PDA

View Full Version : Note to all surfers…



Blaze
03-28-2011, 06:24 PM
If you surf areas that are known to have an underbelly that harbor viruses, Trojans, and other icky, do not bitch, moan, act scared, or in general be a dweeb when you make a connection with a clean machine and get asked about said icky.

I am not here to give a tutorial. I am not interested in "your rights to freedom"

I really do not fucking care.

And in case there is one soul here that has not heard or known...

Exploits (that those fancy computer malwares) can be created for limited use for a target. These sometimes are not "caught" by security ware (especially free security ware)

and unless you are good with forensics or pay for real security ware or people.... You will not know until you are told that you have an icky.

So don't act uppity .... watch where your tube goes ... if you do not know how to clean yourself, stay in the safe areas and for God's sakes don't download anything that isn't 100% mainstream not even from you BBF!
:barf::barf::barf::barf::barf::barf::barf::barf::b arf::barf::barf::barf::barf::barf::barf::barf::bar f::barf::barf::barf:




http://www.marthas-web.com/

CROWBAR
03-28-2011, 06:31 PM
http://www.youtube.com/watch?v=AXezgjSDRXc&feature=related

Jesus Christ
03-28-2011, 07:19 PM
And if ye get an e mail claiming to be from UPS with an executable file attached, do NOT open it. Don't even bother scanning it, because your software may not detect anything.

UPS will never send you anything but a confirmation notice, a tracking number, and maybe a link to their tracking website, and of course, I am the Son of God, so I knew better than to open it. But the scary thing is that it appeared to come from a legit UPS e mail account, so a lot of people will fall for it. And it looks like a pain in thy posterior.....

http://forums.cnet.com/7726-6132_102-5105457.html

Terry
03-28-2011, 08:59 PM
Thank you, Blaze.

Thank you, Crowbar.

Thank you, Jesus.

Terry
03-28-2011, 09:02 PM
btw/ Jesus, I know I promised you that I would abstain from looking at online porn if you helped me out with that thing I prayed to you about.

Thanks for the assist.

I'm sorry I've been unable to keep up my end of the bargain, but I figure if you, Jesus, created the internet than certainly you must have created all the delightful porn to be found on it.

Thy will be done.

PETE'S BROTHER
03-28-2011, 10:05 PM
thank you terry, for telling jesus what i have been unable to tell for nigh on 30 years :biggrin:

Anonymous
03-29-2011, 12:21 PM
btw/ Jesus, I know I promised you that I would abstain from looking at online porn if you helped me out with that thing I prayed to you about.

Thanks for the assist.

I'm sorry I've been unable to keep up my end of the bargain, but I figure if you, Jesus, created the internet than certainly you must have created all the delightful porn to be found on it.

Thy will be done.

You're wasting your time, Jesus is too busy for that kind of shit.

Fapping at the gratest invention since air conditioning & silicon - streaming pr0n goodness!

Cheers! :bottle:

Blaze
04-02-2011, 11:40 PM
LizaMoon Pay-Up Scareware Spreads To 500,000 Sites

Mark Long, newsfactor.com – Fri Apr 1, 4:50 pm ET

Websense Security Labs has updated its Tuesday alert concerning a malicious mass-injection scareware campaign it has dubbed LizaMoon -- an SQL injection attack that adds a line of JavaScript code to web pages that redirects users to a bogus web page that rotates on a periodic basis.
Based on Google search results Thursday, more than 500,000 URLs had a script link to lizamoon.com, which has since been changed, Websense said.

Though search results aren't always great indicators of the scope of an attack -- Google search lists each unique URL rather than each domain or site -- they do provide some indication of the scope of the problem when the numbers go up or down, Websense observed.

"We have also been able to identify several other URLs that are injected in the exact same way, so the attack is even bigger than we originally thought," Websense security analysts wrote in a blog Thursday. "All in all, a Google search reveals over 1,500,000 URLs that have a link with the same URL structure as the initial attack."

Bogus Malware Reports

A user who visits a web page with the injected code is redirected to a bogus Internet site. "Just like most other scareware and rogue AV sites, it shows a pop-up warning saying that your security is at risk and that you have malware and other security issues," said a Websense spokesperson.
"And when you click OK, it displays a scanning tool that looks like its going through the hard drive and finding all sorts of malware, but it's all fake, of course."

Users who click "remove all" to fix their fake problems end up downloading an executable rogue AV to their machines. Then when the unsuspecting user starts the rogue tool, it kills whatever program is currently running.

Nothing else happens until the user tries to start the legitimate program again, at which point the scareware displays a fake Trojan alert. If the user then clicks "remove," the rogue AV escalates to the next stage by prompting the user to install the full-blown scareware app.

This second-stage software, which displays the bogus name Windows Stability Center, warns that there are lots of problems on the user's PC. "To fix them you have to pay for the full version of the app," Websense explained.

Antivirus Engines Still Vulnerable

Though the LizaMoon threat is global, Websense reported nearly half the traffic to the scareware's bogus web sites is coming from U.S. Internet users. Other nations where a considerable number of PC users are falling prey to LizaMoon include Canada (9.23 percent), Italy (8.89 percent), Brazil (7.92 percent) and the United Kingdom (7.92 percent).

Websense said there really hasn't been anything this big before and the threat isn't expected to go away anytime soon. The problem is that only 17 out of 43 of the currently available antivirus engines -- from Kaspersky, Microsoft, Sophos, Symantec, Trendmicro, VIPRE and others -- were able to detect the LizaMoon rogue AV as of Friday afternoon, according to web-security firm VirusTotal.

Websense said it's still analyzing the scareware to see how it infects web pages. However, the security firm's researchers suspect that the attack has gained such widespread traction because it has been able to exploit "vulnerabilities in the web systems used by these sites, such as outdated CMS and blog systems."