B
Interesting in what way Bear? This guy is boring me to tears. I could
make a few comments on things I disagree with, but.. I'd just be
repeating myself and the comments already left for him. Comodo AV is
junk, imo.
Multiple DNS servers? WTF!?!
Here we go:
"I tired using it once, I could not take it anymore, I had to
uninstall it. Just the FP from the web scanner was driving me to the
point it madness, it kept? blocking tons of sites. "
So he's basically like you... That's his comment.
How does this help people with malware issues Bear? Load em up, watch
systems without the hardware slow to a crawl, users get pissed,
uninstall this and that...Seems counter productive.
Ditto ;-)
It's not like he's taking from MDL a Blackhole URL and deobfuscating
the Javascript and showing how to obtain the SWF, PDF and Java
exploits and the subsequent payload(s).
His videos target average users and provides very informative
information about various tools. I don't see you providing
informative narratives for folks.
yeah, I don't suppose many people are interested in dissectingI don't maintain a youtube channel, nor a facebook, myspace, twitter,
(insert your favorite social site here)... So no, You won't see me
providing an informative narrative of anything. I don't think it would
be a good idea for me to provide a video of disecting malware. One
wrong move, poof; damn thing gets loose and I have pissed off users to
deal with. Not to mention the possible problems from the antimalware
community for showing users how to do dangerous or otherwise, unsafe
things... Hell, I couldn't do much worse if I posted how to
troubleshoot the electrical on your microwave. Many have, it's not
difficult to work on in most cases, but it can kill you dead should
you touch the wrong components.. So, for safety, somebody else can
take the risk.. It won't be me.
Quite a few actually, especially in these computer security related
groups. Giving an antimalware program the ability to detect some kinds
of malware often involves having to have someone do the work of
dissecting that malware.
Actually, that's two stories, each with a different plot and cast of
characters.
Well I'm not interested in it. Up and down...all around.
Then why did you post this youtube garbage?
Pooh didn't post it, I did. You can't tell the difference between the
forger and me? I thought you were an expert?
Dustin said:
I think you resort to using forger whenever someone asks you a question
you can't readily answer. I have no way of really knowing if you aren't
posting under both servers. Only your word (hah!) that it's not you.
Dustin said:Bear,
I think you resort to using forger whenever someone asks you a question
you can't readily answer. I have no way of really knowing if you aren't
posting under both servers. Only your word (hah!) that it's not you.
In any event, they aren't forgeries as the header information doesn't
match. It's just two people posting using the same username Bear. Maybe,
two people.
Bear,
I think you resort to using forger whenever someone asks you a question
you can't readily answer. I have no way of really knowing if you aren't
posting under both servers. Only your word (hah!) that it's not you.
In any event, they aren't forgeries as the header information doesn't
match. It's just two people posting using the same username Bear. Maybe,
two people.
That person expressed they had no interest disecting malware,
incidently,you expressed the same opinion here:
Message-ID: <[email protected]>
yeah, I don't suppose many people are interested in dissecting
malware..including myself. Now preventing as much as possible and
recovering easily is a different story.
So my question still stands. Why did you post a youtube video link in
this newsgroup? It's junk. The only way it could possibly qualify under
antivirus is because he mentions using one. Otherwise... Junk.
I disagree. A virus can have imaging in mind all it wants...when INeither Bear has interest in disect or serious discussion of ANTIVIRUS
(as opposed to malware) and an image isn't really a good way to recover
from a virus. Some viruses have imaging users in mind... lol.
I disagree. A virus can have imaging in mind all it wants...when I
reload an image ... the virus is gone. If it's in the firmware or
embedded on the motherboard somewhere or hiding in the speaker, well I
might call for your help. Don't hold your breath.
By the time you realize you have this style of virus, your images
already contain it as well. It's known as a slow infector and for very
good reason. If you have a drive split into multiple partitions and
you dont restore a clean mbr, you run the risk of a virus maintaining
it's presence and still placing you right back to square one. Images
are primarily for hardware failure and known workstation state
integrity.
I disagree...the plan is as solid as it gets.The idea was never a silver bullet to a virus issue. Sometimes,
inexperienced users do mistake it for a cure-all tho. Backups are an
excellent thing to be doing, but the way in which you pass them off
just isn't honest.
Dustin said:By the time you realize you have this style of virus, your images already
contain it as well.
It's known as a slow infector and for very good
reason. If you have a drive split into multiple partitions and you dont
restore a clean mbr, you run the risk of a virus maintaining it's presence
and still placing you right back to square one. Images are primarily for
hardware failure and known workstation state integrity.
The idea was never a silver bullet to a virus issue. Sometimes,
inexperienced users do mistake it for a cure-all tho.
Backups are an
excellent thing to be doing, but the way in which you pass them off just
isn't honest.
His scheme, as laid out, does not allow this to happen. He uses a
previous clean image to get the machine to the point where it can
install the latest cumulative updates.
It does seem like a lot of work doing that when images are not the
right tool to battle malware. For the type of disaster recovery
images *do* address - there's no need to avoid slipstreaming.
Agreed.
And, it doesn't help matters when Bear keeps presenting it as such.
His scheme, as laid out, does not allow this to happen. He uses a
previous clean image to get the machine to the point where it can
install the latest cumulative updates.
It does seem like a lot of work doing that when images are not the
right tool to battle malware. For the type of disaster recovery images
*do* address - there's no need to avoid slipstreaming.
And, it doesn't help matters when Bear keeps presenting it as such.
Yep, he shouldn't even mention malware in that context.
He is very trollish.Dustin said:I'm not sure I'd credit him as the author... Possible, but not entirely
likely. The slow infector relies on it not being detected for sometime,
so that it can slowly work it's way into your backup history. As it's
unknown at that point, it's a safe bet he'd include it in a supposedly
"clean" image-short of install from clean media on known clean HD and no
3rd party apps. In reality this wouldn't work anymore due to the rapid
rate in which samples are passed around and new definitions are posted
to deal with them.
In the past tho, the slow infector did have these backup systems in mind
and intended to take advantage of the process.
Based on his posts recently, he seems to behold some sort of grudge
against techie types. Perhaps he feels they rip people off. He feels his
plan puts techies out of business.