Jump to content

wildman424

Malware Hunters
  • Posts

    1,679
  • Joined

Posts posted by wildman424

  1. Windows 7 Home Premium SP1 -  x64

     

     

     

    ShellExView==================================================Extension Name    : FAExt ClassDisabled          : NoType              : Context MenuDescription       : FileASSASSIN Shell ExtensionVersion           : 1, 0, 0, 1Product Name      : FileASSASSIN Shell ExtensionCompany           : MalwarebytesMy Computer       : NoDesktop           : NoControl Panel     : NoMy Network Places : NoEntire Network    : NoRemote Computer   : NoFilename          : C:\PROGRA~2\FILEAS~1\FILEAS~1.DLLCLSID             : {05672D66-9736-42F5-8BEB-FA1DD3CA51C4}File Created Time : 3/30/2007 6:34:52 PMCLSID Modified Time: 7/25/2013 11:44:07 PMMicrosoft         : NoFile Extensions   : AllFilesystemObjectsFile Attributes   : AFile Size         : 36,864.NET Extension    : No==================================================
  2. Its a False Positive by McAfee

    This information will be useful in reporting the false positive to McAfee

    Site rating dispute submission

    Submit your rating dispute via email at support@siteadvisor.com or online at http://www.siteadvis...erfeedback.html. During the evaluation of this dispute, McAfee communicates with site owners via email.

    Or maybe bring it up in there forum

    https://community.mc...ail/siteadvisor

    In the meen time you can safely add it to the ignore (Trusted Sites) list

  3. wildman, you can eat some Fudge Kitchen Salt water taffy while watching the girls go by on the boardwalk. ahh :wub:

    I wouldn't mind watching the girls go by, but you have my my share of the salt water taffy. Its too hard on the teeth. :lol:

  4. well I can't say either, but I bought the game off Amazon a few years ago. Could this be a sign of pirated software?

    Yes It is. If there's a keygen in there, then it is very likely pirated

    Kegens, cracks, and other pirated software very often come bundled with malware. Not only is using Pirated sotware illegal, it can be dangerous.

    I'd recommend you remove it and any other pirated software.

    Forum Policy On Piracy

  5. the file is already detected :)


    Files Detected: 7
    c:\Users\wildman424\Downloads\Malware Removal\answer(2).exe (Trojan.Agent) -> No action taken.
    [f46df304510bfd392c518e8fec146997]
    c:\Users\wildman424\Downloads\Malware Removal\answer(1).exe (Trojan.Agent) -> No action taken.
    [ce935a9dda82ca6c4d30bd6034cc916f]
    c:\Users\wildman424\Downloads\Malware Removal\answer.exe (Trojan.Agent) -> No action taken.
    [e081a156293359dde19c1c01c63a49b7]
    c:\Users\wildman424\Downloads\Malware Removal\answer(6).exe (Trojan.Agent) -> No action taken.
    [184940b769f32214433a6faed12fbd43]
    c:\Users\wildman424\Downloads\Malware Removal\answer(5).exe (Trojan.Agent) -> No action taken.
    [fa679a5d98c494a2403db86552ae41bf]
    c:\Users\wildman424\Downloads\Malware Removal\answer(4).exe (Trojan.Agent) -> No action taken.
    [4b16a45308540b2ba0ddec31c8382ed2]
    c:\Users\wildman424\Downloads\Malware Removal\answer(3).exe (Trojan.Agent) -> No action taken.
    [67fa57a0c894ef47700d031a2bd560a0]

    File name: answer.exe

    File type: Win32 EXE

    SHA256: 1151e93e421e6d50a471b00efb3f6913694fd4559139253974aaa31df3d2c8c7

    SHA1: 6e791281801359aee735fdbf2ade5670b7be97f7

    MD5: fc069e1699c08a759c9c71f3b177f34f

    File size: 523.0 KB ( 535560 bytes )

    Detection ratio: 14 / 41

    Analysis date: 2012-06-23 17:27:06 UTC ( 1 minute ago )

    https://www.virustot...sis/1340472426/

    Great .. and thanks.. this url showed up at Yahoo Answers and is currently being removed from the site. but.. i was checking it in Sandboxie . but, not on a test computer.. seeing the virustotal results were enough for me ..

    DO NOT extract it from the sandbox, I'd delete the contents of that sandbox so there isn't any accidents ;)

  6. hi

    Im currently running linux ubuntu inside oracle virtualbox.

    Is there any helpful guides to using this please.

    Im completely new to ubuntu and i do like it but im having trouble finding myself way round it sometimes.

    Is it true i dont need a anti virus or firewall to use ubuntu?

    Its a massive learning curve for me as im used to windows7.

    I really like the linux and would like to learn more of its use.

    everyone has to start somewhere and i would like to familiarise myself with ubuntu more.

    im also under the impression that linux is more secure than windows.is this true?

    Many thanks. :wacko:

    Hi,

    have you read through the virtualbox documentation I posted for you in your other topic? Have you got the VirtualBox Expansion Pack and Guest Addtions installed?

    VirtualBox Extension Pack

    VirtualBox comes in many different packages, and installation depends on your host operating system. If you have installed software before, installation should be straightforward: on each host platform, VirtualBox uses the installation method that is most common and easy to use. If you run into trouble or have special requirements, please refer to Chapter 2, Installation details for details about the various installation methods.

    Starting with version 4.0, VirtualBox is split into several components.

    1. The base package consists of all open-source components and is licensed under the GNU General Public License V2.
    2. Additional extension packs can be downloaded which extend the functionality of the VirtualBox base package. Currently, Oracle provides the one extension pack, which can be found at http://www.virtualbox.org and provides the following added functionality:

      1. The virtual USB 2.0 (EHCI) device; see the section called “USB settings”.
      2. VirtualBox Remote Desktop Protocol (VRDP) support; see the section called “Remote display (VRDP support)”.
      3. Intel PXE boot ROM with support for the E1000 network card.
      4. Experimental support for PCI passthrough on Linux hosts; see the section called “PCI passthrough”.

        VirtualBox extension packages have a .vbox-extpack file name extension. To install an extension, simply double-click on the package file, and the VirtualBox Manager will guide you through the required steps.
        To view the extension packs that are currently installed, please start the VirtualBox Manager (see the next section). From the "File" menu, please select "Preferences". In the window that shows up, go to the "Extensions" category which shows you the extensions which are currently installed and allows you to remove a package or add a new one.
        Alternatively you can use VBoxManage on the command line: see
    the section called “VBoxManage extpack” for details.



