Definition, Dangers, and Examples of Hackware
Posted: Wed Jul 04, 2007 2:27 am Post subject: Definition, Dangers,
and Examples of Hackware
(This would apply to utilities here, not full programs.)
REFERENCES TO AVOID HACKWARE REMOVAL UTILITIES:
BlueCollarPC.Net
Hackware: Examples of hackware... beware!
FILE: http://www.bluecollarpc.net/download...s-Examples.txt
Lavasoft Ad Aware: Terms Of Service
http://www.lavasoftsupport.com/index.php?act=boardrules
We do not support any method of cracking, warez, workarounds,
providing any methods, tools, or posting of links designed for this
express purpose. [Removals]
Enigma Software Group Responds
http://www.enigmasoftware.com/suppor...ing-spyhunter/
"....In addition to Symantec, other competitors of Enigma, including
Malwarebytes.org, SecurityCadets.com, MalwareTeks.com, and Temerc.com,
have been coordinating a campaign to have SpyHunter listed as rogue
software. Each of these entities is a competitor of Enigma Software
Group that either has competing products or is an affiliate of
competing products. Enigma is evaluating closely its legal options
with respect to this anticompetitive campaign...."
Why do you little unprofessional ACADEMIC HACKS challenge professional
and expert sharewares? Are you really claiming - "it is the little
guys versus the big guys - c'mon help us out with a donation to keep
our free software onboard".
And of course the FIRST lesson in PC Security has been against "Free
Stuff" shopping:
RELATED ARTICLE:
Itchy Hands » A quick » non-geeky guide to removing malware and ...
http://www.itchyhands.com/2006/01/04...alware-removal
Don't simply download 'free stuff'. Many times the free stuff is just
a lure for you to download and install a programme that is full of
malware. ...
The BlueCollarPC.Net joins in the Total Majority of World Computer
Users in recommending professional expert antispyware shareware
software programs for personal and computer security.
--------------------------/.
FILE:
http://www.bluecollarpc.net/download...s-Examples.txt
SOURCE:
http://www.bluecollarpc.net/pcsafetyfiles.html
Hackware Example: Vista Transformation Pack ....
Moderator:
The term "hackware" is a term I apply to describe any type of software
or utility that over-writes any part of Windows which includes
Internet Explorer, which are 'good-guy hacks' but nevertheless should
examined with "extreme prejudice". You must decide if any over-write
of Windows is going to be compatible and stable and non-interfering in
the many actions conducted. This applies to normal maintenance as well
in disk clean ups and defragging, registry cleaning, volume error
checks, and so on. It is also applies with "hang time" of the normal
navigation now being re-routed through hackwares that in over-writing
Windows are adding more short-cuts and other mappings. Generally, most
hackwares are written by the 'good guy hacks' that are most times
talented and create some real time savers for generally $20.00 that
are really simple re-written and re-mapped short cuts to utilities
that already exist in Windows - such as the Windows utilities of disk
clean up, defrag of disks, history and temporary files clean up and so
on. You can look at these in two ways. One, the person(s) are complete
rip-offs taking advantage of the un-knowing public that most or all
these are Windows utilities already in the computer - - - or two, that
so what, they save the manual time and all the clicks and is worth
that $20.00 to me for the convenience. The latter is generally the
case and thank you for the creations ! Definite, generally safe, time
savers. Those are the most common on the world web and many times
there are genuine freeware ones that are not ad-driven popped up or
bundled with any adware or spyware (working-freewares).
However, there are also the "bad-guy hacks" which is really all that
much malware is - including adware and spywares. These bad-hacks of
course are written commands to do so and so as over-writing Windows
commands externally to perform their malicious intent. Most times this
bad "hackware" does interfere with Windows and Internet Explorer and
makes things unstable until it is removed - immediately of course. So
my comment is to really watch out on any hack software or utility you
wish to install in your computer. There are perhaps many "wanabees"
among good-guy hacks as software/utility writers/creators that are
just not that talented yet obviously, when you may experience
instability and freeze ups from their product. The simple way out is
to uninstall and move on. However, many times a "thrifty software
writer" will not include an uninstaller and the product is also
lacking the language of writing it in to the > Control Panel > Add/
Remove Programs for it to be uninstalled with a click. So there again,
you must examine any 'hackware' package with "extreme prejudice" to
avoid hassles.
Below is an "over-write" hackware as example 'fresh off the presses'.
This type is doing the actual real overwrite of the existing Windows
and Internet Explorer in appearance and navigation. These are the
worst danger to observe, as - if imperfect - are extremely unstable
and loaded with all extra shortcut and display file and registry
entries. There is absolutely nothing here implied by me about this
product example below - but that it is a very good example for the
purpose of the content of my message to owner/users of computers
running the Windows Operating System with Internet Explorer. In other
words, if a software or program or utility software is not from
Microsoft as part of the included Windows System and is manipulating
it for you - it is "hackware". Hack is simply the term loosely applied
to a software writer and/or programmer that is able to write things
externally to operate the Windows OS - a "hack".
Hack - Definition:
http://en.wikipedia.org/wiki/Computer_hacker
"Academice hackers: In the Academic hacker culture, a computer hacker
is a person who enjoys designing software and building programs with a
sense for aesthetics and playful cleverness."
Hi Jack This Utility (Hackware Warning):
http://www.bleepingcomputer.com/tuto...utorial42.html
BRIEF: "If you delete items that it shows, without knowing what they
are, it can lead to other problems such as your Internet no longer
working or problems with running Windows itself. You should also
attempt to clean the Spyware/Hijacker/Trojan with all other methods
before using HijackThis. If you allow HijackThis to remove entries
before another removal tool scans your computer, the files from the
Hijacker/Spyware will still be left on your computer and future
removal tools will not be able to find them. "
So for all free stuff shoppers at the majors of geeks website (you
know the one) ....
Is this the bottom line for all the off-the-wall utilities offered
there in the "free shop" (and other places like them) but are actually
deceptive adverstising as "freeware" which can not ask for a
donation...
Is this the bottom line that they are :
Threat:
Pretexting: Pretending to be a legitimate entity to lure people to
malicious sites.
That is not that far of a stretch and with Organizations like the
Software Business Alliance around it would not surprise me that there
would be a "Shareware Business Alliance" arise and legally have them
shut down as damaging to computer equipment.
You have one question to ask yourself ...
Do you really want to see the glut of a $1.00 "Guessware" software hit
the Internet - and is already here in some areas as the major geekos
site ? Guessware because you have to guess if it will work or not ?
MODERATOR
food for thought
EXAMPLE OF "HACKWARES"
Vista Transformation Pack
http://www.pcworld.com/downloads/fil...ml?tk=nl_Top10
License Type: Free
Price: Free
Date Added: Nov 2006
Operating Systems: Windows XP
File Size: 30200KB
Downloads Count: 76263
Get the Vista look, but beware of hairy install.
If you're just dying for the Vista look, and have the courage to deal
with a scary installation, grab a copy of Vista Transformation Pack 6.
It makes XP look, feel, and to some extent, act like Vista using
icons, themes, a docking bar, and a new clock. It uninstalls like any
other application, but make sure to set a Restore Point just in case.
Note: The installation on this program is tricky and not for those
with a weak stomach. If you have problems feel free to contact the
developer.
_________________
*****Forum Moderator *****
BlueCollarPC.Net Forums Spyware Removal and Computing Safety
http://bluecollarpc.net/phpbb2/index.php
TOPIC# http://bluecollarpc.net/phpbb2/viewtopic.php?t=346


Reply With Quote
