Page 7 of 18 FirstFirst ... 5678917 ... LastLast
Results 61 to 70 of 172

Thread: PCButts Infamous Pic of Dust**** Relaxing After Virus Writing

  1. #61
    G. Morgan Guest

    Re: The Host's file

    ~BD~ wrote:

    >Aardvark wrote:
    >> On Thu, 28 Jul 2011 21:14:55 +0100, ~BD~ wrote:
    >>
    >>> Aardvark wrote:
    >>>> On Thu, 28 Jul 2011 20:00:00 +0100, ~BD~ wrote:
    >>>>
    >>>>
    >>>>> Do you ever think to check something as simple and straight-forward as
    >>>>> the MVP's Host file - just to see if it actually *is* clean - and
    >>>>> doesn't come with a hidden payload?
    >>>>
    >>>> It's a ****ing *text* file, ****.
    >>>>
    >>>>
    >>>>
    >>>>
    >>> Educate yourself.
    >>>
    >>> http://www.youtube.com/watch?v=PEWaD7keeOw

    >>
    >> Link unclicked.
    >>
    >> It's a *text* file.
    >>
    >>
    >>

    >
    >You have no ****ing idea of what is going on - *****WIT*
    >
    >Watch the video clip and damn well *LEARN* something!
    >
    >Or ask Dustin - he *might* just guide you, dopey.


    He told you the same thing, I told you the same thing, and Aardie told
    you the same thing. Is there a trust issue here?


  2. #62
    FromTheRafters Guest

    Re: The Host's file


    "Aardvark" <aardvark@youllnever.know> wrote in message
    news:j0su0q$2ru$8@dont-email.me...
    > On Thu, 28 Jul 2011 19:57:26 -0400, David H. Lipman wrote:
    >
    >> From: "FromTheRafters" <erratic@nomail.afraid.org>
    >>
    >> < snip >
    >>
    >>>> As it's a plain text file, it can't come with anything "hidden".
    >>>>
    >>> Although, one may need to scroll some.

    >>
    >> Maybe a text file using an invisible font ;-)

    >
    > In order for it to be malicious, it would have to spell out lots of
    > insults.


    Seriously, I recall some adware programs that put entries in
    the hosts file so as to act like a lame DNS poisoning scheme.
    They would place their entries way down the 'page' so that the
    average user wouldn't see them even if they knew enough to
    look at the hosts file in the first place.



  3. #63
    G. Morgan Guest

    Re: The Host's file

    ~BD~ wrote:

    >Watch the video clip and damn well *LEARN* something!


    It's 44 mins. long. Where in the track is the part about a text file
    being Malware?


  4. #64
    Aardvark Guest

    Re: The Host's file

    On Thu, 28 Jul 2011 19:34:15 -0500, G. Morgan wrote:

    > He told you the same thing, I told you the same thing, and Aardie told
    > you the same thing. Is there a trust issue here?


    Nope. A slimy trolling innuendo thing.

    SSDD

    --
    "Those who do not make human beings the center of their concern soon
    lose the capacity to make any ethical choices, for they willingly
    sacrifice others in the name of the politically expedient and
    practical." - Dwight Macdonald, “The Root Is Man.”

  5. #65
    FromTheRafters Guest

    Re: The Host's file

    "G. Morgan" <G_Morgan@easy.com> wrote in message
    news:8904371142j9moadboe3k6vgjfbb1sk12d@Osama-is-dead.net...
    > ~BD~ wrote:
    >
    >>Watch the video clip and damn well *LEARN* something!

    >
    > It's 44 mins. long. Where in the track is the part about a text file
    > being Malware?


    His posted links have been non-sequitur to his point lately.



  6. #66
    G. Morgan Guest

    Re: The Host's file

    FromTheRafters wrote:

    >"G. Morgan" <G_Morgan@easy.com> wrote in message
    >news:8904371142j9moadboe3k6vgjfbb1sk12d@Osama-is-dead.net...
    >> ~BD~ wrote:
    >>
    >>>Watch the video clip and damn well *LEARN* something!

    >>
    >> It's 44 mins. long. Where in the track is the part about a text file
    >> being Malware?

    >
    >His posted links have been non-sequitur to his point lately.


    That's why I'm waiting on the exact time in the video.

    I plan to watch the whole thing when I can, it does look interesting.


  7. #67
    Aardvark Guest

    Re: The Host's file

    On Thu, 28 Jul 2011 20:37:30 -0400, FromTheRafters wrote:

    > "Aardvark" <aardvark@youllnever.know> wrote in message
    > news:j0su0q$2ru$8@dont-email.me...
    >> On Thu, 28 Jul 2011 19:57:26 -0400, David H. Lipman wrote:
    >>
    >>> From: "FromTheRafters" <erratic@nomail.afraid.org>
    >>>
    >>> < snip >
    >>>
    >>>>> As it's a plain text file, it can't come with anything "hidden".
    >>>>>
    >>>> Although, one may need to scroll some.
    >>>
    >>> Maybe a text file using an invisible font ;-)

    >>
    >> In order for it to be malicious, it would have to spell out lots of
    >> insults.

    >
    > Seriously, I recall some adware programs that put entries in the hosts
    > file so as to act like a lame DNS poisoning scheme. They would place
    > their entries way down the 'page' so that the average user wouldn't see
    > them even if they knew enough to look at the hosts file in the first
    > place.


    I'm well aware that such a thing can happen. Which is why, if I wanted a
    tailor-made hosts file, I'd go for the MS-MVP one in the certainty that
    it's unlikely to do any harm.

    The only hosts file I need or want is no more than six or seven entries.



    --
    "Those who do not make human beings the center of their concern soon
    lose the capacity to make any ethical choices, for they willingly
    sacrifice others in the name of the politically expedient and
    practical." - Dwight Macdonald, “The Root Is Man.”

  8. #68
    David H. Lipman Guest

    Re: The Host's file

    From: "~BD~" <~BD~@nomail.afraid.com>

    >
    > http://i54.tinypic.com/1zxmd14.jpg


    What now ?

    Are you deliberately showing us that not only do you not know the subject matter but you
    are a ****ty photographer and don't know how to use the FinePix J210 properly ?

    Maybe you are still stuck on the fact you don't comprehend that you have to supply a SATA
    power cable to a SATA drive not just a SATA communication cable.

    --
    Dave
    Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
    http://www.pctipp.ch/downloads/dl/35905.asp



  9. #69
    David H. Lipman Guest

    Re: The Host's file

    From: "G. Morgan" <G_Morgan@easy.com>

    > FromTheRafters wrote:
    >
    >> "G. Morgan" <G_Morgan@easy.com> wrote in message
    >> news:8904371142j9moadboe3k6vgjfbb1sk12d@Osama-is-dead.net...
    >>> ~BD~ wrote:
    >>>
    >>>> Watch the video clip and damn well *LEARN* something!
    >>>
    >>> It's 44 mins. long. Where in the track is the part about a text file
    >>> being Malware?

    >>
    >> His posted links have been non-sequitur to his point lately.

    >
    > That's why I'm waiting on the exact time in the video.
    >
    > I plan to watch the whole thing when I can, it does look interesting.


    For some yes. But it's blurry and you can't see detail.
    For those who don't know how malware hides from analysis using a virtual machine (VM) or
    via the MS API IsDebuggerPresent() you will learn something.


    --
    Dave
    Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
    http://www.pctipp.ch/downloads/dl/35905.asp



  10. #70
    ~BD~ Guest

    Re: The Host's file

    G. Morgan wrote:
    > ~BD~ wrote:
    >
    >> Aardvark wrote:
    >>> On Thu, 28 Jul 2011 21:14:55 +0100, ~BD~ wrote:
    >>>
    >>>> Aardvark wrote:
    >>>>> On Thu, 28 Jul 2011 20:00:00 +0100, ~BD~ wrote:
    >>>>>
    >>>>>
    >>>>>> Do you ever think to check something as simple and straight-forward as
    >>>>>> the MVP's Host file - just to see if it actually *is* clean - and
    >>>>>> doesn't come with a hidden payload?
    >>>>>
    >>>>> It's a ******* *text* file, ****.
    >>>>>
    >>>>>
    >>>>>
    >>>>>
    >>>> Educate yourself.
    >>>>
    >>>> http://www.youtube.com/watch?v=PEWaD7keeOw
    >>>
    >>> Link unclicked.
    >>>
    >>> It's a *text* file.

    >>
    >> Or ask Dustin - he *might* just guide you, dopey.

    >
    > He told you the same thing, I told you the same thing, and Aardie told
    > you the same thing. Is there a trust issue here?



    I don't want to fall out with folk about this, but *please read here*.

    http://mobile.eweek.com/c/a/Security...-Users-114208/

    To *GET* the text file, one *has* to visit a URL.

    "Almost half of Internet users believe it is necessary to actually do
    something on a rogue Website to be infected, when many attacks can
    trigger drive-by downloads just by loading the page."

    If nobody ever *checks* the Hosts file *URL* to *ensure* that a visitor
    has not inadvertently triggered an *unseen* download in addition to the
    text file, users *may never know they have been hit*.

    Exactly the same thing applies in visiting Annexcafe or Aumha. If one's
    AV is not triggered, folk will be unlikely ever to know their machines
    are infected.

    I'm happy to discuss further.

    Dave.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •