User User name Password  
   
Wednesday 24.9.2025 / 17:46
Search AfterDawn Forums:        In English   Suomeksi   Pĺ svenska
afterdawn.com > forums > general discussion > safety valve > lets paint the kettle black,do you have a bitch on whats going on around the site or any thing negative to report
Show topics
 
Forums
Forums
Lets Paint The Kettle Black,Do You Have A Bitch On Whats Going On Around The Site Or Any Thing Negative To Report
  Jump to:
 
Posted Message
AfterDawn Addict
_
16. July 2006 @ 09:08 _ Link to this message    Send private message to this user   
billybob

i do a lot of news,downloads and look for feed back in two threads..ye should keep a eye on them

this thread and
this thread
http://forums.afterdawn.com/thread_view.cfm/295688

that info you just got i posted that
30. June 2006
Advertisement
_
__
Senior Member
_
16. July 2006 @ 09:14 _ Link to this message    Send private message to this user   
Ok cool. ill keep my eye out on it.
You know something? Im getting too sidetrackd with the safety valve subjects, i need to go and try and help some newbies or something, i havent done that in ages! Sorry!

Thanks ireland!![afterdawn legend]
AfterDawn Addict
_
16. July 2006 @ 09:15 _ Link to this message    Send private message to this user   
my bitch for today

read
Just a warning...


A woman said her son found his license plate missing so he called the police to file a report. They told him people were stealing the plates to get free gas. Given the rise in gas prices, people have taken to stealing license plates, putting them on their car, then getting gas and running. The gas station will have "your" license plate # and you could be in trouble for "pump and run." Check your car periodically to be sure you still have a plate. If you should find it missing, file a report immediately!!!


Just an FYI that is going to sound ridiculous.....

Keep an eye on your license plate! Make sure you always know it's there! Mine was stolen this weekend and I have no idea when! The lady at the revenue office said that they have replaced several license plates since gas prices have been so high. People are stealing them, putting them on their vehicles to go buy gas and driving off without paying! When the license plate is reported as the "drive off vehicle", it's YOU they contact! Be aware!!!!





quote

Origins: Rapidly escalating prices have sharply increased the amount of cash people need to have at the ready when refueling their vehicles. This new economic reality has resulted in a rise in "pump and run" gasoline thefts, a form of heist in which perpetrators fill up their vehicles and drive away without paying.

According to the National Association of Convenience Stores (NACS), in 2004 gasoline theft cost the industry an estimated $237 million, with the average loss per store pegged at $2,141. Yet even with that information, it's hard to put a finger on the magnitude of the current problem
because the rise in gasoline prices has driven up the dollar value of the good being stolen. (The typical cost of a gasoline drive-off five years ago was $20, but that same tankful in 2006 is now $40 to $60, according to a gas station owner in Madison, Wisconsin.) Also on the rise is the number of people doing the stealing, with the economic pinch felt at the pumps ? combined with the desire to "punish" station owners who are (unfairly) perceived to be reaping wild profits ? motivating some ordinarily law-abiding consumers to turn to pilferage.

However, while gas theft is on the rise and there have been instances of pump and runs by vehicles bearing stolen plates, the situation warned against in the e-mail is not epidemic ? there doesn't appear to have been a sudden sharp upswing in the number of gasoline drive-offs where stolen tags were involved. Even among pump and run write-ups, news stories about such crimes being facilitated by stolen plates are few and far between. Therefore, while the warning being spread in e-mail is valid, it is not one that needs be spread to one's nearest and dearest at the speed of light.

The ill-intentioned do make off with license plates, but it is much more likely purloined tags will be used to disguise stolen vehicles being moved from one location to another or armed robbery getaway cars than they will to obscure the identities of those filching gas. If not to protect yourself from accusations of gas theft, if you discover one of your tags has gone missing, you should certainly notify police, because by so doing you might be helping to foil a far more serious crime in progress.

Barbara "blew plate special" Mikkelson
janrocks
Suspended permanently
_
16. July 2006 @ 09:22 _ Link to this message    Send private message to this user   
@ ireland..that's great is that..good laugh with a serious message.

@ billybob.. have a look at this..windows genuine bullcrap..this is one of the better kept M$ secrets, they tell you how to kill it themselves lol http://support.microsoft.com/?kbid=314488
ddp
Moderator
_
16. July 2006 @ 09:24 _ Link to this message    Send private message to this user   
billybob, thank ireland for that link i sent you as that was how i found it.
AfterDawn Addict
_
16. July 2006 @ 09:28 _ Link to this message    Send private message to this user   
janrocks
heres a good laugh
heres a rum punch to ye




Some years ago, the father of a friend of mine brought a fairly enormous house in the middle of Bodmin Moor, a sort of Georgian/Regency house built on the site of an older farmhouse.

In the capacious cellars they found half a dozen very large barrels. 'Oh, good!' said mother. 'We can cut them in half and plant orange trees in them.'

So they set to work to cut the barrels in half, but they found that one of them was not empty, so they set it up and borrowed the necessary equipment from the local pub. The cellar filled with a rich, heady Jamaican odour.

'Rum, by God!' said the father. It was indeed, so they decided to take advantage of some fifty gallons of the stuff before cutting the barrel in half.

About a year later, after gallons of rum punch, flip and butter had been consumed, it was getting hard to get any more rum out of the barrel, even by tipping it up with wedges. So they cut it in half, and found in it the well-preserved body of a man.
Senior Member
_
16. July 2006 @ 09:40 _ Link to this message    Send private message to this user   
@ddp, ok then. Thanks ireland! Thanks both of you anyway, problem solved....in a very cheekie fashion lol.

@janrocks, thanks for the link!

I still dont get how its telling me how to solve that problem, but ill look through it properly later.
Thanks.

Bye all,

Billy

Thanks ireland!![afterdawn legend]
ddp
Moderator
_
16. July 2006 @ 10:12 _ Link to this message    Send private message to this user   
teach & learn & behave yourself!!
AfterDawn Addict
_
16. July 2006 @ 10:42 _ Link to this message    Send private message to this user   
Why kids shouldn't be left alone!!


Moderator

1 product review
_
16. July 2006 @ 10:54 _ Link to this message    Send private message to this user   
LMAO....how'd you get that picture of my boy?


AfterDawn Addict
_
16. July 2006 @ 11:26 _ Link to this message    Send private message to this user   
Heads up.

IMPORTANT INFO ABOUT AREA CODE
We actually received a call last week from the 809 area code. The woman said
"Hey, this is Karen. Sorry I missed you--get back to us quickly. I Have
something important to tell you." Then she repeated a phone number beginning
with 809 . "We didn't respond".

Then this week, we received the following e-mail:

Subject: DON'T EVER DIAL AREA CODE 809 , 284 AND 876

THIS IS VERY IMPORTANT INFORMATION PROVIDED TO US BY AT&T. DON'T EVER DIAL
AREA CODE 809

This one is being distributed all over the US . This is pretty scary,
especially given the way they try to get you to call.
Be sure you read this and pass it on.
They get you to call by telling you that it is information about a family
member who has been ill or to tell you someone has-been arrested, died, or
to let you know you have won a wonderful prize, etc.
In each case, you are told to call the 809 number right away. Since there
are so many new area codes these days, people unknowingly return these
calls.

If you call from the US , you will apparently be charged $2425 per-minute.

Or, you'll get a long recorded message. The point is, they will try to keep
you on the phone as long as possible to increase the charges. Unfortunately,
when you get your phone bill, you'll often be charged more than $24, 100.00.

WHY IT WORKS:
The 809 area code is located in the British Virgin Islands (The Bahamas).
The charges afterwards can become a real nightmare. That's because you did
actually make the call. If you complain, both your local phone company and
your long distance carrier will not want to get involved and will most
likely tell you that they are simply providing the billing for the foreign
company. You'll end up dealing with a foreign company that argues they have
done nothing wrong.
Please forward this entire message to your friends, family and colleagues to
help them become aware of this scam
Sandi Van Handl
AT&T Field Service Manager
(920)687-904
Additional information on these area codes can be found from ATT at:

www.consumer.att.com/consumertips/areacode.html
Junior Member
_
16. July 2006 @ 16:19 _ Link to this message    Send private message to this user   
That's good info to know. I would say that I can't believe that they could get away with it, but nowadays nothing suprises me any more.



