Page 2 of 16 FirstFirst 123412 ... LastLast
Results 11 to 20 of 156

Thread: Is MBAM is a 100% safe application?

  1. #11
    ~BD~ Guest

    Re: Is MBAM is a 100% safe application?

    David H. Lipman wrote:
    > From: "David H. Lipman"<DLipman~nospam~@Verizon.Net>
    >
    > | From: "~BD~"<BoaterDave@hot.mail.co.uk>
    >
    > | FUD post !
    >
    > | There is NO malware that infects are resides within the; BIOS, Motherboard or
    > | Video-card
    > | EEPROM.
    >
    >
    > That should have been...
    > "...that infects or resides within..."
    >
    >
    >

    So now we are in a situation where someone (drdos) has posted
    information on a well known technical forum saying one thing ....... and
    Mr David H Lipman (whoever he may *really* be!) making a post on Usenet
    groups claiming that the original poster is wrong.

    Take a step outside the box, David.

    How could anyone simply 'visiting' these groups have any notion of who
    is actually telling the truth?

    I am /inclined/ to believe what *you* say - but there is no supporting
    evidence to that effect - is there?

    Is it reasonable for readers to accept that, as you have made no
    disparaging comment to the contrary, that "Most wiping, erasing,
    formatting, and partitioning tools will not overwrite logical bad
    sectors on the Disk, leaving the Rootkits and their accompanying payload
    of malware behind and still active."?

    If so, what action would one recommend one takes before reinstalling an
    operating system on a previously used disk - Darik's Boot and Nuke?
    http://download.cnet.com/Darik-s-Boo...-10151762.html

    Or, maybe FDISK will do? http://support.microsoft.com/kb/255867

    Or does one simply assume that one's disk is Rootkit free and simply use
    a Windows set-up disk and the in-built formatting facility?

    --
    Dave

  2. #12
    Dustin Cook Guest

    Re: Is MBAM is a 100% safe application?

    ~BD~ <BoaterDave@hot.mail.co.uk> wrote in
    news:7ridndLhg8MJXkfWnZ2dnUVZ8rqdnZ2d@bt.com:

    > David H. Lipman wrote:
    >> From: "David H. Lipman"<DLipman~nospam~@Verizon.Net>
    >>
    >> | From: "~BD~"<BoaterDave@hot.mail.co.uk>
    >>
    >> | FUD post !
    >>
    >> | There is NO malware that infects are resides within the; BIOS,
    >> | Motherboard or Video-card
    >> | EEPROM.
    >>
    >>
    >> That should have been...
    >> "...that infects or resides within..."
    >>
    >>
    >>

    > So now we are in a situation where someone (drdos) has posted
    > information on a well known technical forum saying one thing .......
    > and Mr David H Lipman (whoever he may *really* be!) making a post on
    > Usenet groups claiming that the original poster is wrong.


    If the article claims an infection in the bios or eeprom vs corruption;
    then the article is indeed, wrong. BD.

    > Take a step outside the box, David.


    Google bios and eeproms David. You might find it somewhat enlightening.

    > How could anyone simply 'visiting' these groups have any notion of who
    > is actually telling the truth?


    By doing their own research into the matter?

    > I am /inclined/ to believe what *you* say - but there is no supporting
    > evidence to that effect - is there?


    See above. Google really is your friend.

    > Is it reasonable for readers to accept that, as you have made no
    > disparaging comment to the contrary, that "Most wiping, erasing,
    > formatting, and partitioning tools will not overwrite logical bad
    > sectors on the Disk, leaving the Rootkits and their accompanying
    > payload of malware behind and still active."?


    behind, possibly; active.. no.

    > If so, what action would one recommend one takes before reinstalling
    > an operating system on a previously used disk - Darik's Boot and Nuke?
    > http://download.cnet.com/Darik-s-Boo...-DVD/3000-2094
    > _4-10151762.html


    If it does sector overwrites (and I believe it can be configured to do
    so) yes.

