Before those files are added to Spyerase they are checked and confirmed not
to be system files on 4 different systems Win2000, XP, server, both laptops
and desktops. We are now running tests with Vista. There have been zero
reports from anyone so far but we do keep backups just in case. We even fix
the damage caused by the real thief's roguefix file.
--
Newsgroup Trolls. Read about mine here http://www.pcbutts1.com/downloads
The list grows. Leythos the stalker http://www.leythosthestalker.com, David
H. Lipman, Max M Wachtell III aka What's in a Name?, Fitz,
Rhonda Lea Kirk, Meat Plow, F Kwatu F, George Orwell
"Dustin Cook" <spamfilterineffect.see.sig@nowhere.com> wrote in message
news:Xns98AE14779E725HHI2948AJD832@69.28.186.121.. .
> "pcbutts1" <pcbutts1@****leythosthestalker.com> wrote in
> news:UdidnTYAJKBF6RrYnZ2dnUVZ_rylnZ2d@giganews.com :
>
>> Yes I do. The Zlob variants that Spyerase targets only generates a
>> certain pattern of various file names and only in certain directories.
>> After adding all those file new names it is very easy to see the
>> pattern. It is the very basics of how the signature detections work
>> except it is more direct. It removes the files from the folders and
>> the registry. There are a lot it removes that others miss including
>> SAS. As much as I don't like Nick I still send him samples that I find
>> that SAS misses.
>>
>
> Sorry for the huge delay in a reply, I have been out of state...
>
> I've taken another look at your batch file, and it can easily delete
> innocent files should one or more of them happen to be named as in your
> script. Your batch file relies on file name and location only to determine
> if the file is malware or not. No further checking is done by you. This
> puts the user in a very bad situation, imho as you offer no way to undo
> the
> damage.
>
> --
> Dustin Cook
> Author of BugHunter - MalWare Removal Tool -V2.0
> web: http://bughunter.it-mate.co.uk
> email: bughunter.dustin@gmail.com.removethis
> Last updated: January 4th, 2007


Reply With Quote