SpywareBlaster DB extraction

Discussion in 'SpywareBlaster & Other Forum' started by ghinky, Nov 24, 2003.

Thread Status:
Not open for further replies.
  1. ghinky

    ghinky Guest

    We're trying to disable spyware activex controls across our entire enterprise and we'd like to do it with our own scripts and group policy rather than installing another piece of software. Does anyone know how to get the Spyware DB into plain text so we can use it as our list of activex controls to block?

    Basically I'd like to extract all the info that's inside the "more info on items" window.

    The text in sbinfo.dtb is easy but the hex in sbdatabase.dtb and sbdatabase2.dtb is cryptic:

    [0]
    Value=5C B5 8D C1 AD 26 FE 52 27 FF 94 CE 6F 20 0A 06 C0 49 BC 1D 8B FE 75 DE E5 5C 56 CC 51 3F 3B 33 36 AC A4 E4 4B E9 24 5E 0D 31 5F 54 82 F7 67 32 3C 12 21 4E 18 E7 36 A5
    Name=DF C1 47 99 09 0F 17 51 60 17 07 3B D3 B3 91 85 9B A9 79 C2 50 9C 2F DF
    Data=54

    Any help would be much appreciated
     
  2. Detox

    Detox Retired Moderator

    Joined:
    Feb 9, 2002
    Posts:
    8,507
    Location:
    Texas, USA
    I might be wrong, but I have a suspicion that it's supposed to be a bit cryptic. ;)

    Javacool will be around soon enough, though, and we'll see what he says.
     
Loading...
Thread Status:
Not open for further replies.