"RIAA, what a bunch of turkeys."
Moderator

1 product review
_
16. July 2006 @ 16:23 _ Link to this message    Send private message to this user   
I'm real bad about returning calls and can smell a telemarketer from a mile away...so I hope I'm good to go.


Senior Member
_
16. July 2006 @ 20:47 _ Link to this message    Send private message to this user   


Senior Member
_
16. July 2006 @ 23:31 _ Link to this message    Send private message to this user   
hi :)
a tad off subject

HAPPY BIRTHDAY LOCOENG

sorry i had to shout cuz he's a little deaf


gif by ireland

we cant help if you wont help yourself
AfterDawn Addict
_
17. July 2006 @ 04:54 _ Link to this message    Send private message to this user   
MY BITCH FOR TODAY

THANK YOU SONY FOR STARTING THIS CRAP..BUY OR TRUST SONY,"NOT"

"Invisible" Rootkit found in the wild

Difficult to detect and remove

By Nick Farrell: Monday 17 July 2006, 07:21
SECURITY EXPERTS have found a really nasty rootkit which is next to near impossible to detect and remove.

Dubbed Backdoor.Rustock.A by Symantec and Mailbot.AZ by F-Secure, the code cannot be spotted by most current rootkit detectors.

Symantec claims that it is the first of the next generation of rootkits.

It uses a mixture of old techniques and new ideas to make it "totally invisible on a compromised computer when installed". Apparently it even worked well on a beta version of Windows Vista the Symantec crowd were playing with.

The rootkit probably came from the coding hot houses of Russia and a variant called Backdoor.Rustock.B has also been spotted.

F-Secure claims that its BlackLight rootkit scanner, Build 2.2.1041, can detect the new rootkit.

However it said that it was darn hard to come up with effective detection code because the new rootkit does not have a process.

The rootkit runs inside the driver and in kernel threads and controls kernel functions via special IRP functions.

It even scans for loaded rootkit scanners, then changes its tactics to avoid detection. More here. µ


http://www.theinquirer.net/default.aspx?article=33065





'Invisible' Rootkit Heralds Trouble Ahead

JUL 14, 2006 11:39:17 AM | Add Comment (0) | Permalink

Security researchers have discovered a new type of rootkit they believe will greatly increase the difficulty of detecting and removing malicious code.

The rootkit in question, called Backdoor.Rustock.A by Symantec and Mailbot.AZ by F-Secure, uses advanced techniques to avoid detection by most rootkit detectors.

The rootkit is "unique given the techniques it uses," Symantec?s Elia Florio wrote in a recent analysis. "It can be considered the first-born of the next generation of rootkits."

Rustock.A uses a mixture of old techniques and new ideas to make it "totally invisible on a compromised computer when installed," including a beta version of Windows Vista, Florio wrote.

Symantec believes the rootkit originates from Russia, and a string found in the rootkit?s code indicates new versions will probably be forthcoming. Symantec has already logged a variant called Backdoor.Rustock.B.

F-Secure noted Rustock?s use of NTFS? Alternate Data Streams (ADS) as one significant example of its advanced behavior.

"Saving your data into Alternate Data Streams is usually enough to hide from many tools," wrote F-Secure researcher Antti Tikkanen in a company blog.

"However, in this case, the stream is further hidden using rootkit techniques ... because Mailbot.AZ is hiding something that?s not readily visible; it?s very likely that many security products will have a tough time dealing with this one."

F-Secure said it has released a new version of the BlackLight rootkit scanner, Build 2.2.1041, which can detect Rustock.

According to researchers, other factors that help make Rustock invisible are that it has no process, instead running inside the driver and in kernel threads. It doesn?t hook into any native API, and controls kernel functions via special IRP functions. It removes its entries from kernel structures, and the SYS driver is polymorphic, changing its code from sample to sample.

