Jump to content


Spam Hunters
  • Content Count

  • Joined

  • Last visited

Everything posted by ShyWriter

  1. @DD, They now make bullets that can penetrate duct tape as well as Saran Wrap, even if used together.. @FF I've seen that particular rifle setup in several action movies.. It's sweet.. And if you have enough enemies, well worth the $27,000. *grin*
  2. . You need to read the EULA that came with your software. It's the LICENSE.RTF file in the main Malwarebytes Anti-Malware directory. You had to AGREE with its terms when you did the install or the install would have ceased. I think this part of the EULA might cover it.. even for the older versions.. 2. Ownership. Each copy of the Software is licensed, not sold. For purposes of this Agreement, the terms “purchase,” “sell” and like terms refers to purchase or sale of a license to use the Software and not to a purchase or sale of title to or ownership of any rights or other interests in
  3. Weird.. since you changed the server IP, putting keepsthelightson.vpsboard.com in VT to do an analysis takes one to the admin page of the server (keepsthelightson.vpsboard.com) for login.? I'll stay out of this as I haven't a clue.. I just showed what the user that originally complained to you was seeing.. Which is no longer the case. Sorry for any insinuations my original research showed. Malwarebytes actually is fairly fast in resolving these problems. Steve Who may one day learn to stay out of other peoples' business.
  4. You are correct on being blocked. VT scan shows 0/63 *but* NoScript has a hissy fit along with MBPro.. Plus you are on 3 DNS Blacklists as a SPAMMER. (This is only research I did; I don't work here so don't yell at me ) See attachments: Just an FYI, Steve
  5. . ‘Like Cutting Off a Limb to Save the Body’ Brian Krebs | 3 August 2015 This author has spent many years chronicling the exploits of black hat spammers who use hacked computers to relay junk email. But I’ve dedicated comparatively little time delving into ways of email marketers who technically follow U.S. anti-spam laws yet nevertheless engage in spammy practices. The latter is able to ply their trade because there are thousands of Internet hosting companies operating on thin profit margins that are happy to host spammy but lucrative clients. This is the story of how one hosting company
  6. UUUUMmmmmm... Anybody think it's more Big Brother with M$ keeping your network password "encrypted" somewhere in their cloud if you *DO* allow access?? Shy
  7. Nor any mention of OS/2 which was WinNT v0.0, or Win v0.0 depending on your outlook on life. Shy
  8. . It was only a matter of time before someone would figure out how to hack TrackingPoint's Wi-Fi-connected smart rifle. TrackingPoint makes an expensive smart rifle that easily lets novices hit targets a half mile away. It lets you digitally "tag" a target, then locks the trigger until the gun is perfectly positioned to nail it. And it connects to smartphones or tablets so a buddy can view what the shooter sees in the scope. Now, two security researchers have discovered software flaws in the computerized rifle. Anyone near enough for a Wi-Fi connection to a rifle can remotely tinker wit
  9. . Windows 10 Shares Your Wi-Fi With Contacts Brian Krebs | 29 July 2015 Starting today, Microsoft is offering most Windows 7 and Windows 8 users a free upgrade to the software giant's latest operating system -- Windows 10. But there's a very important security caveat that users should know about before transitioning to the new OS: Unless you opt out, Windows 10 will by default share your Wi-Fi network password with any contacts you may have listed in Outlook and Skype -- and, with an opt-in, your Facebook friends! (More) Read the complete article at: http://krebsonsecurity.com/2015/07/wi
  10. Heck Ron.. I don't even have to go looking for bugs.. They always seem to find me first! On a serious note tho' I've always wished I had the skills of a master hacker (whitehat; of course) and do that kind of stuff. Kind of like Tsutomu Shimomura who caught Kevin Mitnick. (Or Walter Obrien of Scorpion Computer Services - TV show SCORPION is very loosely based on his real life) Steve, The master cracker (Saltine® with sea salt, of course)
  11. . Oh Gosh! Four Zero Day Vulnerabilities Disclosed in Internet Explorer Friday, July 24, 2015 Swati Khandelwal How many Zero-Days do you think could hit Microsoft today? Neither one nor two; this times its Four. The Hewlett-Packard's Zero-Day Initiative (ZDI) has disclosed four new zero-day vulnerabilities in Microsoft's Internet Explorer browser that could be exploited to remotely execute malicious code on victim's machine. All the four zero-days originally were reported to Microsoft, affecting Internet Explorer on the desktop. However, later it was discovered that the zero-day v
  12. I have nothing to do with Software Updates / sub-forums any more; PM "hayc59" instead; please..

  13. A reminder to all as I still get PMs for posting updates, etc, to the Software Forums. Altho' I am still shown as Forum Leader in those forums, I resigned the position of Software Updater almost a year ago and cut all ties to the remaining Moderator as well as the Forums. Anything you find there that is wrong, broken or not updated needs a PM sent to hayc59 *directly* as I am simply a regular member with no "powers" to change/update anything nor does the PM section have a "forward PM" function. Thank you, Steve
  14. Adobe has released the patch: Flash Version https://get.adobe.com/flashplayer/
  15. . Adobe to Patch Hacking Team’s Flash Zero-Day Brian Krebs | 7 July 2015 Adobe Systems Inc. said today it plans to issue a patch on Wednesday to fix a zero-day vulnerability in its Flash Player software that is reportedly being exploited in active attacks. The flaw was disclosed publicly over the weekend after hackers broke into and posted online hundreds of gigabytes of data from Hacking Team, a controversial Italian company that's long been accused of helping repressive regimes spy on dissident groups.(More...) Read more at: http://krebsonsecurity.com/2015/07/adobe-to-patch-hacking-team
  16. . Hackers Exploit Zero-Day Magento Vulnerability to Steal Your Credit Cards Monday, June 29, 2015 | Swati Khandelwal Hackers are increasingly exploiting an unknown flaw to siphon payment card information from e-commerce websites that use Magento, the most popular e-commerce platform owned by eBay. Security researchers at Sucuri are still investigating the attack vector, but they believe that cyber criminals are injecting malicious code into the Magento core file or some widely used module/extension in order to steal payment card data. (More...) Read the rest at: http://thehac
  17. . Crooks Use Hacked Routers to Aid Cyberheists ... Brian Krebs | June 29, 2015 Cybercriminals have long relied on compromised Web sites to host malicious software for use in drive-by download attacks, but at least one crime gang is taking it a step further: New research shows that crooks spreading the Dyre malware for use in cyberheists are leveraging hacked wireless routers to deliver their password-stealing crimeware. Ubiquity Networks airRouter Dyre (a.k.a. “Dyreza”) is generally installed by a downloader Trojan that is flagged by most tools under the name “Upatre.” The latter
  18. Thank you for your reply, Filipos,.. and fix to JRT.. Cheers, Steve
  19. . A Busy Week for Ne’er-Do-Well News... Brian Krebs | 27 June 2015 We often hear about the impact of cybercrime, but too seldom do we read about the successes that law enforcement officials have in apprehending those responsible and bringing them to justice. Last week was an especially busy time for cybercrime justice, with authorities across the globe bringing arrests, prosecutions and some cases stiff sentences in connection with a broad range of cyber crimes, including ATM and bank account cashouts, malware distribution and “swatting” attacks. Ercan Findikoglu, posing with piles of
  20. Go to Virus Total and upload the actual file to their scanner. ( https://www.virustotal.com/en/ ) The random name is irrelevent as 56+ anti-virus engines will do a complete scan and tell you if it's good or bad. Steve
  21. Here's a larger version Pete: A Firefox extension called THUMBNAIL ZOOM PLUS comes in very handy for situations like this.. Steve
  22. Amen.. It did a great job on my whole system until it deleted my paid version of Wisdom-soft SCREENHUNTER 5.1 Pro (the program I use to screen clip photos for various reasons) Thankfully I still has a backed download of the original program, *Phew* ,big time.Perhaps the program can generate a list of the PUPs, allow the user to check/delete in a text file, then run the JRT which uses the now generated file to only delete those on the list.. Just a thought because I'll never use it again... as is.. Steve
  23. Thanks everyone for the warm welcome.. I'm not sure how often, or how much, I can participate but my days of 8-12 hours a day on the forums is long gone. I'll try to visit when I can and I hope when I do visit I can offer something of value. Thanks people/friends, Steve
  24. . By Charlie Osborne for Zero Day | June 24, 2015 -- 16:03 GMT (09:03 PDT) Symantec A security researcher has casually revealed 15 vulnerabilities which impact on Microsoft Windows and Adobe Reader. On Tuesday, Google Project Zero hacker Mateusz Jurczyk outlined a total of 15 critical vulnerabilities discovered within font management systems. The research, also presented at the REcon security conference in Montreal in a talk called "One font vulnerability to rule them all: A story of cross-software ownage, shared codebases and advanced exploitation," (.PDF), reveals a set of nasty rem
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.