From: Gordon Darling on
On Sun, 20 Jun 2010 19:11:41 +0200, Gordon Darling wrote:

snip birsdshit

forgery through mail2news(a)dizum.com





--
ox·y·mo·ron
n. pl. ox·y·mo·ra or ox·y·mo·rons
A rhetorical figure in which incongruous or contradictory terms are
combined, as in Microsoft Security, Microsoft Help and Microsoft Works.
From: idle on
On Sun, 20 Jun 2010 19:48:14 +0000 (UTC), Bear Bottoms wrote in
alt.comp.freeware:

> idle <idle(a)mycomputer.com> wrote in news:8871ftFsl2U1(a)mid.individual.net:
>
>> He's a raging alchololic, or working towards it maybe ;)
>>
>
> Ya, I would resort to insults if I were you to try and get the idiot symbol
> off of my back.

It was meant as a compliment.

--
that's my story and i'm sticking to it.
From: za kAT on
On Sun, 20 Jun 2010 19:47:15 +0000 (UTC), Bear Bottoms wrote:

> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in
> news:hvli57$17r$1(a)news.eternal-september.org:
>
>> On Sun, 20 Jun 2010 17:10:10 +0000 (UTC), Bear Bottoms wrote:
>>
>>> idle <idle(a)mycomputer.com> wrote in
>>> news:886r96FmftU1(a)mid.individual.net:
>>>
>>>> On Sun, 20 Jun 2010 08:24:09 -0500, The Seabat wrote in
>>>> alt.comp.freeware:
>>>>
>>>>> On Sat, 19 Jun 2010 09:41:27 -0700, idle <idle(a)mycomputer.com>
>>>>> wrote:
>>>>>
>>>>>>>On Sat, 19 Jun 2010 15:32:06 +0000 (UTC), Bear Bottoms wrote in
>>>>>>>alt.comp.freeware:
>>>>>>>
>>>>>>>> Exe File Information lists currently running processes to help
>>>>>>>> identify memory hogs and malicious software and applications.
>>>>>>>> This freeware�s straightforward interface displays a list of
>>>>>>>> running processes, complete with process name, memory usage,
>>>>>>>> thread, and application path. Highlight a process and additional
>>>>>>>> information is displayed at the lower part of the main window.
>>>>>>>> You can click a link to find additional information about the
>>>>>>>> process at Exedb.com. Size: 1.2 MB. Win98/Me/2k/XP/Vista/7.
>>>>>>>>
>>>>>>>> http://exedb.com/
>>>>>>>
>>>>>>>Trojan horse Downloader.VB.EZQ
>>>>>>>
>>>>>>>Slime
>>>>>
>>>>> You guys know you're talking to a sock half the time, don't you?
>>>>
>>>> Of course ;)
>>>> That's why I posted the av report, so any others would have a heads
>>>> up and test with their av b4 taking the risk.
>>>> False +? Maybe.
>>>> But with a handful of other progs recommended here doing the same
>>>> functions...
>>>>
>>>> yawn
>>>>
>>>>
>>>
>>> You are an idiot. Please don't pass along malware alerts until you
>>> are sure they are not false positives...unless of course you haven't
>>> the ability to determine such.
>>
>> He did the /right/ thing. Warn us as soon as possible. What's your
>> problem with that?
>>
>
> LOL, and every one else jumped on the false positive with glee.

Excellent retort to my point. Apart from the bit where you focussed on
everyone else.

> I suppose
> none here have the ability to determine if it is a false positive or not.

I don't. Perhaps you would like to outline your methods? It's been a long
time since I've disassembled code. Really, it would make excellent reading.
I'm quite excited now.

> What a bunch of idiots. He didn't do the right thing, unless he has no
> clue how to determine a false positive or not, and then...this obviously
> is the wrong group to report to with one or two exceptions.

Look, I realise 6 doesn't follow 5 in your world, but the rest of us are
simple beings. I too would have floundered, and simply warned others, who
might click on the same post to beware. Now you have informed me I should
go elsewhere, I will do so! Could you let me know where, and what the
procedure is? Thanks.

> What a bunch
> of idiots posting smack about how smart they are and fall into such a
> amateur trap. Good grief. This is er, priceless.

We are humbled by your magnificence.

--
zakAT(a)pooh.the.cat - Sergeant Tech-Com, DN38416.
Assigned to protect you. You've been targeted for denigration!
From: za kAT on
On Sun, 20 Jun 2010 21:33:50 +0000 (UTC), Bear Bottoms wrote:

> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in news:hvlt19$i67$1
> @news.eternal-september.org:
>
>> We are humbled by your magnificence.
>
> Glad you see the light. BTW, you don't have to disassemble code to
> determine the presense of malware.

I asked you to outline your methods. You haven't. You just snipped it and
left the usual trolling teaser. It's tedious. If you have knowledge to
impart. Please do so.

--
zakAT(a)pooh.the.cat - Sergeant Tech-Com, DN38416.
Assigned to protect you. You've been targeted for denigration!
From: za kAT on
On Sun, 20 Jun 2010 22:53:11 +0000 (UTC), Bear Bottoms wrote:

> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in news:hvm2bc$5jb$1
> @news.eternal-september.org:
>
>> On Sun, 20 Jun 2010 21:33:50 +0000 (UTC), Bear Bottoms wrote:
>>
>>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in news:hvlt19$i67
> $1
>>> @news.eternal-september.org:
>>>
>>>> We are humbled by your magnificence.
>>>
>>> Glad you see the light. BTW, you don't have to disassemble code to
>>> determine the presense of malware.
>>
>> I asked you to outline your methods. You haven't. You just snipped it
> and
>> left the usual trolling teaser. It's tedious. If you have knowledge to
>> impart. Please do so.
>>
>
> It isn't magic. Learn on your own. You could visit my security page on my
> website and educate yourself for starters.

I don't want to learn on my own. This is a group hug kinda thing. I want to
know what to do when I have put a file on jotti, and a dozen malware
scanners have gone bonkers, and declared the file has a virus. How do I
determine if it's a false positive? Clock's ticking... Other people in the
group might download it... What do I do that's not magic? I know now how
irresponsible it would be to post a warning here, and I'd just like to know
what the responsible, non magical thingy you do is. What's the procedure? I
mean if I file a report with the developer that might take time, so pretty
please, tell us all what to do!!

--
zakAT(a)pooh.the.cat - Sergeant Tech-Com, DN38416.
Assigned to protect you. You've been targeted for denigration!
First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9
Prev: The real Chrome threat to Firefox
Next: If You Wonder