1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Lets Paint The Kettle Black,Do You Have A Bitch On Whats Going On Around The Site Or Any Thing Negative To Report

Discussion in 'Safety valve' started by ireland, Mar 28, 2006.

Thread Status:
Not open for further replies.
  1. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    Heads up.

    IMPORTANT INFO ABOUT AREA CODE
    We actually received a call last week from the 809 area code. The woman said
    "Hey, this is Karen. Sorry I missed you--get back to us quickly. I Have
    something important to tell you." Then she repeated a phone number beginning
    with 809 . "We didn't respond".

    Then this week, we received the following e-mail:

    Subject: DON'T EVER DIAL AREA CODE 809 , 284 AND 876

    THIS IS VERY IMPORTANT INFORMATION PROVIDED TO US BY AT&T. DON'T EVER DIAL
    AREA CODE 809

    This one is being distributed all over the US . This is pretty scary,
    especially given the way they try to get you to call.
    Be sure you read this and pass it on.
    They get you to call by telling you that it is information about a family
    member who has been ill or to tell you someone has-been arrested, died, or
    to let you know you have won a wonderful prize, etc.
    In each case, you are told to call the 809 number right away. Since there
    are so many new area codes these days, people unknowingly return these
    calls.

    If you call from the US , you will apparently be charged $2425 per-minute.

    Or, you'll get a long recorded message. The point is, they will try to keep
    you on the phone as long as possible to increase the charges. Unfortunately,
    when you get your phone bill, you'll often be charged more than $24, 100.00.

    WHY IT WORKS:
    The 809 area code is located in the British Virgin Islands (The Bahamas).
    The charges afterwards can become a real nightmare. That's because you did
    actually make the call. If you complain, both your local phone company and
    your long distance carrier will not want to get involved and will most
    likely tell you that they are simply providing the billing for the foreign
    company. You'll end up dealing with a foreign company that argues they have
    done nothing wrong.
    Please forward this entire message to your friends, family and colleagues to
    help them become aware of this scam
    Sandi Van Handl
    AT&T Field Service Manager
    (920)687-904
    Additional information on these area codes can be found from ATT at:

    www.consumer.att.com/consumertips/areacode.html

     
  2. hawthorne

    hawthorne Member

    Joined:
    Dec 28, 2004
    Messages:
    39
    Likes Received:
    0
    Trophy Points:
    16
    That's good info to know. I would say that I can't believe that they could get away with it, but nowadays nothing suprises me any more.
     
  3. LOCOENG

    LOCOENG Moderator Staff Member

    Joined:
    Feb 4, 2005
    Messages:
    10,818
    Likes Received:
    4
    Trophy Points:
    118
    I'm real bad about returning calls and can smell a telemarketer from a mile away...so I hope I'm good to go.
     
  4. blivetNC

    blivetNC Regular member

    Joined:
    Nov 8, 2005
    Messages:
    1,692
    Likes Received:
    0
    Trophy Points:
    46
  5. gurnard

    gurnard Regular member

    Joined:
    Mar 22, 2005
    Messages:
    777
    Likes Received:
    0
    Trophy Points:
    46
    hi :)
    a tad off subject

    HAPPY BIRTHDAY LOCOENG

    sorry i had to shout cuz he's a little deaf
     
  6. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    MY BITCH FOR TODAY

    THANK YOU SONY FOR STARTING THIS CRAP..BUY OR TRUST SONY,"NOT"

    "Invisible" Rootkit found in the wild

    Difficult to detect and remove

    By Nick Farrell: Monday 17 July 2006, 07:21
    SECURITY EXPERTS have found a really nasty rootkit which is next to near impossible to detect and remove.

    Dubbed Backdoor.Rustock.A by Symantec and Mailbot.AZ by F-Secure, the code cannot be spotted by most current rootkit detectors.

    Symantec claims that it is the first of the next generation of rootkits.

    It uses a mixture of old techniques and new ideas to make it "totally invisible on a compromised computer when installed". Apparently it even worked well on a beta version of Windows Vista the Symantec crowd were playing with.

    The rootkit probably came from the coding hot houses of Russia and a variant called Backdoor.Rustock.B has also been spotted.

    F-Secure claims that its BlackLight rootkit scanner, Build 2.2.1041, can detect the new rootkit.

    However it said that it was darn hard to come up with effective detection code because the new rootkit does not have a process.

    The rootkit runs inside the driver and in kernel threads and controls kernel functions via special IRP functions.

    It even scans for loaded rootkit scanners, then changes its tactics to avoid detection. More here. µ


    http://www.theinquirer.net/default.aspx?article=33065





    'Invisible' Rootkit Heralds Trouble Ahead

    JUL 14, 2006 11:39:17 AM | Add Comment (0) | Permalink

    Security researchers have discovered a new type of rootkit they believe will greatly increase the difficulty of detecting and removing malicious code.

    The rootkit in question, called Backdoor.Rustock.A by Symantec and Mailbot.AZ by F-Secure, uses advanced techniques to avoid detection by most rootkit detectors.

    The rootkit is "unique given the techniques it uses," Symantec’s Elia Florio wrote in a recent analysis. "It can be considered the first-born of the next generation of rootkits."

    Rustock.A uses a mixture of old techniques and new ideas to make it "totally invisible on a compromised computer when installed," including a beta version of Windows Vista, Florio wrote.

    Symantec believes the rootkit originates from Russia, and a string found in the rootkit’s code indicates new versions will probably be forthcoming. Symantec has already logged a variant called Backdoor.Rustock.B.

    F-Secure noted Rustock’s use of NTFS’ Alternate Data Streams (ADS) as one significant example of its advanced behavior.

    "Saving your data into Alternate Data Streams is usually enough to hide from many tools," wrote F-Secure researcher Antti Tikkanen in a company blog.

    "However, in this case, the stream is further hidden using rootkit techniques ... because Mailbot.AZ is hiding something that’s not readily visible; it’s very likely that many security products will have a tough time dealing with this one."

    F-Secure said it has released a new version of the BlackLight rootkit scanner, Build 2.2.1041, which can detect Rustock.

    According to researchers, other factors that help make Rustock invisible are that it has no process, instead running inside the driver and in kernel threads. It doesn’t hook into any native API, and controls kernel functions via special IRP functions. It removes its entries from kernel structures, and the SYS driver is polymorphic, changing its code from sample to sample.

    Rustock also scans for loaded rootkit scanners, then changes its behavior to avoid detection, according to Florio.

    -Matthew Broersma, Techworld.com (London)

    Check out our CIO News Alerts and Tech Informer pages for more updated news coverage.

    http://www.cio.com/blog_view.html?CID=23011
     
  7. rav009

    rav009 Active member

    Joined:
    Nov 14, 2005
    Messages:
    2,204
    Likes Received:
    0
    Trophy Points:
    66
    That was a very interesting read ireland, I hate rootkit, no matter what your dealing with there always hard to spot without somthing like rootkit revealer or Blacklight (which I think is still availible for free)...

    Thank god I've only ever had a few real ones, b*****d's them rootkit's are. :S

     
  8. billybob

    billybob Regular member

    Joined:
    Jan 30, 2006
    Messages:
    904
    Likes Received:
    0
    Trophy Points:
    26
    Please excuse my ignorance, but is a rootkit some kind of virus or worm or spyware?
     
  9. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    billybob

    SEE IF THIS HELPS YE

    Microsoft Exec Warns of Rootkits
    http://www.newsfactor.com/story.xhtml?story_id=43077
    ms Microsoft dedicates four staffers to analyze rootkit samples found in customer computers or on the Internet. In his presentation, Danseglio offered a list of the most wanted rootkits, adding that 90 percent of what Microsoft finds relates to Hacker Defender, a rootkit from the Czech Republic based programmer who calls himself Holy Father. The programmer charges several hundred dollars to make Gold versions of his basic rootkit.

    Writing rootkits isn't a crime, but using them to hide code in a computer that's been hacked by other means is, Danseglio said. Holy Father last month indicated he's retiring from his Web site business, leading some to speculate that he's been hired for some purpose somewhere. Microsoft Exec Warns of Rootkits - NewsFactor Network Linked by shanmuga Tue May2 2006 8:18am EDT


    Microsoft Exec Warns of Rootkits

    Microsoft Exec Warns of Rootkits May 1, 2006 9:32AM

    Microsoft dedicates four staffers to analyze rootkit samples found in customer computers or on the Internet. In his presentation at the InfoSec Conference, Microsoft's Mike Danseglio offered a list of the most-wanted rootkits, adding that 90 percent of what Microsoft finds relates to Hacker Defender, a rootkit created by a Czech Republic-based programmer.

    If your system gets infiltrated by a rootkit, you might as well just "waste the system entirely," a Microsoft official told fellow security professionals at the annual InfoSec Conference.

    Microsoft's Mike Danseglio, program manager in the company's security solutions group, was among a host of security experts from big-name companies who swapped advice about protecting networks with 1,700 showgoers.

    According to Danseglio, the hacker rootkit is "probably the nastiest piece of malware you'll get," because it is designed to hide unwanted files -- or any sign a computer has been compromised -- stealthily.

    Microsoft dedicates four staffers to analyze rootkit samples found in customer computers or on the Internet. In his presentation, Danseglio offered a list of the most-wanted rootkits, adding that 90 percent of what Microsoft finds relates to Hacker Defender, a rootkit from the Czech Republic-based programmer who calls himself Holy Father. The programmer charges several hundred dollars to make Gold versions of his basic rootkit.

