Results 1 to 10 of 11

Thread: Ping: Dustin Cook

Hybrid View

  1. #1
    Dustin Cook Guest

    Re: Ping: Dustin Cook

    "The Real Truth MVP" <toidi@tpap.com> wrote in
    news:bJLLk.3660$D32.2805@flpi146.ffdc.sbc.com:

    > Dustin's assessment of my Remove-it program is flawed.


    In what way(s)?

    > The only correct think he said about it was that it is a batch file.
    > The only intentional errors/markers placed in it are mine the ones I


    PcButts, why would you deliberatly put errors inside a program designed to
    "help" people? C'mon now. Your trying to twist things around,

    > to track who was stealing it. I know which one they are. Try asking
    > him which ones he is talking about to try and prove what he says. The


    Afraid not, PcButts. The markers change with each copy you modify without
    permission and re-distribute as your own. I will not provide you any
    further details concerning them. You may want to give up the prove it
    nonsense, I'm an actual software programmer; And you can't even code a
    batch file on your own without stealing most of it from someone else.

    You have been caught with posts containing Comparisons from the original
    authors work and your modifications, and in some cases, you forgot to crop
    out his name! Who do you really think your trying to bull**** here buddy?

    Do you honestly think the various individuals who post about what you are,
    I mean, what you really are and do, are all just.. crazy and against you?
    Many of us have long standing credentials, and you have a long standing
    history of being a thief. Well documented, all one needs to do is google
    pcbutts. Seriously.

    http://www.google.com/search?hl=en&q...earch&aq=f&oq=

    Not a single link from the first page is a positive comment concerning you.
    They all do however backup *ALL* of my claims that you asked me to prove,
    none of which actually required me helping you figure out anything you
    stole. Hah!

    > program is all mine and it is totally different then any other tool
    > out there and it does a lot more then most including MBAM. There are


    This is for my entertainment, because I can't sleep and I should be... In
    what possible way is a fixed filename BATCH FILE superior to anything
    that's actually written in various programming languages, has a resident
    driver, can read/write directly to NTFS bypassing most rootkits, and the
    list of features continues. Our program is consistently proving itself in
    the field, a simple google search on malwarebytes will find tons and tons
    of positive reviews of our software.

    BugHunter is capable of doing more than your batch file alone ever could.

    > in less then 10 minutes, compare that to everybody else's that takes
    > hours. Remove-it will set a restore point prior to making any changes,


    Not if windows won't let you. You'll "ask" to set a restore point, you
    meant.

    > it will modify your hosts file and protect it from being changed by
    > rogue malware. It will make the necessary changes to your registry,


    Oh, yes, this it will. Here's what else you will no longer have access too,
    that ISN't ROGUE.


    # [Thieves and trolls]
    127.0.0.1 www.pctipp.ch
    127.0.0.1 pctipp.ch
    127.0.0.1 www.raymond.cc
    127.0.0.1 raymond.cc
    127.0.0.1 www.claymania.com
    127.0.0.1 claymania.com
    127.0.0.1 www.elephantboycomputers.com
    127.0.0.1 elephantboycomputers.com
    127.0.0.1 www.it-mate.co.uk
    127.0.0.1 it-mate.co.uk
    127.0.0.1 mysteryfcm.co.uk
    127.0.0.1 www.mysteryfcm.co.uk
    127.0.0.1 www.internetinspiration.co.uk
    127.0.0.1 internetinspiration.co.uk
    127.0.0.1 www.mvps.org
    127.0.0.1 mvps.org
    127.0.0.1 bughunter.it-mate.co.uk
    127.0.0.1 www.bughunter.it-mate.co.uk
    127.0.0.1 www.siri.geekstogo.com
    127.0.0.1 siri.geekstogo.com
    127.0.0.1 siri.urz.free.fr
    127.0.0.1 www.siri.urz.free.fr
    127.0.0.1 noahdfear.geekstogo.com
    127.0.0.1 www.noahdfear.geekstogo.com


    None of the sites listed are considered to be trolls by anyone worth
    anything, Quite the opposite in fact. Nobody mentioned on that list of urls
    is a thief, either. In fact, many of the sites are very well known as
    reputable help sites, the fact you claim to be protecting someone from harm
    by blocking them shows two things. One, your really stupid, Two, your an
    *******.

    > fix the damage done by malware, reset your desktop and IE, fix and
    > repair corrupted Winsock that have been modified by malware. Repairs


    Alas, not alone it won't. It relies on several utilities written by decent
    people, that have not given him permission to use any of them. In fact,
    several authors have repeatedly had to ask you to remove their things from
    your website. I had to resort to a valid DMCA against your ISP over a
    picture you thought was amusing. An edited picture that I would expect from
    a teenager, a very young teenager.

    > your internet connection and much more. and it will give You the
    > choice to say yes or no before each change is made so you are not
    > forced to anything. It also runs on Windows 2000. Stuart the guy who
    > tried to steal my program was not able to steal the code that fixes
    > the Windows 2000 compatibility issue. Remove-it does NOT damage


    Stuart is the batch files real author, And your version had the bug for the
    longest time, Stuarts had the correct code. Did someone finally show you
    where you got setup, or did you figure it out this time? heh.

    And, unless you fixed the filename calling issue (fixed filenames for you,
    stupid idea for this), it still won't run on windows 2000.

    Face it Christopher, you picked Stuart's program to rip off because it's
    about the only thing you are even partially able to understand as far as
    computer programming is concerned, it's a batch file.

    > systems. If you want real feedback on how Remove-it works then read it
    > on my blog and not here in the newsgroup where trolls can post what
    > ever they want.


    The blog your talking about requires all comments to be approved by you. As
    a result, anything that is said that you don't like, isn't approved and
    never appears. You may continue calling all of us Trolls if you like, but
    it only demonstrates your stupidity when you do so.




    --
    Regards,
    Dustin Cook, Author of BugHunter
    BugHunter - http://bughunter.it-mate.co.uk
    MalwareBytes - http://www.malwarebytes.org



  2. #2
    The Real Truth MVP Guest

    Re: Ping: Dustin Cook

    I'll tell you what Dustbin Kook. You fully infect two systems with lets say
    antispyware2009 and Zlob. Load your MBAM on one and my Remove-it one the
    other. Start a full scan with your MBAM, go watch a football game, comeback
    when it's over then wait another 5 minutes for your scan to complete. Start
    my Remove-it software, go take a ****, come back and enjoy your nice clean
    computer.


    --
    The Real Truth http://pcbutts1-therealtruth.blogspot.com/




    "Dustin Cook" <bughunter.dustin@gmail.com> wrote in message
    news:Xns9B43EA25FAB27HHI2948AJD832@69.16.185.250.. .
    > "The Real Truth MVP" <toidi@tpap.com> wrote in
    > news:bJLLk.3660$D32.2805@flpi146.ffdc.sbc.com:
    >
    >> Dustin's assessment of my Remove-it program is flawed.

    >
    > In what way(s)?
    >
    >> The only correct think he said about it was that it is a batch file.
    >> The only intentional errors/markers placed in it are mine the ones I

    >
    > PcButts, why would you deliberatly put errors inside a program designed to
    > "help" people? C'mon now. Your trying to twist things around,
    >
    >> to track who was stealing it. I know which one they are. Try asking
    >> him which ones he is talking about to try and prove what he says. The

    >
    > Afraid not, PcButts. The markers change with each copy you modify without
    > permission and re-distribute as your own. I will not provide you any
    > further details concerning them. You may want to give up the prove it
    > nonsense, I'm an actual software programmer; And you can't even code a
    > batch file on your own without stealing most of it from someone else.
    >
    > You have been caught with posts containing Comparisons from the original
    > authors work and your modifications, and in some cases, you forgot to crop
    > out his name! Who do you really think your trying to bull**** here buddy?
    >
    > Do you honestly think the various individuals who post about what you are,
    > I mean, what you really are and do, are all just.. crazy and against you?
    > Many of us have long standing credentials, and you have a long standing
    > history of being a thief. Well documented, all one needs to do is google
    > pcbutts. Seriously.
    >
    > http://www.google.com/search?hl=en&q...earch&aq=f&oq=
    >
    > Not a single link from the first page is a positive comment concerning
    > you.
    > They all do however backup *ALL* of my claims that you asked me to prove,
    > none of which actually required me helping you figure out anything you
    > stole. Hah!
    >
    >> program is all mine and it is totally different then any other tool
    >> out there and it does a lot more then most including MBAM. There are

    >
    > This is for my entertainment, because I can't sleep and I should be... In
    > what possible way is a fixed filename BATCH FILE superior to anything
    > that's actually written in various programming languages, has a resident
    > driver, can read/write directly to NTFS bypassing most rootkits, and the
    > list of features continues. Our program is consistently proving itself in
    > the field, a simple google search on malwarebytes will find tons and tons
    > of positive reviews of our software.
    >
    > BugHunter is capable of doing more than your batch file alone ever could.
    >
    >> in less then 10 minutes, compare that to everybody else's that takes
    >> hours. Remove-it will set a restore point prior to making any changes,

    >
    > Not if windows won't let you. You'll "ask" to set a restore point, you
    > meant.
    >
    >> it will modify your hosts file and protect it from being changed by
    >> rogue malware. It will make the necessary changes to your registry,

    >
    > Oh, yes, this it will. Here's what else you will no longer have access
    > too,
    > that ISN't ROGUE.
    >
    >
    > # [Thieves and trolls]
    > 127.0.0.1 www.pctipp.ch
    > 127.0.0.1 pctipp.ch
    > 127.0.0.1 www.raymond.cc
    > 127.0.0.1 raymond.cc
    > 127.0.0.1 www.claymania.com
    > 127.0.0.1 claymania.com
    > 127.0.0.1 www.elephantboycomputers.com
    > 127.0.0.1 elephantboycomputers.com
    > 127.0.0.1 www.it-mate.co.uk
    > 127.0.0.1 it-mate.co.uk
    > 127.0.0.1 mysteryfcm.co.uk
    > 127.0.0.1 www.mysteryfcm.co.uk
    > 127.0.0.1 www.internetinspiration.co.uk
    > 127.0.0.1 internetinspiration.co.uk
    > 127.0.0.1 www.mvps.org
    > 127.0.0.1 mvps.org
    > 127.0.0.1 bughunter.it-mate.co.uk
    > 127.0.0.1 www.bughunter.it-mate.co.uk
    > 127.0.0.1 www.siri.geekstogo.com
    > 127.0.0.1 siri.geekstogo.com
    > 127.0.0.1 siri.urz.free.fr
    > 127.0.0.1 www.siri.urz.free.fr
    > 127.0.0.1 noahdfear.geekstogo.com
    > 127.0.0.1 www.noahdfear.geekstogo.com
    >
    >
    > None of the sites listed are considered to be trolls by anyone worth
    > anything, Quite the opposite in fact. Nobody mentioned on that list of
    > urls
    > is a thief, either. In fact, many of the sites are very well known as
    > reputable help sites, the fact you claim to be protecting someone from
    > harm
    > by blocking them shows two things. One, your really stupid, Two, your an
    > *******.
    >
    >> fix the damage done by malware, reset your desktop and IE, fix and
    >> repair corrupted Winsock that have been modified by malware. Repairs

    >
    > Alas, not alone it won't. It relies on several utilities written by decent
    > people, that have not given him permission to use any of them. In fact,
    > several authors have repeatedly had to ask you to remove their things from
    > your website. I had to resort to a valid DMCA against your ISP over a
    > picture you thought was amusing. An edited picture that I would expect
    > from
    > a teenager, a very young teenager.
    >
    >> your internet connection and much more. and it will give You the
    >> choice to say yes or no before each change is made so you are not
    >> forced to anything. It also runs on Windows 2000. Stuart the guy who
    >> tried to steal my program was not able to steal the code that fixes
    >> the Windows 2000 compatibility issue. Remove-it does NOT damage

    >
    > Stuart is the batch files real author, And your version had the bug for
    > the
    > longest time, Stuarts had the correct code. Did someone finally show
    > you
    > where you got setup, or did you figure it out this time? heh.
    >
    > And, unless you fixed the filename calling issue (fixed filenames for you,
    > stupid idea for this), it still won't run on windows 2000.
    >
    > Face it Christopher, you picked Stuart's program to rip off because it's
    > about the only thing you are even partially able to understand as far as
    > computer programming is concerned, it's a batch file.
    >
    >> systems. If you want real feedback on how Remove-it works then read it
    >> on my blog and not here in the newsgroup where trolls can post what
    >> ever they want.

    >
    > The blog your talking about requires all comments to be approved by you.
    > As
    > a result, anything that is said that you don't like, isn't approved and
    > never appears. You may continue calling all of us Trolls if you like, but
    > it only demonstrates your stupidity when you do so.
    >
    >
    >
    >
    > --
    > Regards,
    > Dustin Cook, Author of BugHunter
    > BugHunter - http://bughunter.it-mate.co.uk
    > MalwareBytes - http://www.malwarebytes.org
    >
    >



  3. #3
    Dustin Cook Guest

    Re: Ping: Dustin Cook

    "The Real Truth MVP" <toidi@tpap.com> wrote in
    news:2tsNk.4574$as4.1099@nlpi069.nbdc.sbc.com:

    > I'll tell you what


    Nah.. You won't.

    First, your going to learn to spell my name properly if you expect me to
    take you even partially seriously for a second or two.

    2nd, I really don't care what you tell people about yourself. I was asked
    to comment by another and so I did.

    3rd, Ok, now you may go, worm.


    --
    Regards,
    Dustin Cook, Author of BugHunter
    BugHunter - http://bughunter.it-mate.co.uk
    MalwareBytes - http://www.malwarebytes.org



Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •