Results 1 to 10 of 97

Thread: Clarification of a few points.

Hybrid View

  1. #1
    Dustin Guest

    Re: Clarification of a few points.

    "Jenn" <nope@nowayatno.howanyday> wrote in
    news:iv5ef0$kla$1@dont-email.me:

    > Is it possible for a malware cleaner program to put it's own
    > 'root-kit' hidden somewhere and then say the system is clean?


    Sure, but then, that malware cleaner wouldn't last very long. It's
    subject to constant peer review and 3rd party independent analysis.

    > I don't know what a root-kit is


    I'm not surprised.

    > thread off and on. Why get insulted that someone wants to put
    > Malwarebytes to the ultimate analysis? If nothing is wrong and it
    > isn't doing anything wrong, then the question should just be
    > answered with a, "NO ... Malwarebytes doesn't do that and here is
    > the proof".......


    I'm not insulted that someone wanted to put malwarebytes to some sort
    of test; As I said, it's already been peer reviewed, and is constantly
    under scrutiny; as all apps of it's nature are.

    If something was amiss, they wouldn't be able to hide it for very long.
    I already answered BD's question and my proof was that I disassembled
    the executable. BD in his slimey fashion won't accept the proof.

    > it, but I'm not into analyzing malware and such things either. It's
    > a business... aren't they used to being put to the test?


    They always are, Jenn. They aren't malicious and you only display more
    astounding ignorance carrying on like this. Computers seem to be
    magical to you and BD.. I just don't get that.


    --
    (Hey) I keep on thinking that it's
    (Hey) all done and all over now (whoa)
    You keep on thinking you can save me save me
    (Hey) My ship is sinking but it's
    (Hey) all good and I can go down (whoa)
    You've got me thinking that the party's all over


  2. #2
    Jenn Guest

    Re: Clarification of a few points.

    Dustin wrote:
    > "Jenn" <nope@nowayatno.howanyday> wrote in
    > news:iv5ef0$kla$1@dont-email.me:
    >
    >> Is it possible for a malware cleaner program to put it's own
    >> 'root-kit' hidden somewhere and then say the system is clean?

    >
    > Sure, but then, that malware cleaner wouldn't last very long. It's
    > subject to constant peer review and 3rd party independent analysis.


    .... just curious .. who's the 3rd party independent analysis done by?


    >> thread off and on. Why get insulted that someone wants to put
    >> Malwarebytes to the ultimate analysis? If nothing is wrong and it
    >> isn't doing anything wrong, then the question should just be
    >> answered with a, "NO ... Malwarebytes doesn't do that and here is
    >> the proof".......



    > I'm not insulted that someone wanted to put malwarebytes to some sort
    > of test; As I said, it's already been peer reviewed, and is constantly
    > under scrutiny; as all apps of it's nature are.
    >
    > If something was amiss, they wouldn't be able to hide it for very
    > long. I already answered BD's question and my proof was that I
    > disassembled the executable. BD in his slimey fashion won't accept


    Well... I don't know if you've ever seen the movie, "The Net", or not...(one
    of my all time favorites), but in that movie there was a company that
    provided a security program to some high level companies. It was supposed
    to be the premier program to protect any business and keep it secure up to
    and including governments. The thing is, a back door was written into the
    program so the people who knew about the back door could gain access to
    systems using the software. Good movie ...

    That's why I asked about this ....

    >> it, but I'm not into analyzing malware and such things either. It's
    >> a business... aren't they used to being put to the test?



    > They always are, Jenn. They aren't malicious and you only display more
    > astounding ignorance carrying on like this. Computers seem to be
    > magical to you and BD.. I just don't get that.


    The thing is ... I grew up when there wasn't any such thing as a home pc.
    Computers didn't start being a normal thing in the home 'til I already had 3
    kids... We learned about computers together as they grew up, so for me
    computers are a bit magical because they turned my world from being just a
    local experience into being a world wide experience. I love meeting people
    all over the world who I'd never have had the chance to meet otherwise.

    --
    Jenn (from Oklahoma)



  3. #3
    ~BD~ Guest

    Re: Clarification of a few points.

    On 08/07/2011 01:20, Jenn wrote:
    > Dustin wrote:
    >> "Jenn"<nope@nowayatno.howanyday> wrote in
    >> news:iv5ef0$kla$1@dont-email.me:
    >>
    >>> Is it possible for a malware cleaner program to put it's own
    >>> 'root-kit' hidden somewhere and then say the system is clean?

    >>
    >> Sure, but then, that malware cleaner wouldn't last very long. It's
    >> subject to constant peer review and 3rd party independent analysis.

    >
    > ... just curious .. who's the 3rd party independent analysis done by?
    >
    >
    >>> thread off and on. Why get insulted that someone wants to put
    >>> Malwarebytes to the ultimate analysis? If nothing is wrong and it
    >>> isn't doing anything wrong, then the question should just be
    >>> answered with a, "NO ... Malwarebytes doesn't do that and here is
    >>> the proof".......

    >
    >
    >> I'm not insulted that someone wanted to put malwarebytes to some sort
    >> of test; As I said, it's already been peer reviewed, and is constantly
    >> under scrutiny; as all apps of it's nature are.
    >>
    >> If something was amiss, they wouldn't be able to hide it for very
    >> long. I already answered BD's question and my proof was that I
    >> disassembled the executable. BD in his slimey fashion won't accept

    >
    > Well... I don't know if you've ever seen the movie, "The Net", or not...(one
    > of my all time favorites), but in that movie there was a company that
    > provided a security program to some high level companies. It was supposed
    > to be the premier program to protect any business and keep it secure up to
    > and including governments. The thing is, a back door was written into the
    > program so the people who knew about the back door could gain access to
    > systems using the software. Good movie ...
    >
    > That's why I asked about this ....


    Others may suspect that I've coerced you to support me on this Jenn.
    As you know, I have not! (But thanks anyway <smile>)

    >>> it, but I'm not into analyzing malware and such things either. It's
    >>> a business... aren't they used to being put to the test?

    >
    >
    >> They always are, Jenn. They aren't malicious and you only display more
    >> astounding ignorance carrying on like this. Computers seem to be
    >> magical to you and BD.. I just don't get that.

    >
    > The thing is ... I grew up when there wasn't any such thing as a home pc.
    > Computers didn't start being a normal thing in the home 'til I already had 3
    > kids... We learned about computers together as they grew up, so for me
    > computers are a bit magical because they turned my world from being just a
    > local experience into being a world wide experience. I love meeting people
    > all over the world who I'd never have had the chance to meet otherwise.


    I think you are similar in many ways to the vast majority of your
    generation - without being in any way nasty, when using a computer at
    home I suspect you could realistically be described as a nomal/average
    user! :-)


  4. #4
    Jenn Guest

    Re: Clarification of a few points.

    ~BD~ wrote:
    > On 08/07/2011 01:20, Jenn wrote:


    >> Well... I don't know if you've ever seen the movie, "The Net", or
    >> not...(one of my all time favorites), but in that movie there was a
    >> company that provided a security program to some high level
    >> companies. It was supposed to be the premier program to protect any
    >> business and keep it secure up to and including governments. The
    >> thing is, a back door was written into the program so the people who
    >> knew about the back door could gain access to systems using the
    >> software. Good movie ...


    >> That's why I asked about this ....


    > Others may suspect that I've coerced you to support me on this Jenn.
    > As you know, I have not! (But thanks anyway <smile>)


    naaaaaaa You didn't ask me to say anything. You didn't ask Graham to say
    anything, either. I've been reading the thread off and on and was just
    wondering about it myself ... so I asked.

    >> The thing is ... I grew up when there wasn't any such thing as a
    >> home pc. Computers didn't start being a normal thing in the home
    >> 'til I already had 3 kids... We learned about computers together as
    >> they grew up, so for me computers are a bit magical because they
    >> turned my world from being just a local experience into being a
    >> world wide experience. I love meeting people all over the world who
    >> I'd never have had the chance to meet otherwise.


    > I think you are similar in many ways to the vast majority of your
    > generation - without being in any way nasty, when using a computer at
    > home I suspect you could realistically be described as a nomal/average
    > user! :-)


    mmmm maybe ... I probably do more on a computer than the average person in
    my age group does, tho...

    --
    Jenn (from Oklahoma)



  5. #5
    Dustin Guest

    Re: Clarification of a few points.

    "Jenn" <nope@nowayatno.howanyday> wrote in
    news:iv5ig4$9qd$1@dont-email.me:

    > ... just curious .. who's the 3rd party independent analysis done
    > by?



    I'm not going to play semantics. What I said stands.

    > Well... I don't know if you've ever seen the movie, "The Net", or
    > not...(one of my all time favorites), but in that movie there was a
    > company that provided a security program to some high level


    I've seen it. As with other "hacker" movies, it's loosly based in
    reality.


    > companies. It was supposed to be the premier program to protect any
    > business and keep it secure up to and including governments. The
    > thing is, a back door was written into the program so the people who
    > knew about the back door could gain access to systems using the
    > software. Good movie ...


    Well the thing is, Jenn, it made for a good movie, but wouldn't work in
    real life.

    > That's why I asked about this ....


    Which is fine, but I've already dissassembled it; and as I worked for
    them, I've seen it in raw form. no backdoors.

    >> They always are, Jenn. They aren't malicious and you only display
    >> more astounding ignorance carrying on like this. Computers seem to
    >> be magical to you and BD.. I just don't get that.

    >
    > The thing is ... I grew up when there wasn't any such thing as a
    > home pc. Computers didn't start being a normal thing in the home
    > 'til I already had 3 kids... We learned about computers together as


    They weren't normal when I was little either, Jenn. You aren't an
    exception here and it doesn't matter.



    --
    (Hey) I keep on thinking that it's
    (Hey) all done and all over now (whoa)
    You keep on thinking you can save me save me
    (Hey) My ship is sinking but it's
    (Hey) all good and I can go down (whoa)
    You've got me thinking that the party's all over


  6. #6
    ~BD~ Guest

    Re: Clarification of a few points.

    Dustin wrote:
    > "Jenn"<nope@nowayatno.howanyday> wrote in
    > news:iv5ig4$9qd$1@dont-email.me:
    >
    >> ... just curious .. who's the 3rd party independent analysis done
    >> by?

    >
    >
    > I'm not going to play semantics. What I said stands.



    It's not a question of semantics.

    You stated that there had been 3rd party independent analysis.

    Who by, Dustin - and when?

    Or were you lying - something you say you do not do?

  7. #7
    Beauregard T. Shagnasty Guest

    Re: Clarification of a few points.

    ~BD~ wrote:

    > Dustin wrote:
    >> "Jenn" wrote:
    >>> ... just curious .. who's the 3rd party independent analysis done
    >>> by?

    >>
    >> I'm not going to play semantics. What I said stands.

    >
    > It's not a question of semantics.
    > You stated that there had been 3rd party independent analysis.


    If we tell you, then we'll have to kill you.

    > Who by, Dustin - and when?


    It's by the NSA. (Now we'll have to kill you.)

    > Or were you lying - something you say you do not do?


    No, that's something you do.

    --
    -bts
    -May the fleas of a thousand camels infest your narrowboat
    -and sink it in the deepest canal in all of England

  8. #8
    Jenn Guest

    Re: Clarification of a few points.

    Dustin wrote:
    > "Jenn" <nope@nowayatno.howanyday> wrote in
    > news:iv5ig4$9qd$1@dont-email.me:
    >
    >> ... just curious .. who's the 3rd party independent analysis done
    >> by?



    > I'm not going to play semantics. What I said stands.


    You said it .. I was just asking who you were talking about... don't you
    know?



    --
    Jenn (from Oklahoma)



Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •