"The Real Truth MVP" <toidi@tpap.com> wrote in
news:bJLLk.3660$D32.2805@flpi146.ffdc.sbc.com:

> Dustin's assessment of my Remove-it program is flawed.


In what way(s)?

> The only correct think he said about it was that it is a batch file.
> The only intentional errors/markers placed in it are mine the ones I


PcButts, why would you deliberatly put errors inside a program designed to
"help" people? C'mon now. Your trying to twist things around,

> to track who was stealing it. I know which one they are. Try asking
> him which ones he is talking about to try and prove what he says. The


Afraid not, PcButts. The markers change with each copy you modify without
permission and re-distribute as your own. I will not provide you any
further details concerning them. You may want to give up the prove it
nonsense, I'm an actual software programmer; And you can't even code a
batch file on your own without stealing most of it from someone else.

You have been caught with posts containing Comparisons from the original
authors work and your modifications, and in some cases, you forgot to crop
out his name! Who do you really think your trying to bull**** here buddy?

Do you honestly think the various individuals who post about what you are,
I mean, what you really are and do, are all just.. crazy and against you?
Many of us have long standing credentials, and you have a long standing
history of being a thief. Well documented, all one needs to do is google
pcbutts. Seriously.

http://www.google.com/search?hl=en&q...earch&aq=f&oq=

Not a single link from the first page is a positive comment concerning you.
They all do however backup *ALL* of my claims that you asked me to prove,
none of which actually required me helping you figure out anything you
stole. Hah!

> program is all mine and it is totally different then any other tool
> out there and it does a lot more then most including MBAM. There are


This is for my entertainment, because I can't sleep and I should be... In
what possible way is a fixed filename BATCH FILE superior to anything
that's actually written in various programming languages, has a resident
driver, can read/write directly to NTFS bypassing most rootkits, and the
list of features continues. Our program is consistently proving itself in
the field, a simple google search on malwarebytes will find tons and tons
of positive reviews of our software.

BugHunter is capable of doing more than your batch file alone ever could.

> in less then 10 minutes, compare that to everybody else's that takes
> hours. Remove-it will set a restore point prior to making any changes,


Not if windows won't let you. You'll "ask" to set a restore point, you
meant.

> it will modify your hosts file and protect it from being changed by
> rogue malware. It will make the necessary changes to your registry,


Oh, yes, this it will. Here's what else you will no longer have access too,
that ISN't ROGUE.


# [Thieves and trolls]
127.0.0.1 www.pctipp.ch
127.0.0.1 pctipp.ch
127.0.0.1 www.raymond.cc
127.0.0.1 raymond.cc
127.0.0.1 www.claymania.com
127.0.0.1 claymania.com
127.0.0.1 www.elephantboycomputers.com
127.0.0.1 elephantboycomputers.com
127.0.0.1 www.it-mate.co.uk
127.0.0.1 it-mate.co.uk
127.0.0.1 mysteryfcm.co.uk
127.0.0.1 www.mysteryfcm.co.uk
127.0.0.1 www.internetinspiration.co.uk
127.0.0.1 internetinspiration.co.uk
127.0.0.1 www.mvps.org
127.0.0.1 mvps.org
127.0.0.1 bughunter.it-mate.co.uk
127.0.0.1 www.bughunter.it-mate.co.uk
127.0.0.1 www.siri.geekstogo.com
127.0.0.1 siri.geekstogo.com
127.0.0.1 siri.urz.free.fr
127.0.0.1 www.siri.urz.free.fr
127.0.0.1 noahdfear.geekstogo.com
127.0.0.1 www.noahdfear.geekstogo.com


None of the sites listed are considered to be trolls by anyone worth
anything, Quite the opposite in fact. Nobody mentioned on that list of urls
is a thief, either. In fact, many of the sites are very well known as
reputable help sites, the fact you claim to be protecting someone from harm
by blocking them shows two things. One, your really stupid, Two, your an
*******.

> fix the damage done by malware, reset your desktop and IE, fix and
> repair corrupted Winsock that have been modified by malware. Repairs


Alas, not alone it won't. It relies on several utilities written by decent
people, that have not given him permission to use any of them. In fact,
several authors have repeatedly had to ask you to remove their things from
your website. I had to resort to a valid DMCA against your ISP over a
picture you thought was amusing. An edited picture that I would expect from
a teenager, a very young teenager.

> your internet connection and much more. and it will give You the
> choice to say yes or no before each change is made so you are not
> forced to anything. It also runs on Windows 2000. Stuart the guy who
> tried to steal my program was not able to steal the code that fixes
> the Windows 2000 compatibility issue. Remove-it does NOT damage


Stuart is the batch files real author, And your version had the bug for the
longest time, Stuarts had the correct code. Did someone finally show you
where you got setup, or did you figure it out this time? heh.

And, unless you fixed the filename calling issue (fixed filenames for you,
stupid idea for this), it still won't run on windows 2000.

Face it Christopher, you picked Stuart's program to rip off because it's
about the only thing you are even partially able to understand as far as
computer programming is concerned, it's a batch file.

> systems. If you want real feedback on how Remove-it works then read it
> on my blog and not here in the newsgroup where trolls can post what
> ever they want.


The blog your talking about requires all comments to be approved by you. As
a result, anything that is said that you don't like, isn't approved and
never appears. You may continue calling all of us Trolls if you like, but
it only demonstrates your stupidity when you do so.




--
Regards,
Dustin Cook, Author of BugHunter
BugHunter - http://bughunter.it-mate.co.uk
MalwareBytes - http://www.malwarebytes.org