    > Or, maybe FDISK will do? http://support.microsoft.com/kb/255867


    FDISK is a partitioning tool. it doesn't address sectors marked as bad.

    > Or does one simply assume that one's disk is Rootkit free and simply
    > use a Windows set-up disk and the in-built formatting facility?


    If the system disc is clean and initializes the bootsector with clean
    code, bye bye rootkit. Assuming it was an MBR based one.


    --
    "Hrrngh! Someday I'm going to hurl this...er...roll this...hrrngh.. nudge
    this boulder right down a cliff." - Goblin Warrior


  3. #13
    David H. Lipman Guest

    Re: Is MBAM is a 100% safe application?

    From: "~BD~" <BoaterDave@hot.mail.co.uk>


    | So now we are in a situation where someone (drdos) has posted
    | information on a well known technical forum saying one thing ....... and
    | Mr David H Lipman (whoever he may *really* be!) making a post on Usenet
    | groups claiming that the original poster is wrong.

    | Take a step outside the box, David.

    | How could anyone simply 'visiting' these groups have any notion of who
    | is actually telling the truth?

    | I am /inclined/ to believe what *you* say - but there is no supporting
    | evidence to that effect - is there?

    | Is it reasonable for readers to accept that, as you have made no
    | disparaging comment to the contrary, that "Most wiping, erasing,
    | formatting, and partitioning tools will not overwrite logical bad
    | sectors on the Disk, leaving the Rootkits and their accompanying payload
    | of malware behind and still active."?

    | If so, what action would one recommend one takes before reinstalling an
    | operating system on a previously used disk - Darik's Boot and Nuke?
    | http://download.cnet.com/Darik-s-Boo...-10151762.html

    | Or, maybe FDISK will do? http://support.microsoft.com/kb/255867

    | Or does one simply assume that one's disk is Rootkit free and simply use
    | a Windows set-up disk and the in-built formatting facility?

    | --
    | Dave

    Show us *any* malware in the wild that; infects or resides within the; BIOS, Motherboard
    or Video-card.
    **And I do not mean some engineer in lab environment who found he could introduce malware
    into the BIOS, Motherboard or Video-card.

    There is not taking a step outside the box. This is the reality.
    There is NO malware that infects or resides within the; BIOS, Motherboard or Video-card.

    --
    Dave
    http://www.claymania.com/removal-trojan-adware.html
    Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



  4. #14
    FromTheRafters Guest

    Re: Is MBAM is a 100% safe application?

    "~BD~" <BoaterDave@hot.mail.co.uk> wrote in message
    news:RbSdnY3dLah7CUfWnZ2dnUVZ8nSdnZ2d@bt.com...
    > FromTheRafters wrote:
    >
    >>
    >> Maybe, but I believe he is not stupid

    >
    > That's good to know!
    >
    >> - just annoying as all hell. D

    >
    > Name two things which I do which you find annoying - if necessary,
    > please explain why so. I *may* change what I do!


    1) Introducing your personal vendetta against PF whenever it suits you.
    2) Needlessly crossposting your posts, even when from within another's
    thread and transplanting posts from other places and posting off topic
    and getting too obsessed with having other people's personal information
    and practically *demanding* that others assuage any personal "hinky
    feeling" you may have and ... well ... that's enough for number two.

    > Now .......
    >
    > Here's an item for you to get your teeth into, FTR!
    >
    > It's an extract from a thread I once started here:-
    >
    > http://forum.kaspersky.com/index.php...ic=50275&st=40
    >
    > (this is post No 46)


    > Performing a standard Disk Format and Reinstall of the Operating
    > System
    > will render common infections incompatible,


    Incompatible with what?

    > but not all Rootkits and its accompanying payload of malware.....


    ???

    Had this person posted here, there would have been opposing viewpoints
    voiced, I haven't visited that forum, so I don't know what went on
    there.

    > Rootkits work from outside the Operating System


    There are user mode and kernel mode rootkits - how is that considered
    "outside" the OS?

    I might agree with *some* rootkits work from outside the OS (VM or
    hypervisor based perhaps?)

    > and can hide in Bad Sectors of the Hard Disk thus have places to hide
    > on the Hard Disk that are essentially outside the Operating Systems
    > environment, untouchable by it, yet still at hand.


    There are many places to hide stuff, that doesn't mean it is code that
    can be invoked or otherwise executed.

    > Most wiping, erasing, formatting, and partitioning tools will not
    > overwrite logical bad sectors on the Disk, leaving the Rootkits and
    > their accompanying payload of malware behind and still active.


    Usually, such tactics render the malware "headless" and as such it is
    not *active*.

    [...]

    > Rootkits reside in the Root of things, thus the name 'Root' that
    > service as an protective container for the accompanying payload of
    > malware, or on the bright side, the accompanying payload of Software
    > Code with productive, safe intentions, together they are a
    > 'KIT'.....thus the name 'ROOTKIT'.....and Rootkits are not a joke.


    Rootkit's used to be a collection of programs that an attacker could use
    to replace tools with trojanized versions - once having obtained root
    privileges. Now they are mostly just filter drivers to filter out
    information that is being made available to such tools.

    > Once the Computer is compromised by an Rootkit with its accompanying
    > payload of malware, all files in the System can not be trusted and are
    > likely infected.....


    Why infect programs when you can install malware in a stealthed
    (filtered) condition?

    When you have the system as host, there is little reason to also use a
    program to host code.

    [...]

    > Rootkits can also hide in the Firmware of Hardware Components, in the
    > BIOS, Motherboard, Video-card EEPROM or Alternate Data Streams.....


    There is room for "bad code" in those places. There may even be enough
    room for enough code to actually function as a starting point for the
    implementation of a rootkit (or other malicious functions). Having
    *only* a starting point is not enough to qualify it as a rootkit.

    > Rootkits hide their processes, files, and folders by using
    > sophisticated hooking and filtering techniques. As a result,
    > traditional methods of viewing the system state typically return no
    > indication of foul play.....the Rootkit makes sure of that.


    A rootkit might also cease doing the cloaking if it detects that a
    rootkit detector is executing.

    [...]

    > *************
    >
    > I'd be most interested to discuss these comments of drdos further -
    > you will note that the thread was closed by the moderator shortly
    > after we reached this stage!


    I'll just accept that as a fact, no need to go there.

    > In particular, do you agree that "Rootkits can also hide in the
    > Firmware of Hardware Components, in the BIOS, Motherboard, Video-card
    > EEPROM or Alternate Data Streams....." ?


    I'll agree that subversive code could hide in there, but that's a long
    way from saying a rootkit or virus could launch from there.

    [...]



  5. #15
    ~BD~ Guest

    Re: Is MBAM is a 100% safe application?

    Dustin Cook wrote:
    >
    > If the article claims an infection in the bios or eeprom vs corruption;
    > then the article is indeed, wrong. BD.


    Thank you, Dustin.

    >> Take a step outside the box, David.

    >
    > Google bios and eeproms David. You might find it somewhat enlightening.


    I've done much research!

    >> How could anyone simply 'visiting' these groups have any notion of who
    >> is actually telling the truth?

    >
    > By doing their own research into the matter?


    On Usenet there is absolutely no way of telling who is telling the truth
    AFAICT. I know much about you and, in spite of what you may think I
    thought (!) I'm quite sure that you a real young man with a mom and a
    family.

    I know absolutely *nothing* about David H. Lipman, save for the fact
    that he thinks he is God's gift to Usenet and is a contributor at
    Malwarebytes forums. His English is poor and he has little understanding
    of human nature.

