From: John on
To remove EncFiltLog.menc
This file appears to be write protected, but it can be removed with a linux OS and the shred command.
Go to linuxcd.org. Order a copy of Backtrack3 live CD. (About $7.00) Remove the HD so you don't get confused. Make sure the bios setting will boot from a CD. Start BT3. Open terminal window (bottom tray left side) Type without quotes, the command "cd /mnt" List the contents of the mount directory, Code- "ls" If you use a USB adapter for the SD card it should mount as sda5. In the mount directory you should see floppy/ live/ sda5/sr0 Change to the sda5 directory, Code- "cd sda5" You should see the files on the microSD. Use the shred command to remove the EncFiltLog.menc, Code- "shred -fuvz EncFiltLog.menc" The first time it stops with an error message, repeat the command and it will overwrite 26 times. Now create a dummy file with the same name. Code- "vi EncFiltLog.menc" This will create an empty file with the same name. Push the escape key twice to put vi into command mode, you should hear a beep. Now put it into insert mode by pushing the i key. Type a few letters. Now write it to the file Code-":w" and quit the editor, Code ":q" Now make the file executable, Code- "chmod u=x EncFiltLog.menc" Remove all other access permissions Code- "chmod g-rwx EncFiltLog.menc" Then Code- "chmod o-rwx EncFiltLog.menc" You can also do this with the Graphical interface. What you want is an "excutable" file that looks like the original but does nothing . If you try to look at the original with vi Code-
"vi EncFiltLog.menc" you get an error message saying this is a binary file (executable program) . But it claims to be a plain text file. I noticed something was wrong when my phone started connecting to the internet by itself. When I removed the sd card it stopped. When I put the card back in it did it again. This is probably a R.A.T or backdoor the govt uses to spy on us. For the shred manual return to the root directory Code- "cd" Then, Code-"man shred" also "man chmod" Do not remove the SD card while it is mounted. Shut the computer off or unmount the sd card Code- "cd /mnt" Then "umount sda5"
I noticed other problems. I install Compusec encryption . The next day my password doesn't work. I install windows xp on a dell laptop. The next day the password doesn't work. I install Vista on a lenovo laptop . The next day the password doesn't work . I install Ubuntu Linux on a external HD. The next day the password doesn't work. 4 different pieces of hardware and the same problem. 3 different OS and same problem. Not a hardware or software problem. I remove the wi-fi card and there is no bluetooth card - same problem . One of the programs Zone Alarm is monitoring is Remote Registry Service, which allows the govt working with microsoft to shut down your firewall. The only program that can start Remote Registry Service is a remote computer. The fact that Zone Alarm was monitoring that program means it was started. How was Remote Registry Service started when I haven't installed the modem, there is no wi-fi card or bluetooth card? A whole bunch of programs start acting as servers. The firewall gets shut down. Acronis Try and Decide program shows 300MB of information added to my computer in 10 minutes. How, when I haven't connected to the internet yet? When the laptop is covered with RFI shielding (twpinc.com) and grounded to create a faraday cage the programs do not all become servers, the password doesn't get changed, the firewall doesn't get shutdown. Conclusion, there is a receiver in your computer that allows the govt to hack into your computer even when you are offline. If you think I am making this up dl Wireshark and see where your computer is connecting to.
Asia Pacific Network Information Center
121.0.0.0-121.255.255.255
221.0.0.0-221.255.255.255
61.0.0.0-61.255.255.255
202.0.0.0-203.255.255.255
210.0.0.0-211.255.255.255
218.0.0.0-218.255.255.255
220.0.0.0-220.255.255.255
60.0.0.0-60.255.255.255
125.0.0.0-125.255.255.255
189.0.0.0-189.255.255.255
200.0.0.0-200.255.255.255
Level 3 communications
8.0.0.0-8.255.255.255
64.152.0.0-64.159.255.255.255
67.24.0.0-67.31.255.255
4.0.0.0-4.255.255.255
69.192.0.0-69.192.255.255
RIPE
94.0.0.0-94.255.255.255
217.0.0.0-217.255.255.255
81.0.0.0-81.255.255.255
84.0.0.0-84.255.255.255
85.0.0.0-85.255.255.255
62.0.0.0-62.255.255.255
88.0.0.0-88.255.255.255
212.0.0.0-212.255.255.255
Go to a library and look at your spam mail. Go to the bottom and click on "show full headers" get the originating ip address and go to arin.net and do a reverse DNS lookup. You will see that most are comong from RIPE. Probably containing malicious code.



John Montgomery wrote:

Remove EncFiltLog.menc
20-Mar-10

To remove EncFiltLog.menc
This file appears to be write protected, but it can be removed with a linux OS and the shred command.
Go to linuxcd.org. Order a copy of Backtrack3 live CD. (About $7.00) Remove the HD so you don't get confused. Make sure the bios setting will boot from a CD. Start BT3. Open terminal window (bottom tray left side) Type without quotes, the command "cd /mnt" List the contents of the mount directory, Code- "ls" If you use a USB adapter for the SD card it should mount as sda5. In the mount directory you should see floppy/ live/ sda5/sr0 Change to the sda5 directory, Code- "cd sda5" You should see the files on the microSD. Use the shred command to remove the EncFiltLog.menc, Code- "shred -fuvz EncFiltLog.menc" The first time it stops with an error message, repeat the command and it will overwrite 26 times. Now create a dummy file with the same name. Code- "vi EncFiltLog.menc" This will create an empty file with the same name. Push the escape key twice to put vi into command mode, you should hear a beep. Now put it into insert mode by pushing the i key. Type a few letters. Now write it to the file Code-":w" and quit the editor, Code ":q" Now make the file executable, Code- "chmod u=x EncFiltLog.menc" Remove all other access permissions Code- "chmod g-rwx EncFiltLog.menc" Then Code- "chmod o-rwx EncFiltLog.menc" You can also do this with the Graphical interface. What you want is an "excutable" file that looks like the original but does nothing . If you try to look at the original with vi Code-
"vi EncFiltLog.menc" you get an error message saying this is a binary file (executable program) . But it claims to be a plain text file. I noticed something was wrong when my phone started connecting to the internet by itself. When I removed the sd card it stopped. When I put the card back in it did it again. This is probably a R.A.T or backdoor the govt uses to spy on us. For the shred manual return to the root directory Code- "cd" Then, Code-"man shred" also "man chmod" Do not remove the SD card while it is mounted. Shut the computer off or unmount the sd card Code- "cd /mnt" Then "umount sda5"
I noticed other problems. I install Compusec encryption . The next day my password doesn't work. I install windows xp on a dell laptop. The next day the password doesn't work. I install Vista on a lenovo laptop . The next day the password doesn't work . I install Ubuntu Linux on a external HD. The next day the password doesn't work. 4 different pieces of hardware and the same problem. 3 different OS and same problem. Not a hardware or software problem. I remove the wi-fi card and there is no bluetooth card - same problem . One of the programs Zone Alarm is monitoring is Remote Registry Service, which allows the govt working with microsoft to shut down your firewall. The only program that can start Remote Registry Service is a remote computer. The fact that Zone Alarm was monitoring that program means it was started. How was Remote Registry Service started when I haven't installed the modem, there is no wi-fi card or bluetooth card? A whole bunch of programs start acting as servers. The firewall gets shut down. Acronis Try and Decide program shows 300MB of information added to my computer in 10 minutes. How, when I haven't connected to the internet yet? When the laptop is covered with RFI shielding (twpinc.com) and grounded to create a faraday cage the programs do not all become servers, the password doesn't get changed, the firewall doesn't get shutdown. Conclusion, there is a receiver in your computer that allows the govt to hack into your computer even when you are offline. If you think I am making this up dl Wireshark and see where your computer is connecting to.
Asia Pacific Network Information Center
121.0.0.0-121.255.255.255
221.0.0.0-221.255.255.255
61.0.0.0-61.255.255.255
202.0.0.0-203.255.255.255
210.0.0.0-211.255.255.255
218.0.0.0-218.255.255.255
220.0.0.0-220.255.255.255
60.0.0.0-60.255.255.255
125.0.0.0-125.255.255.255
189.0.0.0-189.255.255.255
200.0.0.0-200.255.255.255
Level 3 communications
8.0.0.0-8.255.255.255
64.152.0.0-64.159.255.255.255
67.24.0.0-67.31.255.255
4.0.0.0-4.255.255.255
69.192.0.0-69.192.255.255
RIPE
94.0.0.0-94.255.255.255
217.0.0.0-217.255.255.255
81.0.0.0-81.255.255.255
84.0.0.0-84.255.255.255
85.0.0.0-85.255.255.255
62.0.0.0-62.255.255.255
88.0.0.0-88.255.255.255
212.0.0.0-212.255.255.255
Go to a library and look at your spam mail. Go to the bottom and click on "show full headers" get the originating ip address and go to arin.net and do a reverse DNS lookup. You will see that most are comong from RIPE. Probably containing malicious code.

Previous Posts In This Thread:


Submitted via EggHeadCafe - Software Developer Portal of Choice
How to Annotate Images from a database in a web page
http://www.eggheadcafe.com/tutorials/aspnet/0c4c3072-6730-41db-a759-082c24acd999/how-to-annotate-images-fr.aspx