    Writing rootkits isn't a crime, but using them to hide code in a computer that's been hacked by other means is, Danseglio said. Holy Father last month indicated he's retiring from his Web site business, leading some to speculate that he's been hired for some purpose somewhere.

    According to Danseglio, rootkits have been embedded in many networks, with college campuses especially hard-hit. The University of Washington has become notorious for its students using rootkits to hide pornography and music on the university's servers, he said.

    Danseglio offered a list of tools, including a few from Microsoft, that can detect rootkits. But he said there are no simple ways to address the menace. "There are no rootkit-resistant operating systems," Danseglio said.

    Kerry Anderson, a Fidelity Investment Brokerage vice president in the information security group, spoke on the topic of setting up a computer forensics program to tackle crime, including child pornography, terrorism and financial fraud.

    A company's first priority should be establishing a policy and internal training for auditing and investigating suspected computer crime, coordinating among the legal, human resources and I.T. departments, she said.

    She advised extending that policy to include working with outsourcing providers, vendors and business partners to ascertain their computer-investigation procedures and get the right to audit and monitor their computers if necessary. "Our contracts today are requiring the right to do risk assessment and visitation audits," she pointed out.

    The insider threat is a top concern at State Street, which manages more than $10 trillion in assets. State Street Senior Technology Officer Doug Sweetman said securities laws require the firm to conduct background checks on employees and prospective employees. (continued...)

    1 | 2 | Next Page >
    But these days, that might go beyond a criminal-history check and include scouring the Web to find blogs an applicant has written or evidence of a gambling habit or visiting hacker sites -- all of which might raise a red flag. "I don't feel any restrictions going after your blog or pulling all these data together," he said.

    One headache at State Street is the freeware that employees download and the company wants to remove as a potential security risk. Google Desktop 3.0 search software is among the programs State Street watches out for: "It allows for file-sharing and takes the file up to the Google complex," Sweetman said.

    "You've got to think about where that file is when Google indexes content," he said.

    Rootkits that hide in Windows:

    # Hacker Defender
    # FU
    # HE4Hook
    # Vanquish
    # AFX
    # NT Rootkit

    Tools that can detect rootkits:

    # PatchFinder2 and Klister/Flister, proof-of-concept tools from Polish researcher Joanna Rutkoska
    # RootkitRevealer from Sysinternals
    # Blacklight from F-Secure
    # Microsoft File Checksum Integrity Environment
    # Bootable Antivirus & Recovery Tools from Alwil Software
    # Knoppix Security Tools Distribution (open source)













    Rootkit Guru: The Evil in Sony BMG
    rootkit1 One man hidden in central Europe rivets the attention of security professionals worldwide. He calls himself holy_father. And he created Hacker Defender, the notorious rootkit used by adware, spyware, virus, digital rights management, and security professionals to bugger Microsoft Windows. Email Battles asked holy_father to weigh in on the Sony BMG copy-protection scandal. While we helped a bit with english and formatting, this is pure holy_father, so listen up


    Rootkit Guru: The Evil in Sony BMG

    Posted on 12/15/2005 @ 11:42:31 in Security.

    One man hidden in central Europe rivets the attention of security professionals worldwide. He calls himself holy_father. And he created Hacker Defender, the notorious rootkit used by adware, spyware, virus, digital rights management, and security professionals to bugger Microsoft Windows. Email Battles asked holy_father to weigh in on the Sony BMG copy-protection scandal. While we helped a bit with english and formatting, this is pure holy_father, so listen up:

    Somehow it seems modern to use the term "rootkit technology" when you talk about software hiding itself. The problem is not that Sony BMG used rootkit technology to protect their property. But I do see some problems.

    Evil 1: Changes OS Without Consent.
    There is nothing mentioned in Sony BMG's installation software about installing OS drivers that subvert the OS kernel. This is a big deal. Coding drivers is not easy stuff. If the driver is not coded very carefully, in some cases it may crash your OS very easily. So the question is whether that protection [Sony BMG's DRM software] was thoroughly tested. On multiprocessor machines, there is a big chance of crash if the driver is not coded carefully. But a user doesn't have to have a multiprocessor machine to have problems with this kind of driver.

    Evil 2: Crashes Security Products.
    Installation of a firewall, antivirus, IDS/IPS (Intruder Detection Service/Intruder Prevention Service), or other security program could cause the computer to crash if it is installed either before or after that driver from Sony BMG. All these risks should have been mentioned in the installation software. If not, it can cause a lot of headaches for a lot of people - even normal users. And of course, it can cause a lot of problems to Sony BMG then.

    Evil 3: Can't Be Uninstalled.
    There is no easy way to uninstall that software once installed. It is very hard to believe that a serious company made something that is not fully uninstallable. If the only chance for common users is to reinstall their whole OS or to pay technical support to uninstall that stuff in combination with what I mentioned before (possible problems with later installations of security software), it could be a big problem for a lot of people again.

    Evil 4: Triggers False Positives.
    Sony BMG's software is identified as malicious by security software. This is partially Sony BMG's problem and partially a problem triggered by security software vendors. You can imagine a situation in some big company with a high level of security when the local admin finds malicious software on an employee's workstation. That could cause this employee to be fired immediately.

    Email Battles' staff is willing to bet that Sony BMG lawyers will be scrubbing this mess long after Sony and BMG execs delete each other from their Christmas card lists.


    Background:

    * Anti-Virus Solution: More Anti-Virus; Email Battles; 9 November 2005.
    * The Death of Sony BMG; Email Battles; 15 November 2005.
    * Hacker Defender; holy_father.
    * How To Dig Out Rootkits; Email Battles; 22 March 2005.
    * P2P Safer Than Buying The DVD; Email Battles; 11 November 2005.
    * Rootkit Guru: Win 9x/ME Are Hopeless; Email Battles; 13 December 2005.
    * Rootkitters Lay in Wait for Vista 2006; Email Battles; 7 December 2005.
    * Signature War: Rootkits vs Antivirus; Email Battles; 19 October 2005.

    http://www.emailbattles.com/archive/battles/security_aacdffheea_jd/
     
  10. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    IF THAT DON'T HELP YOU,
    maybe this will,shes looking for her rootkit.......

    [​IMG]
     
  11. LOCOENG

    LOCOENG Moderator Staff Member

    Joined:
    Feb 4, 2005
    Messages:
    10,818
    Likes Received:
    4
    Trophy Points:
    118
  12. pyffy

    pyffy Regular member

    Joined:
    Sep 7, 2004
    Messages:
    113
    Likes Received:
    0
    Trophy Points:
    26
    Rootkit or contact lens? either way form an orderly queue behine ME to help her look ;-)
     
  13. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    update on Afterdawn Complaint Department

    [​IMG]
     
  14. ireland

    ireland Active member

    Joined:
    Nov 28, 2002
    Messages:
    3,451
    Likes Received:
    15
    Trophy Points:
    68
    good news


    EU overturns Sony/BMG merger

    Aftershocks are still being felt throughout the music industry as the EU's Court of First Instance overturned 2004's Sony/BMG merger last Friday (read the decision). The court, which has also adjudicated parts of the Microsoft antitrust case, administered a major smackdown to the European Commission, the group that first approved the merger.


    go here
    http://forums.afterdawn.com/thread_view.cfm/23/295688#2185319
     
  15. billybob

    billybob Regular member

    Joined:
    Jan 30, 2006
    Messages:
    904
    Likes Received:
    0
    Trophy Points:
    26
    Ill read all that in the morning ireland.
    Right now its 12:19am and im really tired!

    Thanks mate.
     
  16. hawthorne

    hawthorne Member

    Joined:
    Dec 28, 2004
    Messages:
    39
    Likes Received:
    0
    Trophy Points:
    16
    My bitch for today is this; Why are there people out there that find it their sole purpose in life to create viruses, trojen horses, rootkits, malware, spyware, worms, etc.... so that I can spend endless hours trying to keep my system protected from their crap, and spend a bucket of $$$ in the process?

    Some would say it's a conspiracy by the anti-virus companies to generate profits. I'm not leaning that way though. I think these wankers just get off on f-ing with all of us.

    Ahhh, that feels better. Have a nice evening.
     
  17. arniebear

    arniebear Active member

    Joined:
    Jan 2, 2005
    Messages:
    7,191
    Likes Received:
    0
    Trophy Points:
    96
    @hawthorne

    I join in your bitch and echo every sentiment your expressed. Now I feel much better too :)
     
  18. gerry1

    gerry1 Guest

    @Ireland...loved your complaint button. I think I'll fashion one for the office; I'll have to add a safety feature though as some dope is sure to push it.

    @billyboy...nice to see you back! I see that you're as shy and quiet as ever LOL!
     
  19. hawthorne

    hawthorne Member

    Joined:
    Dec 28, 2004
    Messages:
    39
    Likes Received:
    0
    Trophy Points:
    16
    It's kinda like this

    [​IMG]

    Unfortunitly we don't get to play the lil devils role in this game.
     
  20. hawthorne

    hawthorne Member

    Joined:
    Dec 28, 2004
    Messages:
    39
    Likes Received:
    0
    Trophy Points:
    16
    Or possibly like this


    [​IMG]
     
Thread Status:
Not open for further replies.

Share This Page