Rustock also scans for loaded rootkit scanners, then changes its behavior to avoid detection, according to Florio.

-Matthew Broersma, Techworld.com (London)

Check out our CIO News Alerts and Tech Informer pages for more updated news coverage.

http://www.cio.com/blog_view.html?CID=23011
Senior Member
_
17. July 2006 @ 05:03 _ Link to this message    Send private message to this user   
That was a very interesting read ireland, I hate rootkit, no matter what your dealing with there always hard to spot without somthing like rootkit revealer or Blacklight (which I think is still availible for free)...

Thank god I've only ever had a few real ones, b*****d's them rootkit's are. :S



Yours Truly; Rav
BitTorrent Safety Guide: http://forums.afterdawn.com/thread_view.cfm/395674
Free Security Software: http://forums.afterdawn.com/thread_view.cfm/292257
The cleverest of all, in my opinion, is the man who calls himself a fool at least once a month. - Fyodor Dostoevsky
Senior Member
_
17. July 2006 @ 06:43 _ Link to this message    Send private message to this user   
Please excuse my ignorance, but is a rootkit some kind of virus or worm or spyware?

Thanks ireland!![afterdawn legend]
AfterDawn Addict
_
17. July 2006 @ 06:55 _ Link to this message    Send private message to this user   
billybob

SEE IF THIS HELPS YE

Microsoft Exec Warns of Rootkits
http://www.newsfactor.com/story.xhtml?story_id=43077
ms Microsoft dedicates four staffers to analyze rootkit samples found in customer computers or on the Internet. In his presentation, Danseglio offered a list of the most wanted rootkits, adding that 90 percent of what Microsoft finds relates to Hacker Defender, a rootkit from the Czech Republic based programmer who calls himself Holy Father. The programmer charges several hundred dollars to make Gold versions of his basic rootkit.

Writing rootkits isn't a crime, but using them to hide code in a computer that's been hacked by other means is, Danseglio said. Holy Father last month indicated he's retiring from his Web site business, leading some to speculate that he's been hired for some purpose somewhere. Microsoft Exec Warns of Rootkits - NewsFactor Network Linked by shanmuga Tue May2 2006 8:18am EDT


Microsoft Exec Warns of Rootkits

Microsoft Exec Warns of Rootkits May 1, 2006 9:32AM

Microsoft dedicates four staffers to analyze rootkit samples found in customer computers or on the Internet. In his presentation at the InfoSec Conference, Microsoft's Mike Danseglio offered a list of the most-wanted rootkits, adding that 90 percent of what Microsoft finds relates to Hacker Defender, a rootkit created by a Czech Republic-based programmer.

If your system gets infiltrated by a rootkit, you might as well just "waste the system entirely," a Microsoft official told fellow security professionals at the annual InfoSec Conference.

Microsoft's Mike Danseglio, program manager in the company's security solutions group, was among a host of security experts from big-name companies who swapped advice about protecting networks with 1,700 showgoers.

According to Danseglio, the hacker rootkit is "probably the nastiest piece of malware you'll get," because it is designed to hide unwanted files -- or any sign a computer has been compromised -- stealthily.

Microsoft dedicates four staffers to analyze rootkit samples found in customer computers or on the Internet. In his presentation, Danseglio offered a list of the most-wanted rootkits, adding that 90 percent of what Microsoft finds relates to Hacker Defender, a rootkit from the Czech Republic-based programmer who calls himself Holy Father. The programmer charges several hundred dollars to make Gold versions of his basic rootkit.

Writing rootkits isn't a crime, but using them to hide code in a computer that's been hacked by other means is, Danseglio said. Holy Father last month indicated he's retiring from his Web site business, leading some to speculate that he's been hired for some purpose somewhere.

According to Danseglio, rootkits have been embedded in many networks, with college campuses especially hard-hit. The University of Washington has become notorious for its students using rootkits to hide pornography and music on the university's servers, he said.

Danseglio offered a list of tools, including a few from Microsoft, that can detect rootkits. But he said there are no simple ways to address the menace. "There are no rootkit-resistant operating systems," Danseglio said.

Kerry Anderson, a Fidelity Investment Brokerage vice president in the information security group, spoke on the topic of setting up a computer forensics program to tackle crime, including child pornography, terrorism and financial fraud.

A company's first priority should be establishing a policy and internal training for auditing and investigating suspected computer crime, coordinating among the legal, human resources and I.T. departments, she said.

She advised extending that policy to include working with outsourcing providers, vendors and business partners to ascertain their computer-investigation procedures and get the right to audit and monitor their computers if necessary. "Our contracts today are requiring the right to do risk assessment and visitation audits," she pointed out.

The insider threat is a top concern at State Street, which manages more than $10 trillion in assets. State Street Senior Technology Officer Doug Sweetman said securities laws require the firm to conduct background checks on employees and prospective employees. (continued...)

1 | 2 | Next Page >
But these days, that might go beyond a criminal-history check and include scouring the Web to find blogs an applicant has written or evidence of a gambling habit or visiting hacker sites -- all of which might raise a red flag. "I don't feel any restrictions going after your blog or pulling all these data together," he said.

One headache at State Street is the freeware that employees download and the company wants to remove as a potential security risk. Google Desktop 3.0 search software is among the programs State Street watches out for: "It allows for file-sharing and takes the file up to the Google complex," Sweetman said.

"You've got to think about where that file is when Google indexes content," he said.

Rootkits that hide in Windows:

# Hacker Defender
# FU
# HE4Hook
# Vanquish
# AFX
# NT Rootkit

Tools that can detect rootkits:

# PatchFinder2 and Klister/Flister, proof-of-concept tools from Polish researcher Joanna Rutkoska
# RootkitRevealer from Sysinternals
# Blacklight from F-Secure
# Microsoft File Checksum Integrity Environment
# Bootable Antivirus & Recovery Tools from Alwil Software
# Knoppix Security Tools Distribution (open source)













Rootkit Guru: The Evil in Sony BMG
rootkit1 One man hidden in central Europe rivets the attention of security professionals worldwide. He calls himself holy_father. And he created Hacker Defender, the notorious rootkit used by adware, spyware, virus, digital rights management, and security professionals to bugger Microsoft Windows. Email Battles asked holy_father to weigh in on the Sony BMG copy-protection scandal. While we helped a bit with english and formatting, this is pure holy_father, so listen up


Rootkit Guru: The Evil in Sony BMG

Posted on 12/15/2005 @ 11:42:31 in Security.

One man hidden in central Europe rivets the attention of security professionals worldwide. He calls himself holy_father. And he created Hacker Defender, the notorious rootkit used by adware, spyware, virus, digital rights management, and security professionals to bugger Microsoft Windows. Email Battles asked holy_father to weigh in on the Sony BMG copy-protection scandal. While we helped a bit with english and formatting, this is pure holy_father, so listen up:

Somehow it seems modern to use the term "rootkit technology" when you talk about software hiding itself. The problem is not that Sony BMG used rootkit technology to protect their property. But I do see some problems.

Evil 1: Changes OS Without Consent.
There is nothing mentioned in Sony BMG's installation software about installing OS drivers that subvert the OS kernel. This is a big deal. Coding drivers is not easy stuff. If the driver is not coded very carefully, in some cases it may crash your OS very easily. So the question is whether that protection [Sony BMG's DRM software] was thoroughly tested. On multiprocessor machines, there is a big chance of crash if the driver is not coded carefully. But a user doesn't have to have a multiprocessor machine to have problems with this kind of driver.

Evil 2: Crashes Security Products.
Installation of a firewall, antivirus, IDS/IPS (Intruder Detection Service/Intruder Prevention Service), or other security program could cause the computer to crash if it is installed either before or after that driver from Sony BMG. All these risks should have been mentioned in the installation software. If not, it can cause a lot of headaches for a lot of people - even normal users. And of course, it can cause a lot of problems to Sony BMG then.

Evil 3: Can't Be Uninstalled.
There is no easy way to uninstall that software once installed. It is very hard to believe that a serious company made something that is not fully uninstallable. If the only chance for common users is to reinstall their whole OS or to pay technical support to uninstall that stuff in combination with what I mentioned before (possible problems with later installations of security software), it could be a big problem for a lot of people again.

Evil 4: Triggers False Positives.
Sony BMG's software is identified as malicious by security software. This is partially Sony BMG's problem and partially a problem triggered by security software vendors. You can imagine a situation in some big company with a high level of security when the local admin finds malicious software on an employee's workstation. That could cause this employee to be fired immediately.

Email Battles' staff is willing to bet that Sony BMG lawyers will be scrubbing this mess long after Sony and BMG execs delete each other from their Christmas card lists.


Background:

* Anti-Virus Solution: More Anti-Virus; Email Battles; 9 November 2005.
* The Death of Sony BMG; Email Battles; 15 November 2005.
* Hacker Defender; holy_father.
* How To Dig Out Rootkits; Email Battles; 22 March 2005.
* P2P Safer Than Buying The DVD; Email Battles; 11 November 2005.
* Rootkit Guru: Win 9x/ME Are Hopeless; Email Battles; 13 December 2005.
* Rootkitters Lay in Wait for Vista 2006; Email Battles; 7 December 2005.
* Signature War: Rootkits vs Antivirus; Email Battles; 19 October 2005.

http://www.emailbattles.com/archive/battles/security_aacdffheea_jd/
AfterDawn Addict
_
17. July 2006 @ 07:00 _ Link to this message    Send private message to this user   
IF THAT DON'T HELP YOU,
maybe this will,shes looking for her rootkit.......

Moderator

1 product review
_
17. July 2006 @ 07:43 _ Link to this message    Send private message to this user   
HUH?


Junior Member
_
17. July 2006 @ 07:50 _ Link to this message    Send private message to this user   
Rootkit or contact lens? either way form an orderly queue behine ME to help her look ;-)



If at first you don't succeed....give up and go to the pub!
Quote:-"I drink therefore I am". W. C. Fields
I'm an amnesic bulimic...I eat and eat and then forget to be sick.
AfterDawn Addict
_
17. July 2006 @ 13:32 _ Link to this message    Send private message to this user   
update on Afterdawn Complaint Department

AfterDawn Addict
_
17. July 2006 @ 14:35 _ Link to this message    Send private message to this user   
good news


EU overturns Sony/BMG merger

Aftershocks are still being felt throughout the music industry as the EU's Court of First Instance overturned 2004's Sony/BMG merger last Friday (read the decision). The court, which has also adjudicated parts of the Microsoft antitrust case, administered a major smackdown to the European Commission, the group that first approved the merger.


go here
http://forums.afterdawn.com/thread_view.cfm/23/295688#2185319
Advertisement
_
__
 
_
Senior Member
_
17. July 2006 @ 15:19 _ Link to this message    Send private message to this user   
Ill read all that in the morning ireland.
Right now its 12:19am and im really tired!

Thanks mate.

Thanks ireland!![afterdawn legend]
This thread is closed and therefore you are not allowed reply to this thread.
 
afterdawn.com > forums > general discussion > safety valve > lets paint the kettle black,do you have a bitch on whats going on around the site or any thing negative to report
 

Digital video: AfterDawn.com | AfterDawn Forums
Music: MP3Lizard.com
Gaming: Blasteroids.com | Blasteroids Forums | Compare game prices
Software: Software downloads
Blogs: User profile pages
RSS feeds: AfterDawn.com News | Software updates | AfterDawn Forums
International: AfterDawn in Finnish | AfterDawn in Swedish | AfterDawn in Norwegian | download.fi
Navigate: Search | Site map
About us: About AfterDawn Ltd | Advertise on our sites | Rules, Restrictions, Legal disclaimer & Privacy policy
Contact us: Send feedback | Contact our media sales team
 
  © 1999-2025 by AfterDawn Ltd.

  IDG TechNetwork