From: John on 20 Mar 2010 15:24 To remove EncFiltLog.menc This file appears to be write protected, but it can be removed with a linux OS and the shred command. Go to linuxcd.org. Order a copy of Backtrack3 live CD. (About $7.00) Remove the HD so you don't get confused. Make sure the bios setting will boot from a CD. Start BT3. Open terminal window (bottom tray left side) Type without quotes, the command "cd /mnt" List the contents of the mount directory, Code- "ls" If you use a USB adapter for the SD card it should mount as sda5. In the mount directory you should see floppy/ live/ sda5/sr0 Change to the sda5 directory, Code- "cd sda5" You should see the files on the microSD. Use the shred command to remove the EncFiltLog.menc, Code- "shred -fuvz EncFiltLog.menc" The first time it stops with an error message, repeat the command and it will overwrite 26 times. Now create a dummy file with the same name. Code- "vi EncFiltLog.menc" This will create an empty file with the same name. Push the escape key twice to put vi into command mode, you should hear a beep. Now put it into insert mode by pushing the i key. Type a few letters. Now write it to the file Code-":w" and quit the editor, Code ":q" Now make the file executable, Code- "chmod u=x EncFiltLog.menc" Remove all other access permissions Code- "chmod g-rwx EncFiltLog.menc" Then Code- "chmod o-rwx EncFiltLog.menc" You can also do this with the Graphical interface. What you want is an "excutable" file that looks like the original but does nothing . If you try to look at the original with vi Code- "vi EncFiltLog.menc" you get an error message saying this is a binary file (executable program) . But it claims to be a plain text file. I noticed something was wrong when my phone started connecting to the internet by itself. When I removed the sd card it stopped. When I put the card back in it did it again. This is probably a R.A.T or backdoor the govt uses to spy on us. For the shred manual return to the root directory Code- "cd" Then, Code-"man shred" also "man chmod" Do not remove the SD card while it is mounted. Shut the computer off or unmount the sd card Code- "cd /mnt" Then "umount sda5" I noticed other problems. I install Compusec encryption . The next day my password doesn't work. I install windows xp on a dell laptop. The next day the password doesn't work. I install Vista on a lenovo laptop . The next day the password doesn't work . I install Ubuntu Linux on a external HD. The next day the password doesn't work. 4 different pieces of hardware and the same problem. 3 different OS and same problem. Not a hardware or software problem. I remove the wi-fi card and there is no bluetooth card - same problem . One of the programs Zone Alarm is monitoring is Remote Registry Service, which allows the govt working with microsoft to shut down your firewall. The only program that can start Remote Registry Service is a remote computer. The fact that Zone Alarm was monitoring that program means it was started. How was Remote Registry Service started when I haven't installed the modem, there is no wi-fi card or bluetooth card? A whole bunch of programs start acting as servers. The firewall gets shut down. Acronis Try and Decide program shows 300MB of information added to my computer in 10 minutes. How, when I haven't connected to the internet yet? When the laptop is covered with RFI shielding (twpinc.com) and grounded to create a faraday cage the programs do not all become servers, the password doesn't get changed, the firewall doesn't get shutdown. Conclusion, there is a receiver in your computer that allows the govt to hack into your computer even when you are offline. If you think I am making this up dl Wireshark and see where your computer is connecting to. Asia Pacific Network Information Center 121.0.0.0-121.255.255.255 221.0.0.0-221.255.255.255 61.0.0.0-61.255.255.255 202.0.0.0-203.255.255.255 210.0.0.0-211.255.255.255 218.0.0.0-218.255.255.255 220.0.0.0-220.255.255.255 60.0.0.0-60.255.255.255 125.0.0.0-125.255.255.255 189.0.0.0-189.255.255.255 200.0.0.0-200.255.255.255 Level 3 communications 8.0.0.0-8.255.255.255 64.152.0.0-64.159.255.255.255 67.24.0.0-67.31.255.255 4.0.0.0-4.255.255.255 69.192.0.0-69.192.255.255 RIPE 94.0.0.0-94.255.255.255 217.0.0.0-217.255.255.255 81.0.0.0-81.255.255.255 84.0.0.0-84.255.255.255 85.0.0.0-85.255.255.255 62.0.0.0-62.255.255.255 88.0.0.0-88.255.255.255 212.0.0.0-212.255.255.255 Go to a library and look at your spam mail. Go to the bottom and click on "show full headers" get the originating ip address and go to arin.net and do a reverse DNS lookup. You will see that most are comong from RIPE. Probably containing malicious code. John Montgomery wrote: Remove EncFiltLog.menc 20-Mar-10 To remove EncFiltLog.menc This file appears to be write protected, but it can be removed with a linux OS and the shred command. Go to linuxcd.org. Order a copy of Backtrack3 live CD. (About $7.00) Remove the HD so you don't get confused. Make sure the bios setting will boot from a CD. Start BT3. Open terminal window (bottom tray left side) Type without quotes, the command "cd /mnt" List the contents of the mount directory, Code- "ls" If you use a USB adapter for the SD card it should mount as sda5. In the mount directory you should see floppy/ live/ sda5/sr0 Change to the sda5 directory, Code- "cd sda5" You should see the files on the microSD. Use the shred command to remove the EncFiltLog.menc, Code- "shred -fuvz EncFiltLog.menc" The first time it stops with an error message, repeat the command and it will overwrite 26 times. Now create a dummy file with the same name. Code- "vi EncFiltLog.menc" This will create an empty file with the same name. Push the escape key twice to put vi into command mode, you should hear a beep. Now put it into insert mode by pushing the i key. Type a few letters. Now write it to the file Code-":w" and quit the editor, Code ":q" Now make the file executable, Code- "chmod u=x EncFiltLog.menc" Remove all other access permissions Code- "chmod g-rwx EncFiltLog.menc" Then Code- "chmod o-rwx EncFiltLog.menc" You can also do this with the Graphical interface. What you want is an "excutable" file that looks like the original but does nothing . If you try to look at the original with vi Code- "vi EncFiltLog.menc" you get an error message saying this is a binary file (executable program) . But it claims to be a plain text file. I noticed something was wrong when my phone started connecting to the internet by itself. When I removed the sd card it stopped. When I put the card back in it did it again. This is probably a R.A.T or backdoor the govt uses to spy on us. For the shred manual return to the root directory Code- "cd" Then, Code-"man shred" also "man chmod" Do not remove the SD card while it is mounted. Shut the computer off or unmount the sd card Code- "cd /mnt" Then "umount sda5" I noticed other problems. I install Compusec encryption . The next day my password doesn't work. I install windows xp on a dell laptop. The next day the password doesn't work. I install Vista on a lenovo laptop . The next day the password doesn't work . I install Ubuntu Linux on a external HD. The next day the password doesn't work. 4 different pieces of hardware and the same problem. 3 different OS and same problem. Not a hardware or software problem. I remove the wi-fi card and there is no bluetooth card - same problem . One of the programs Zone Alarm is monitoring is Remote Registry Service, which allows the govt working with microsoft to shut down your firewall. The only program that can start Remote Registry Service is a remote computer. The fact that Zone Alarm was monitoring that program means it was started. How was Remote Registry Service started when I haven't installed the modem, there is no wi-fi card or bluetooth card? A whole bunch of programs start acting as servers. The firewall gets shut down. Acronis Try and Decide program shows 300MB of information added to my computer in 10 minutes. How, when I haven't connected to the internet yet? When the laptop is covered with RFI shielding (twpinc.com) and grounded to create a faraday cage the programs do not all become servers, the password doesn't get changed, the firewall doesn't get shutdown. Conclusion, there is a receiver in your computer that allows the govt to hack into your computer even when you are offline. If you think I am making this up dl Wireshark and see where your computer is connecting to. Asia Pacific Network Information Center 121.0.0.0-121.255.255.255 221.0.0.0-221.255.255.255 61.0.0.0-61.255.255.255 202.0.0.0-203.255.255.255 210.0.0.0-211.255.255.255 218.0.0.0-218.255.255.255 220.0.0.0-220.255.255.255 60.0.0.0-60.255.255.255 125.0.0.0-125.255.255.255 189.0.0.0-189.255.255.255 200.0.0.0-200.255.255.255 Level 3 communications 8.0.0.0-8.255.255.255 64.152.0.0-64.159.255.255.255 67.24.0.0-67.31.255.255 4.0.0.0-4.255.255.255 69.192.0.0-69.192.255.255 RIPE 94.0.0.0-94.255.255.255 217.0.0.0-217.255.255.255 81.0.0.0-81.255.255.255 84.0.0.0-84.255.255.255 85.0.0.0-85.255.255.255 62.0.0.0-62.255.255.255 88.0.0.0-88.255.255.255 212.0.0.0-212.255.255.255 Go to a library and look at your spam mail. Go to the bottom and click on "show full headers" get the originating ip address and go to arin.net and do a reverse DNS lookup. You will see that most are comong from RIPE. Probably containing malicious code. Previous Posts In This Thread: Submitted via EggHeadCafe - Software Developer Portal of Choice How to Annotate Images from a database in a web page http://www.eggheadcafe.com/tutorials/aspnet/0c4c3072-6730-41db-a759-082c24acd999/how-to-annotate-images-fr.aspx
|
Pages: 1 Prev: Remove EncFiltLog.menc Next: www.CeBeans.com - new program listings - Mar 22 2010 |