Nome utente : Password :
Registrazione di un nuovo utente
Moderatore: toedder 
 Computers

Have computer questions, hints, or tips?

BBW's Tips on how to speed up page load the brainking site
Computers (BIG BAD WOLF, 2007-03-12 20:16:01)


Messaggi per pagina:

Cosa cè di nuovo sullargomento database servers?
Lista delle discussioni
Non ti è possibile inserire messaggi in questo forum. Il livello minimo di sottoscrizione per linvio dei messaggi è {0}.
Modalità: Chiunque può inviare messaggi
Cerca nei messaggi:  

11. Maggio 2004, 00:41:59
Lythande 
<Google it. There's a sh*tload of links. ;>

2. Maggio 2004, 22:31:26
Lythande 
Harley: One could edit the registry, but that's not something that should be done by the casual user. TweakUI might help, but I don't know if it comes in a flavour compatible with your friends computer, since you didn't mention the OS. Outhouse is a PITA to make behave, especially when you have the audacity to not use Bill Gate's favourite.

18. Aprile 2004, 03:16:07
Lythande 
Argomento: <Re: (_) | N > Kb
Actually (I think I forgot the b) it was coffee (or beer or whatever) piped through Nose into (or onto) Keyboard. ;)

13. Aprile 2004, 12:15:21
Lythande 
<(_) | N > K

13. Aprile 2004, 11:36:21
Lythande 
lol

13. Aprile 2004, 10:58:17
Lythande 
<You may have to do it from DOS, which in the newer M$CRap products is a lot harder than it used to be, which is why I still have 95OSR2 and will have until debian gets installed. ;>

24. Marzo 2004, 09:24:20
Lythande 
Argomento: Re: hackers vs security experts
Oooh.. sounds like so much fun... could be my chance to be that quiet little fly-on-wall and watch fishy and rek in live action, throwing around their b---- erm.. *blushes* nevermind 'notherstory.. Except that now I think they're both certified security experts and as to hacking, the less said, the better.

13. Marzo 2004, 08:02:38
Lythande 
Argomento: Re: Spyhunter
File transfer protocol, yes (part of the tcp/ip suite). Web-page constructor, no. Though it is often used to -upload- 'pages' (or files), so I suppose you could say it aids in the construction of sites. It's simply a means of (gasp!) transfering files from one machine to another. :)

12. Marzo 2004, 20:14:29
Lythande 
What has ftp clients to do with spyware or the removal thereof?

26. Febbraio 2004, 10:51:09
Lythande 
I dont'use quicken (or have it installed), so I've no idea what the .exe is named. I wondered about that myself, but didn't check. I will say this, again, though. Do not open _any_ attachment unless you know exactly what it is, and if it's a pif, dll, exe, bat, com, vb (and a slew of other application type files), use a -good- antivirus to scan it with -first-. Always be aware that even your best friend could be affected by a worm propogating itself without their awareness. And if you -don't- run an antivirus program and you run windows, the same goes for you. There are more ways to contract unfavorable code than just opening the wrong email attachment. And the further we advance, more 'methods' are discovered every day.

25. Febbraio 2004, 12:03:33
Lythande 
Argomento: Re: Lythande
What happens with the stolen passwords depends on what the theif wants to do with them, if anything. :/ The other 'check' was probably testing your ports. Password stealers can be some type of keystroke capture program which sends it's data to a particular place (ftp/http location, email address, irc channel, whatever). Passwords can be located in a variety of different files (cookies, pwl files 'wallet' files, etc. They're supposed to be encrypted, but windows encryption is notoriously inept.

The fact that your machines share a router does not necessarily mean they're all corrupted, but they could be, especially if you share files or programs between them. All of them should be checked, and disinfected if necessary.

If by 'wipe out everything and start from scratch' you mean a low-level format of all drives and re-installation of everything from CD, you should be safe. Just be sure when you re-load you include an up-to-date antivirus program. :)

25. Febbraio 2004, 08:40:34
Lythande 
Argomento: Re: Lythande
These files are major programs, but if you have the disks you could replace them. The problem is that most trojans deposit other programs onto your system (often hidden) which carry out their 'dirty work' (or 'payload'). Your entire system needs 'disinfected'. PWSteal.Trojan (PassWord steal) tells me you also need to change every password you use, right down to the one you use to log on to your ISP.

A good antivirus can often 'disinfect' files, but sometimes it is necessary to delete these files and replace them from a non-contaminated CD. You may have to reinstall quicken and others from your windows CD. You -must- keep your antivirus program updated, otherwise new virii (which are released daily) can slip past your defenses.

NEVER open an email attachment without checking it first, even when it appears to be from a trusted source. They may be infected and don't yet realize it.

The links I gave you will often have detailed instructions for disinfecting your system from certain virii, but it sounds like you are infected with more than one. If you are unsure of your abilities, then you need to find someone who knows what they're doing to help you clean your system.

24. Febbraio 2004, 21:54:19
Lythande 
Argomento: Re: DVD Player
Please! :)

24. Febbraio 2004, 21:15:42
Lythande 
usually you won't find them 'by name'. Your best bet is to find a good anti-virus program. And just for future reference, here are some good links to check out if you think you have (or hear about) a virus:

Virus information
Hoax information
Virus Descriptions

3. Febbraio 2004, 21:25:49
Lythande 
<You could just install debian. :> <ducks>

3. Febbraio 2004, 10:37:18
Lythande 
<Do you have a link to that story? :>

2. Febbraio 2004, 05:22:50
Lythande 
That's because it loads the page as it reads it. I believe IE renders the whole page before displaying any of it, which is one of the reasons it seems so slow sometimes. (I say, "I believe," because I haven't used IE (or even had it on my machine) in about six or eight years... other than at my brother's house, and that's rarely.)

9. Gennaio 2004, 07:59:06
Lythande 
Argomento: Re:
All that means is that you're setting the attributes of the file non-hidden, -read-only, and -system all at once. :)

8. Gennaio 2004, 19:59:20
Lythande 
Argomento: Re: deltree
If they're +h files, you may have to attrib -h -r -s first (though some of those may not apply, it can't hurt). Not sure how 98's 'dos' works with that.

8. Gennaio 2004, 19:56:51
Lythande 
Be careful using the /y switch. Like BBW said, if you make a mistake, you could be in big trouble. Deltree works just as well if you leave off the /y, and you can -read- what tree you're about to delete, giving you a chance to double-check and change if necessary.

8. Gennaio 2004, 19:28:36
Lythande 
Harley: Were you at a DOS prompt, and exactly what command did you type?

Data e ora
Amici in linea
Forum preferiti
Gruppi
Consiglio del giorno
Copyright © 2002 - 2024 Filip Rachunek, all rights reserved.
Torna all'inizio