    Note - You must use the extension pack for the version of VirtualBox that you have installed.
    Also only use the extension packs available from the Virtualbox website site. DO NOT install an extension pack from an unknown/unstusted source as these can contain system level software that could be potentially harmful to your (host) system.
    VirtualBox Guest Additions
    For any serious and interactive use, the VirtualBox Guest Additions will make your life much easier by providing closer integration between host and guest and improving the interactive performance of guest systems.
    As mentioned in the section called “Some terminology”, the Guest Additions are designed to be installed inside a virtual machine after the guest operating system has been installed. They consist of device drivers and system applications that optimize the guest operating system for better performance and usability. Please see the section called “Supported guest operating systems” for details on what guest operating systems are fully supported with Guest Additions by VirtualBox.
    The VirtualBox Guest Additions for all supported guest operating systems are provided as a single CD-ROM image file which is called VBoxGuestAdditions.iso. This image file is located in the installation directory of VirtualBox. To install the Guest Additions for a particular VM, you mount this ISO file in your VM as a virtual CD-ROM and install from there.
    The Guest Additions offer the following features:
    • Mouse pointer integration
      To overcome the limitations for mouse support that were described in the section called “Capturing and releasing keyboard and mouse”, this provides you with seamless mouse support. You will only have one mouse pointer and pressing the Host key is no longer required to "free" the mouse from being captured by the guest OS. To make this work, a special mouse driver is installed in the guest that communicates with the "real" mouse driver on your host and moves the guest mouse pointer accordingly.
    • Shared folders
      These provide an easy way to exchange files between the host and the guest. Much like ordinary Windows network shares, you can tell VirtualBox to treat a certain host directory as a shared folder, and VirtualBox will make it available to the guest operating system as a network share, irrespective of whether guest actually has a network. For details, please refer to the section called “Shared folders”.
    • Better video support
      While the virtual graphics card which VirtualBox emulates for any guest operating system provides all the basic features, the custom video drivers that are installed with the Guest Additions provide you with extra high and non-standard video modes as well as accelerated video performance.
      In addition, with Windows, Linux and Solaris guests, you can resize the virtual machine's window if the Guest Additions are installed. The video resolution in the guest will be automatically adjusted (as if you had manually entered an arbitrary resolution in the guest's display settings). Please see the section called “Resizing the machine's window” also. Finally, if the Guest Additions are installed, 3D graphics and 2D video for guest applications can be accelerated; see the section called “Hardware-accelerated graphics”.
    • Seamless windows
      With this feature, the individual windows that are displayed on the desktop of the virtual machine can be mapped on the host's desktop, as if the underlying application was actually running on the host. See the section called “Seamless windows” for details.
    • Generic host/guest communication channels
      The Guest Additions enable you to control and monitor guest execution in ways other than those mentioned above. The so-called "guest properties" provide a generic string-based mechanism to exchange data bits between a guest and a host, some of which have special meanings for controlling and monitoring the guest; see the section called “Guest properties” for details.Additionally, applications can be started in a guest from the host; see the section called “Guest control”.
    • Time synchronization
      With the Guest Additions installed, VirtualBox can ensure that the guest's system time is better synchronized with that of the host. For various reasons, the time in the guest might run at a slightly different rate than the time on the host. The host could be receiving updates via NTP and its own time might not run linearly. A VM could also be paused, which stops the flow of time in the guest for a shorter or longer period of time. When the wall clock time between the guest and host only differs slightly, the time synchronization service attempts to gradually and smoothly adjust the guest time in small increments to either "catch up" or "lose" time. When the difference is too great (e.g., a VM paused for hours or restored from saved state), the guest time is changed immediately, without a gradual adjustment. The Guest Additions will re-synchronize the time regularly. See the section called “Tuning the Guest Additions time synchronization parameters” for how to configure the parameters of the time synchronization mechanism.
    • Shared clipboard
      With the Guest Additions installed, the clipboard of the guest operating system can optionally be shared with your host operating system; see the section called “General settings”.
    • Automated logons (credentials passing)
      For details, please see the section called “Automated guest logons”.

    Each version of VirtualBox, even minor releases, ship with their own version of the Guest Additions. While the interfaces through which the VirtualBox core communicates with the Guest Additions are kept stable so that Guest Additions already installed in a VM should continue to work when VirtualBox is upgraded on the host, for best results, it is recommended to keep the Guest Additions at the same version.

    Starting with VirtualBox 3.1, the Windows and Linux Guest Additions therefore check automatically whether they have to be updated. If the host is running a newer VirtualBox version than the Guest Additions, a notification with further instructions is displayed in the guest.

    To disable this update check for the Guest Additions of a given virtual machine, set the value of its /VirtualBox/GuestAdd/CheckHostVersion guest property to 0; see the section called “Guest properties” for details.

    Guest Additions are available for virtual machines running Windows, Linux, Solaris or OS/2. The following sections describe the specifics of each variant in detail.

    Guest Additions for Linux

    Like the Windows Guest Additions, the VirtualBox Guest Additions for Linux are a set of device drivers and system applications which may be installed in the guest operating system.

    The following Linux distributions are officially supported:

    • Fedora as of Fedora Core 4;
    • Redhat Enterprise Linux as of version 3;
    • SUSE and openSUSE Linux as of version 9;
    • Ubuntu as of version 5.10.

    Many other distributions are known to work with the Guest Additions.

    The version of the Linux kernel supplied by default in SUSE and openSUSE 10.2, Ubuntu 6.10 (all versions) and Ubuntu 6.06 (server edition) contains a bug which can cause it to crash during startup when it is run in a virtual machine. The Guest Additions work in those distributions.

    Note that some Linux distributions already come with all or part of the VirtualBox Guest Additions. You may choose to keep the distribution's version of the Guest Additions but these are often not up to date and limited in functionality, so we recommend replacing them with the Guest Additions that come with VirtualBox. The VirtualBox Linux Guest Additions installer tries to detect existing installation and replace them but depending on how the distribution integrates the Guest Additions, this may require some manual interaction. It is highly recommended to take a snapshot of the virtual machine before replacing pre-installed Guest Additions.

    Installing the Linux Guest Additions

    The VirtualBox Guest Additions for Linux are provided on the same virtual CD-ROM file as the Guest Additions for Windows described above. They also come with an installation program guiding you through the setup process, although, due to the significant differences between Linux distributions, installation may be slightly more complex.

    Installation generally involves the following steps:

    1. Before installing the Guest Additions, you will have to prepare your guest system for building external kernel modules. This works similarly as described in the section called “The VirtualBox kernel module”, except that this step must now be performed in your Linux guest instead of on a Linux host system, as described there.
      Again, as with Linux hosts, we recommend using DKMS if it is available for the guest system. If it is not installed, use this command for Ubuntu/Debian systems:
      sudo apt-get install dkms
      or for Fedora systems:
      yum install dkms
      Be sure to install DKMS before installing the Linux Guest Additions. If DKMS is not available or not installed, the guest kernel modules will need to be recreated manually whenever the guest kernel is updated using the command
      /etc/init.d/vboxadd setup
      as root.
    2. Insert the VBoxGuestAdditions.iso CD file into your Linux guest's virtual CD-ROM drive, exactly the same way as described for a Windows guest in the section called “Installation”.
    3. Change to the directory where your CD-ROM drive is mounted and execute as root:
      sh ./VBoxLinuxAdditions.run

    For your convenience, we provide the following step-by-step instructions for freshly installed copies of recent versions of the most popular Linux distributions. After these preparational steps, you can execute the VirtualBox Guest Additions installer as described above.

    Ubuntu

    1. In order to fully update your guest system, open a terminal and run
      apt-get update
      as root followed by
      apt-get upgrade
    2. Install DKMS using
      apt-get install dkms
    3. Reboot your guest system in order to activate the updates and then proceed as described above.

    Graphics and mouse integration

    In Linux and Solaris guests, VirtualBox graphics and mouse integration goes through the X Window System. VirtualBox can use the X.Org variant of the system (or XFree86 version 4.3 which is identical to the first X.Org release). During the installation process, the X.Org display server will be set up to use the graphics and mouse drivers which come with the Guest Additions.

    After installing the Guest Additions into a fresh installation of a supported Linux distribution or Solaris system (many unsupported systems will work correctly too), the guest's graphics mode will change to fit the size of the VirtualBox window on the host when it is resized. You can also ask the guest system to switch to a particular resolution by sending a "video mode hint" using the VBoxManage tool.

    Multiple guest monitors are supported in guests using the X.Org server version 1.3 (which is part of release 7.3 of the X Window System version 11) or a later version. The layout of the guest screens can be adjusted as needed using the tools which come with the guest operating system.

    If you want to understand more about the details of how the X.Org drivers are set up (in particular if you wish to use them in a setting which our installer doesn't handle correctly), you should read the section called “Guest graphics and mouse driver setup in depth”.

    Updating the Linux Guest Additions

    The Guest Additions can simply be updated by going through the installation procedure again with an updated CD-ROM image. This will replace the drivers with updated versions. You should reboot after updating the Guest Additions.

    Above information from VirtualBox Documentation

    =========

    Firewall on Ubuntu

    Linux has a firewall built in and generally ready to use "out of the box"

    The Linux kernel includes the netfilter subsystem, which is used to manipulate or decide the fate of network traffic headed into or through your computer. All modern Linux firewall solutions use this system for packet filtering. The kernel's packet filtering system would be of little use to users or administrators without a user interface with which to manage it. This is the purpose of iptables. When a packet reaches your computer, it is handed off to the netfilter subsystem for acceptance, manipulation, or rejection based on the rules supplied to it via iptables. Thus, iptables is all you need to manage your firewall (if you're familiar with it). Many front-ends such as UFW(Uncomplicated Firewall) are available to simplify the task, however.

    iptables

    iptables is the userspace command line program used to configure the Linux 2.4.x and 2.6.x IPv4 packet filtering ruleset. Since Network Address Translation is also configured from the packet filter ruleset, iptables is used for this, too. The iptables package also includes ip6tables. ip6tables is used for configuring the IPv6 packet filter. iptables is the database of firewall rules and is the actual firewall used in Linux systems. The traditional interface for configuring iptables in Linux systems is the command-line interface terminal. The other utilities in this section simplify the manipulation of the iptables database.

    UFW

    UFW (Uncomplicated Firewall)is a front-end for iptables and is particularly well-suited for host-based firewalls. UFW was developed specifically for Ubuntu (but is available in other distributions), and is also configured from the terminal.

    Gufw is a graphical front-end to UFW, and is recommended for beginners.

    UFW was introduced in Ubuntu 8.04 LTS (Hardy Heron), and is available by default in all Ubuntu installations after 8.04 LTS.

    =========

    Anti-Virus On Linux

    You'll get differant opinions on this subject depending on who you talk to. In my opinion YES you should definatly install an anti-virus on Linux. Esspecially if your going to be sharing files with Windows and other other OS's

    Although Linux is a very secure system, is designed to be resisteant to viruses, they are not immune. Its difficult for viruses and other malware to install/run on Linux, but not entirely impossible. For a Linux binary virus to infect executables, those executables must be writable by the user activating the virus. That is not likely to be the case. Chances are, the programs are owned by root and the user is running from a non-privileged account. To modify system files the user must be running as root.That is why its very important to use extreame caution when your running as root or with root's permissions using sudo (By default, the Root account is locked in Ubuntu).Never run an unknown program, script or command as root/superuser. As long as its not run with root privleges, anything you do open or run from your user account is ussually confined to your /home directory. Your /home directory is usually the only place where normal users are allowed to write files. This can be modified through permissions though, so don't do anything funky to the permissions with chown or chmod you should be alright.

    When you install software, use the reposiitories. There's tons of software in there for just about everything. Don't add unknown or untrused sources to your sources list.

    Documentation for Ubuntu

    Official Ubuntu Documentation

    User/Community Documentation

    Ubuntu Support Forum

    https://help.ubuntu.com/community/Security

    https://help.ubuntu.com/community/Firewall

    https://help.ubuntu.com/community/Antivirus

    https://help.ubuntu.com/community/Linuxvirus

    this post on Ubuntu's Forum

    http://ubuntuforums.org/showthread.php?t=510812

  7. Greetings forum,

    I have decided to download oracle virtualbox and it is sitting in my downloads folder for the time being.

    I have never used this program before ever so i am a little apprehensive about using it.

    I understand i can download an ISO of any operating system to run in the virtual box.

    This is where i am getting a bit stuck with this,Ive seen on a different website that i can download a 500mb iso of ubuntu os.

    When i have downloaded this iso is it simply a case of using the downloaded iso to insert into the virtualbox or does it need to be burned on to cds?

    500mb seems a lot of data to be burning to cd.

    Im very sorry to trouble you with this as im a complete novice with virtualbox.

    Could you help me with this dilemma please?

    Kind regards. :blush:

    you could burn the iso to a disk and load it into the VM using the host system's cd/dvd drive or you can simply point the VM to the iso file. ;)

    VirtualBox Documentation

    https://www.virtualbox.org/wiki/End-user_documentation

    500mb seems a lot of data to be burning to cd.

    500MB isn't that much acctuallty, some of them images can be several gigabytes

  8. Thanks for your consideration wildman424 but I may have given the wrong impression with that post. I don't like either of the sites I quoted so I won't use them. I don't feel anyone including myself has the right to influence the public by categorising a website as safe or unsafe using the criteria adopted by WOT. Web security is, or should be, about protecting users from malicious content. Protection from malicious code, scripts and drive-by downloads.Beyond that, all popular web browsers have settings that permit restrictions on content and even free AV's have some form of protection against the damaging stuff.

    This kinda leaves me to ask the question WOT is it for? It's not a blocker so offers no real-time defence against malware and due to the inaccuracy and manipulation of it's rating system it's unreliable as an advisor. I find phrases like 'ethical issues' and 'bad shopping experiences' hilarious in the way they're typically applied on WOT. I had a crap takeaway the other night, I wonder if they

    have a website. There's a thought. :D

    And I'd have to agree with you completly about this:

    Web security is, or should be, about protecting users from malicious content. Protection from malicious code, scripts and drive-by downloads

    I can't speak for any one else but when I go looking into a suspicious site, I'm gerneraly looking for malicious content, phishing or other scams and spammers. I don't think anyone has the right to empose censorship on anyone else. I don't even (hardly) use all the comment catgories, as they're beyond the scope of what I'm trying to do. I'm after the bad guys out there, I could really care less what someones opinion is on a topic or a paticular persons/groups religious or political views ect, ect, as long as there not out there spreading malicious code, phishing scams, scamming old ladies outta there hard earned money or spamming all over the place.

    as an example: <<=== ( an example only now, Now don't no one go blowing this out of context and getting your panties in a twist) :rolleyes:

    if I was to put up a site saying a womens place is "in the kitchen barefoot and pregnant",

    • would it be considered offensive to some, YES ( womens lib groups would have a shinipfit); and there would probally be a lot of pissed off people out there ....RIGHT.
    • Do I have right to say it if ts what I beleive politically/religiously, YES, as long as it isn't dircetly targeting any specific person, group and isn't said in a vulgar/hatefull way.
    • does you, myself or anyone else have to like, agree or aprove of it, if it is in conflict with your own beliefs, NO.
    • Should I or do I deserve to be censored or told I'm a hateful a******* or be wrongfully accused of being hateful or malicious, when its a personal political/religious/socal view/opinion, NO.

    WOT was intended as a guide for web surfers, It will give you one of those "warning this site has a bad reputation" popus if you have the addon installed and vist a site with a bad reputation so in a way it acts a blocker by immediately letting the user know if a site has a bad reputation, although it doesn't actually block the site, so I see your point there.

    a back to the manipulation of the rating system, facepalm2.gif

    Its not foolproof, no system is, there is always room for improvments, and there is always going to be someone attemping to abuse it, game for there own neforious means.

    In the end its up to the end user to make an informed decision on whether or not they want to visit a site.

    If everyone was honest then we wouldn't even be having this discussion. Perhaps we as a group should put our focus on putting it back on the right path, catching and eliminating those that abuse it, instead of trying to discredit a project that sole existance is intended for a good cause.

    @wildman424 I started to read your reply, but then I realized that you thought you were on MyWot forum (FYI this topic is not about reviewing other websites, except MyWot itself. Resulting in your reply being quite ridiculous) so I just stopped reading... for now

    I do believe I was quoting and replying a post from BornSlippy there Dukeo, if there entire post was directed solely at you I would have quoted & replied to you directly instead, there's only a single line of that post direted directly at you and,I don't see where it could have come rude or impolite in any way, unlike your completly usless reply to it. You just came off as a jerk, Not a way to get any sympathy from me there pal. Considering how long I've been contributing at multiple forums and the WOT project I think I know where I'm at .... most of the time.

    from what I've seen from your site thus far your site looks a lot like a splog, used soley to promote affiliated websites, to increase the search engine rankings of the associated sites and to simply sell links/ads. I even ended up reading on your site or one of your affiliates sites about some software that scraps content from other sites, but no your not into any shady business.

    Just a note to remain civil (not that anyone is currently out of line but sometimes things can quickly escalate and cause the topic to be closed).

    I'll behave, I promise :blush:

    If it does start getting uncivil I'll make like a ghost and disapear, I don't like feeding trolls, feeding trolls is a good way to loose a finger :P

    Disclaimer:

    I am not an employee of Malwarebytes and I am not employee of WOT, the views opinions express are my own persnal opinions, and do not in any way reflect the opinions of anyone else ,except myself.

  9. Maybe I'm not understanding this WOT thing so maybe someone can explain this example.

    Two websites, both espousing views which are so diametrically opposed to my own that I disagree with just about every syllable written.

    Both are fuelled by hate filled paranoia, half truths and downright lies, yet I can find no valid reason to caution against visiting either.

    One is owned and controlled by one of the richest and most powerful media conglomerates in history,

    the other isn't. Guess which site gets Green. Is this significant?

    hxxp://www.cwfa.org/ http://www.mywot.com...card/cwalac.org

    hxxp://www.foxnews.com/ http://www.mywot.com...www.foxnews.com

    that first one I've nerver heard of, it apears to be a religiously motivate political group, I checked there site out, although I don't believe in there "views" I didn't find any reason why they should have a bad rating. I wouldn't even consider anything on that site hateful. Its there opinion/beliefs and they are entitted have a right to express them. the only issue I found is I didn't find any privacy policy either ( as one of the other reviewers had pointed out).

    the other site is Fox News, Its safe as far as I know Iv'e used it myself many times, but I will do a though checking of it before I mark its Wot card, If I havn't already. Just like any other site I review. I don't play favorites, I try to be fair to everyone.

    Claification: I checked cwalac.org since that's the scorecard link you provided, there where links to cwfa.org, but I havn't checked that entire site out....yet.

    I didn't check Fox News' site, Its possible that I might have already in the past since its a site I have used before.

    @ dukeo

    I glanced at your site, but havn't got much past your ridicuos blog post, so I havn't rated you ...yet

  10. looks like I'm late to the party as usual,

    I am a WOT contributor, and I call em how I see em at the time the my rating is posted. If I go investigating a site suspected of being a phishing scam and find sutable evidence to support the claim they get the red rating. If go investigating a site and find malicious content that could cause a breach in an unsupecting users security it gets the red. Sites engaged in the use of spam and sites that are engaged in ethically questionable practices/content also recieve a bad rating.

    I may use other users comments & ratings as a starting point of an investigation, but I do not rely solely on them as it could be considered hearsay, and it would not nor could it be considered reliable just the same as hearsay doesn't hold up in any court of law.

    The purpose of WOT is to gather information on sites particularly sites known to contain threats, scams, or other undesirable content and and provide that information to the public so they can make an informed decision of weather or not is is safe to visit a site, whether or not the content of a site is trustworthy, whether or not the content of a site is of questionable reliability, or it the content of a site would be considered offensive to them. In the end its up to the end user to make an informed decision on whether or not they want to visit a site.

    Sites that are actually dangerous ussually don't last long, the community as a whole is rather good at getting sites that are actually dangerous blacklisted or shutdown very quickly.

    Could it be comprimised, Uh ... its possable maybe, but it isn't very likely. The chances of all that information being inacurate or falsafied by the majority is very slim to none.

    Is it a 100% accrurate, No, people make mistakes and automated test do result in false possitives.

    People do make mistakes, myself included. And I invite any site owner whose site I have rated to get in contact with me if they feel that there site was mis-rated, was given a poor rating at the time do to a comprimise beyond there control, or would other wise like to have there site rechecked and I'd be more than happy to check it again and re-rate it. I'm firm but I'm fair. Every one gets a fair evaluation.

    contact on WOT

    or via this forum's PM system

  11. I had to run Dell diagnostics, and it required a reboot. On reboot I got an Error Code 2 from Malwarebytes. The tray icon didn't load but the UI is reporting the protection module as on.

    b4ftol.jpg

    is that one of the system error codes, or a diferant error code?

    edit:

    when I closed thay error message the UI did report that the protection module was off, I didn't have any issues turning it back on.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.