From: BoaterDave on
On Aug 4, 3:49 am, Dustin <bughunter.dus...(a)gmail.com> wrote:
> ~BD~ <BoaterDave~no.sp...(a)hotmail.co.uk> wrote innews:n5Cdne1gFMmhOMXRnZ2dnUVZ8iednZ2d(a)bt.com:
>
> > Peter Foldes wrote:
> >> BD
>
> >> And Roy C was told by some including me that it was a bad site that
> >> was mostly snake oil. He also found out the hard way as you will.
>
> > I'm not concerned for me - my concern was for my elderly friend who
> > has already paid and is using the software!
>
> If you haven't already suggested it, he should get a refund and if they
> are unwilling to provide one, contact his credit card company to have
> the charges reversed. At the least he has been scammed. At worst, he's
> been scammed and software damage has been done to his computer, as we
> can't possibly know which registry keys have been altered since he ran
> the software. If since installing that program he hasn't made any other
> significant system changes or installed new software, I'd recommend he
> uninstall it (Revo uninstaller or total uninstall might be of use in
> this case); In fact, I'd use one of those before I trusted the uniblue
> uninstaller.
>
> Once he's removed the program, I'd recommend he keep revo or total
> uninstall for future issues, and use the system restore feature to go
> back prior to his installation of said product. That should atleast
> revert the registry hives and critical system files if any have been
> altered/replaced or removed. As your friend would be using the
> unaffected registry, any executables possibly left behind by the
> uninstall process would be neutered and no longer pose any potential
> threat to the system.
>
> --
> "I like your Christ. I don't like your Christians. They are so unlike
> your Christ."  - author unknown.

Thank you for the advice, Dustin. I will pass on your comments to
Clive.

Surely there is something that can be done to stop companies like
Uniblue peddle their wares on the Internet?

Have you and or others posting on these groups made any kind of
official complaint about what you term 'Scamware' ?

If the products really do harm, something *should* be done to stop
them.

Maybe there's something I could do to help in this regard? Advice
welcomed.

Dave
From: ~BD~ on
Dustin wrote:
> I'm also unfamiliar with Mark


Did this simply slip your mind, Dustin?

http://tinypic.com/r/ht8zv9/4

It's not important! :)

Dave
From: James Morrow on
In article <Xns9DC9E883D4288HHI2948AJD832(a)69.16.185.247>,
bughunter.dustin(a)gmail.com says...

<snip>
> Once he's removed the program, I'd recommend he keep revo or total
> uninstall for future issues, and use the system restore feature to go
> back prior to his installation of said product. That should atleast
> revert the registry hives and critical system files if any have been
> altered/replaced or removed. As your friend would be using the
> unaffected registry, any executables possibly left behind by the
> uninstall process would be neutered and no longer pose any potential
> threat to the system.
>
I just tested Revo Uninstall and it works great. I had a real mess with
Adobe Reader 9.3.3. Windows XP would not get rid of it. It kept
checking for an update but would neither update or uninstall. Revo
Uninstall swept it away, registry keys and all. I installed Foxit
Reader. Problem solved. I would very much recommend Revo.
--
James E. Morrow
Email to: jamesemorrow(a)email.com
From: David H. Lipman on
From: "ASCII" <me2(a)privacy.net>

| James Morrow wrote:
>>I installed Foxit
>>Reader. Problem solved. I would very much recommend Revo.

| I agree with your recommendations
| both onboard here
| Foxit v4.1.0.0726
| Revo Pro v2.2.3


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Foxit Releases Foxit Reader 4.1.1.0805

Original release date: August 6, 2010 at 10:31 am Last revised: August
6, 2010 at 10:31 am


Foxit has released Foxit Reader 4.1.1.0805 to address a vulnerability
associated with the improper rendering of PDF documents. Exploitation of
this vulnerability may allow an attacker to execute arbitrary code.

US-CERT encourages users and administrators to review the security
release notes for Foxit Reader 4.1.1.0805 and apply any necessary
updates to help mitigate the risks. Additional information regarding
this vulnerability can be found in US-CERT Vulnerability Note VU#275247.

US-CERT will provide additional information as it becomes available.

Relevant Url(s):
<http://www.kb.cert.org/vuls/id/275247>

<http://www.foxitsoftware.com/announcements/2010861227.html>

====
This entry is available at
http://www.us-cert.gov/current/index.html#foxit_releases_foxit_reader_4

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTFwn0T6pPKYJORa3AQJPPgf/eb0FlEqr2+S1OIRgtH2PsQMbXJktQL8W
2LdJomPcZAh7yOffV1iSrJIBow2mGGdFNhay0YkA9l/2TfIdB3/EnSB2r6l16BDY
yep4ZIntB+5WEu8Qt5qxVvUyjSnGttPyKkSPafT46/TYkOGGKQ8utD+bGDvwSDjN
pQ4Ms9ZXty+O0eMyI4nD4qh3UYBRRjOIMm+9bZhSplHEDkpPHl9MLfyEshmPYfsC
lL5jDyv0z+jANKQHaSxh1gw4Ah9i4B3xirCp2w6t1yGRbd7EdIufS8c0p4+a/Unl
yG7lFmhXP387ttFCxg7pFJAzXb9XzKRLcT8NlBCHrBS+seX6efdqfg==
=FNM0
-----END PGP SIGNATURE-----

--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


From: Dustin on
ASCII <me2(a)privacy.net> wrote in news:4c5d5ff4.716703(a)EDCBIC:

> David H. Lipman wrote:
>>
>>Foxit has released Foxit Reader 4.1.1.0805 to address a
>>vulnerability associated with the improper rendering of PDF
>>documents. Exploitation of this vulnerability may allow an attacker
>>to execute arbitrary code.
>
> Although I don't have an iPad nor iPhone,

Whats your personal views on those?



--
"I like your Christ. I don't like your Christians. They are so unlike
your Christ." - author unknown.
First  |  Prev  | 
Pages: 1 2 3 4
Prev: Anti-virus & signature updates
Next: Anti-virus