    >> I am /inclined/ to believe what *you* say - but there is no supporting
    >> evidence to that effect - is there?

    >
    > See above. Google really is your friend.


    I find nothing about the personal/professional life of Mr Lipman.

    Quote:

    1. The "False Authority Syndrome"

    Don't believe everything. Some people talk or write about viruses as if
    they were an authority in this field, but in fact they are often not.

    Ref: http://www.claymania.com/info-fas.html


    >> Is it reasonable for readers to accept that, as you have made no
    >> disparaging comment to the contrary, that "Most wiping, erasing,
    >> formatting, and partitioning tools will not overwrite logical bad
    >> sectors on the Disk, leaving the Rootkits and their accompanying
    >> payload of malware behind and still active."?

    >
    > behind, possibly; active.. no.


    OK - possible to be reactivated once back on-line?

    >> If so, what action would one recommend one takes before reinstalling
    >> an operating system on a previously used disk - Darik's Boot and Nuke?
    >> http://download.cnet.com/Darik-s-Boo...-DVD/3000-2094
    >> _4-10151762.html

    >
    > If it does sector overwrites (and I believe it can be configured to do
    > so) yes.


    That was my understanding. Thanks.


    >> Or, maybe FDISK will do? http://support.microsoft.com/kb/255867

    >
    > FDISK is a partitioning tool. it doesn't address sectors marked as bad.


    At that link it says - quote:-

    "When you run the fdisk command to create, delete, or change a
    partition, all of the data on that partition is permanently deleted".

    I've always understood that to mean that any malware would be destroyed
    too!

    >> Or does one simply assume that one's disk is Rootkit free and simply
    >> use a Windows set-up disk and the in-built formatting facility?

    >
    > If the system disc is clean


    How can one be sure that it *is* clean?!!!

    > and initializes the bootsector with clean
    > code, bye bye rootkit. Assuming it was an MBR based one.


    That is my understanding too. My niggling concern has always been that
    malware (call it what you will) might remain 'somewhere' within a box
    ready to continue with it's malicious activity even though it's been
    flattened and windows reinstalled (or even if a *new* hard disk has been
    installed!).

    I suspect such thoughts came about from my contact and discussion with
    our then High Tech Crime Unit - who recommended that I *destroy/trash*
    the machine involved in my identity theft encounter. The implication was
    that there is much more going on 'behind the scenes'- things that the
    authorities do not want the public to know about!

    As I'm sure you have gathered, I prefer honesty and openness!

    --
    Dave

  6. #16
    ~BD~ Guest

    Re: Is MBAM is a 100% safe application?

    David H. Lipman wrote:
    >
    > Show us *any* malware in the wild that; infects or resides within the; BIOS, Motherboard
    > or Video-card.
    > **And I do not mean some engineer in lab environment who found he could introduce malware
    > into the BIOS, Motherboard or Video-card.


    I cannot do that ...... and you know it!

    However - that does *not* mean that it *doesn't* happen!

    > There is not taking a step outside the box. This is the reality.
    > There is NO malware that infects or resides within the; BIOS, Motherboard or Video-card.


    So you say, David.

    Please review my answers to Dustin Cook.

    BD



  7. #17
    David H. Lipman Guest

    Re: Is MBAM is a 100% safe application?

    From: "~BD~" <BoaterDave@hot.mail.co.uk>

    | David H. Lipman wrote:

    >> Show us *any* malware in the wild that; infects or resides within the; BIOS,
    >> Motherboard
    >> or Video-card.
    >> **And I do not mean some engineer in lab environment who found he could introduce
    >> malware
    >> into the BIOS, Motherboard or Video-card.


    | I cannot do that ...... and you know it!

    | However - that does *not* mean that it *doesn't* happen!

    You can't becuase there are none!

    While there are none, you are pushing FUD.


    --
    Dave
    http://www.claymania.com/removal-trojan-adware.html
    Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



  8. #18
    ~BD~ Guest

    Re: Is MBAM is a 100% safe application?

    David H. Lipman wrote:
    > From: "~BD~"<BoaterDave@hot.mail.co.uk>
    >
    > | David H. Lipman wrote:
    >
    >>> Show us *any* malware in the wild that; infects or resides within the; BIOS,
    >>> Motherboard
    >>> or Video-card.
    >>> **And I do not mean some engineer in lab environment who found he could introduce
    >>> malware
    >>> into the BIOS, Motherboard or Video-card.

    >
    > | I cannot do that ...... and you know it!
    >
    > | However - that does *not* mean that it *doesn't* happen!
    >
    > You can't becuase there are none!
    >
    > While there are none, you are pushing FUD.
    >
    >


    To whom do you consider that I'm "pushing" Fear, Uncertainty and Doubt?

    All I've *ever* been doing is asking questions!

    --
    BD

  9. #19
    David H. Lipman Guest

    Re: Is MBAM is a 100% safe application?

    From: "~BD~" <BoaterDave@hot.mail.co.uk>

    | To whom do you consider that I'm "pushing" Fear, Uncertainty and Doubt?

    | All I've *ever* been doing is asking questions!

    To all the readers of the x-posted news groups and all the http front-ends that access
    them.

    As for ...
    "In particular, do you agree that "Rootkits can also hide in the Firmware
    of Hardware Components, in the BIOS, Motherboard, Video-card EEPROM or
    Alternate Data Streams....." ?

    The part about Rootkits hiding in the Firmware of Hardware Components, in the BIOS,
    Motherboard, Video-card EEPROM has already been answered. You brought it up before, a few
    times, and you were told that it is incorrect. By you re-incarnating the subject matter
    you are introducing FUD as if what you had been previously told was not factual.

    As for ADS that is a whole different concept and is a way of hding a RootKit.
    http://en.wikipedia.org/wiki/Alternate_data_stream

    There is a kind of RootKit methodology that has been used, that was NOT even mentioned,
    and was used by the Gromozon malware family (which also used ADS) and was described quite
    well by Marco Guiliani of Prevx.

    Find that information and report back what that methodology is. That's worth discussing,
    not "In particular, do you agree that "Rootkits can also hide in the Firmware
    of Hardware Components, in the BIOS, Motherboard, Video-card EEPROM" ****.



    --
    Dave
    http://www.claymania.com/removal-trojan-adware.html
    Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



  10. #20
    ~BD~ Guest

    Re: Is MBAM is a 100% safe application?

    FromTheRafters wrote:
    > "~BD~"<BoaterDave@hot.mail.co.uk> wrote in message
    > news:RbSdnY3dLah7CUfWnZ2dnUVZ8nSdnZ2d@bt.com...
    >> FromTheRafters wrote:
    >>
    >>>
    >>> Maybe, but I believe he is not stupid

    >>
    >> That's good to know!
    >>
    >>> - just annoying as all hell. D

    >>
    >> Name two things which I do which you find annoying - if necessary,
    >> please explain why so. I *may* change what I do!


    Let's deal with this part of your response first.

    > 1) Introducing your personal vendetta against PF whenever it suits you.


    I have no personal vendetta against anyone.

    The posting persona known as Peter Foldes (or is it Derek Feldman?) is
    not honest and truthful. I don't approve of that.

    > 2) Needlessly crossposting your posts, even when from within another's
    > thread and transplanting posts from other places and posting off topic
    > and getting too obsessed with having other people's personal information
    > and practically *demanding* that others assuage any personal "hinky
    > feeling" you may have and ... well ... that's enough for number two.


    Isn't Usenet great?

    If folk choose not to substantiate their standing in the real world then
    AFAIC they are simply fantasy figures of the Internet.

    Remember this thread, FTR

    http://groups.google.com/group/micro...dilema&lnk=ol&

    Not much has changed!

    --
    Dave

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •