Page 6 of 9 FirstFirst ... 45678 ... LastLast
Results 51 to 60 of 84

Thread: Virusburst

  1. #51
    Nick Skrepetos Guest

    Re: Virusburst


    pcbutts1 wrote:
    > You have my address remember, 3424 topgun st rosamond ca my name is Chris
    > Butts. You believe the trolls that's all you need to prove them right. Since
    > they say I am a thief I have no money so you will have to come out here. I
    > cant afford it. Like the troll Andy "Wanker" said I have no credit card..
    > BTW it took me all of 5 minutes to write the syntax to get spyerase working
    > on vista without compromising security.
    >
    >


    Much as I figured......


  2. #52
    Leythos Guest

    Re: Virusburst

    In article <TqadnWSQaMxwvgLYnZ2dnUVZ_qisnZ2d@giganews.com>, pcbutts1
    @leythosthestalker.com says...
    > Newsgroup Trolls. Read about mine here http://www.pcbutts1.com/downloads
    > The list grows. Leythos the stalker http://www.leythosthestalker.com, David
    > H. Lipman, Max M Wachtell III aka What's in a Name?, Fitz,
    > Rhonda Lea Kirk, Meat Plow, F Kwatu F, George Orwell


    As long as you keep posting my name in your messages I am forced to
    reply with public content that you've provided showing your ethics.

    *** WARNING - these links contain foul/pornographic content of an
    abusive nature created by PCBUTTS1 and still hosted on his public
    website ***

    From: pcbutts1
    Date: Sat, Jul 15 2006 10:14 pm
    Email: "pcbutts1" <pcbutts1@seedsv.com>
    Groups: 24hoursupport.helpdesk

    You mean these websites?
    http://www.pcbutts1.com/rlk/rlk.htm
    http://www.pcbutts1.com/license.htm
    http://www.pcbutts1.com/downloads/max.htm

    Wait until you see my new one featuring the one and only Fake MVP Noel
    Paton. I will probably add it to this one
    http://www.pcbutts1.com/downloads/mpv.htm

    Lets not forget this one put up after the MVPs thought they were special
    and emailed them. They even analyzed the email thinking it was fake.
    http://www.pcbutts1.com/downloads/wtcpcb.htm .

    All four of the trolls went crazy with complaints with this one
    especially the Stalker Leythos http://www.pcbutts1.com/cracks.htm lets
    not forget this one http://www.pcbutts1.com/Louthe*******.htm .

    - -
    The best live web video on the internet
    http://www.seedsv.com/webdemo.htm
    NEW Embedded system W/Linux. We now sell DVR cards.
    See it all at http://www.seedsv.com/products.htm
    Sharpvision simply the best http://www.seedsv.com


    --

    spam999free@rrohio.com
    remove 999 in order to email me

  3. #53
    Dustin Cook Guest

    Re: Virusburst

    "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    newsZWdnW7Ah9mMOwDYnZ2dnUVZ_segnZ2d@giganews.com:

    > You ****ing troll, If what you believe is true it would have already
    > happened. What I say IS true TOLERATE it fool.
    >


    I have to respectfully disagree. Your signature is a bit misleading. I've
    known a couple of those individuals for years, and they never came across
    as trolls to myself or many other individuals.


    How many years old is your program?

    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool -V2.0
    web: http://bughunter.it-mate.co.uk
    email: bughunter.dustin@gmail.com.removethis
    Last updated: January 4th, 2007

  4. #54
    pcbutts1 Guest

    Re: Virusburst

    I started writing spyerase back in June 2005 shortly after Trojan.Zlob was
    discovered. It has been thru 3 renames.

    --

    Newsgroup Trolls. Read about mine here http://www.pcbutts1.com/downloads
    The list grows. Leythos the stalker http://www.leythosthestalker.com, David
    H. Lipman, Max M Wachtell III aka What's in a Name?, Fitz,
    Rhonda Lea Kirk, Meat Plow, F Kwatu F, George Orwell



    "Dustin Cook" <spamfilterineffect.see.sig@nowhere.com> wrote in message
    news:Xns98B0A80CFEF5HHI2948AJD832@69.28.186.121...
    > "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    > newsZWdnW7Ah9mMOwDYnZ2dnUVZ_segnZ2d@giganews.com:
    >
    >> You ****ing troll, If what you believe is true it would have already
    >> happened. What I say IS true TOLERATE it fool.
    >>

    >
    > I have to respectfully disagree. Your signature is a bit misleading. I've
    > known a couple of those individuals for years, and they never came across
    > as trolls to myself or many other individuals.
    >
    >
    > How many years old is your program?
    >
    > --
    > Dustin Cook
    > Author of BugHunter - MalWare Removal Tool -V2.0
    > web: http://bughunter.it-mate.co.uk
    > email: bughunter.dustin@gmail.com.removethis
    > Last updated: January 4th, 2007




  5. #55
    Dustin Cook Guest

    Re: Virusburst

    "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    news:VeOdnUfap6yAXADYnZ2dnUVZ_revnZ2d@giganews.com :

    > Dustin the files are analyzed and checked and verified here in my
    > office test lab.


    Then why do you release a simple script file, instead of an actual
    program which could do real content analysis, to be sure it's getting the
    right file in it's crosshairs?

    I don't know of any serious office test labs which release mass deletion
    scripts.... What's the name of this office?

    > Our test boxes are infected for weeks at a time and
    > then checked for changes they are constantly monitored and not with
    > just one infection but two and three at a time. We know what these
    > files are and what they do and how they change. I understand what you
    > are saying but you need to understand what we do to prevent from
    > happening what you say can happen. Yes it can happen but we guard
    > against it.


    Monitored for what and how? And what are you infecting them with in the
    first place? Virus's infect, trojans are not capable of infection. They'd
    be viruses if they could....Trojans.. ehh, you know as adware, spyware,
    riskware.. heh, etc... they're all trojans when it comes right down to
    it.

    > For example. a few months ago we found a file that is not
    > a windows file but a legitimate file if it is deleted it will break
    > your system, however only if you have certain software installed. We
    > find these all the time.


    This is normal in the study of malware and systems which may have some on
    them. It's not something to brag about.

    > If the malware can be removed safely without
    > deleting that file then spyerase will not delete that file. If it
    > cannot then it will be deleted and replaced on reboot with a good
    > clean file or the file is replaced before scanning and it will not be
    > included in the detection database. We did however use this method to


    detection database? What detection database? Your file is a long batch
    file that occasionally calls 3rd party programs (Strange, one would think
    a lab would develop their own software for that)... to delete files and
    stop processes which may be running in memory. I don't see any references
    to any database of any kind in your script.... No file io calls to any
    files of any kind, except for deletion...

    Your script is incapable of deciding whether or not a file is malware
    because it does not do any kind of analysis, it simply deletes any files
    that match hard coded names... Any malware that's released that goes for
    common names has the benefit of making sure your script trashes the host
    in the process of removal...

    It's one thing to have false alarms as all programs occasionally do, but
    it's never okay to treat a file as bad simply because of it's name!


    > set traps for the thieves who try to steal spyerase. I will send you
    > one such file, you analyze it and tell me if bug hunter detects it or



    Pcbutts, a question if you will...

    You mentioned spyerase was developed in 2005, correct? If that's the
    case, why do several roguefix versions I have at the shop predate it, and
    practically match several lines for lines in your spyerase?

    I've tried to be as civil with you as I possibly know how, but I'm
    convinced you've stolen those routines and don't really understand what's
    going on in the code; hence your need to release a script, and depend on
    other programs to do everything for you.

    > if you know what the file does and what program uses it. You can post
    > your answer here but don't name the file.


    The file is common with several programs, one of which is acs... It's a
    library often mistaken for being malware.


    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool -V2.0
    web: http://bughunter.it-mate.co.uk
    email: bughunter.dustin@gmail.com.removethis
    Last updated: January 4th, 2007

  6. #56
    pcbutts1 Guest

    Re: Virusburst

    You asked when I started writing spyerase only. That was in June 2005 Zlob
    was discovered in March of 2005, I've been around much longer then that. You
    should know all my scripts are similar. You talk about databases and
    software, I have all that but I work for the government and my programs are
    used only on government systems it is not available to the public. The
    government does not use COTS unless it is cheaper for specialized software.
    We write our own software. 5 years ago I wrote a tech paper on Spyware and
    submitted it to my boss. Although it was hard to believe at that time he
    took my word for it and purchased Spysweeper. That did not last long because
    it was ineffective and incompatible. I started writing my own removal
    scripts and they have since been adopted by my job. Now if you get the same
    spam email over and over again are you going to scan it or read it every
    single time before you delete it just to make sure it is spam? or are you
    going to just delete it. If you know a file is bad there is no reason to
    have to waste time scanning it. For example if you download a file called
    Leythosisastalking*******.jpg.pif you know by the name and extension that it
    is bad. Why scan it? We scan it anyways just to verify then we add it to my
    Spyerase for deletion. If we come across a file with the same name like
    appwiz.cpl, which is a legitimate windows file we don't delete it we replace
    it with a know good file. This is done before Spyerase is run during the
    install process and that file is not added to the list in Spyerase.

    As far as roguefix goes I did not know Stuart has stolen any of my scripts
    until it was brought to my attention by a friend of mine. My scripts have
    been out there for a long time and I never used to post them to the NG's
    just in the forums. To this date there are 4 people who use my scripts as
    their own with my permission simply because they asked first and did not
    steal it. So you will find it out there. I have about 20 or so scripts that
    do just about anything to a windows system. Don't ask what the name of the
    program is that I wrote for my job because I won't tell you. I am under
    contract and it has just been renewed for another 5 years so it will be a
    while.

    --

    Newsgroup Trolls. Read about mine here http://www.pcbutts1.com/downloads
    The list grows. Leythos the stalker http://www.leythosthestalker.com, David
    H. Lipman, Max M Wachtell III aka What's in a Name?, Fitz,
    Rhonda Lea Kirk, Meat Plow, F Kwatu F, George Orwell



    "Dustin Cook" <spamfilterineffect.see.sig@nowhere.com> wrote in message
    news:Xns98B0D022D498EHHI2948AJD832@69.28.186.121.. .
    > "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    > news:VeOdnUfap6yAXADYnZ2dnUVZ_revnZ2d@giganews.com :
    >
    >> Dustin the files are analyzed and checked and verified here in my
    >> office test lab.

    >
    > Then why do you release a simple script file, instead of an actual
    > program which could do real content analysis, to be sure it's getting the
    > right file in it's crosshairs?
    >
    > I don't know of any serious office test labs which release mass deletion
    > scripts.... What's the name of this office?
    >
    >> Our test boxes are infected for weeks at a time and
    >> then checked for changes they are constantly monitored and not with
    >> just one infection but two and three at a time. We know what these
    >> files are and what they do and how they change. I understand what you
    >> are saying but you need to understand what we do to prevent from
    >> happening what you say can happen. Yes it can happen but we guard
    >> against it.

    >
    > Monitored for what and how? And what are you infecting them with in the
    > first place? Virus's infect, trojans are not capable of infection. They'd
    > be viruses if they could....Trojans.. ehh, you know as adware, spyware,
    > riskware.. heh, etc... they're all trojans when it comes right down to
    > it.
    >
    >> For example. a few months ago we found a file that is not
    >> a windows file but a legitimate file if it is deleted it will break
    >> your system, however only if you have certain software installed. We
    >> find these all the time.

    >
    > This is normal in the study of malware and systems which may have some on
    > them. It's not something to brag about.
    >
    >> If the malware can be removed safely without
    >> deleting that file then spyerase will not delete that file. If it
    >> cannot then it will be deleted and replaced on reboot with a good
    >> clean file or the file is replaced before scanning and it will not be
    >> included in the detection database. We did however use this method to

    >
    > detection database? What detection database? Your file is a long batch
    > file that occasionally calls 3rd party programs (Strange, one would think
    > a lab would develop their own software for that)... to delete files and
    > stop processes which may be running in memory. I don't see any references
    > to any database of any kind in your script.... No file io calls to any
    > files of any kind, except for deletion...
    >
    > Your script is incapable of deciding whether or not a file is malware
    > because it does not do any kind of analysis, it simply deletes any files
    > that match hard coded names... Any malware that's released that goes for
    > common names has the benefit of making sure your script trashes the host
    > in the process of removal...
    >
    > It's one thing to have false alarms as all programs occasionally do, but
    > it's never okay to treat a file as bad simply because of it's name!
    >
    >
    >> set traps for the thieves who try to steal spyerase. I will send you
    >> one such file, you analyze it and tell me if bug hunter detects it or

    >
    >
    > Pcbutts, a question if you will...
    >
    > You mentioned spyerase was developed in 2005, correct? If that's the
    > case, why do several roguefix versions I have at the shop predate it, and
    > practically match several lines for lines in your spyerase?
    >
    > I've tried to be as civil with you as I possibly know how, but I'm
    > convinced you've stolen those routines and don't really understand what's
    > going on in the code; hence your need to release a script, and depend on
    > other programs to do everything for you.
    >
    >> if you know what the file does and what program uses it. You can post
    >> your answer here but don't name the file.

    >
    > The file is common with several programs, one of which is acs... It's a
    > library often mistaken for being malware.
    >
    >
    > --
    > Dustin Cook
    > Author of BugHunter - MalWare Removal Tool -V2.0
    > web: http://bughunter.it-mate.co.uk
    > email: bughunter.dustin@gmail.com.removethis
    > Last updated: January 4th, 2007




  7. #57
    Chaz P. Klinder Guest

    Re: Virusburst

    pcbutts1 wrote:
    > You asked when I started writing spyerase only. That was in June 2005 Zlob
    > was discovered in March of 2005, I've been around much longer then that. You
    > should know all my scripts are similar. You talk about databases and
    > software, I have all that but I work for the government and my programs are
    > used only on government systems it is not available to the public. The
    > government does not use COTS unless it is cheaper for specialized software.
    > We write our own software. 5 years ago I wrote a tech paper on Spyware and
    > submitted it to my boss. Although it was hard to believe at that time he
    > took my word for it and purchased Spysweeper. That did not last long because
    > it was ineffective and incompatible. I started writing my own removal
    > scripts and they have since been adopted by my job. Now if you get the same
    > spam email over and over again are you going to scan it or read it every
    > single time before you delete it just to make sure it is spam? or are you
    > going to just delete it. If you know a file is bad there is no reason to
    > have to waste time scanning it. For example if you download a file called
    > Leythosisastalking*******.jpg.pif you know by the name and extension that it
    > is bad. Why scan it? We scan it anyways just to verify then we add it to my
    > Spyerase for deletion. If we come across a file with the same name like
    > appwiz.cpl, which is a legitimate windows file we don't delete it we replace
    > it with a know good file. This is done before Spyerase is run during the
    > install process and that file is not added to the list in Spyerase.
    >
    > As far as roguefix goes I did not know Stuart has stolen any of my scripts
    > until it was brought to my attention by a friend of mine. My scripts have
    > been out there for a long time and I never used to post them to the NG's
    > just in the forums. To this date there are 4 people who use my scripts as
    > their own with my permission simply because they asked first and did not
    > steal it. So you will find it out there. I have about 20 or so scripts that
    > do just about anything to a windows system. Don't ask what the name of the
    > program is that I wrote for my job because I won't tell you. I am under
    > contract and it has just been renewed for another 5 years so it will be a
    > while.
    >



    What a crock of sh1t !

    Since Clinton became president COTS/GOTS was the preferred way to go.
    Numerous Gov't. programs were cut and/or their budgets slashed because
    they were too bloody costly. Clinton mandated that COTS solutions were
    to be found and used wherever and whenever possible. When Bush came in
    to the Whitehouse he reinforced that mandate. It has been the law of
    the land ever since.

    You say "all my scripts are similar" yet you falsely accuse noahdfear,
    S!ri and Stuart as stealing from you. The fact is all three have
    created original code. NONE are similar with S!Ri's being the most
    eloquent and complex at the same time.

    S!Ri's SmitfraudFix generation of registry fix files and VBS script
    files created on-the-fly are both advanced and yet simple and thus
    eloquent.

    Noahdfear's SmitRem use of peer utilities for the killing of running
    processes and working with the registry was done in a symbiotic
    relationship. Noahdfear had permission to use Bobbi Flekman's SWREG and
    Peacock's PROCESS utilities.

    Stuart was considered a mere "copy cat" but used his own style and
    coding methodology and used the Windows XP stock TSKILL utility.

    The fact is in Oct 2005 you were hosting Noahdfear's SmitRem utility and
    posting the suggestion for its use and you did NOT perform a complete
    Search & Replace of all occurances of 'noahdfear' replacing it with
    PCBUTTS1 and the following was easily found...

    echo.>>%systemdrive%\smitfiles.txt
    echo by noahdfear>>%systemdrive%\smitfiles.txt
    echo.>>%systemdrive%\smitfiles.txt

    You were confronted about this, edited the file, and then conveniently
    dropped hosting the file or suggesting its use. Since all there
    mentioned utilities target the same malware family, there should be
    convergence in programming structure. There is no convergence and the
    only similarity is in the targeted malware family.

    You also are clueless about malware. Any file can have any name. All
    too often an innocuous JPG file is downloaded off a web site that is a
    binary executable file not a true JPEG file. The same goes for a TXT
    file. Any file can be loaded as a "AppInit_DLLs" or "Winlogon\Notify"
    and NOT be a file named as a DLL. The file could be an innocuous TXT
    file and loaded and still perform its payload.

    Don't tell us the following is really a MP3 file !

    h**p:// www.hothotmodels.net /live.mp3


    You also have a fixation on HiJack This logs. However they are
    incomplete as many forms of malware hide from HiJack This or will NEVER
    be shown in a log. Take the Trojan-Downloader.Win32.Agent.awf as an
    example. In a Hijack This log file you may see the QuickTime stub
    "C:\Program Files\QuickTime\qttask.exe" being loaded and you'll say it
    legitimate. However HiJack This won't show you that "C:\Program
    Files\QuickTime\bak\qttask.exe" was created which is the real QuickTime
    stub and "C:\Program Files\QuickTime\qttask.exe" is the
    Trojan-Downloader.Win32.Agent.awf as noted by its date and file size.
    Points NOT shown in a HiJack This log.

    Now lets talk about the supposed theft by Stuart. Stuart is in London
    and you are in California. You have NEVER posted any links in public
    where Stuart could have found out anything of a supposed source code to
    SuperFix or SpyErase. If you were using it at NASA Stuart would have no
    way if having access to it and Stuart doesn't even access Usenet. His
    base and following was/is totally European. There is no connection or
    mention of anything prior to August 26 when
    http://www.internetinspiration.co.uk/roguefix.htm was posted with the
    suggestion of using RogueFix in alt.comp.virus . Subsequently you
    posted in 24hoursupport.helpdesk on September 3 to use SuperFix.
    Since you have been found to plagiarise so many other's code, SuperFix
    was examined and it was found to be RougeFix to a tee with a complete
    Search and Replace performed changing the name to SuperFix and
    attributes to you. The same pattern as seen with other utilities you
    have been found to have plagiarised.

    You were confronted with the facts and denied the facts and changed it
    from SuperFix to SpyErase and password protected the file with a approx.
    55 char password. However you continued to deny the theft of Stuart's
    work. Then on September 20 you announced SpyErase and that it was
    Windows 2000 compliant (which it never was) that it had "1100+
    signatures" (where it does NOT find malware via signature detection but
    by name and path location) and you posted a laundry list of rogue anti
    malware targets. In reality you went back to Stuart's web page and
    copied his target list including all the spelling errors (which was one
    of several anti-Butts detectors Stuart used) such as "Spyshefiff"
    instead of "SpySheriff". You can't state that Stuart plagiarised you
    when the web page was hosting the web page with the target name
    "Spyshefiff" PRIOR to September 20th when you copied and pasted it into
    your post.

    You are a fraud Christopher Butts !

    Oh, lets not forget that /YOU/ don't have a contract with NASA JPL. You
    are an employee of Lockheed Martin Information Technology (LMIT) and as
    such you are contracted to JPL by LMIT.


  8. #58
    pcbutts1 Guest

    Re: Virusburst

    You have no idea what you are talking about. I wrote the original code that
    noahdfear stole and modified, he improved it. I had no problem with that
    until he claimed it was his. He didn't and still don't know who I am because
    I don't post as pcbutts1 in the forums nor do I use pcbutts1.com in the
    forums. He challenged me on the ownership and lost. S!ri then used
    noahdfears code and modified that claiming it was his. I don't know where
    Stuart came from or how long he has been using my code. I then modified
    Spyerase to fully support and work on Windows 2000. I also set traps in the
    program itself so I can tell the forgery. Stuarts latest version 1.92 still
    has all the traps in it. Spyerase started at version 1.0 it is now at
    version 8.5. That BS about COTS you spewed out is just that ...BS. And I
    don't know what makes you think I use Spyerase at work. My tool that I use
    at work is much better. For the last time I am not Christopher Butts. You
    don't know me so you might as well stop trying to identify me. You also know
    nothing about NASA. JPL, or LMIT.

    Now lets take a good look at what we have so far, lets bring everybody up to
    date. You are a troll, Everyone in my sig and on my website are trolls and
    thieves. You all have failed to shut me down or stop me. You failed because
    you lie and lies do not work. You have no proof of anything so that's why
    you lie. I have proof of everything that why I'm still here. Spyerase is
    mine. Spyerase works even on 2000. Spyerase has never ruined any system. I
    have never ruined any system with my HJT advice. Leythos the stalker is so
    obsessed with me that he thinks I am talking to him because of my sig and he
    obeys, maybe I should tell him to go play on the freeway. He is so obsessed
    that he really thinks posting links to my website will be a shock to me,
    like I don't know what's there when I wrote it. what an idiot. Trolls are
    dumb. I am smart. All you dumbass trolls please keep trying to shut me down.

    --

    Newsgroup Trolls. Read about mine here http://www.pcbutts1.com/downloads
    The list grows. Leythos the stalker http://www.leythosthestalker.com, David
    H. Lipman, Max M Wachtell III aka What's in a Name?, Fitz,
    Rhonda Lea Kirk, Meat Plow, F Kwatu F, George Orwell



    "Chaz P. Klinder" <dont-spam.me@charter.net.invalid> wrote in message
    news:enptho$qv4$1@aioe.org...
    > pcbutts1 wrote:
    >> You asked when I started writing spyerase only. That was in June 2005
    >> Zlob was discovered in March of 2005, I've been around much longer then
    >> that. You should know all my scripts are similar. You talk about
    >> databases and software, I have all that but I work for the government and
    >> my programs are used only on government systems it is not available to
    >> the public. The government does not use COTS unless it is cheaper for
    >> specialized software. We write our own software. 5 years ago I wrote a
    >> tech paper on Spyware and submitted it to my boss. Although it was hard
    >> to believe at that time he took my word for it and purchased Spysweeper.
    >> That did not last long because it was ineffective and incompatible. I
    >> started writing my own removal scripts and they have since been adopted
    >> by my job. Now if you get the same spam email over and over again are you
    >> going to scan it or read it every single time before you delete it just
    >> to make sure it is spam? or are you going to just delete it. If you know
    >> a file is bad there is no reason to have to waste time scanning it. For
    >> example if you download a file called Leythosisastalking*******.jpg.pif
    >> you know by the name and extension that it is bad. Why scan it? We scan
    >> it anyways just to verify then we add it to my Spyerase for deletion. If
    >> we come across a file with the same name like appwiz.cpl, which is a
    >> legitimate windows file we don't delete it we replace it with a know good
    >> file. This is done before Spyerase is run during the install process and
    >> that file is not added to the list in Spyerase.
    >>
    >> As far as roguefix goes I did not know Stuart has stolen any of my
    >> scripts until it was brought to my attention by a friend of mine. My
    >> scripts have been out there for a long time and I never used to post them
    >> to the NG's just in the forums. To this date there are 4 people who use
    >> my scripts as their own with my permission simply because they asked
    >> first and did not steal it. So you will find it out there. I have about
    >> 20 or so scripts that do just about anything to a windows system. Don't
    >> ask what the name of the program is that I wrote for my job because I
    >> won't tell you. I am under contract and it has just been renewed for
    >> another 5 years so it will be a while.
    >>

    >
    >
    > What a crock of sh1t !
    >
    > Since Clinton became president COTS/GOTS was the preferred way to go.
    > Numerous Gov't. programs were cut and/or their budgets slashed because
    > they were too bloody costly. Clinton mandated that COTS solutions were to
    > be found and used wherever and whenever possible. When Bush came in to
    > the Whitehouse he reinforced that mandate. It has been the law of the
    > land ever since.
    >
    > You say "all my scripts are similar" yet you falsely accuse noahdfear,
    > S!ri and Stuart as stealing from you. The fact is all three have created
    > original code. NONE are similar with S!Ri's being the most eloquent and
    > complex at the same time.
    >
    > S!Ri's SmitfraudFix generation of registry fix files and VBS script files
    > created on-the-fly are both advanced and yet simple and thus eloquent.
    >
    > Noahdfear's SmitRem use of peer utilities for the killing of running
    > processes and working with the registry was done in a symbiotic
    > relationship. Noahdfear had permission to use Bobbi Flekman's SWREG and
    > Peacock's PROCESS utilities.
    >
    > Stuart was considered a mere "copy cat" but used his own style and coding
    > methodology and used the Windows XP stock TSKILL utility.
    >
    > The fact is in Oct 2005 you were hosting Noahdfear's SmitRem utility and
    > posting the suggestion for its use and you did NOT perform a complete
    > Search & Replace of all occurances of 'noahdfear' replacing it with
    > PCBUTTS1 and the following was easily found...
    >
    > echo.>>%systemdrive%\smitfiles.txt
    > echo by noahdfear>>%systemdrive%\smitfiles.txt
    > echo.>>%systemdrive%\smitfiles.txt
    >
    > You were confronted about this, edited the file, and then conveniently
    > dropped hosting the file or suggesting its use. Since all there mentioned
    > utilities target the same malware family, there should be convergence in
    > programming structure. There is no convergence and the only similarity is
    > in the targeted malware family.
    >
    > You also are clueless about malware. Any file can have any name. All too
    > often an innocuous JPG file is downloaded off a web site that is a binary
    > executable file not a true JPEG file. The same goes for a TXT file. Any
    > file can be loaded as a "AppInit_DLLs" or "Winlogon\Notify" and NOT be a
    > file named as a DLL. The file could be an innocuous TXT file and loaded
    > and still perform its payload.
    >
    > Don't tell us the following is really a MP3 file !
    >
    > h**p:// www.hothotmodels.net /live.mp3
    >
    >
    > You also have a fixation on HiJack This logs. However they are incomplete
    > as many forms of malware hide from HiJack This or will NEVER be shown in a
    > log. Take the Trojan-Downloader.Win32.Agent.awf as an example. In a
    > Hijack This log file you may see the QuickTime stub "C:\Program
    > Files\QuickTime\qttask.exe" being loaded and you'll say it legitimate.
    > However HiJack This won't show you that "C:\Program
    > Files\QuickTime\bak\qttask.exe" was created which is the real QuickTime
    > stub and "C:\Program Files\QuickTime\qttask.exe" is the
    > Trojan-Downloader.Win32.Agent.awf as noted by its date and file size.
    > Points NOT shown in a HiJack This log.
    >
    > Now lets talk about the supposed theft by Stuart. Stuart is in London and
    > you are in California. You have NEVER posted any links in public where
    > Stuart could have found out anything of a supposed source code to SuperFix
    > or SpyErase. If you were using it at NASA Stuart would have no way if
    > having access to it and Stuart doesn't even access Usenet. His base and
    > following was/is totally European. There is no connection or mention of
    > anything prior to August 26 when
    > http://www.internetinspiration.co.uk/roguefix.htm was posted with the
    > suggestion of using RogueFix in alt.comp.virus . Subsequently you posted
    > in 24hoursupport.helpdesk on September 3 to use SuperFix. Since you have
    > been found to plagiarise so many other's code, SuperFix was examined and
    > it was found to be RougeFix to a tee with a complete Search and Replace
    > performed changing the name to SuperFix and attributes to you. The same
    > pattern as seen with other utilities you have been found to have
    > plagiarised.
    >
    > You were confronted with the facts and denied the facts and changed it
    > from SuperFix to SpyErase and password protected the file with a approx.
    > 55 char password. However you continued to deny the theft of Stuart's
    > work. Then on September 20 you announced SpyErase and that it was
    > Windows 2000 compliant (which it never was) that it had "1100+ signatures"
    > (where it does NOT find malware via signature detection but by name and
    > path location) and you posted a laundry list of rogue anti malware
    > targets. In reality you went back to Stuart's web page and copied his
    > target list including all the spelling errors (which was one of several
    > anti-Butts detectors Stuart used) such as "Spyshefiff" instead of
    > "SpySheriff". You can't state that Stuart plagiarised you when the web
    > page was hosting the web page with the target name "Spyshefiff" PRIOR to
    > September 20th when you copied and pasted it into your post.
    >
    > You are a fraud Christopher Butts !
    >
    > Oh, lets not forget that /YOU/ don't have a contract with NASA JPL. You
    > are an employee of Lockheed Martin Information Technology (LMIT) and as
    > such you are contracted to JPL by LMIT.
    >




  9. #59
    Dustin Cook Guest

    Re: Virusburst

    "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    news:bpWdneQKVPkK_z3YnZ2dnUVZ_qGjnZ2d@giganews.com :

    > You asked when I started writing spyerase only. That was in June 2005
    > Zlob was discovered in March of 2005, I've been around much longer
    > then that. You should know all my scripts are similar. You talk about
    > databases and software, I have all that but I work for the government
    > and my programs are used only on government systems it is not
    > available to the public. The government does not use COTS unless it is
    > cheaper for specialized software. We write our own software. 5 years
    > ago I wrote a tech paper on Spyware and submitted it to my boss.
    > Although it was hard to believe at that time he took my word for it
    > and purchased Spysweeper. That did not last long because it was
    > ineffective and incompatible. I started writing my own removal scripts


    If your able to write such software in the first place, I would have
    thought you'd be using some of your own code; not that of someone elses.
    Your spyerase is just too similiar for it to be a coincidence... Since
    they're programs predate yours, it doesn't take a rocket scientist to
    figure out what program was based on what.


    BTW, Pcbutts, I can't prove your the one who did the hex editing on a
    modified bughunt.exe which I have since recieved, but you will be given
    credit for the new protection routines which will prevent this from
    happening in the future. I've seen you ripping script routines off for
    awhile now and said nothing, I was planning on leaving things as they
    were; the regulars do a good job of you anyhow.. But... Hex editing a
    free program? I've spent a considerable amount of time writing and
    debugging it for some lowlife POS to go and use a hex editor on my
    ****ing copyright strings!

    [Snip rest unread]
    /end of rant

  10. #60
    pcbutts1 Guest

    Re: Virusburst

    Don't give me credit It was not me. I don't steal. I suggest you try to find
    who did it and let me know because it has happened to me before. Start with
    how you found out. I think it's Nick because some of the things that were
    done to one of my programs was very slick. Password it and put traps in it.
    It will make it somewhat easier to track.Now you know how I feel.

    --

    Newsgroup Trolls. Read about mine here http://www.pcbutts1.com/downloads
    The list grows. Leythos the stalker http://www.leythosthestalker.com, David
    H. Lipman, Max M Wachtell III aka What's in a Name?, Fitz,
    Rhonda Lea Kirk, Meat Plow, F Kwatu F, George Orwell



    "Dustin Cook" <spamfilterineffect.see.sig@nowhere.com> wrote in message
    news:Xns98B1B549ECF98HHI2948AJD832@69.28.186.121.. .
    > "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    > news:bpWdneQKVPkK_z3YnZ2dnUVZ_qGjnZ2d@giganews.com :
    >
    >> You asked when I started writing spyerase only. That was in June 2005
    >> Zlob was discovered in March of 2005, I've been around much longer
    >> then that. You should know all my scripts are similar. You talk about
    >> databases and software, I have all that but I work for the government
    >> and my programs are used only on government systems it is not
    >> available to the public. The government does not use COTS unless it is
    >> cheaper for specialized software. We write our own software. 5 years
    >> ago I wrote a tech paper on Spyware and submitted it to my boss.
    >> Although it was hard to believe at that time he took my word for it
    >> and purchased Spysweeper. That did not last long because it was
    >> ineffective and incompatible. I started writing my own removal scripts

    >
    > If your able to write such software in the first place, I would have
    > thought you'd be using some of your own code; not that of someone elses.
    > Your spyerase is just too similiar for it to be a coincidence... Since
    > they're programs predate yours, it doesn't take a rocket scientist to
    > figure out what program was based on what.
    >
    >
    > BTW, Pcbutts, I can't prove your the one who did the hex editing on a
    > modified bughunt.exe which I have since recieved, but you will be given
    > credit for the new protection routines which will prevent this from
    > happening in the future. I've seen you ripping script routines off for
    > awhile now and said nothing, I was planning on leaving things as they
    > were; the regulars do a good job of you anyhow.. But... Hex editing a
    > free program? I've spent a considerable amount of time writing and
    > debugging it for some lowlife POS to go and use a hex editor on my
    > ****ing copyright strings!
    >
    > [Snip rest unread]
    > /end of rant




Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •