Prev: The real Chrome threat to Firefox
Next: If You Wonder
From: Dustin Cook on 23 Jun 2010 12:14 Bear Bottoms <bearbottoms1(a)gmai.com> wrote in news:Xns9D9FD4ED4C08Fbearbottoms1gmaicom(a)news.albasani.net: > Dustin Cook <bughunter.dustin(a)gmail.com> wrote in > news:Xns9D9FCBCC2AFD3HHI2948AJD832(a)69.16.185.247: > >> Why did you sort of go into panic mode and post an apology after the >> alert (which turned out to be a false positive) was posted? You >> didn't check the file out either. *g*. >> >> And btw, it is a false positive.. I don't have any use for the >> program, I just wanted something to take apart that might have been >> interesting.. *shrug*. it wasn't. >> > > You are hoping I didn't check it out, might save some face for you and > a few others...but guess what, I did. So that makes you wrong. I'm not here to save face. You didn't initally check it out, unless the posts are forgeries.. which, I suppose is possible. So I'll reserve comment in that case. > Of course some programs alerted a false positive. All of the programs > that alerted on it from Jotti...well trash them. They are worthless. > This is about as basic as it gets. I agree the programs hueristics might be a little high strung, but not worthless. :) > As for the program, it is more useful than Windows Task Manager for > the most part. Just about any program of this type would be. Agreed. -- The bear went over the mountain to see what he could see. Hey! The other side of the mountain was all that he could see! So he went back over the mountain to see what he could see. Hey! The other side of the mountain was all that he could see! - Green Jelly The Bear Song
From: Ari Silverstein on 23 Jun 2010 12:41 On Wed, 23 Jun 2010 16:12:55 GMT, Dustin Cook wrote: > Bear Bottoms <bearbottoms1(a)gmai.com> wrote in > news:Xns9D9FD6C009E7bearbottoms1gmaicom(a)news.albasani.net: > >> Dustin Cook <bughunter.dustin(a)gmail.com> wrote in >> news:Xns9D9FCC6F2C478HHI2948AJD832(a)69.16.185.247: >> >>> Bear Bottoms <bearbottoms1(a)gmai.com> wrote in >>> news:Xns9D9DB5FBE7B87bearbottoms1gmaicom(a)news.albasani.net: >>> >>>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in >>>> news:hvm2bc$5jb$1 @news.eternal-september.org: >>>> >>>>> On Sun, 20 Jun 2010 21:33:50 +0000 (UTC), Bear Bottoms wrote: >>>>> >>>>>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in >>>>>> news:hvlt19$i67 >>>> $1 >>>>>> @news.eternal-september.org: >>>>>> >>>>>>> We are humbled by your magnificence. >>>>>> >>>>>> Glad you see the light. BTW, you don't have to disassemble code to >>>>>> determine the presense of malware. >>>>> >>>>> I asked you to outline your methods. You haven't. You just snipped >>>>> it >>>> and >>>>> left the usual trolling teaser. It's tedious. If you have knowledge >>>>> to impart. Please do so. >>>>> >>>> >>>> It isn't magic. Learn on your own. You could visit my security page >>>> on my website and educate yourself for starters. >>>> >>> >>> BD, >>> >>> I have an argument against your comment. In some cases, if the >>> malware is properly designed; you shouldn't even notice it's there, >>> until it's time for it to do it's thing. In those cases, I do think >>> being able to read code would be a valuable asset. I can provide >>> another example, of what I consider.. potentially? malware. A friend >>> has a laptop he acquired thru a rental/to own place. It has an >>> interesting little program that's hidden from the user; It >>> occasionally makes contact on the internet to a server I don't yet >>> know, and in this case, it accepted a remote shutdown request. For >>> over 3 hours it had a message on the screen and refused to boot up >>> normally without a password he acquired by calling the store. >>> >>> On one hand, thats interesting anti theft software; but it does >>> behave in a very sneaky fashion. The program you listed here btw, >>> doesn't see it's executable running. :) >>> >>> Have a nice day. >>> >> >> Your argument is valid. There is no silver bullet as you know. The >> game is in favor of the hackers. Defense is always one step behind. >> You do the best you can with it. However, this event of discussion is >> about as basic as it gets. The warning was premature and most anyone >> should have been able to see through it, unless you are completely >> ignorant of these issues. > > I agree with you on the warning. > >> BTW, I'm having much less fun with you than you are having with me :) > > Well, in all fairness, I'm really not here to try and troll you. I do > find agreement on occasion with some of your posts. And, for what it's > worth, I'm not convinced you really don't know the stuff posted in > response to you, vs your possible? enjoyment in just arguing back and > forth. You remind me of a classmate I once had in computers. He had the > teacher convinced he didn't know a damn thing, which was handy when the > network was being hacked by him later. *g*. No, no, Bottoms is a pure idiot, trust me on this. He's also a self-admitted baby-killing drug pusher. One goes hand-in-hand with the other. -- Talk about F-Cars - www.ferrarichat.com/forum/member.php?u=89702
From: Franklin on 23 Jun 2010 13:31 Ari Silverstein wrote: > On Wed, 23 Jun 2010 16:12:55 GMT, Dustin Cook wrote: > >> Bear Bottoms <bearbottoms1(a)gmai.com> wrote in >> news:Xns9D9FD6C009E7bearbottoms1gmaicom(a)news.albasani.net: >> >>> Dustin Cook <bughunter.dustin(a)gmail.com> wrote in >>> news:Xns9D9FCC6F2C478HHI2948AJD832(a)69.16.185.247: >>> >>>> Bear Bottoms <bearbottoms1(a)gmai.com> wrote in >>>> news:Xns9D9DB5FBE7B87bearbottoms1gmaicom(a)news.albasani.net: >>>> >>>>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in >>>>> news:hvm2bc$5jb$1 @news.eternal-september.org: >>>>> >>>>>> On Sun, 20 Jun 2010 21:33:50 +0000 (UTC), Bear Bottoms wrote: >>>>>> >>>>>>> za kAT <zakAT(a)super-secret-IPaddress.invalid> wrote in >>>>>>> news:hvlt19$i67 >>>>> $1 >>>>>>> @news.eternal-september.org: >>>>>>> >>>>>>>> We are humbled by your magnificence. >>>>>>> >>>>>>> Glad you see the light. BTW, you don't have to disassemble >>>>>>> code to determine the presense of malware. >>>>>> >>>>>> I asked you to outline your methods. You haven't. You just >>>>>> snipped it >>>>> and >>>>>> left the usual trolling teaser. It's tedious. If you have >>>>>> knowledge to impart. Please do so. >>>>>> >>>>> >>>>> It isn't magic. Learn on your own. You could visit my security >>>>> page on my website and educate yourself for starters. >>>>> >>>> >>>> BD, >>>> >>>> I have an argument against your comment. In some cases, if the >>>> malware is properly designed; you shouldn't even notice it's >>>> there, until it's time for it to do it's thing. In those cases, I >>>> do think being able to read code would be a valuable asset. I can >>>> provide another example, of what I consider.. potentially? >>>> malware. A friend has a laptop he acquired thru a rental/to own >>>> place. It has an interesting little program that's hidden from >>>> the user; It occasionally makes contact on the internet to a >>>> server I don't yet know, and in this case, it accepted a remote >>>> shutdown request. For over 3 hours it had a message on the screen >>>> and refused to boot up normally without a password he acquired by >>>> calling the store. >>>> >>>> On one hand, thats interesting anti theft software; but it does >>>> behave in a very sneaky fashion. The program you listed here btw, >>>> doesn't see it's executable running. :) >>>> >>>> Have a nice day. >>>> >>> >>> Your argument is valid. There is no silver bullet as you know. The >>> game is in favor of the hackers. Defense is always one step >>> behind. You do the best you can with it. However, this event of >>> discussion is about as basic as it gets. The warning was premature >>> and most anyone should have been able to see through it, unless >>> you are completely ignorant of these issues. >> >> I agree with you on the warning. >> >>> BTW, I'm having much less fun with you than you are having with me >>> :) >> >> Well, in all fairness, I'm really not here to try and troll you. I >> do find agreement on occasion with some of your posts. And, for >> what it's worth, I'm not convinced you really don't know the stuff >> posted in response to you, vs your possible? enjoyment in just >> arguing back and forth. You remind me of a classmate I once had in >> computers. He had the teacher convinced he didn't know a damn >> thing, which was handy when the network was being hacked by him >> later. *g*. > > No, no, Bottoms is a pure idiot, trust me on this. He's also a > self-admitted baby-killing drug pusher. > > One goes hand-in-hand with the other. Actually, I do trust you on that.
From: Franklin on 23 Jun 2010 13:31 Gordon Darling wrote: > On Sun, 20 Jun 2010 19:11:41 +0200, Gordon Darling wrote: > > snip birsdshit > > forgery through mail2news(a)dizum.com > You must have hit a nerve with Millbank. He's going to spoof you to show just how much you've upset him. Well done.
From: Nemesis on 23 Jun 2010 18:22
On Wed, 23 Jun 2010 21:58:11 +0000, Bear Bottoms wrote: > Dustin Cook <bughunter.dustin(a)gmail.com> wrote in > news:Xns9DA07C86238FFHHI2948AJD832(a)69.16.185.247: > >> Take it easy Bottoms, and don't be so uptight. > > I'm loose as a goose and enjoying every day more and more. Aha, so you DID use penix. Can't be that hard to install then. []'s |