F
FromTheRafters
If everybody stopped replying to you, would you continue to just post
and answer your own messages?
Bingo!!
If everybody stopped replying to you, would you continue to just post
and answer your own messages?
JD said:Let's find out. I think he'd grow weary of his little bs game and move
onto another newsgroup. We'll never know because it's not going to
happen. And then Jenn pops up with her moron statements. I hate to see
this newsgroup turn into this but so it goes.
JD said:~BD~ said:FromTheRafters wrote:
FromTheRafters wrote:
[...]
*What if* ....... ?
One or more of those 'trusted' malware cleaning forums (or even
a trusted software programme) could, surely, download such a
programme onto a user's machine so that, forever afterwards,
whatever is done on
that machine may be monitored by an outside agency.
Thank you for responding FTR!
That's not very likely,
But .... *I* believe that it is *possible*!
********
As I've said elsewhere ..........
"What a super ruse it would be, eh? - to clear a machine of
everyone else's 'nasties' but then, perhaps, leave their own
package installed on the user's machine. No one would ever
suspect, would they?"
such a trojan would soon be discovered and dealt
with - very bad for the 'trusted' source's reputation.[...]
Now this is where we seem to have a *real* difference of opinion,
FTR!
Just *who* would discover such covert malware. With today's
high-speed and powerful machines a *user* is highly *unlikely* to
discover that they have become part of a botnet! If their
/cleaned/ machine is performing *better* that it had in a long
while, why would the *user* suspect anything untoward?
Bigger picture:
Remember the quote about how you can fool some of the people some
of the time, but you can't fool all of the people all of the time?
“You may fool all the people some of the time, you can even fool
some of the people all of the time, but you cannot fool all of the
people all the time.” Abraham Lincoln
Malware like
that relies on the first part of that quote. It doesn't care about
the second part because there is no shortage of fools. Such
software does eventually get discovered, but usually cannot be
traced back to a single source - there are many sources and they
change location often. If someone has a *real firewall* then this
type of commercial malware's activities can soon be discovered.
So asking "who would" is the wrong question - the individual is
insignificant in comparison to the whole. Instead you must ask
yourself if *anybody* would discover the hidden function, and what
that would mean to an otherwise legitimate (contactable) business.
OK. Let' use an example.
I do not consider Aumha.net to be a business (do you?)
Let's say someone goes there for the cleaning of their machine and
all seems to go to plan. Is there *any* company/organisation which
makes random checks on such 'help' sites to ensure that nothing
untoward, along the lines which I've described, is happening - to
ensure that they are *not* compromising the machines of naive
'customers'?
My limited understanding of matters is that once a machine is
under the control of a botmaster, all personal control is
effectively lost.
Do you dispute this?
Yes, but I may be reading it differently than you are. It would
depend on how much control is still afforded you by the nature of
the offending program.
Perhaps you are. I meant that an outside agency may do whatever they
wish - whenever they wish - with the owner of the machine being
completely unaware of the 'intruder'. This may only be achieved if
the user can still carry out whatever he/she wishes to do and does
not become suspicious in any way.
HTH
boater Dave, You are so full of $hit my monitor stinks when I see
your messages. Try a slow boat to anywhere but these newsgroups. OK?
You might enjoy life more if you stopped complaining about things over
which you have no control. None whatsoever!
No one *makes* you read what I have to say (there again, maybe you
don't!) and it costs you nothing. Simply ignore me if what I say
offends you.
Enjoy your day!
FromTheRafters said:~BD~ said:FromTheRafters wrote:
[...]
*What if* ....... ?
One or more of those 'trusted' malware cleaning forums (or even a
trusted software programme) could, surely, download such a programme
onto a user's machine so that, forever afterwards, whatever is done
on
that machine may be monitored by an outside agency.
Thank you for responding FTR!
That's not very likely,
But .... *I* believe that it is *possible*!
********
As I've said elsewhere ..........
"What a super ruse it would be, eh? - to clear a machine of everyone
else's 'nasties' but then, perhaps, leave their own package installed
on the user's machine. No one would ever suspect, would they?"
such a trojan would soon be discovered and dealt
with - very bad for the 'trusted' source's reputation.[...]
Now this is where we seem to have a *real* difference of opinion, FTR!
Just *who* would discover such covert malware. With today's high- speed
and powerful machines a *user* is highly *unlikely* to discover that
they have become part of a botnet! If their /cleaned/ machine is
performing *better* that it had in a long while, why would the *user*
suspect anything untoward?
Bigger picture:
Remember the quote about how you can fool some of the people some of the
time, but you can't fool all of the people all of the time?
“You may fool all the people some of the time, you can even fool some of
the people all of the time, but you cannot fool all of the people all
the time.” Abraham Lincoln
Malware like
that relies on the first part of that quote. It doesn't care about the
second part because there is no shortage of fools. Such software does
eventually get discovered, but usually cannot be traced back to a single
source - there are many sources and they change location often. If
someone has a *real firewall* then this type of commercial malware's
activities can soon be discovered.
So asking "who would" is the wrong question - the individual is
insignificant in comparison to the whole. Instead you must ask yourself
if *anybody* would discover the hidden function, and what that would
mean to an otherwise legitimate (contactable) business.
OK. Let' use an example.
I do not consider Aumha.net to be a business (do you?)
Let's say someone goes there for the cleaning of their machine and all
seems to go to plan. Is there *any* company/organisation which makes
random checks on such 'help' sites to ensure that nothing untoward,
along the lines which I've described, is happening - to ensure that they
are *not* compromising the machines of naive 'customers'?
Perhaps you are. I meant that an outside agency may do whatever they
wish - whenever they wish - with the owner of the machine being
completely unaware of the 'intruder'. This may only be achieved if the
user can still carry out whatever he/she wishes to do and does not
become suspicious in any way.
If everybody stopped replying to you, would you continue to just post
and answer your own messages? Why don't we all see what happens?
Let's find out. I think he'd grow weary of his little bs game and move
onto another newsgroup. We'll never know because it's not going to
happen. And then Jenn pops up with her moron statements. I hate to see
this newsgroup turn into this but so it goes.
Now *that* is exactly what I tried to encourage you to do, Dustin!
I can hope for nothing more than that someone *will* take an interest
and investigate. Most folk are too busy to do as I have done for well
over four years now. I've never professed to know much about computers
but I do have an ability to sense when things do not ring true.
I'm sure you are right but it seems that such checks and balances are
woefully inadequate. The bad guys are winning and cybercrime is still
Just like the Somali pirates, the Internet bad guys *must* be stopped.
FromTheRafters said:The *malware* to detect, would be the surreptitious installer (trojan)
of the keylogger. Since you evidently installed it yourself, there *is*
no malware to detect. If this program comes with a way to install it
surreptitiously, then that function (or it's result) *should* be
detected. What you would need in order to prevent one administrator from
being able to detect that the other' has installed spyware is to have
the whole deal on a monitor or hypervisor where one administrates the
"platform" on which both administrators appear to administrate in the
emulated "environment".
G. Morgan said:Are there ANY programs that DO detect and remove it?
G. Morgan said:I'm going to rephrase my question.
Why wouldn't the author's of Super ASW and MBAM not include commercial
key
loggers in their detections? It doesn't matter if you bought the
spyware in a
nice package at Fry's, or downloaded it from any number of free
sources.
Key loggers are Spyware, period. I can't leave a customer's house
after
scanning with Avira, MBAM, and Super ASW --- knowing that none of them
detects
this "greyware". <--- Which I have a problem with that term.
Forget what I said about my g/f. That was just theoretical. I'm
talking about
working on other's PC's now.
Why do commercial vendors get a "pass", when script kiddies and other
a$$holes
that write Trojans for "fun" don't?
I'll join the forum and see what happens. But, my strong opinion as a
technician, the tools I use to must be 100% dead-on. Spyware is
spyware, no
matter what spin you put on it (PUP, Greyware) whatever.... Just
because it
comes in shrink wrapped box doesn't mean it's not spyware.
G. Morgan said:I also do house calls on the side. I would like a program that
detects ALL key
loggers, not just non-commercial ones. Husband spying on wife, etc...
JD said:FromTheRafters wrote:
We have a term down here in Texas. It's called "pi$$ing into the wind." We
try not to do that but sometimes one mis-judges the wind direction.
JD said:Let's find out. I think he'd grow weary of his little bs game and move
onto another newsgroup. We'll never know because it's not going to happen.
And then Jenn pops up with her moron statements. I hate to see this
newsgroup turn into this but so it goes.
I'm speculating here that some antispyware vendors would be willing to
supply detection for these once they are reported to them.
I also do house calls on the side. I would like a program that
detects ALL key loggers, not just non-commercial ones. Husband spying
on wife, etc...
I'm going to rephrase my question.
Why wouldn't the author's of Super ASW and MBAM not include commercial
key loggers in their detections? It doesn't matter if you bought the
spyware in a nice package at Fry's, or downloaded it from any number
of free sources.
Key loggers are Spyware, period. I can't leave a customer's house
after scanning with Avira, MBAM, and Super ASW --- knowing that none
of them detects this "greyware". <--- Which I have a problem with
that term.
Why do commercial vendors get a "pass", when script kiddies and other
a$$holes that write Trojans for "fun" don't?
I'll join the forum and see what happens. But, my strong opinion as a
technician, the tools I use to must be 100% dead-on. Spyware is
spyware, no matter what spin you put on it (PUP, Greyware)
whatever.... Just because it comes in shrink wrapped box doesn't mean
it's not spyware.
Jenn said:Texas sayings isn't going to make up for a low IQ.
Dustin Cook said:As many of the keyloggers are commercial in nature; Perhaps you could
purchase a copy of the popular ones and provide the complete installer to
various antimalware researchers.