No Anti-Virus software works

Do you have a question? Post it now! No Registration Necessary.  Now with pictures!

Threaded View
No Anti-Virus software works.  But you're likely one of the billions of
people who believe it does something and you give large amounts of money
to the rip-off companies who sell their so called "anti-virus" crap.

It dont matter if you buy the most expensive AV crap, or use the
ad-supported (so called), Free crap, it dont do one goddamn thing.  

If your computer gets a virus, this AV software will leave you flat and
without any hope.  Your only two options are to either wipe everything
off your computer and start over by re-installing your operating system,
and everything else you once had, or to toss your computer in the trash
and buy a new one.

All of this, courtesy of some pimple faced, 16 year old ghetto punk
living in his parents basement, with no future and no goals in life
except to destroy other people's computers by writing virus code.

Stop giving your money to these crooks who claim their AV software will
protect you.  IT WONT.  You may as well just flush that money down the
toilet.....  At least that way it wont be filling the pockets of these
criminals who sell this worthless AV software, for they are as bad as
the assholes who write the viruses.  ALL of them belong in prison!

Re: No Anti-Virus software works wrote:
Quoted text here. Click to load it

I've been saying the same thing here for years.

Way back around 10 years ago, there were some in the tech press who were
saying that the AV industry was going to collapse because their primary
customers (corporations, governments and other institutions) were going
to realize the poor value proposition of AV software.  What these
pundits failed to realize is the absurd human condition to seek out
protection and security (in this case, of the electronic / internet
variety) and to incorrectly perceive the true effectiveness of these

It's also probably the case that IT people simply see it as job security
to constantly inflate their department's budgets by maintaining the
purchasing of increasingly more costly "security" solutions, regardless
their effectiveness, simply to satisfy the ignorant desires of the
executives that pay them.  Because when their organization gets hacked,
the IT department can claim that they "buy and deploy the most expensive
security solutions known to man".  Like the emperor's new clothes -
woven from the finest, most expensive code.

Quoted text here. Click to load it

Again, something I've been saying here for years.  Just look at my past
posts where I show poor initial detection of files submitted to

Quoted text here. Click to load it

Not quite.

All of this is courtesy of Micro$oft, and their treasonous subversion of
the computing security of the US and nations around the world just to
satisfy their short-sighted financial need to replace then-current
Win-9x/me (which did not require remote server-based product activation)
with the best trojan-hosting platform known to mankind -> Windows XP.  

An operating system unfit for direct exposure to the internet for at
least the first 6 years of it's product lifetime.

An operating system unnecessarily complex and overmanaged for the needs
of the vast majority of installations.

Macro$haft and the NT-line of Windoze allowed the pimple-faced
miscreants to turn what would have been a low-level, low-impact nuisance
into a global malware industry.  The industrial levels of spam that have
existed since about mid-2004 can be traced directly back to the
needless, forced adoption of XP starting in 2002 into PC's at all levels
(home, soho, edu, corp/org/gov, etc).

Quoted text here. Click to load it

While I've been running Windows 98 with various enhancements for many
years - and with no AV software at all, the fact is that vulnerability
is baked into the NT-line of Windows (and other platforms like
Android).  The computer-owning public is simply not capable or desirous
of delving into the details and taking charge of their chosen hardware
(phone, tablet, laptop, desktop) and reconfiguring it to make it less
vulnerable (or invunlerable) to remote code exection and control.  For
many such consumer devices, such reconfiguration is not even possible -
by design and by marketing intent.

Quoted text here. Click to load it

The executives that were running Milkro$oft 15 years ago are the ones
that should get their ass hauled off to prison - starting with Bill
Gates himself.

Re: No Anti-Virus software works


Quoted text here. Click to load it

In an enterprise AV makes a lot of sense because the vast majority of
infections I encountered (mostly due to brain-dead users) were KNOWN
threats. To be honest I can't think of anything that I ever saw come
into a network that wasn't already known by most AV. It's a lot easier
to have AV help lock things down than assume any given user is going
to have intelligence. BYOD is a recipe for disaster and I really don't
envy anyone working in an environment that invites that.

I do hate the odd resource idiocy that happens with a lot of AV at
times but overall the time saved in cleaning up after idiots makes it
worth it.

For home use I practice safe computing and that includes Windows being
disposable. So I only run AV at home while testing. Funny thing is a
few years ago I was testing M$ security essentials just when that one
big it of poisoned advertising links hit a bunch of websites. I saw it
disable the AV before I stepped in and killed it. Just a couple months
ago I had a Windows box get one of those ransomware hits AND, while I
did nuke it later, I'd killed the box before it encrypted anything and
I never did find any signs that it had gotten an actual infection. But
that did reinforce my decision to do most internet stuff either on
Linux or from Windows VMs :)

Internet Survival time (was: No Anti-Virus software works)

MadAdmin wrote:
Quoted text here. Click to load it

The phenomena of Windoze 2k and XP systems that were hacked by worms
faster than their first round of updating could be performed was
measured in terms of how long those systems could be exposed to a
network (either local LAN or the internet at large).  That measurement
was known as the "internet survival time", and it was measured in

Internet Survival Time by Sophos

Anti-virus company Sophos published their own statistic regarding
"internet survival time". Their number was 12 minutes. The survival time
currently reported by is 31 minutes. Their story also has
some interesting statistics on the number of viruses in the first half
of 2005 compared to last year. But don't let it spoil your weekend. If
you are in the security field professionally, just think of it as job


1 July 2005

Virus writing on the up as average time to infection spirals down

Sophos charts virus activity for first six months of 2005

Sophos, a world leader in protecting businesses against viruses and
spam, has revealed results of its comprehensive research into the last
six months of virus activity. In 2005 so far, Sophos has detected and
protected against 7,944 new viruses - up 59% from the first six months
of last year.

In line with this substantial increase in virus writing, is the rapidly
decreasing average time to infection. There is now a 50% chance of being
infected by an internet worm in just 12 minutes of being online using an
unprotected, unpatched Windows PC.  (they mean NT-based Windows PC - but
they always fail to explicitly state that).

Even back in 2005, they constantly tried to confuse the issue of NT's
vulnerability compared to 9x/me by simply referring to NT-based windows
as simply "windows".

The truth is that Win-9x/me was not vulnerable to any of the known 5 or
6 families of network-based worms.  You could take a default install of
win-98, connect it to the internet, give it a DMZ or directly-routable
IP address, perform NO updates on it, and no worm could touch it.

Contrast that with Win-2K or XP.  Do the same thing, and before your
first round of updates could be downloaded, your system would already be

The longstanding Zafi-D worm accounts for more than a quarter of all
viruses reported to Sophos so far this year. Dominating the top of the
monthly virus charts for the first four months, this Hungarian worm uses
the guise of a Christmas greeting to trick users into opening its
infected attachment.

"Most surprising is that Zafi-D managed to hang around long after the
festive season and well into the Spring," said Graham Cluley, senior
technology consultant at Sophos. "It's only in the last two months that
Zafi-D has started to lose its stranglehold on the chart, but it's still
a significant threat."

The bilingual Sober-N, which takes third place on the six-month chart
having first emerged in May, stormed to the top of the virus chart last
month - finally knocking Zafi-D from the top spot. Posing as tickets to
the 2006 World cup in Germany, Sober-N compromised thousands of PCs in
40 countries.

Sober-N waited silently in the background of infected PCs, before
upgrading itself to a newer version in order to churn out German
nationalistic spam from the compromised, 'zombie' computers.

"The Sober family of worms show just how much damage can now be done
through a zombie machine," said Cluley. "The combined effort of
spammers, virus writers and their zombie armies are certainly a force to
be reckoned with. Increasingly, legitimate organisations are being
thrown into the firing line - finding themselves being identified as
sources of spam."

"The threats are consolidating - its becoming more blurred as to whether
something is a spam, a spyware, a phish, or a virus problem. Businesses
must ensure they are protected against all of these threats," continued
Cluley. "Furthermore, it makes sense to source your security solution
from a vendor who has expertise in all of these areas in-house -
allowing nothing to slip through the net."

Another old-timer, Netsky-P, which was the hardest-hitting virus of
2004, has enjoyed an extremely long reign near the top of the virus
chart so far in 2005. German teenager Sven Jaschan, who admitted writing
the Netsky and Sasser worms more than a year ago, will face trial next
week for computer sabotage, data manipulation and disruption of public

"Even though Jaschan's worms continue to spread and cause problems for
many computer users, he's likely to avoid a prison sentence because of
his age," said Cluley. "When comparing a dumb teenager with other
internet criminals who plot to steal millions of credit card details or
bank account information from infected PCs, it's clear who should get
the harsher sentences."

2005 has so far seen several highly publicised arrests relating to
computer crime. In May, Israeli police managed to track down a London
based couple, who were arrested for writing malicious software that was
used by Israeli companies to spy on their competitors. The previous
month saw the arrest of a Cypriot man who spied on a 17-year old girl
via her webcam after infecting her PC with a Trojan horse. A similar
scenario resulted in a Spanish student being fined.

Sophos has seen a threefold increase in the number of keylogging Trojans
so far this year. Trojans are delivered to target organisations via
email attachments or links to websites. They are often used by remote
hackers to steal privileged information and very often, to launch
further attacks. In June, an NISCC investigation, which Sophos assisted
with, found that nearly 300 UK government departments and businesses
have been the subject of Trojan horse attacks.

"What we are witnessing is a stampede of new Trojan horses every day,"
said Cluley. "Although some familiar worms have a tight grip on the
charts, the growth in Trojan horses is perhaps the most significant
development in malware-writing. Trojans don't normally make the charts
because they don't spread under their own steam, and are increasingly
being used for targeted attacks designed to make money or steal

The prevalence of organised computer crime is higher than ever. The
attempted breach at the Sumitomo Mitsui bank in London and the
MasterCard hack are prime examples of the continued trend towards
financially motivated computer crime.

Variants of the Mytob worm are also prevalent in the chart at sixth and
eighth places. More recent versions of the worm have adopted a new
trick, most commonly used by phishers, which includes a faked web link
pointing to the malicious code. Each new Mytob variant has been tweaked
slightly differently, which indicates that the authors may be searching
for the elements of their malicious code that will help them create a
super worm. Sophos believes that it is unlikely that we have seen the
last of this family of worms.

The total number of viruses protected against by Sophos now stands at

Re: Internet Survival time

On 2015-05-11 9:32 AM, Virus G_u_y wrote:
Quoted text here. Click to load it


Wolf K

Site Timeline