Severe infection

Discussion in 'other anti-malware software' started by ako, Aug 8, 2009.

Thread Status:
Not open for further replies.
  1. ako

    ako Registered Member

    Joined:
    Nov 16, 2006
    Posts:
    627
  2. gery

    gery Registered Member

    Joined:
    Mar 8, 2008
    Posts:
    1,785
    is this a joke or something?:rolleyes: :rolleyes: :rolleyes: :rolleyes:
     
  3. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    12,883
    Location:
    Canada
  4. cheater87

    cheater87 Registered Member

    Joined:
    Apr 22, 2005
    Posts:
    3,124
    Location:
    Pennsylvania.
    Cookies are nothing to worry about. Just go to Internet settings and select delete cookies. I also see your using sandboxie. If you have it set to delete contents on exit then it would get rid of all cookies and other left overs of that session.
     
  5. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    12,883
    Location:
    Canada
  6. Cloudcroft

    Cloudcroft Registered Member

    Joined:
    Feb 29, 2004
    Posts:
    433
    Location:
    The Hill Country of Texas
    This!
     
  7. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
  8. ako

    ako Registered Member

    Joined:
    Nov 16, 2006
    Posts:
    627
    I found this "severe" warning funny :)
    This kind of FUD is of course unethical.

    But, cookies are actually among the most devious and stealthy monsters, they don't even need startups or services to stay on your system :D
     
    Last edited: Aug 9, 2009
  9. ako

    ako Registered Member

    Joined:
    Nov 16, 2006
    Posts:
    627
    What a relief I was running it inside a virtual machine! :D
     
  10. Tarq57

    Tarq57 Registered Member

    Joined:
    Oct 7, 2006
    Posts:
    966
    Location:
    Wellington NZ
    Yep. Dodged that bullet. Well done. ;)
     
  11. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    You all stop laughing when Joanne publishes her first essay on a text.file format based exploit, capable of fooling virtualisation and elevation control in the new WIndows 7 OS (off course this exploit is backwards compatible for all NT based Microsoft OS-ses)
     
  12. HKEY1952

    HKEY1952 Registered Member

    Joined:
    Jul 22, 2009
    Posts:
    648
    Location:
    HKEY/SECURITY/ (value not set)
    The .txt exploit can also be used to hijack Threads regardless of the Forum format.

    Also try these reputable Online Scanners, must accept ActiveX:

    Windows Live OneCare Safety Scanner:
    http://onecare.live.com/site/en-US/default.htm

    01)- Protection = Virus/Spyware Scan
    02)- Clean Up = Registry and Hard Drive Scan

    Microsoft Malicious Software Removal Tool:
    http://www.microsoft.com/security/malwareremove/default.aspx

    01)- More comprehensive and customizable scans compared to the Windows and Microsoft Update Scans
    02)- Choose Run, do not download


    HKEY1952
     
  13. dell boy

    dell boy Registered Member

    Joined:
    Apr 13, 2009
    Posts:
    240
    Location:
    uk, england
    ssj you do need to run antimalware, linux fanboys say it to advertise it, but think about it there are people on this forum using windows without antivirus here, does that mean you dont need it?
    what i read was linux, like every operating system, also can get viruses, but has far less exploits, because no matter how secure your system is, if someone is dumb enough to install file and it has a key logger for example, then there will always be a need for antimalwares.
     
  14. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    Sorry just kidding :oops: , who is afraid of Joanna RUTKOWSKA's text based blue pill :D , the only blue pill I would like to try has viagra on it :argh:
     
  15. ako

    ako Registered Member

    Joined:
    Nov 16, 2006
    Posts:
    627
  16. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    Haha nice one AKO:thumb:

    There are more or less two directions in security:
    - the Monolith kernels (WINTEL stream)

    - the micro OS-kernel


    See http://en.wikipedia.org/wiki/Kernel_(computing)
    and for the debate http://en.wikipedia.org/wiki/Tanenbaum–Torvalds_debate

    I am really interested in the to be launched netbook OS of Google, it should have some of the benefis of a small kernel, until then Joanna will find vulnarabilities of specific hardware vendors trying to outmax their features between firmware and the kernel, without proper standards. So complex code and complex interfacing will inevitably suffer from exploits as addressed in that video.

    Regards Kees
     
  17. cheater87

    cheater87 Registered Member

    Joined:
    Apr 22, 2005
    Posts:
    3,124
    Location:
    Pennsylvania.
    I use Linux and WOT. So WOT should help with securing Linux even more.
     
Thread Status:
Not open for further replies.