Results 1 to 10 of 156

Thread: Is MBAM is a 100% safe application?

Hybrid View

  1. #1
    ~BD~ Guest

    Re: Is MBAM is a 100% safe application?

    David H. Lipman wrote:
    > From: "~BD~"<BoaterDave@hot.mail.co.uk>
    >
    > | David H. Lipman wrote:
    >
    >>> Show us *any* malware in the wild that; infects or resides within the; BIOS,
    >>> Motherboard
    >>> or Video-card.
    >>> **And I do not mean some engineer in lab environment who found he could introduce
    >>> malware
    >>> into the BIOS, Motherboard or Video-card.

    >
    > | I cannot do that ...... and you know it!
    >
    > | However - that does *not* mean that it *doesn't* happen!
    >
    > You can't becuase there are none!
    >
    > While there are none, you are pushing FUD.
    >
    >


    To whom do you consider that I'm "pushing" Fear, Uncertainty and Doubt?

    All I've *ever* been doing is asking questions!

    --
    BD

  2. #2
    David H. Lipman Guest

    Re: Is MBAM is a 100% safe application?

    From: "~BD~" <BoaterDave@hot.mail.co.uk>

    | To whom do you consider that I'm "pushing" Fear, Uncertainty and Doubt?

    | All I've *ever* been doing is asking questions!

    To all the readers of the x-posted news groups and all the http front-ends that access
    them.

    As for ...
    "In particular, do you agree that "Rootkits can also hide in the Firmware
    of Hardware Components, in the BIOS, Motherboard, Video-card EEPROM or
    Alternate Data Streams....." ?

    The part about Rootkits hiding in the Firmware of Hardware Components, in the BIOS,
    Motherboard, Video-card EEPROM has already been answered. You brought it up before, a few
    times, and you were told that it is incorrect. By you re-incarnating the subject matter
    you are introducing FUD as if what you had been previously told was not factual.

    As for ADS that is a whole different concept and is a way of hding a RootKit.
    http://en.wikipedia.org/wiki/Alternate_data_stream

    There is a kind of RootKit methodology that has been used, that was NOT even mentioned,
    and was used by the Gromozon malware family (which also used ADS) and was described quite
    well by Marco Guiliani of Prevx.

    Find that information and report back what that methodology is. That's worth discussing,
    not "In particular, do you agree that "Rootkits can also hide in the Firmware
    of Hardware Components, in the BIOS, Motherboard, Video-card EEPROM" ****.



    --
    Dave
    http://www.claymania.com/removal-trojan-adware.html
    Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •