Prev: The real Chrome threat to Firefox
Next: If You Wonder
From: Bloggs on 20 Jun 2010 22:19 za kAT wrote: >I don't want to learn on my own. This is a group hug kinda thing. I >want to know what to do when I have put a file on jotti, and a dozen >malware scanners have gone bonkers, and declared the file has a virus. >How do I determine if it's a false positive? Clock's ticking... Other >people in the group might download it... What do I do that's not magic? >I know now how irresponsible it would be to post a warning here, and >I'd just like to know what the responsible, non magical thingy you do >is. What's the procedure? I mean if I file a report with the developer >that might take time, so pretty please, tell us all what to do!! Ask the expert in all things computing: John Stubbings :-) He knows everything! No, really. If that doesn't save you then you have at least two other options: 1.run the program and if it infects your system with malware, you can easily restore it from your most recent image. You do take regular images. Right? 2.ask Gordon Darling how he cleans his system using anti-malware stuff. He reckons it's better than restoring from an image or reloading from scratch. Problem solved. -HTH- Bloggs "You have been targeted for denigration"
From: Gordon Darling on 20 Jun 2010 23:25 -------------FORGERY----------------- ...posted through <news.sunsite.dk> LART sent. >On Sun, 20 Jun 2010 19:11:41 +0200, FORGER Gordon Darling wrote: {{rubbish snipped}} -- ox�y�mo�ron n. pl. ox�y�mo�ra or ox�y�mo�rons A rhetorical figure in which incongruous or contradictory terms are combined, as in Microsoft Security, Microsoft Help and Microsoft Works. I block all posts made via remailers.
From: za kAT on 21 Jun 2010 05:08 On Mon, 21 Jun 2010 01:56:36 +0000 (UTC), Bear Bottoms wrote: > za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in > news:hvm78h$osv$1(a)news.eternal-september.org: > >> On Sun, 20 Jun 2010 22:53:11 +0000 (UTC), Bear Bottoms wrote: >> >>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in >>> news:hvm2bc$5jb$1 @news.eternal-september.org: >>> >>>> On Sun, 20 Jun 2010 21:33:50 +0000 (UTC), Bear Bottoms wrote: >>>> >>>>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in >>>>> news:hvlt19$i67 >>> $1 >>>>> @news.eternal-september.org: >>>>> >>>>>> We are humbled by your magnificence. >>>>> >>>>> Glad you see the light. BTW, you don't have to disassemble code to >>>>> determine the presense of malware. >>>> >>>> I asked you to outline your methods. You haven't. You just snipped >>>> it >>> and >>>> left the usual trolling teaser. It's tedious. If you have knowledge >>>> to impart. Please do so. >>>> >>> >>> It isn't magic. Learn on your own. You could visit my security page >>> on my website and educate yourself for starters. >> >> I don't want to learn on my own. This is a group hug kinda thing. I >> want to know what to do when I have put a file on jotti, and a dozen >> malware scanners have gone bonkers, and declared the file has a virus. >> How do I determine if it's a false positive? Clock's ticking... Other >> people in the group might download it... What do I do that's not >> magic? I know now how irresponsible it would be to post a warning >> here, and I'd just like to know what the responsible, non magical >> thingy you do is. What's the procedure? I mean if I file a report with >> the developer that might take time, so pretty please, tell us all what >> to do!! >> > > Geez...for this one, use universal extractor with Wise and the x switch > in a sandbox and check out all the files. Too simple. Too simple by far. My AV has already done that. You don't really know. You just throw around buzz words like 'sandbox', and vagaries like 'check out'. The sensible thing is just leave a warning, and send a report to the developer, and let them sort it out. Job done. While I'm sure people who really know what they are doing have all kinds of methods, the only way I can think of doing it is to check out what traces the malware leaves [if they have been published],install the app on a separate piece of isolated hardware you are willing to trash, and look for those traces. Frankly, I couldn't be arsed. -- zakAT(a)pooh.the.cat - Sergeant Tech-Com, DN38416. Assigned to protect you. You've been targeted for denigration!
From: John Stubbings on 21 Jun 2010 09:59 za kAT wrote: >While I'm sure people who really know what they are doing have all kinds >of methods, the only way I can think of doing it is to check out what >traces the malware leaves [if they have been published],install the app >on a separate piece of isolated hardware you are willing to trash, and >look for those traces. > >Frankly, I couldn't be arsed because I'm an innumerate cowardly pitiful windbag. John Stubbings -- "You have been targeted for denigration"
From: Shadow on 21 Jun 2010 11:37
On Sun, 20 Jun 2010 22:53:11 +0000 (UTC), Bear Bottoms <bearbottoms1(a)gmai.com> wrote: >It isn't magic. Learn on your own. You could visit my security page on my >website and educate yourself for starters. I did, oh noble Lord. Re-installing windows - I do it all the time ... []'s |