Jump to content

Humpty

Experienced Members
  • Posts

    2,107
  • Joined

  • Last visited

Posts posted by Humpty

  1. With this in mind, it's surprising to learn the amount of work and machinery involved in manufacturing a single motherboard. We'd vaguely imagined some sort of stamping process where all components are slapped onto the bare board in one step and soldered, before being boxed in a big room full of bored workers.

     

    Sure there'd have to be some testing, but how intense could it be?

     

    As PCSTATS recent trip to Gigabyte's Nan-Ping factory in Taiwan showed us, there's a lot more to it. In fact, producing and testing a single motherboard involves a mind-boggling host of automated machines, people and processes; so we'd like to detail the whole assembly line we toured while covering Computex, to give you a feel for how things are really made.

    Mobo Factory Tour

  2. Came across this antispyware review site which promotes/reviews five Antispyware apps with all of them being ROGUE applications.

     

    If you ever come across the pic below of the fella scratching his head then it's probably a rogue site.

     

    Malwarebyte's Antimalware has all of them in it's database.

    Alert Spy

    Pest Bot

    Pest Protector

    Spy Destroy

    Spyware Remover

    i1568_Scratch.JPG

    Anti-Spyware Reviews

     

    Spyware is an insidious threat. It'll watch what you read and what you do - and worst of all, it's almost impossible to remove without damaging your computer! But what one person can create, another person can remove. Anti-spyware software is a modern necessity!

     

    We've tested dozens - even hundreds! - of spyware removal programs. Some of them are great, most of them get the job done (more or less), and too many simply don't work. We've gathered the top contenders in the field, and reviewed them here for your convenience!

    hxxp://stoand.bezoogle.com/pp/anti-spyware/

     

    i1567_Spy.JPG

  3. Good article with heaps of screenies of the rogue XP Antivirus and the tricks these rogues use to rip off the unwary.

     

    Might add that I do go to these sort of sites quite often and FF's noscript stops the lot in that I have to allow the site through noscript in order to see what's gonna happen.

    Before the popup in the screen shot there was actually another one too. That one was an animated GIF that looked like it was performing a virus scan of your computer. Needless to say, it found several pieces of fake malware on my computer, hence the dire warning in the fake popup.

     

    If this looks suspicious to you, it should. We are not on www.msn-us.info. We are on virus-securityscanner.com. When you go to any of the sites that are linked in the blog comments you download a few files, and then it redirects you to hxxp://virus-securityscanner.com/2008/3/freescan.php?aid=880421, where the last part is some form of identifier that we will return to shortly.

    Anatomy of a Rogue Security App.

  4. Known as InPrivate, Microsoft is touting the feature as one of several security enhancements within its next major browser release. The scenarios for using InPrivate include when you're using someone else's computer, when you need to buy a gift for a loved one without ruining the surprise, or when you're at an Internet kiosk and don't want the next person to know which Web site you visited. While you can currently clear the browser cache with a mouse click, it's an all-or-nothing action. InPrivate temporarily suspends the automatic caching functions, allowing you to keep the rest of your browsing history intact.

    Cnet Article

  5. I think MBAM is geared more towards being a specialist Trojan/Antispyware/Rogue Remover rather than your conventional Virii.

     

    If you ever come across anything suspect you could upload to MBAM for them to have a look at and maybe inclusion to MBAM's detection/removal data base.

    Bruce Harrison

    Malwarebytes Lead Researcher:

    MBAM will continue to gain weapons and tools and continue to gain ground on all of the malware that conventional AVs cant handle . We have progressed far enough that we are now in the process of acquiring many of the top freelance researchers and this will push our abilities even further . What they have seen so far is the result of a single researcher , by 09 we will have 5 .

     

    MBAM has heuristics and special case malware heuristics for common problem infections like vundo and zlob many others.

  6. Observations regarding the interview
    • Keep the Windows operating system updated through Windows Update.
    • Full scans are not usually required as Quick scan will detect the malware installation modifications.
    • Up to date anti virus applications are a must. Avast! or Avira AntiVir are good free versions. AVG is not recommended but it is better than nothing.
    • Software based firewalls are a waste of system resources. A router based firewall is much better.
    • Windows Defender does not automatically update its definitions.
    • WinPatrol was not mentioned.

    Malwarebytes Antimalware is one of the best going.

     

    Most Antivirus/Antimalware are useless against a zero day attack but I do use these apps to clean up other machines.

  7. Sorry Tom can't really help as I haven't had the same scenario to go by.

     

    Hazel's advice in posting over at SB's forum should be beneficial.

     

    Tzuk, the developer, is a decent fellow in trying to sort users probs plus there are some very capable helpers as well.

     

    No need to register as you can post as a guest.

     

    The thread "Official Version 3.00 and Later" is where to post and you can also download the latest beta from the sticky at the top which are usually stable.

    SB's Forum

  8. I followed the search suggestions in the article and they would certainly fool the unaware into thinking they were infected and needed the rogue app to clean up.

    Seems like the bad guys pushing for fake antivirus software are not done yet.

     

    We received several reports from the North American region earlier today about users being victimized by a rogue antispyware, which these users have downloaded after they have somehow been convinced to click on malicious links. These links point to malware that caused overt signs (such as popup balloons and modified wallpapers) to appear in the PC suggesting that the system has indeed been infected. This is not goodwill, though ? because downloading the ?trial version? only scans the system. To remove the infection the user will have to purchase the entire antispyware for real money. Users may be infected via spammed email messages, spammed instant messages, or even via ads served in social networking sites.

    Trend Article

  9. But what if your trusted news delivery mechanism is the bad guys new delivery malware delivery mechanism? By imitating legitimate emails, criminals have built up a network of more than 250,000 spam-sending machines. Up until 2:12 AM today CNN had been the primary target, and we received CNN Alerts, at rates peaking as high as a dozen per minute. At 2:12 AM, the CNN campaign stopped.

     

    Beginning at 3:15 AM today, August 13th, the UAB Spam Data Mine began receiving emails with news headlines in them that claimed to be from MSNBC. We're now receiving several each minute, with more than 500 archived already this morning. Here's the first one we received:

    Article

  10. Another round of fake ?authority? email has been launched, this time it is a bogus Internet Explorer 7 (IE7) update spam. Here is a current version of the email (it will probably change a bit soon):

     

    From: admin@microsoft.com

     

    Subject: Internet Explorer 7

     

    Message: You are receiving this e-mail because you subscribed to MSN Featured Offers. Microsoft respects your privacy. If you do not wish to receive this MSN Featured Offers e-mail, please click the ?Unsubscribe? link below. This will not unsubscribe you from e-mail communications from third-party advertisers that may appear in MSN Feature Offers. This shall not constitute an offer by MSN. MSN shall not be responsible or liable for the advertisers? content nor any of the goods or service advertised. Prices and item availability subject to change without notice.

     

    File name in attachment: update.exe

    Article

  11. Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov, of VMware Inc. have discovered a technique that can be used to bypass all memory protection safeguards that Microsoft built into Windows Vista. These new methods have been used to get around Vista's Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP) and other protections by loading malicious content through an active web browser. The researchers were able to load whatever content they wanted into any location they wished on a user's machine using a variety of objects, such as Java, ActiveX and even .NET objects. This feat was achieved by taking advantage of the way that Internet Explorer (and other browsers) handle active scripting in the Operating System.

    Article

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.