paperback: 184 pages
Publisher: CreateSpace (February 22, 2008)
Language: English
ISBN-10: 1440470499
ISBN-13: 978-1440470493
27 Nov 2012
Book Review: Where I Am Led: A Service Exploration Workbook
By lunaKM on May 30, 2012
Courtesy OF: http://www.submissiveguide.com/2012/05/book-review-where-i-am-led-a-service-exploration-workbook/
The book I’m talking about is “The Path of Service – Guideposts for Excellence” by Christina “slavette” Parker. It has been out of print for years and if you go to the Amazon.com page for this book you can buy a used copy for over $200 right now. But don’t do that. I have a much better solution.
Buy the 2nd edition. Trust me on this, it is well worth it.
Where I am Led: A Service Exploration Workbook is the 2nd edition of the aforementioned book. On the Amazon page it says it’s the 2nd edition of the book that I coveted for a year but I didn’t know until I opened it up and read the introduction to the book. I about squealed with joy. I could now share with you a book that has value to my submission and I knew that it would help you as well.
It is a workbook, and it written in a way that you have space to write in your thoughts to the tasks, questions and projects that you find throughout the book. I’ve reviewed a workbook in the past, but this one is definitely more useful in the organization, inspiration and personal growth potential. Here’s what it has in store for you.
Monthly ProjectsWeekly Writing AssignmentsTwice Weekly Prompts and QuotesThoughts and General Advice
It’s organized quite well and I haven’t found a single page that isn’t worth my time and energy to think about. You definitely want to read the “How to Use this Book” section at the beginning because it has useful tips for how to get started and to use the book successfully. You can do this book alone or with your Dominant. I even know of several submissives that are working through the book together.
If you only do one thing that I ask from you on this site, please do yourself a favor and buy this book. Where I am Led is an excellent personal growth tool for the submissive arsenal.
Product Details
Where I Am Led: A Service Exploration Workbook
Paperback: 190 pages
Publisher: Alfred Press (October 7, 2009)
Language: English
ISBN-10: 0578035952
ISBN-13: 978-0578035956
13 Nov 2012
Subscribe to:
Posts (Atom)
Practice makes perfect
Resulting form the lack of effectiveness in work while wearing shackles, I did promise Mistress to practice more at home when I have time an...
Blog Archive
- March 2022 (3)
- December 2021 (2)
- October 2021 (2)
- September 2021 (2)
- June 2021 (2)
- November 2020 (1)
- October 2020 (8)
- August 2020 (1)
- July 2020 (1)
- April 2020 (1)
- March 2020 (5)
- February 2020 (4)
- November 2019 (5)
- October 2019 (2)
- August 2019 (1)
- December 2018 (1)
- September 2018 (3)
- August 2018 (3)
- May 2018 (3)
- April 2018 (4)
- March 2018 (5)
- November 2017 (3)
- October 2017 (3)
- September 2017 (3)
- December 2016 (1)
- September 2016 (2)
- June 2016 (3)
- May 2016 (3)
- April 2016 (14)
- March 2016 (2)
- January 2016 (2)
- December 2015 (2)
- November 2015 (5)
- October 2015 (2)
- September 2015 (7)
- August 2015 (1)
- July 2015 (13)
- June 2015 (14)
- May 2015 (18)
- April 2015 (23)
- March 2015 (8)
- February 2015 (4)
- January 2015 (11)
- December 2014 (10)
- November 2014 (3)
- October 2014 (14)
- September 2014 (2)
- August 2014 (5)
- July 2014 (13)
- June 2014 (21)
- May 2014 (20)
- April 2014 (2)
- January 2014 (4)
- December 2013 (7)
- November 2013 (11)
- October 2013 (4)
- September 2013 (2)
- August 2013 (4)
- July 2013 (6)
- June 2013 (4)
- May 2013 (16)
- April 2013 (20)
- March 2013 (19)
- February 2013 (15)
- January 2013 (25)
- December 2012 (4)
- November 2012 (3)
- October 2012 (15)
- September 2012 (8)
- August 2012 (42)
- July 2012 (9)
- June 2012 (12)
- May 2012 (3)
- March 2012 (2)