From: za kAT on
On Tue, 22 Jun 2010 20:26:36 +0000 (UTC), Bear Bottoms wrote:

> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in news:hvptla$vgg$1
> @news.eternal-september.org:
>
>> Developers want you to report this kind of thing you dumbfuck.
>>
>
> So you think these developers do not know about the false positives?

What I think is, that ever since you came to this group, the level of
sensible common sense advice given out here has deteriorated to the point
of autism.

--
zakAT(a)pooh.the.cat - Sergeant Tech-Com, DN38416.
Assigned to protect you. You've been targeted for denigration!
From: Blitz The Dog on
za kAT wrote this bollix:

>"I have done the above on a couple of occasions. The developers sorted
>it out with the AV companies, and then told me when they had done so."


So what you wrote further up the thread was bollix. Right?:

"I'm not interested in what the developer tells me.
He/she has to sort it out with the anti virus vendors. I'm interested
in what they tell me."

Why don't you think about it and tell us WHO you listen to (apart from
your countless socks). lol



Blitz The Dog
"You have been targeted for denigration"

From: Dustin Cook on
Bear Bottoms <bearbottoms1(a)gmai.com> wrote in
news:Xns9D9D9674CFAA5bearbottoms1gmaicom(a)news.albasani.net:

> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in
> news:hvli57$17r$1(a)news.eternal-september.org:
>
>> On Sun, 20 Jun 2010 17:10:10 +0000 (UTC), Bear Bottoms wrote:
>>
>>> idle <idle(a)mycomputer.com> wrote in
>>> news:886r96FmftU1(a)mid.individual.net:
>>>
>>>> On Sun, 20 Jun 2010 08:24:09 -0500, The Seabat wrote in
>>>> alt.comp.freeware:
>>>>
>>>>> On Sat, 19 Jun 2010 09:41:27 -0700, idle <idle(a)mycomputer.com>
>>>>> wrote:
>>>>>
>>>>>>>On Sat, 19 Jun 2010 15:32:06 +0000 (UTC), Bear Bottoms wrote in
>>>>>>>alt.comp.freeware:
>>>>>>>
>>>>>>>> Exe File Information lists currently running processes to help
>>>>>>>> identify memory hogs and malicious software and applications.
>>>>>>>> This freeware�s straightforward interface displays a list of
>>>>>>>> running processes, complete with process name, memory usage,
>>>>>>>> thread, and application path. Highlight a process and
>>>>>>>> additional information is displayed at the lower part of the
>>>>>>>> main window. You can click a link to find additional
>>>>>>>> information about the process at Exedb.com. Size: 1.2 MB.
>>>>>>>> Win98/Me/2k/XP/Vista/7.
>>>>>>>>
>>>>>>>> http://exedb.com/
>>>>>>>
>>>>>>>Trojan horse Downloader.VB.EZQ
>>>>>>>
>>>>>>>Slime
>>>>>
>>>>> You guys know you're talking to a sock half the time, don't you?
>>>>
>>>> Of course ;)
>>>> That's why I posted the av report, so any others would have a heads
>>>> up and test with their av b4 taking the risk.
>>>> False +? Maybe.
>>>> But with a handful of other progs recommended here doing the same
>>>> functions...
>>>>
>>>> yawn
>>>>
>>>>
>>>
>>> You are an idiot. Please don't pass along malware alerts until you
>>> are sure they are not false positives...unless of course you haven't
>>> the ability to determine such.
>>
>> He did the /right/ thing. Warn us as soon as possible. What's your
>> problem with that?
>>
>
> LOL, and every one else jumped on the false positive with glee. I
> suppose none here have the ability to determine if it is a false
> positive or not. What a bunch of idiots. He didn't do the right thing,
> unless he has no clue how to determine a false positive or not, and
> then...this obviously is the wrong group to report to with one or two
> exceptions. What a bunch of idiots posting smack about how smart they
> are and fall into such a amateur trap. Good grief. This is er,
> priceless.

Why did you sort of go into panic mode and post an apology after the
alert (which turned out to be a false positive) was posted? You didn't
check the file out either. *g*.

And btw, it is a false positive.. I don't have any use for the program, I
just wanted something to take apart that might have been interesting..
*shrug*. it wasn't.




--
The bear went over the mountain to see what he could see. Hey! The other
side of the mountain was all that he could see! So he went back over the
mountain to see what he could see. Hey! The other side of the mountain
was all that he could see! - Green Jelly The Bear Song
From: Dustin Cook on
Bear Bottoms <bearbottoms1(a)gmai.com> wrote in
news:Xns9D9DB5FBE7B87bearbottoms1gmaicom(a)news.albasani.net:

> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in
> news:hvm2bc$5jb$1 @news.eternal-september.org:
>
>> On Sun, 20 Jun 2010 21:33:50 +0000 (UTC), Bear Bottoms wrote:
>>
>>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in
>>> news:hvlt19$i67
> $1
>>> @news.eternal-september.org:
>>>
>>>> We are humbled by your magnificence.
>>>
>>> Glad you see the light. BTW, you don't have to disassemble code to
>>> determine the presense of malware.
>>
>> I asked you to outline your methods. You haven't. You just snipped it
> and
>> left the usual trolling teaser. It's tedious. If you have knowledge
>> to impart. Please do so.
>>
>
> It isn't magic. Learn on your own. You could visit my security page on
> my website and educate yourself for starters.
>

BD,

I have an argument against your comment. In some cases, if the malware is
properly designed; you shouldn't even notice it's there, until it's time
for it to do it's thing. In those cases, I do think being able to read
code would be a valuable asset. I can provide another example, of what I
consider.. potentially? malware. A friend has a laptop he acquired thru a
rental/to own place. It has an interesting little program that's hidden
from the user; It occasionally makes contact on the internet to a server
I don't yet know, and in this case, it accepted a remote shutdown
request. For over 3 hours it had a message on the screen and refused to
boot up normally without a password he acquired by calling the store.

On one hand, thats interesting anti theft software; but it does behave in
a very sneaky fashion. The program you listed here btw, doesn't see it's
executable running. :)

Have a nice day.


--
The bear went over the mountain to see what he could see. Hey! The other
side of the mountain was all that he could see! So he went back over the
mountain to see what he could see. Hey! The other side of the mountain
was all that he could see! - Green Jelly The Bear Song
From: Dustin Cook on
Bear Bottoms <bearbottoms1(a)gmai.com> wrote in
news:Xns9D9FD6C009E7bearbottoms1gmaicom(a)news.albasani.net:

> Dustin Cook <bughunter.dustin(a)gmail.com> wrote in
> news:Xns9D9FCC6F2C478HHI2948AJD832(a)69.16.185.247:
>
>> Bear Bottoms <bearbottoms1(a)gmai.com> wrote in
>> news:Xns9D9DB5FBE7B87bearbottoms1gmaicom(a)news.albasani.net:
>>
>>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in
>>> news:hvm2bc$5jb$1 @news.eternal-september.org:
>>>
>>>> On Sun, 20 Jun 2010 21:33:50 +0000 (UTC), Bear Bottoms wrote:
>>>>
>>>>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in
>>>>> news:hvlt19$i67
>>> $1
>>>>> @news.eternal-september.org:
>>>>>
>>>>>> We are humbled by your magnificence.
>>>>>
>>>>> Glad you see the light. BTW, you don't have to disassemble code to
>>>>> determine the presense of malware.
>>>>
>>>> I asked you to outline your methods. You haven't. You just snipped
>>>> it
>>> and
>>>> left the usual trolling teaser. It's tedious. If you have knowledge
>>>> to impart. Please do so.
>>>>
>>>
>>> It isn't magic. Learn on your own. You could visit my security page
>>> on my website and educate yourself for starters.
>>>
>>
>> BD,
>>
>> I have an argument against your comment. In some cases, if the
>> malware is properly designed; you shouldn't even notice it's there,
>> until it's time for it to do it's thing. In those cases, I do think
>> being able to read code would be a valuable asset. I can provide
>> another example, of what I consider.. potentially? malware. A friend
>> has a laptop he acquired thru a rental/to own place. It has an
>> interesting little program that's hidden from the user; It
>> occasionally makes contact on the internet to a server I don't yet
>> know, and in this case, it accepted a remote shutdown request. For
>> over 3 hours it had a message on the screen and refused to boot up
>> normally without a password he acquired by calling the store.
>>
>> On one hand, thats interesting anti theft software; but it does
>> behave in a very sneaky fashion. The program you listed here btw,
>> doesn't see it's executable running. :)
>>
>> Have a nice day.
>>
>>
>
> Your argument is valid. There is no silver bullet as you know. The
> game is in favor of the hackers. Defense is always one step behind.
> You do the best you can with it. However, this event of discussion is
> about as basic as it gets. The warning was premature and most anyone
> should have been able to see through it, unless you are completely
> ignorant of these issues.

I agree with you on the warning.

> BTW, I'm having much less fun with you than you are having with me :)

Well, in all fairness, I'm really not here to try and troll you. I do
find agreement on occasion with some of your posts. And, for what it's
worth, I'm not convinced you really don't know the stuff posted in
response to you, vs your possible? enjoyment in just arguing back and
forth. You remind me of a classmate I once had in computers. He had the
teacher convinced he didn't know a damn thing, which was handy when the
network was being hacked by him later. *g*.

> That is good though, eh?

Take it easy Bottoms, and don't be so uptight.




--
The bear went over the mountain to see what he could see. Hey! The other
side of the mountain was all that he could see! So he went back over the
mountain to see what he could see. Hey! The other side of the mountain
was all that he could see! - Green Jelly The Bear Song
First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9
Prev: The real Chrome threat to Firefox
Next: If You Wonder