Results 1 to 10 of 11

Thread: Ping: Dustin Cook

Hybrid View

  1. #1
    Buffalo Guest

    Ping: Dustin Cook

    Has anyone tried PCButts1's Remove-it software to see if it really does mess
    up a computer or installs malware in it?
    I keep hearing that he pirates it or illegally uses others' software and
    combines it to form his Remove-it program, but I hear (read) a lot of
    different things in NGs.
    Thanks



  2. #2
    Dustin Cook Guest

    Re: Ping: Dustin Cook

    "Buffalo" <Eric@nada.com.invalid> wrote in
    news:XJSdnbLs_obnoWLVnZ2dnUVZ_uWdnZ2d@comcast.com:

    > Has anyone tried PCButts1's Remove-it software to see if it really
    > does mess up a computer or installs malware in it?


    It messes up on occasion because it's a huge batch file. It's not
    actually a program. The filenames are fixed, so their is definate
    potential for dataloss. It doesn't install anything, no. It does however
    replace your default hosts file with one of it's own, which will block
    legitimate sites from opening in your browser(s). BugHunter's main
    website is one of them, for what it's worth. Other legitimate sites are
    as well. It's been a few months since I last checked his hosts file.

    > I keep hearing that he pirates it or illegally uses others' software
    > and combines it to form his Remove-it program, but I hear (read) a lot
    > of different things in NGs.


    It's cobbled together and actually based on another individuals work,
    yes. Pcbutts takes the official release, find/replace's stewart's name
    with Pcbutts, and leaves the intentional errors/markers in place to let
    us know he's modded it (again). As Pcbutts isn't a coder of any sort, he
    always falls for this. Intentional bugs in the script, that are never
    executed, so no worries there.



    --
    Regards,
    Dustin Cook, Author of BugHunter
    BugHunter - http://bughunter.it-mate.co.uk
    MalwareBytes - http://www.malwarebytes.org



  3. #3
    Buffalo Guest

    Re: Ping: Dustin Cook



    Dustin Cook wrote:
    > "Buffalo" <Eric@nada.com.invalid> wrote in
    > news:XJSdnbLs_obnoWLVnZ2dnUVZ_uWdnZ2d@comcast.com:
    >
    >> Has anyone tried PCButts1's Remove-it software to see if it really
    >> does mess up a computer or installs malware in it?

    >
    > It messes up on occasion because it's a huge batch file. It's not
    > actually a program. The filenames are fixed, so their is definate
    > potential for dataloss. It doesn't install anything, no. It does
    > however replace your default hosts file with one of it's own, which
    > will block legitimate sites from opening in your browser(s).
    > BugHunter's main website is one of them, for what it's worth. Other
    > legitimate sites are as well. It's been a few months since I last
    > checked his hosts file.
    >
    >> I keep hearing that he pirates it or illegally uses others' software
    >> and combines it to form his Remove-it program, but I hear (read) a
    >> lot of different things in NGs.

    >
    > It's cobbled together and actually based on another individuals work,
    > yes. Pcbutts takes the official release, find/replace's stewart's name
    > with Pcbutts, and leaves the intentional errors/markers in place to
    > let us know he's modded it (again). As Pcbutts isn't a coder of any
    > sort, he always falls for this. Intentional bugs in the script, that
    > are never executed, so no worries there.


    Thanks for your take on that and the prompt response.



  4. #4
    The Real Truth MVP Guest

    Re: Ping: Dustin Cook

    Dustin's assessment of my Remove-it program is flawed. The only correct
    think he said about it was that it is a batch file. The only intentional
    errors/markers placed in it are mine the ones I put in it to track who was
    stealing it. I know which one they are. Try asking him which ones he is
    talking about to try and prove what he says. The program is all mine and it
    is totally different then any other tool out there and it does a lot more
    then most including MBAM. There are no false positives in Remove-it. it will
    clean your system of malware in less then 10 minutes, compare that to
    everybody else's that takes hours. Remove-it will set a restore point prior
    to making any changes, it will modify your hosts file and protect it from
    being changed by rogue malware. It will make the necessary changes to your
    registry, fix the damage done by malware, reset your desktop and IE, fix and
    repair corrupted Winsock that have been modified by malware. Repairs your
    internet connection and much more. and it will give You the choice to say
    yes or no before each change is made so you are not forced to anything. It
    also runs on Windows 2000. Stuart the guy who tried to steal my program was
    not able to steal the code that fixes the Windows 2000 compatibility issue.
    Remove-it does NOT damage systems. If you want real feedback on how
    Remove-it works then read it on my blog and not here in the newsgroup where
    trolls can post what ever they want.

    --
    The Real Truth http://pcbutts1-therealtruth.blogspot.com/




    "Buffalo" <Eric@nada.com.invalid> wrote in message
    news:WP-dnTffr_eI02LVnZ2dnUVZ_qHinZ2d@comcast.com...
    >
    >
    > Dustin Cook wrote:
    >> "Buffalo" <Eric@nada.com.invalid> wrote in
    >> news:XJSdnbLs_obnoWLVnZ2dnUVZ_uWdnZ2d@comcast.com:
    >>
    >>> Has anyone tried PCButts1's Remove-it software to see if it really
    >>> does mess up a computer or installs malware in it?

    >>
    >> It messes up on occasion because it's a huge batch file. It's not
    >> actually a program. The filenames are fixed, so their is definate
    >> potential for dataloss. It doesn't install anything, no. It does
    >> however replace your default hosts file with one of it's own, which
    >> will block legitimate sites from opening in your browser(s).
    >> BugHunter's main website is one of them, for what it's worth. Other
    >> legitimate sites are as well. It's been a few months since I last
    >> checked his hosts file.
    >>
    >>> I keep hearing that he pirates it or illegally uses others' software
    >>> and combines it to form his Remove-it program, but I hear (read) a
    >>> lot of different things in NGs.

    >>
    >> It's cobbled together and actually based on another individuals work,
    >> yes. Pcbutts takes the official release, find/replace's stewart's name
    >> with Pcbutts, and leaves the intentional errors/markers in place to
    >> let us know he's modded it (again). As Pcbutts isn't a coder of any
    >> sort, he always falls for this. Intentional bugs in the script, that
    >> are never executed, so no worries there.

    >
    > Thanks for your take on that and the prompt response.
    >
    >



  5. #5
    ---Fitz--- Guest

    Re: Ping: Dustin Cook

    "The Real Truth MVP" <toidi@tpap.com> wrote in message
    news:bJLLk.3660$D32.2805@flpi146.ffdc.sbc.com...
    > Dustin's assessment of my Remove-it program is flawed. The only correct
    > think he said about it was that it is a batch file. The only intentional
    > errors/markers placed in it are mine the ones I put in it to track who was
    > stealing it. I know which one they are. Try asking him which ones he is
    > talking about to try and prove what he says. The program is all mine and
    > it is totally different then any other tool out there and it does a lot
    > more then most including MBAM. There are no false positives in Remove-it.
    > it will clean your system of malware in less then 10 minutes, compare that
    > to everybody else's that takes hours. Remove-it will set a restore point
    > prior to making any changes, it will modify your hosts file and protect it
    > from being changed by rogue malware.


    Does your hosts file block the MVP sites and other legit malware tools?


  6. #6
    David H. Lipman Guest

    Re: Ping: Dustin Cook

    From: "---Fitz---" <fitz@invalid.com>

    | "The Real Truth MVP" <toidi@tpap.com> wrote in message
    | news:bJLLk.3660$D32.2805@flpi146.ffdc.sbc.com...
    >> Dustin's assessment of my Remove-it program is flawed. The only correct
    >> think he said about it was that it is a batch file. The only intentional
    >> errors/markers placed in it are mine the ones I put in it to track who was
    >> stealing it. I know which one they are. Try asking him which ones he is
    >> talking about to try and prove what he says. The program is all mine and
    >> it is totally different then any other tool out there and it does a lot
    >> more then most including MBAM. There are no false positives in Remove-it.
    >> it will clean your system of malware in less then 10 minutes, compare that
    >> to everybody else's that takes hours. Remove-it will set a restore point
    >> prior to making any changes, it will modify your hosts file and protect it
    >> from being changed by rogue malware.


    | Does your hosts file block the MVP sites and other legit malware tools?

    From Butts' Hosts file...

    # [Thieves and trolls]
    127.0.0.1 www.pctipp.ch
    127.0.0.1 pctipp.ch
    127.0.0.1 www.raymond.cc
    127.0.0.1 raymond.cc
    127.0.0.1 www.claymania.com
    127.0.0.1 claymania.com
    127.0.0.1 www.elephantboycomputers.com
    127.0.0.1 elephantboycomputers.com
    127.0.0.1 www.it-mate.co.uk
    127.0.0.1 it-mate.co.uk
    127.0.0.1 mysteryfcm.co.uk
    127.0.0.1 www.mysteryfcm.co.uk
    127.0.0.1 www.internetinspiration.co.uk
    127.0.0.1 internetinspiration.co.uk
    127.0.0.1 www.mvps.org
    127.0.0.1 mvps.org
    127.0.0.1 bughunter.it-mate.co.uk
    127.0.0.1 www.bughunter.it-mate.co.uk
    127.0.0.1 www.siri.geekstogo.com
    127.0.0.1 siri.geekstogo.com
    127.0.0.1 siri.urz.free.fr
    127.0.0.1 www.siri.urz.free.fr
    127.0.0.1 noahdfear.geekstogo.com
    127.0.0.1 www.noahdfear.geekstogo.com


    --
    Dave
    http://www.claymania.com/removal-trojan-adware.html
    Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp



  7. #7
    Dustin Cook Guest

    Re: Ping: Dustin Cook

    "The Real Truth MVP" <toidi@tpap.com> wrote in
    news:bJLLk.3660$D32.2805@flpi146.ffdc.sbc.com:

    > Dustin's assessment of my Remove-it program is flawed.


    In what way(s)?

    > The only correct think he said about it was that it is a batch file.
    > The only intentional errors/markers placed in it are mine the ones I


    PcButts, why would you deliberatly put errors inside a program designed to
    "help" people? C'mon now. Your trying to twist things around,

    > to track who was stealing it. I know which one they are. Try asking
    > him which ones he is talking about to try and prove what he says. The


    Afraid not, PcButts. The markers change with each copy you modify without
    permission and re-distribute as your own. I will not provide you any
    further details concerning them. You may want to give up the prove it
    nonsense, I'm an actual software programmer; And you can't even code a
    batch file on your own without stealing most of it from someone else.

    You have been caught with posts containing Comparisons from the original
    authors work and your modifications, and in some cases, you forgot to crop
    out his name! Who do you really think your trying to bull**** here buddy?

    Do you honestly think the various individuals who post about what you are,
    I mean, what you really are and do, are all just.. crazy and against you?
    Many of us have long standing credentials, and you have a long standing
    history of being a thief. Well documented, all one needs to do is google
    pcbutts. Seriously.

    http://www.google.com/search?hl=en&q...earch&aq=f&oq=

    Not a single link from the first page is a positive comment concerning you.
    They all do however backup *ALL* of my claims that you asked me to prove,
    none of which actually required me helping you figure out anything you
    stole. Hah!

    > program is all mine and it is totally different then any other tool
    > out there and it does a lot more then most including MBAM. There are


    This is for my entertainment, because I can't sleep and I should be... In
    what possible way is a fixed filename BATCH FILE superior to anything
    that's actually written in various programming languages, has a resident
    driver, can read/write directly to NTFS bypassing most rootkits, and the
    list of features continues. Our program is consistently proving itself in
    the field, a simple google search on malwarebytes will find tons and tons
    of positive reviews of our software.

    BugHunter is capable of doing more than your batch file alone ever could.

    > in less then 10 minutes, compare that to everybody else's that takes
    > hours. Remove-it will set a restore point prior to making any changes,


    Not if windows won't let you. You'll "ask" to set a restore point, you
    meant.

    > it will modify your hosts file and protect it from being changed by
    > rogue malware. It will make the necessary changes to your registry,


    Oh, yes, this it will. Here's what else you will no longer have access too,
    that ISN't ROGUE.


    # [Thieves and trolls]
    127.0.0.1 www.pctipp.ch
    127.0.0.1 pctipp.ch
    127.0.0.1 www.raymond.cc
    127.0.0.1 raymond.cc
    127.0.0.1 www.claymania.com
    127.0.0.1 claymania.com
    127.0.0.1 www.elephantboycomputers.com
    127.0.0.1 elephantboycomputers.com
    127.0.0.1 www.it-mate.co.uk
    127.0.0.1 it-mate.co.uk
    127.0.0.1 mysteryfcm.co.uk
    127.0.0.1 www.mysteryfcm.co.uk
    127.0.0.1 www.internetinspiration.co.uk
    127.0.0.1 internetinspiration.co.uk
    127.0.0.1 www.mvps.org
    127.0.0.1 mvps.org
    127.0.0.1 bughunter.it-mate.co.uk
    127.0.0.1 www.bughunter.it-mate.co.uk
    127.0.0.1 www.siri.geekstogo.com
    127.0.0.1 siri.geekstogo.com
    127.0.0.1 siri.urz.free.fr
    127.0.0.1 www.siri.urz.free.fr
    127.0.0.1 noahdfear.geekstogo.com
    127.0.0.1 www.noahdfear.geekstogo.com


    None of the sites listed are considered to be trolls by anyone worth
    anything, Quite the opposite in fact. Nobody mentioned on that list of urls
    is a thief, either. In fact, many of the sites are very well known as
    reputable help sites, the fact you claim to be protecting someone from harm
    by blocking them shows two things. One, your really stupid, Two, your an
    *******.

    > fix the damage done by malware, reset your desktop and IE, fix and
    > repair corrupted Winsock that have been modified by malware. Repairs


    Alas, not alone it won't. It relies on several utilities written by decent
    people, that have not given him permission to use any of them. In fact,
    several authors have repeatedly had to ask you to remove their things from
    your website. I had to resort to a valid DMCA against your ISP over a
    picture you thought was amusing. An edited picture that I would expect from
    a teenager, a very young teenager.

    > your internet connection and much more. and it will give You the
    > choice to say yes or no before each change is made so you are not
    > forced to anything. It also runs on Windows 2000. Stuart the guy who
    > tried to steal my program was not able to steal the code that fixes
    > the Windows 2000 compatibility issue. Remove-it does NOT damage


    Stuart is the batch files real author, And your version had the bug for the
    longest time, Stuarts had the correct code. Did someone finally show you
    where you got setup, or did you figure it out this time? heh.

    And, unless you fixed the filename calling issue (fixed filenames for you,
    stupid idea for this), it still won't run on windows 2000.

    Face it Christopher, you picked Stuart's program to rip off because it's
    about the only thing you are even partially able to understand as far as
    computer programming is concerned, it's a batch file.

    > systems. If you want real feedback on how Remove-it works then read it
    > on my blog and not here in the newsgroup where trolls can post what
    > ever they want.


    The blog your talking about requires all comments to be approved by you. As
    a result, anything that is said that you don't like, isn't approved and
    never appears. You may continue calling all of us Trolls if you like, but
    it only demonstrates your stupidity when you do so.




    --
    Regards,
    Dustin Cook, Author of BugHunter
    BugHunter - http://bughunter.it-mate.co.uk
    MalwareBytes - http://www.malwarebytes.org



  8. #8
    The Real Truth MVP Guest

    Re: Ping: Dustin Cook

    I'll tell you what Dustbin Kook. You fully infect two systems with lets say
    antispyware2009 and Zlob. Load your MBAM on one and my Remove-it one the
    other. Start a full scan with your MBAM, go watch a football game, comeback
    when it's over then wait another 5 minutes for your scan to complete. Start
    my Remove-it software, go take a ****, come back and enjoy your nice clean
    computer.


    --
    The Real Truth http://pcbutts1-therealtruth.blogspot.com/




    "Dustin Cook" <bughunter.dustin@gmail.com> wrote in message
    news:Xns9B43EA25FAB27HHI2948AJD832@69.16.185.250.. .
    > "The Real Truth MVP" <toidi@tpap.com> wrote in
    > news:bJLLk.3660$D32.2805@flpi146.ffdc.sbc.com:
    >
    >> Dustin's assessment of my Remove-it program is flawed.

    >
    > In what way(s)?
    >
    >> The only correct think he said about it was that it is a batch file.
    >> The only intentional errors/markers placed in it are mine the ones I

    >
    > PcButts, why would you deliberatly put errors inside a program designed to
    > "help" people? C'mon now. Your trying to twist things around,
    >
    >> to track who was stealing it. I know which one they are. Try asking
    >> him which ones he is talking about to try and prove what he says. The

    >
    > Afraid not, PcButts. The markers change with each copy you modify without
    > permission and re-distribute as your own. I will not provide you any
    > further details concerning them. You may want to give up the prove it
    > nonsense, I'm an actual software programmer; And you can't even code a
    > batch file on your own without stealing most of it from someone else.
    >
    > You have been caught with posts containing Comparisons from the original
    > authors work and your modifications, and in some cases, you forgot to crop
    > out his name! Who do you really think your trying to bull**** here buddy?
    >
    > Do you honestly think the various individuals who post about what you are,
    > I mean, what you really are and do, are all just.. crazy and against you?
    > Many of us have long standing credentials, and you have a long standing
    > history of being a thief. Well documented, all one needs to do is google
    > pcbutts. Seriously.
    >
    > http://www.google.com/search?hl=en&q...earch&aq=f&oq=
    >
    > Not a single link from the first page is a positive comment concerning
    > you.
    > They all do however backup *ALL* of my claims that you asked me to prove,
    > none of which actually required me helping you figure out anything you
    > stole. Hah!
    >
    >> program is all mine and it is totally different then any other tool
    >> out there and it does a lot more then most including MBAM. There are

    >
    > This is for my entertainment, because I can't sleep and I should be... In
    > what possible way is a fixed filename BATCH FILE superior to anything
    > that's actually written in various programming languages, has a resident
    > driver, can read/write directly to NTFS bypassing most rootkits, and the
    > list of features continues. Our program is consistently proving itself in
    > the field, a simple google search on malwarebytes will find tons and tons
    > of positive reviews of our software.
    >
    > BugHunter is capable of doing more than your batch file alone ever could.
    >
    >> in less then 10 minutes, compare that to everybody else's that takes
    >> hours. Remove-it will set a restore point prior to making any changes,

    >
    > Not if windows won't let you. You'll "ask" to set a restore point, you
    > meant.
    >
    >> it will modify your hosts file and protect it from being changed by
    >> rogue malware. It will make the necessary changes to your registry,

    >
    > Oh, yes, this it will. Here's what else you will no longer have access
    > too,
    > that ISN't ROGUE.
    >
    >
    > # [Thieves and trolls]
    > 127.0.0.1 www.pctipp.ch
    > 127.0.0.1 pctipp.ch
    > 127.0.0.1 www.raymond.cc
    > 127.0.0.1 raymond.cc
    > 127.0.0.1 www.claymania.com
    > 127.0.0.1 claymania.com
    > 127.0.0.1 www.elephantboycomputers.com
    > 127.0.0.1 elephantboycomputers.com
    > 127.0.0.1 www.it-mate.co.uk
    > 127.0.0.1 it-mate.co.uk
    > 127.0.0.1 mysteryfcm.co.uk
    > 127.0.0.1 www.mysteryfcm.co.uk
    > 127.0.0.1 www.internetinspiration.co.uk
    > 127.0.0.1 internetinspiration.co.uk
    > 127.0.0.1 www.mvps.org
    > 127.0.0.1 mvps.org
    > 127.0.0.1 bughunter.it-mate.co.uk
    > 127.0.0.1 www.bughunter.it-mate.co.uk
    > 127.0.0.1 www.siri.geekstogo.com
    > 127.0.0.1 siri.geekstogo.com
    > 127.0.0.1 siri.urz.free.fr
    > 127.0.0.1 www.siri.urz.free.fr
    > 127.0.0.1 noahdfear.geekstogo.com
    > 127.0.0.1 www.noahdfear.geekstogo.com
    >
    >
    > None of the sites listed are considered to be trolls by anyone worth
    > anything, Quite the opposite in fact. Nobody mentioned on that list of
    > urls
    > is a thief, either. In fact, many of the sites are very well known as
    > reputable help sites, the fact you claim to be protecting someone from
    > harm
    > by blocking them shows two things. One, your really stupid, Two, your an
    > *******.
    >
    >> fix the damage done by malware, reset your desktop and IE, fix and
    >> repair corrupted Winsock that have been modified by malware. Repairs

    >
    > Alas, not alone it won't. It relies on several utilities written by decent
    > people, that have not given him permission to use any of them. In fact,
    > several authors have repeatedly had to ask you to remove their things from
    > your website. I had to resort to a valid DMCA against your ISP over a
    > picture you thought was amusing. An edited picture that I would expect
    > from
    > a teenager, a very young teenager.
    >
    >> your internet connection and much more. and it will give You the
    >> choice to say yes or no before each change is made so you are not
    >> forced to anything. It also runs on Windows 2000. Stuart the guy who
    >> tried to steal my program was not able to steal the code that fixes
    >> the Windows 2000 compatibility issue. Remove-it does NOT damage

    >
    > Stuart is the batch files real author, And your version had the bug for
    > the
    > longest time, Stuarts had the correct code. Did someone finally show
    > you
    > where you got setup, or did you figure it out this time? heh.
    >
    > And, unless you fixed the filename calling issue (fixed filenames for you,
    > stupid idea for this), it still won't run on windows 2000.
    >
    > Face it Christopher, you picked Stuart's program to rip off because it's
    > about the only thing you are even partially able to understand as far as
    > computer programming is concerned, it's a batch file.
    >
    >> systems. If you want real feedback on how Remove-it works then read it
    >> on my blog and not here in the newsgroup where trolls can post what
    >> ever they want.

    >
    > The blog your talking about requires all comments to be approved by you.
    > As
    > a result, anything that is said that you don't like, isn't approved and
    > never appears. You may continue calling all of us Trolls if you like, but
    > it only demonstrates your stupidity when you do so.
    >
    >
    >
    >
    > --
    > Regards,
    > Dustin Cook, Author of BugHunter
    > BugHunter - http://bughunter.it-mate.co.uk
    > MalwareBytes - http://www.malwarebytes.org
    >
    >



Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •