Results 1 to 7 of 7

Thread: Definition, Dangers, and Examples of Hackware

  1. #1
    Gerald309 Guest

    Definition, Dangers, and Examples of Hackware

    Definition, Dangers, and Examples of Hackware
    Posted: Wed Jul 04, 2007 2:27 am Post subject: Definition, Dangers,
    and Examples of Hackware

    (This would apply to utilities here, not full programs.)

    REFERENCES TO AVOID HACKWARE REMOVAL UTILITIES:

    BlueCollarPC.Net
    Hackware: Examples of hackware... beware!
    FILE: http://www.bluecollarpc.net/download...s-Examples.txt

    Lavasoft Ad Aware: Terms Of Service
    http://www.lavasoftsupport.com/index.php?act=boardrules
    We do not support any method of cracking, warez, workarounds,
    providing any methods, tools, or posting of links designed for this
    express purpose. [Removals]

    Enigma Software Group Responds
    http://www.enigmasoftware.com/suppor...ing-spyhunter/
    "....In addition to Symantec, other competitors of Enigma, including
    Malwarebytes.org, SecurityCadets.com, MalwareTeks.com, and Temerc.com,
    have been coordinating a campaign to have SpyHunter listed as rogue
    software. Each of these entities is a competitor of Enigma Software
    Group that either has competing products or is an affiliate of
    competing products. Enigma is evaluating closely its legal options
    with respect to this anticompetitive campaign...."

    Why do you little unprofessional ACADEMIC HACKS challenge professional
    and expert sharewares? Are you really claiming - "it is the little
    guys versus the big guys - c'mon help us out with a donation to keep
    our free software onboard".

    And of course the FIRST lesson in PC Security has been against "Free
    Stuff" shopping:

    RELATED ARTICLE:
    Itchy Hands » A quick » non-geeky guide to removing malware and ...
    http://www.itchyhands.com/2006/01/04...alware-removal
    Don't simply download 'free stuff'. Many times the free stuff is just
    a lure for you to download and install a programme that is full of
    malware. ...

    The BlueCollarPC.Net joins in the Total Majority of World Computer
    Users in recommending professional expert antispyware shareware
    software programs for personal and computer security.
    --------------------------/.
    FILE:
    http://www.bluecollarpc.net/download...s-Examples.txt
    SOURCE:
    http://www.bluecollarpc.net/pcsafetyfiles.html
    Hackware Example: Vista Transformation Pack ....
    Moderator:
    The term "hackware" is a term I apply to describe any type of software
    or utility that over-writes any part of Windows which includes
    Internet Explorer, which are 'good-guy hacks' but nevertheless should
    examined with "extreme prejudice". You must decide if any over-write
    of Windows is going to be compatible and stable and non-interfering in
    the many actions conducted. This applies to normal maintenance as well
    in disk clean ups and defragging, registry cleaning, volume error
    checks, and so on. It is also applies with "hang time" of the normal
    navigation now being re-routed through hackwares that in over-writing
    Windows are adding more short-cuts and other mappings. Generally, most
    hackwares are written by the 'good guy hacks' that are most times
    talented and create some real time savers for generally $20.00 that
    are really simple re-written and re-mapped short cuts to utilities
    that already exist in Windows - such as the Windows utilities of disk
    clean up, defrag of disks, history and temporary files clean up and so
    on. You can look at these in two ways. One, the person(s) are complete
    rip-offs taking advantage of the un-knowing public that most or all
    these are Windows utilities already in the computer - - - or two, that
    so what, they save the manual time and all the clicks and is worth
    that $20.00 to me for the convenience. The latter is generally the
    case and thank you for the creations ! Definite, generally safe, time
    savers. Those are the most common on the world web and many times
    there are genuine freeware ones that are not ad-driven popped up or
    bundled with any adware or spyware (working-freewares).

    However, there are also the "bad-guy hacks" which is really all that
    much malware is - including adware and spywares. These bad-hacks of
    course are written commands to do so and so as over-writing Windows
    commands externally to perform their malicious intent. Most times this
    bad "hackware" does interfere with Windows and Internet Explorer and
    makes things unstable until it is removed - immediately of course. So
    my comment is to really watch out on any hack software or utility you
    wish to install in your computer. There are perhaps many "wanabees"
    among good-guy hacks as software/utility writers/creators that are
    just not that talented yet obviously, when you may experience
    instability and freeze ups from their product. The simple way out is
    to uninstall and move on. However, many times a "thrifty software
    writer" will not include an uninstaller and the product is also
    lacking the language of writing it in to the > Control Panel > Add/
    Remove Programs for it to be uninstalled with a click. So there again,
    you must examine any 'hackware' package with "extreme prejudice" to
    avoid hassles.

    Below is an "over-write" hackware as example 'fresh off the presses'.
    This type is doing the actual real overwrite of the existing Windows
    and Internet Explorer in appearance and navigation. These are the
    worst danger to observe, as - if imperfect - are extremely unstable
    and loaded with all extra shortcut and display file and registry
    entries. There is absolutely nothing here implied by me about this
    product example below - but that it is a very good example for the
    purpose of the content of my message to owner/users of computers
    running the Windows Operating System with Internet Explorer. In other
    words, if a software or program or utility software is not from
    Microsoft as part of the included Windows System and is manipulating
    it for you - it is "hackware". Hack is simply the term loosely applied
    to a software writer and/or programmer that is able to write things
    externally to operate the Windows OS - a "hack".

    Hack - Definition:
    http://en.wikipedia.org/wiki/Computer_hacker
    "Academice hackers: In the Academic hacker culture, a computer hacker
    is a person who enjoys designing software and building programs with a
    sense for aesthetics and playful cleverness."

    Hi Jack This Utility (Hackware Warning):
    http://www.bleepingcomputer.com/tuto...utorial42.html
    BRIEF: "If you delete items that it shows, without knowing what they
    are, it can lead to other problems such as your Internet no longer
    working or problems with running Windows itself. You should also
    attempt to clean the Spyware/Hijacker/Trojan with all other methods
    before using HijackThis. If you allow HijackThis to remove entries
    before another removal tool scans your computer, the files from the
    Hijacker/Spyware will still be left on your computer and future
    removal tools will not be able to find them. "

    So for all free stuff shoppers at the majors of geeks website (you
    know the one) ....
    Is this the bottom line for all the off-the-wall utilities offered
    there in the "free shop" (and other places like them) but are actually
    deceptive adverstising as "freeware" which can not ask for a
    donation...
    Is this the bottom line that they are :

    Threat:
    Pretexting: Pretending to be a legitimate entity to lure people to
    malicious sites.

    That is not that far of a stretch and with Organizations like the
    Software Business Alliance around it would not surprise me that there
    would be a "Shareware Business Alliance" arise and legally have them
    shut down as damaging to computer equipment.
    You have one question to ask yourself ...
    Do you really want to see the glut of a $1.00 "Guessware" software hit
    the Internet - and is already here in some areas as the major geekos
    site ? Guessware because you have to guess if it will work or not ?


    MODERATOR
    food for thought

    EXAMPLE OF "HACKWARES"
    Vista Transformation Pack
    http://www.pcworld.com/downloads/fil...ml?tk=nl_Top10
    License Type: Free
    Price: Free
    Date Added: Nov 2006
    Operating Systems: Windows XP
    File Size: 30200KB
    Downloads Count: 76263
    Get the Vista look, but beware of hairy install.
    If you're just dying for the Vista look, and have the courage to deal
    with a scary installation, grab a copy of Vista Transformation Pack 6.
    It makes XP look, feel, and to some extent, act like Vista using
    icons, themes, a docking bar, and a new clock. It uninstalls like any
    other application, but make sure to set a Restore Point just in case.
    Note: The installation on this program is tricky and not for those
    with a weak stomach. If you have problems feel free to contact the
    developer.

    _________________
    *****Forum Moderator *****
    BlueCollarPC.Net Forums Spyware Removal and Computing Safety
    http://bluecollarpc.net/phpbb2/index.php
    TOPIC# http://bluecollarpc.net/phpbb2/viewtopic.php?t=346


  2. #2
    Dustin Cook Guest

    Re: Definition, Dangers, and Examples of Hackware

    Gerald309 <gerald309@gmail.com> wrote in
    news:1184115871.722070.322590@g4g2000hsf.googlegro ups.com:

    > Definition, Dangers, and Examples of Hackware
    > Posted: Wed Jul 04, 2007 2:27 am Post subject: Definition, Dangers,
    > and Examples of Hackware
    >
    > (This would apply to utilities here, not full programs.)


    Cripes. I thought posts from others were sometimes painful to read. Yours
    however takes the cake.

    > Enigma Software Group Responds
    > http://www.enigmasoftware.com/suppor...up-responds-to
    > -symantec-corporation-listing-spyhunter/ "....In addition to Symantec,
    > other competitors of Enigma, including Malwarebytes.org,
    > SecurityCadets.com, MalwareTeks.com, and Temerc.com, have been
    > coordinating a campaign to have SpyHunter listed as rogue software.
    > Each of these entities is a competitor of Enigma Software Group that
    > either has competing products or is an affiliate of competing
    > products. Enigma is evaluating closely its legal options with respect
    > to this anticompetitive campaign...."


    I believe BugHunter detects spyhunter as a rogue application as well. I'd
    have to check to be sure. It's classified as rogue for it's
    unprofessional actions and malicious activities.


    > Why do you little unprofessional ACADEMIC HACKS challenge professional
    > and expert sharewares? Are you really claiming - "it is the little
    > guys versus the big guys - c'mon help us out with a donation to keep
    > our free software onboard".


    Professional and expert sharewares? WTF... Please explain in english,
    what the hell it is you mean?

    > The term "hackware" is a term I apply to describe any type of software
    > or utility that over-writes any part of Windows which includes
    > Internet Explorer, which are 'good-guy hacks' but nevertheless should
    > examined with "extreme prejudice". You must decide if any over-write
    > of Windows is going to be compatible and stable and non-interfering in



    overwrite of windows? You don't actually have much of a clue huh?

    > the many actions conducted. This applies to normal maintenance as well
    > in disk clean ups and defragging, registry cleaning, volume error


    Wouldn't you be checking the volume before attempting to defrag it?
    Are you using all of these terms to further confuse people?

    > checks, and so on. It is also applies with "hang time" of the normal
    > navigation now being re-routed through hackwares that in over-writing
    > Windows are adding more short-cuts and other mappings. Generally, most



    Overwriting? What the hell do you mean?

    > these are Windows utilities already in the computer - - - or two, that
    > so what, they save the manual time and all the clicks and is worth
    > that $20.00 to me for the convenience. The latter is generally the


    Heh, the utilities which often come with windows are inferior in many
    ways to their commercial optional replacement counterparts. If your
    trying to claim in any possible way that defrag is better than disk
    keeper (even tho, it's essentially the same engine, just seriously
    stripped down) your crazy.

    Windows comes with wordpad, It doesn't take the place of word however.

    > However, there are also the "bad-guy hacks" which is really all that
    > much malware is - including adware and spywares. These bad-hacks of
    > course are written commands to do so and so as over-writing Windows
    > commands externally to perform their malicious intent. Most times this
    > bad "hackware" does interfere with Windows and Internet Explorer and
    > makes things unstable until it is removed - immediately of course. So
    > my comment is to really watch out on any hack software or utility you
    > wish to install in your computer. There are perhaps many "wanabees"
    > among good-guy hacks as software/utility writers/creators that are
    > just not that talented yet obviously, when you may experience
    > instability and freeze ups from their product. The simple way out is



    Must be alot of wannabes working on linux programs then. I've seen many
    just close xwindows without so much as an error screen. The same really
    could be said for any platform. You have your good developers and your
    bad ones. The OS doesn't matter.

    > to uninstall and move on. However, many times a "thrifty software
    > writer" will not include an uninstaller and the product is also
    > lacking the language of writing it in to the > Control Panel > Add/



    I don't think you have any idea of what your talking about now. lacking
    the language of writing it in to the control panel? Ehh, it's a registry
    key to be listed there. You can do that with anything.

    > Remove Programs for it to be uninstalled with a click. So there again,
    > you must examine any 'hackware' package with "extreme prejudice" to
    > avoid hassles.


    Do all linux apps remove with just a click?

    > product example below - but that it is a very good example for the
    > purpose of the content of my message to owner/users of computers
    > running the Windows Operating System with Internet Explorer. In other
    > words, if a software or program or utility software is not from
    > Microsoft as part of the included Windows System and is manipulating
    > it for you - it is "hackware". Hack is simply the term loosely applied
    > to a software writer and/or programmer that is able to write things
    > externally to operate the Windows OS - a "hack".


    You are using the terminology loosely. And it's insulting.

    > So for all free stuff shoppers at the majors of geeks website (you
    > know the one) ....
    > Is this the bottom line for all the off-the-wall utilities offered
    > there in the "free shop" (and other places like them) but are actually
    > deceptive adverstising as "freeware" which can not ask for a
    > donation...
    > Is this the bottom line that they are :


    BugHunter certainly is freeware sir. Donations are entirely optional, yet
    welcome. The program doesn't encourage you to donate either way. If you
    want to donate, you can. I don't hassle you about it.

    BugHunter does not advertise anything whatsoever. It is what it is, a
    free tool for removing malware.

    > Threat:
    > Pretexting: Pretending to be a legitimate entity to lure people to
    > malicious sites.



    Your so full of misinformation it's not even funny.
    You don't really make any sense either. Are you 15 or something?

    > Do you really want to see the glut of a $1.00 "Guessware" software hit
    > the Internet - and is already here in some areas as the major geekos
    > site ? Guessware because you have to guess if it will work or not ?


    If you have to guess, I wouldn't allow you to work for me.

    >
    > MODERATOR
    > food for thought


    Food for thought: You are a ****ing moron.


    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool - v2.2c
    email: bughunter.dustin@gmail.com.removethis
    web..: http://bughunter.it-mate.co.uk
    Pad..: http://bughunter.it-mate.co.uk/pad.xml


  3. #3
    David H. Lipman Guest

    Re: Definition, Dangers, and Examples of Hackware

    From: "Dustin Cook" <spamfilterineffect.see.sig@nowhere.com>

    < snip >

    >> Enigma Software Group Responds
    >> http://www.enigmasoftware.com/suppor...up-responds-to
    >> -symantec-corporation-listing-spyhunter/ "....In addition to Symantec,
    >> other competitors of Enigma, including Malwarebytes.org,
    >> SecurityCadets.com, MalwareTeks.com, and Temerc.com, have been
    >> coordinating a campaign to have SpyHunter listed as rogue software.
    >> Each of these entities is a competitor of Enigma Software Group that
    >> either has competing products or is an affiliate of competing
    >> products. Enigma is evaluating closely its legal options with respect
    >> to this anticompetitive campaign...."

    |
    | I believe BugHunter detects spyhunter as a rogue application as well. I'd
    | have to check to be sure. It's classified as rogue for it's
    | unprofessional actions and malicious activities.
    |

    < snip >

    I followed the ENTIRE thread on SpywareWarrior from beginning toend when Enigma's Alvin
    Estevez tried to defend their software. Alvin actually asked for full contact information
    on all posters of the thread. He was denied this information. It was believed he would try
    to sue the participants for acting in a fashion that woud impeed their ability to make a
    profit (I forget the more exacting terminology). Enigma is a for-profit, publicly traded,
    company.

    I strongly urge *ALL* to read the ORGINAL thread of 4/26 on SpywareWarrior.
    http://spywarewarrior.com/viewtopic.php?t=24810

    Note what was being dealt with was the spamvertising of so-called anti malware removal
    utilities that were really SpyHunter disguised and the non-disclosure you had to BUY the
    software for it to actualy remove the malware. Additionally many affilities would obtain
    accounts in HJT forums and break into threads spamvertising said utilities.

    I don't know why CBGerry (aka; Gerald309) is quoting Enigma's web site but It only
    diminishes any positives thoughts I may have had about him.

    --
    Dave
    http://www.claymania.com/removal-trojan-adware.html
    http://www.ik-cs.com/got-a-virus.htm



  4. #4
    cmsix Guest

    Re: Definition, Dangers, and Examples of Hackware


    "David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message
    news:N5gli.3435$Y_3.326@trnddc04...
    > From: "Dustin Cook" <spamfilterineffect.see.sig@nowhere.com>
    >
    > < snip >
    >
    >>> Enigma Software Group Responds
    >>> http://www.enigmasoftware.com/suppor...up-responds-to
    >>> -symantec-corporation-listing-spyhunter/ "....In addition to Symantec,
    >>> other competitors of Enigma, including Malwarebytes.org,
    >>> SecurityCadets.com, MalwareTeks.com, and Temerc.com, have been
    >>> coordinating a campaign to have SpyHunter listed as rogue software.
    >>> Each of these entities is a competitor of Enigma Software Group that
    >>> either has competing products or is an affiliate of competing
    >>> products. Enigma is evaluating closely its legal options with respect
    >>> to this anticompetitive campaign...."

    > |
    > | I believe BugHunter detects spyhunter as a rogue application as well.
    > I'd
    > | have to check to be sure. It's classified as rogue for it's
    > | unprofessional actions and malicious activities.
    > |
    >
    > < snip >
    >
    > I followed the ENTIRE thread on SpywareWarrior from beginning toend when
    > Enigma's Alvin
    > Estevez tried to defend their software. Alvin actually asked for full
    > contact information
    > on all posters of the thread. He was denied this information. It was
    > believed he would try
    > to sue the participants for acting in a fashion that woud impeed their
    > ability to make a
    > profit (I forget the more exacting terminology). Enigma is a for-profit,
    > publicly traded,
    > company.
    >
    > I strongly urge *ALL* to read the ORGINAL thread of 4/26 on
    > SpywareWarrior.
    > http://spywarewarrior.com/viewtopic.php?t=24810
    >
    > Note what was being dealt with was the spamvertising of so-called anti
    > malware removal
    > utilities that were really SpyHunter disguised and the non-disclosure you
    > had to BUY the
    > software for it to actualy remove the malware. Additionally many
    > affilities would obtain
    > accounts in HJT forums and break into threads spamvertising said
    > utilities.
    >
    > I don't know why CBGerry (aka; Gerald309) is quoting Enigma's web site but
    > It only
    > diminishes any positives thoughts I may have had about him.


    Funny, it didn't detract at all from my original estimation. Maybe it has
    something to do with where I started.

    cmsix

    >
    > --
    > Dave
    > http://www.claymania.com/removal-trojan-adware.html
    > http://www.ik-cs.com/got-a-virus.htm
    >
    >




  5. #5
    Default User Guest

    Re: Definition, Dangers, and Examples of Hackware

    On Thu, 12 Jul 2007 02:57:44 GMT, "cmsix" <cmsix@hotmail.com> wrote:

    >> I don't know why CBGerry (aka; Gerald309) is quoting Enigma's web site but
    >> It only
    >> diminishes any positives thoughts I may have had about him.

    >
    >Funny, it didn't detract at all from my original estimation. Maybe it has
    >something to do with where I started.


    No, I had the same response to his potings and have yet to reply to any of
    them. He appears to be just another "I-think-I'm-an-expert" n00b with
    half-a-clue.

  6. #6
    Maximus the Mad Guest

    Re: Definition, Dangers, and Examples of Hackware

    Dustin Cook aka spamfilterineffect.see.sig@nowhere.com on 7/11/2007 at
    9:40:07 PM in
    alt.privacy.spyware<Xns996ADD04988C6HHI2948AJD832@ 69.28.186.121> after
    much thought,came up with this jewel:

    > Gerald309 <gerald309@gmail.com> wrote in
    > news:1184115871.722070.322590@g4g2000hsf.googlegro ups.com:
    >
    > > Definition, Dangers, and Examples of Hackware
    > > Posted: Wed Jul 04, 2007 2:27 am Post subject: Definition,
    > > Dangers, and Examples of Hackware
    > >
    > > (This would apply to utilities here, not full programs.)

    >
    > Cripes. I thought posts from others were sometimes painful to read.
    > Yours however takes the cake.


    I almost cross-posted his ramblings to AUK + 24HD. K-Man and the others
    would have a field day.

    max
    --
    Virus Removal http://www.freespaces.com/maxwachtel/removal.html
    Keep Clean http://www.freespaces.com/maxwachtel/keepingclean.html
    Tools http://www.freespaces.com/maxwachtel/tools.html
    Change nomail.afraid.org to gmail.com to reply by e-mail.

  7. #7
    Dustin Cook Guest

    Re: Definition, Dangers, and Examples of Hackware

    "Maximus the Mad" <maxwachtel@nomail.afraid.org> wrote in
    news:xn0f8mi3117e9f000@news.albasani.net:

    > Dustin Cook aka spamfilterineffect.see.sig@nowhere.com on 7/11/2007 at
    > 9:40:07 PM in
    > alt.privacy.spyware<Xns996ADD04988C6HHI2948AJD832@ 69.28.186.121> after
    > much thought,came up with this jewel:
    >
    >> Gerald309 <gerald309@gmail.com> wrote in
    >> news:1184115871.722070.322590@g4g2000hsf.googlegro ups.com:
    >>
    >> > Definition, Dangers, and Examples of Hackware
    >> > Posted: Wed Jul 04, 2007 2:27 am Post subject: Definition,
    >> > Dangers, and Examples of Hackware
    >> >
    >> > (This would apply to utilities here, not full programs.)

    >>
    >> Cripes. I thought posts from others were sometimes painful to read.
    >> Yours however takes the cake.

    >
    > I almost cross-posted his ramblings to AUK + 24HD. K-Man and the others
    > would have a field day.
    >
    > max


    As much as I dislike those groups and K-man, I wouldn't wish this guy on
    them either. Even they don't deserve the abuse.


    --
    Dustin Cook
    Author of BugHunter - MalWare Removal Tool - v2.2c
    email: bughunter.dustin@gmail.com.removethis
    web..: http://bughunter.it-mate.co.uk
    Pad..: http://bughunter.it-mate.co.uk/pad.xml


Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •