On Jul 13, 8:14 pm, Dustin Cook
<spamfilterineffect.see....@nowhere.com> wrote:
> Hi All,
>
> After closely examining the toolbar offered by bluecollarpc.net, I'm left
> with no choice but to include it for detection and optional removal by the
> user due to the fact it's using a known adware/trackware companies product
> that's simply rebranded.
>
> As of today, 07-13-2007, BugHunter detects this program and both known
> variants of it, one which affects firefox via an extensions installation
> and the other which affects Internet Explorer via a BHO installation.
>
> Based on information collected on the company actually responsible for most
> of the code present inside, I'd recommend others follow suit.
>
> Thank You.
>
> --
> Dustin Cook
> Author of BugHunter - MalWare Removal Tool - v2.2c
> email: bughunter.dus...@gmail.com.removethis
> web..:http://bughunter.it-mate.co.uk
> Pad..:http://bughunter.it-mate.co.uk/pad.xml
And this is your idea of reciprocity ? Which shows I am intelligent
and you are not ? Poor baby (yah yah yah yah yahyah gahgah) did some
nobody call you an ACADEMIC HACK ???? BOY did I hit your spot !!!! How
dared you to dignify the following with such a tit for tat
insignificant projected lie showing us all who you really are -
someone who CAN'T be trusted with the HAckwRE you push for illicit
profits: QUOTE
Definition, Dangers, and Examples of Hackware
http://bluecollarpc.net/phpbb2/viewtopic.php?t=346
(This would apply to utilities here, not full programs.)
REFERENCES TO AVOID HACKWARE REMOVAL UTILITIES:
BlueCollarpC.Net
Hackware: Examples of hackware... beware!
FILE: http://www.bluecollarpc.net/download...s-Examples.txt
Lavasoft Ad Aware: Terms Of Service
http://www.lavasoftsupport.com/index.php?act=boardrules
We do not support any method of cracking, warez, workarounds,
providing any methods, tools, or posting of links designed for this
express purpose. [Removals]
Enigma Software Group Responds
http://www.enigmasoftware.com/suppor...ing-spyhunter/
"....In addition to Symantec, other competitors of Enigma, including
Malwarebytes.org, SecurityCadets.com, MalwareTeks.com, and Temerc.com,
have been coordinating a campaign to have SpyHunter listed as rogue
software. Each of these entities is a competitor of Enigma Software
Group that either has competing products or is an affiliate of
competing products. Enigma is evaluating closely its legal options
with respect to this anticompetitive campaign...."
Why do you little unprofessional ACADEMIC HACKS challenge professional
and expert sharewares? Are you really claiming - "it is the little
guys versus the big guys - c'mon help us out with a donation to keep
our free software onboard".
And of course the FIRST lesson in PC Security has been against "Free
Stuff" shopping:
RELATED ARTICLE:
Itchy Hands » A quick » non-geeky guide to removing malware and ...
http://www.itchyhands.com/2006/01/04...alware-removal
Don't simply download 'free stuff'. Many times the free stuff is just
a lure for you to download and install a programme that is full of
malware. ...
The BlueCollarPC.Net joins in the Total Majority of World Computer
Users in recommending professional expert antispyware shareware
software programs for personal and computer security.
--------------------------/.
FILE:
http://www.bluecollarpc.net/download...s-Examples.txt
SOURCE:
http://www.bluecollarpc.net/pcsafetyfiles.html
Hackware Example: Vista Transformation Pack ....
Moderator:
The term "hackware" is a term I apply to describe any type of software
or utility that over-writes any part of Windows which includes
Internet Explorer, which are 'good-guy hacks' but nevertheless should
examined with "extreme prejudice". You must decide if any over-write
of Windows is going to be compatible and stable and non-interfering in
the many actions conducted. This applies to normal maintenance as well
in disk clean ups and defragging, registry cleaning, volume error
checks, and so on. It is also applies with "hang time" of the normal
navigation now being re-routed through hackwares that in over-writing
Windows are adding more short-cuts and other mappings. Generally, most
hackwares are written by the 'good guy hacks' that are most times
talented and create some real time savers for generally $20.00 that
are really simple re-written and re-mapped short cuts to utilities
that already exist in Windows - such as the Windows utilities of disk
clean up, defrag of disks, history and temporary files clean up and so
on. You can look at these in two ways. One, the person(s) are complete
rip-offs taking advantage of the un-knowing public that most or all
these are Windows utilities already in the computer - - - or two, that
so what, they save the manual time and all the clicks and is worth
that $20.00 to me for the convenience. The latter is generally the
case and thank you for the creations ! Definite, generally safe, time
savers. Those are the most common on the world web and many times
there are genuine freeware ones that are not ad-driven popped up or
bundled with any adware or spyware (working-freewares).
However, there are also the "bad-guy hacks" which is really all that
much malware is - including adware and spywares. These bad-hacks of
course are written commands to do so and so as over-writing Windows
commands externally to perform their malicious intent. Most times this
bad "hackware" does interfere with Windows and Internet Explorer and
makes things unstable until it is removed - immediately of course. So
my comment is to really watch out on any hack software or utility you
wish to install in your computer. There are perhaps many "wanabees"
among good-guy hacks as software/utility writers/creators that are
just not that talented yet obviously, when you may experience
instability and freeze ups from their product. The simple way out is
to uninstall and move on. However, many times a "thrifty software
writer" will not include an uninstaller and the product is also
lacking the language of writing it in to the > Control Panel > Add/
Remove Programs for it to be uninstalled with a click. So there again,
you must examine any 'hackware' package with "extreme prejudice" to
avoid hassles.
Below is an "over-write" hackware as example 'fresh off the presses'.
This type is doing the actual real overwrite of the existing Windows
and Internet Explorer in appearance and navigation. These are the
worst danger to observe, as - if imperfect - are extremely unstable
and loaded with all extra shortcut and display file and registry
entries. There is absolutely nothing here implied by me about this
product example below - but that it is a very good example for the
purpose of the content of my message to owner/users of computers
running the Windows Operating System with Internet Explorer. In other
words, if a software or program or utility software is not from
Microsoft as part of the included Windows System and is manipulating
it for you - it is "hackware". Hack is simply the term loosely applied
to a software writer and/or programmer that is able to write things
externally to operate the Windows OS - a "hack".
Hack - Definition:
http://en.wikipedia.org/wiki/Computer_hacker
"Academice hackers: In the Academic hacker culture, a computer hacker
is a person who enjoys designing software and building programs with a
sense for aesthetics and playful cleverness."
EXAMPLE OF "HACKWARES"
Vista Transformation Pack
http://www.pcworld.com/downloads/fil...ml?tk=nl_Top10
License Type: Free
Price: Free
Date Added: Nov 2006
Operating Systems: Windows XP
File Size: 30200KB
Downloads Count: 76263
Get the Vista look, but beware of hairy install.
If you're just dying for the Vista look, and have the courage to deal
with a scary installation, grab a copy of Vista Transformation Pack
6.
It makes XP look, feel, and to some extent, act like Vista using
icons, themes, a docking bar, and a new clock. It uninstalls like any
other application, but make sure to set a Restore Point just in case.
Note: The installation on this program is tricky and not for those
with a weak stomach. If you have problems feel free to contact the
developer.
Hi Jack This Utility (Hackware Warning) ....
Hi Jack This Utility (Hackware Warning):
http://www.bleepingcomputer.com/tuto...utorial42.html
BRIEF:
"If you delete items that it shows, without knowing what they are, it
can lead to other problems such as your Internet no longer working or
problems with running Windows itself. You should also attempt to clean
the Spyware/Hijacker/Trojan with all other methods before using
HijackThis. If you allow HijackThis to remove entries before another
removal tool scans your computer, the files from the Hijacker/Spyware
will still be left on your computer and future removal tools will not
be able to find them. "
_________________
*****Administrator, BlueCollarPCNet Forums*****
http://bluecollarpc.net/phpbb2/index.php
BLUE COLLAR PC TOOLBAR (freeware)
http://bluecollarpc.communitytoolbars.com/
HEY GET ****ED JERK OFF ....SAID THAT....THIS JUST WENT TO CONDUIT.COM
WHOM I AM SURE WILL BE KNOKING ON YOUR DOOR IMMEDIATELY FAGGER


Reply With Quote