Page 7 of 9 FirstFirst ... 56789 LastLast
Results 61 to 70 of 84

Thread: Virusburst

  1. #61
    Dustin Cook Guest

    Re: Virusburst

    "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    news:q4adnULc6PSLEjzYnZ2dnUVZ_vCknZ2d@giganews.com :

    > Don't give me credit It was not me. I don't steal. I suggest you try
    > to find who did it and let me know because it has happened to me
    > before. Start with how you found out. I think it's Nick because some
    > of the things that were done to one of my programs was very slick.
    > Password it and put traps in it. It will make it somewhat easier to
    > track.Now you know how I feel.


    You don't steal? Hmm...Strange, the evidence would indicate otherwise...

    Your programs are.. ehh, scripts.. They aren't the same, not even in the
    same league.

    PcButts, you claim to be a programmer, yes? Well then, I present you a
    very simple source code snippit below. The code is quiet harmless. I'd
    like for you to tell me what each set of instructions is doing. If you do
    understand whats going on in the pc, than this code should be a cinche
    for you to figure it out. If you really do write real applications and
    don't just steal scripts from people, what does the code below do?

    mov ax,5301
    xor bx,bx
    int 15
    mov ax,530e
    mov cx,0102
    int 15
    mov ax,5307
    mov bl,01
    mov cx,0003
    int 15



    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool -V2.0
    web: http://bughunter.it-mate.co.uk
    email: bughunter.dustin@gmail.com.removethis
    Last updated: January 4th, 2007

  2. #62
    Leythos Guest

    Re: Virusburst

    In article <Xns98B1CC738F513HHI2948AJD832@69.28.186.121>,
    spamfilterineffect.see.sig@nowhere.com says...
    > If you really do write real applications and
    > don't just steal scripts from people, what does the code below do?
    >
    > mov ax,5301
    > xor bx,bx
    > int 15
    > mov ax,530e
    > mov cx,0102
    > int 15
    > mov ax,5307
    > mov bl,01
    > mov cx,0003
    > int 15
    >


    You've got to be kidding - he won't know.

    --
    Want to know what PCBUTTS1 is really about?
    *** WARNING - these links contain foul/pornographic content of an
    abusive nature created by PCBUTTS1 and still hosted on his public
    website ***
    http://www.pcbutts1.com/rlk/rlk.htm ,
    http://www.pcbutts1.com/license.htm ,
    http://www.pcbutts1.com/downloads/max.htm ,
    http://www.pcbutts1.com/downloads/mpv.htm ,
    http://www.pcbutts1.com/downloads/wtcpcb.htm ,
    http://www.pcbutts1.com/cracks.htm ,
    http://www.pcbutts1.com/Louthe*******.htm
    All while spamming his company website at: http://www.seedsv.com

  3. #63
    Nick Skrepetos Guest

    Re: Virusburst


    pcbutts1 wrote:
    > Don't give me credit It was not me. I don't steal. I suggest you try to find
    > who did it and let me know because it has happened to me before. Start with
    > how you found out. I think it's Nick because some of the things that were
    > done to one of my programs was very slick. Password it and put traps in it.
    > It will make it somewhat easier to track.Now you know how I feel.
    >
    > --
    >


    PCButts - you better be careful about accusing me of anything. You are
    smarter than to rip me off, or rip my products off because you know I
    will have you in court faster than you can blink. I put out a challenge
    to you regarding technical knowledge, etc. and you declined - so leave
    me out of your rants and comments.

    Thanks!


  4. #64
    pcbutts1 Guest

    Re: Virusburst

    Look I'm not going to sit here and argue assembly language with you or
    anybody. It won't do any good your mind is already made up. You are starting
    to sound like Nick. If you want to argue with someone then argue with
    Leythos the stalker he claims to be a programmer he probably modified your
    code. It was not me. Ask leythos the stalker what happened to his Newsfeed
    account.

    --

    Newsgroup Trolls. Read about mine here http://www.pcbutts1.com/downloads
    The list grows. Leythos the stalker http://www.leythosthestalker.com, David
    H. Lipman, Max M Wachtell III aka What's in a Name?, Fitz,
    Rhonda Lea Kirk, Meat Plow, F Kwatu F, George Orwell



    "Dustin Cook" <spamfilterineffect.see.sig@nowhere.com> wrote in message
    news:Xns98B1CC738F513HHI2948AJD832@69.28.186.121.. .
    > "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    > news:q4adnULc6PSLEjzYnZ2dnUVZ_vCknZ2d@giganews.com :
    >
    >> Don't give me credit It was not me. I don't steal. I suggest you try
    >> to find who did it and let me know because it has happened to me
    >> before. Start with how you found out. I think it's Nick because some
    >> of the things that were done to one of my programs was very slick.
    >> Password it and put traps in it. It will make it somewhat easier to
    >> track.Now you know how I feel.

    >
    > You don't steal? Hmm...Strange, the evidence would indicate otherwise...
    >
    > Your programs are.. ehh, scripts.. They aren't the same, not even in the
    > same league.
    >
    > PcButts, you claim to be a programmer, yes? Well then, I present you a
    > very simple source code snippit below. The code is quiet harmless. I'd
    > like for you to tell me what each set of instructions is doing. If you do
    > understand whats going on in the pc, than this code should be a cinche
    > for you to figure it out. If you really do write real applications and
    > don't just steal scripts from people, what does the code below do?
    >
    > mov ax,5301
    > xor bx,bx
    > int 15
    > mov ax,530e
    > mov cx,0102
    > int 15
    > mov ax,5307
    > mov bl,01
    > mov cx,0003
    > int 15
    >
    >
    >
    > --
    > Dustin Cook
    > Author of BugHunter - MalWare Removal Tool -V2.0
    > web: http://bughunter.it-mate.co.uk
    > email: bughunter.dustin@gmail.com.removethis
    > Last updated: January 4th, 2007




  5. #65
    pcbutts1 Guest

    Re: Virusburst

    I believe you did steal it you and Leythos the stalker. You probably did it
    and planted it somewhere to make it look like I did it. Sent Dustin a bogus
    email or something. You can threaten me all you want Nick but until I do
    something illegal there is nothing you or your attorney can do about it.
    This link is still valid Nick.
    http://www.pcbutts1.com/downloads/SUPERAntiSpyware.exe



    --

    Newsgroup Trolls. Read about mine here http://www.pcbutts1.com/downloads
    The list grows. Leythos the stalker http://www.leythosthestalker.com, David
    H. Lipman, Max M Wachtell III aka What's in a Name?, Fitz,
    Rhonda Lea Kirk, Meat Plow, F Kwatu F, George Orwell



    "Nick Skrepetos" <nskrepetos@yahoo.com> wrote in message
    news:1168226637.362325.61970@51g2000cwl.googlegrou ps.com...
    >
    > pcbutts1 wrote:
    >> Don't give me credit It was not me. I don't steal. I suggest you try to
    >> find
    >> who did it and let me know because it has happened to me before. Start
    >> with
    >> how you found out. I think it's Nick because some of the things that were
    >> done to one of my programs was very slick. Password it and put traps in
    >> it.
    >> It will make it somewhat easier to track.Now you know how I feel.
    >>
    >> --
    >>

    >
    > PCButts - you better be careful about accusing me of anything. You are
    > smarter than to rip me off, or rip my products off because you know I
    > will have you in court faster than you can blink. I put out a challenge
    > to you regarding technical knowledge, etc. and you declined - so leave
    > me out of your rants and comments.
    >
    > Thanks!
    >




  6. #66
    Dustin Cook Guest

    Re: Virusburst

    Leythos <void@nowhere.lan> wrote in news:MPG.200b6f44227a70d8989680@news-
    server.columbus.rr.com:

    > In article <Xns98B1CC738F513HHI2948AJD832@69.28.186.121>,
    > spamfilterineffect.see.sig@nowhere.com says...
    >> If you really do write real applications and
    >> don't just steal scripts from people, what does the code below do?
    >>
    >> mov ax,5301
    >> xor bx,bx
    >> int 15
    >> mov ax,530e
    >> mov cx,0102
    >> int 15
    >> mov ax,5307
    >> mov bl,01
    >> mov cx,0003
    >> int 15
    >>

    >
    > You've got to be kidding - he won't know.
    >


    You know, I somewhat expected him to cheat and just look it up. It's not
    quiet that easy tho, as those instructions do one simple task.. but they
    have to be done in that order.

    It's by no means difficult code nor is it hard to understand for anyone
    who actually does program; even if assembler isn't your forte; you could,
    as I said look it up and be able to determine what it's doing.


    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool -V2.0
    web: http://bughunter.it-mate.co.uk
    email: bughunter.dustin@gmail.com.removethis
    Last updated: January 4th, 2007

  7. #67
    Dustin Cook Guest

    Re: Virusburst

    "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    news:kICdnVt50vivJzzYnZ2dnUVZ_vShnZ2d@giganews.com :

    > Look I'm not going to sit here and argue assembly language with you or
    > anybody. It won't do any good your mind is already made up. You are


    I wasn't attempting to start an Argument, I simply wanted an idea of your
    ... ehh, programming skillset. Since you wouldn't even take a guess, nor
    do you apparently know how to cheat and just look up the routines, you
    want to play word games instead; It makes me really suspect you are,
    generally speaking, full of ****, AND, a code thief.

    > starting to sound like Nick. If you want to argue with someone then
    > argue with Leythos the stalker he claims to be a programmer he
    > probably modified your code. It was not me. Ask leythos the stalker
    > what happened to his Newsfeed account.


    That's the thing, the code itself isn't modified, only a couple of my
    text strings, and only partially. Btw, the person whom did the hex
    editing disabled one of the logging commands...Another reason you should
    only download programs from the author. They tend to work as designed
    that way.

    Your spyerase program is a garbled together patch job of other people's
    work. It doesn't do everything you've said, either. No backups, no
    renaming, just deletion and possibly replace if you can find what you
    call a clean backup. I've done a silly test with your program. I made it
    look for a file it thought was bad, due to your stupid method of
    detection (filenames only) and guess what? It replaced the "bad" file
    with a byte for byte duplicate it thinks is clean, simply because of the
    folder in which it found the copy!

    BugHunter is by no means perfect, It can/does/has suffered from false
    alarms, but that's certainly NOT due to some silly "if file says
    britneystits.exe" it MUST be bad.


    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool -V2.0
    web: http://bughunter.it-mate.co.uk
    email: bughunter.dustin@gmail.com.removethis
    Last updated: January 4th, 2007

  8. #68
    Dustin Cook Guest

    Re: Virusburst

    "pcbutts1" <pcbutts1@leythosthestalker.com> wrote in
    news:zK-dnY_4MqAKXTzYnZ2dnUVZ_ragnZ2d@giganews.com:

    > I believe you did steal it you and Leythos the stalker. You probably
    > did it and planted it somewhere to make it look like I did it. Sent
    > Dustin a bogus email or something.


    Highly doubtful.

    > You can threaten me all you want
    > Nick but until I do something illegal there is nothing you or your
    > attorney can do about it. This link is still valid Nick.
    > http://www.pcbutts1.com/downloads/SUPERAntiSpyware.exe


    And yet, Nick has asked that you not host his program; as he can't
    guarantee the file you have is the same as the one he has for download.

    You willingly violate an authors request; accuse him of things everyone
    knows isn't true, and then expect anyone to take you seriously?

    You know pcbutts, I did some dirty things several years ago, but one thing
    I never did was steal code and claim it as my own! You are as bad as
    pondscum.


    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool -V2.0
    web: http://bughunter.it-mate.co.uk
    email: bughunter.dustin@gmail.com.removethis
    Last updated: January 4th, 2007

  9. #69
    Nick Skrepetos Guest

    Re: Virusburst


    pcbutts1 wrote:
    > I believe you did steal it you and Leythos the stalker. You probably did it
    > and planted it somewhere to make it look like I did it. Sent Dustin a bogus
    > email or something. You can threaten me all you want Nick but until I do
    > something illegal there is nothing you or your attorney can do about it.
    > This link is still valid Nick.
    > http://www.pcbutts1.com/downloads/SUPERAntiSpyware.exe
    >


    You are misleading people thinking they can download from your link.
    That is costing me business, which equals money - that is the basis of
    a lawsuit.

    I am sure lots of people here have tried to download SUPERAntiSpyware
    here with the intetion to possibly purchase and then did not do so
    because the link you provided was invalid.

    In fact, those of you that are willing to sign a written statement to
    that fact, please contact me directly.


  10. #70
    Default User Guest

    Re: Virusburst

    On 7 Jan 2007 20:46:45 -0800, "Nick Skrepetos" <nskrepetos@yahoo.com>
    wrote:

    >
    >pcbutts1 wrote:
    >> I believe you did steal it you and Leythos the stalker. You probably did it
    >> and planted it somewhere to make it look like I did it. Sent Dustin a bogus
    >> email or something. You can threaten me all you want Nick but until I do
    >> something illegal there is nothing you or your attorney can do about it.
    >> This link is still valid Nick.
    >> http://www.pcbutts1.com/downloads/SUPERAntiSpyware.exe
    >>

    >
    >You are misleading people thinking they can download from your link.
    >That is costing me business, which equals money - that is the basis of
    >a lawsuit.
    >
    >I am sure lots of people here have tried to download SUPERAntiSpyware
    >here with the intetion to possibly purchase and then did not do so
    >because the link you provided was invalid.
    >
    >In fact, those of you that are willing to sign a written statement to
    >that fact, please contact me directly.


    Not only that, but he is using your copyright on the name SUPERAntiSpyware
    on his site, which could give you the right to confiscate his domain. It's
    no different than confiscating the domain of a Phish perpetrator, and in
    this case I'd say any reasonable person would believe he is usurping your
    good name for illegal purposes.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •