Page 1 of 3 123 LastLast
Results 1 to 10 of 172

Thread: PCButts Infamous Pic of Dust**** Relaxing After Virus Writing

Hybrid View

  1. #1
    G. Morgan Guest

    Re: The Host's file

    ~BD~ wrote:

    >Aardvark wrote:
    >> On Thu, 28 Jul 2011 21:14:55 +0100, ~BD~ wrote:
    >>
    >>> Aardvark wrote:
    >>>> On Thu, 28 Jul 2011 20:00:00 +0100, ~BD~ wrote:
    >>>>
    >>>>
    >>>>> Do you ever think to check something as simple and straight-forward as
    >>>>> the MVP's Host file - just to see if it actually *is* clean - and
    >>>>> doesn't come with a hidden payload?
    >>>>
    >>>> It's a ****ing *text* file, ****.
    >>>>
    >>>>
    >>>>
    >>>>
    >>> Educate yourself.
    >>>
    >>> http://www.youtube.com/watch?v=PEWaD7keeOw

    >>
    >> Link unclicked.
    >>
    >> It's a *text* file.
    >>
    >>
    >>

    >
    >You have no ****ing idea of what is going on - *****WIT*
    >
    >Watch the video clip and damn well *LEARN* something!
    >
    >Or ask Dustin - he *might* just guide you, dopey.


    He told you the same thing, I told you the same thing, and Aardie told
    you the same thing. Is there a trust issue here?


  2. #2
    Aardvark Guest

    Re: The Host's file

    On Thu, 28 Jul 2011 19:34:15 -0500, G. Morgan wrote:

    > He told you the same thing, I told you the same thing, and Aardie told
    > you the same thing. Is there a trust issue here?


    Nope. A slimy trolling innuendo thing.

    SSDD

    --
    "Those who do not make human beings the center of their concern soon
    lose the capacity to make any ethical choices, for they willingly
    sacrifice others in the name of the politically expedient and
    practical." - Dwight Macdonald, “The Root Is Man.”

  3. #3
    ~BD~ Guest

    Re: The Host's file

    G. Morgan wrote:
    > ~BD~ wrote:
    >
    >> Aardvark wrote:
    >>> On Thu, 28 Jul 2011 21:14:55 +0100, ~BD~ wrote:
    >>>
    >>>> Aardvark wrote:
    >>>>> On Thu, 28 Jul 2011 20:00:00 +0100, ~BD~ wrote:
    >>>>>
    >>>>>
    >>>>>> Do you ever think to check something as simple and straight-forward as
    >>>>>> the MVP's Host file - just to see if it actually *is* clean - and
    >>>>>> doesn't come with a hidden payload?
    >>>>>
    >>>>> It's a ******* *text* file, ****.
    >>>>>
    >>>>>
    >>>>>
    >>>>>
    >>>> Educate yourself.
    >>>>
    >>>> http://www.youtube.com/watch?v=PEWaD7keeOw
    >>>
    >>> Link unclicked.
    >>>
    >>> It's a *text* file.

    >>
    >> Or ask Dustin - he *might* just guide you, dopey.

    >
    > He told you the same thing, I told you the same thing, and Aardie told
    > you the same thing. Is there a trust issue here?



    I don't want to fall out with folk about this, but *please read here*.

    http://mobile.eweek.com/c/a/Security...-Users-114208/

    To *GET* the text file, one *has* to visit a URL.

    "Almost half of Internet users believe it is necessary to actually do
    something on a rogue Website to be infected, when many attacks can
    trigger drive-by downloads just by loading the page."

    If nobody ever *checks* the Hosts file *URL* to *ensure* that a visitor
    has not inadvertently triggered an *unseen* download in addition to the
    text file, users *may never know they have been hit*.

    Exactly the same thing applies in visiting Annexcafe or Aumha. If one's
    AV is not triggered, folk will be unlikely ever to know their machines
    are infected.

    I'm happy to discuss further.

    Dave.

  4. #4
    G. Morgan Guest

    Re: The Host's file

    ~BD~ wrote:

    >To *GET* the text file, one *has* to visit a URL.


    Or use the command line 'wget' in a sandbox, for the paranoid.





  5. #5
    Bullwinkle. Guest

    Re: The Host's file


    "G. Morgan" <G_Morgan@easy.com> wrote in message
    news:jkl537puukrjda1tsqi8fu0pl3qnbvkvde@Osama-is-dead.net...

    Get off usenet and get a job, moocher.



  6. #6
    Aardvark Guest

    Re: The Host's file

    On Fri, 29 Jul 2011 10:52:03 -0500, G. Morgan wrote:

    > ~BD~ wrote:
    >
    >>To *GET* the text file, one *has* to visit a URL.

    >
    > Or use the command line 'wget' in a sandbox, for the paranoid.


    LOL. I use wget all the time, along with urpmi and apt-get. All command-
    line driven. I could use GUI applications, but I find the CLI faster and
    more convenient. Nothing to do with security.



    --
    "Those who do not make human beings the center of their concern soon
    lose the capacity to make any ethical choices, for they willingly
    sacrifice others in the name of the politically expedient and
    practical." - Dwight Macdonald, “The Root Is Man.”

  7. #7
    David H. Lipman Guest

    Re: The Host's file

    From: "Aardvark" <aardvark@youllnever.know>

    > On Fri, 29 Jul 2011 10:52:03 -0500, G. Morgan wrote:
    >
    >> ~BD~ wrote:
    >>
    >>> To *GET* the text file, one *has* to visit a URL.

    >>
    >> Or use the command line 'wget' in a sandbox, for the paranoid.

    >
    > LOL. I use wget all the time, along with urpmi and apt-get. All command-
    > line driven. I could use GUI applications, but I find the CLI faster and
    > more convenient. Nothing to do with security.
    >


    I use it daily. Great for malware download scripting and I can use *any* User-Agent.

    Core component of my Multi-AV.

    I'm using "Wget 1.12-2504 built on mingw32."


    --
    Dave
    Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
    http://www.pctipp.ch/downloads/dl/35905.asp



  8. #8
    Aardvark Guest

    Re: The Host's file

    On Fri, 29 Jul 2011 12:20:27 -0400, David H. Lipman wrote:

    > From: "Aardvark" <aardvark@youllnever.know>
    >
    >> On Fri, 29 Jul 2011 10:52:03 -0500, G. Morgan wrote:
    >>
    >>> ~BD~ wrote:
    >>>
    >>>> To *GET* the text file, one *has* to visit a URL.
    >>>
    >>> Or use the command line 'wget' in a sandbox, for the paranoid.

    >>
    >> LOL. I use wget all the time, along with urpmi and apt-get. All
    >> command- line driven. I could use GUI applications, but I find the CLI
    >> faster and more convenient. Nothing to do with security.
    >>
    >>

    > I use it daily. Great for malware download scripting and I can use
    > *any* User-Agent.
    >
    > Core component of my Multi-AV.
    >
    > I'm using "Wget 1.12-2504 built on mingw32."


    "[root@aardvark2 ~]# wget -V
    GNU Wget 1.12 built on linux-gnu."





    --
    "Those who do not make human beings the center of their concern soon
    lose the capacity to make any ethical choices, for they willingly
    sacrifice others in the name of the politically expedient and
    practical." - Dwight Macdonald, “The Root Is Man.”

  9. #9
    David H. Lipman Guest

    Re: The Host's file

    From: "Aardvark" <aardvark@youllnever.know>

    > On Fri, 29 Jul 2011 12:20:27 -0400, David H. Lipman wrote:
    >
    >> From: "Aardvark" <aardvark@youllnever.know>
    >>
    >>> On Fri, 29 Jul 2011 10:52:03 -0500, G. Morgan wrote:
    >>>
    >>>> ~BD~ wrote:
    >>>>
    >>>>> To *GET* the text file, one *has* to visit a URL.
    >>>>
    >>>> Or use the command line 'wget' in a sandbox, for the paranoid.
    >>>
    >>> LOL. I use wget all the time, along with urpmi and apt-get. All
    >>> command- line driven. I could use GUI applications, but I find the CLI
    >>> faster and more convenient. Nothing to do with security.
    >>>

    >> I use it daily. Great for malware download scripting and I can use
    >> *any* User-Agent.
    >>
    >> Core component of my Multi-AV.
    >>
    >> I'm using "Wget 1.12-2504 built on mingw32."

    >
    > "[root@aardvark2 ~]# wget -V
    > GNU Wget 1.12 built on linux-gnu."
    >


    Originally there were problems on the Windows builds and that's why the version still has
    the "2504" build in its versioning.

    --
    Dave
    Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
    http://www.pctipp.ch/downloads/dl/35905.asp



  10. #10
    David H. Lipman Guest

    Re: The Host's file

    From: "G. Morgan" <G_Morgan@easy.com>

    > ~BD~ wrote:
    >
    >> To *GET* the text file, one *has* to visit a URL.

    >
    > Or use the command line 'wget' in a sandbox, for the paranoid.
    >


    +1

    But it doesn't need to be sandboxed at all.


    --
    Dave
    Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
    http://www.pctipp.ch/downloads/dl/35905.asp



Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •