martymas

Members
  • Content Count

    4314
  • Joined

  • Last visited

Posts posted by martymas

  1. hey sultan with you and skeet you both seem to be on a posting frenzy

    on g4 youve post to over half of the Q.

    and its been like that for several days .cant you sleep at night or day .

    like il_wiccan would post ha ha ha ha

    go for it .

    skeet has done the same is this the way to get the post count up.never though of that until now.wow good idea.

    take care

    marty

  2. can some one tell me if best bestteckie has a news letter.if so where do i go to subscribe to it .i was getting 3 from g4 but they are all gamers and im not into that .

    so i unsubscribed to them. i want a news letter that covers all aspects of compts

    thanks

    marty

  3. hi team just watched a animal planet discovery program .

    and it featured a touch screen monkey program where the monkey touched the screen with his [finger] [paw]what ever.and he has images to press and there was return for him which ever one he pressed

    now thve advanced this to intelectually handi capped people.and people in that category. iwas bown away by the technology in this field.

    i have a friend who is nearly blind in both eyes through diabetes

    and she has thechnology for the blind called rocket techo

    she also has audio software.thought i would share this info with members and how advanced they are

    marty

  4. i have a legal copy

    but have it installed on two different machines.i have one on a p2 and it runs quite well.

    i thought you could only install it on one legal machine.actuall i intend to install linux on the p2 i used xp to see if it would run an OS .

    because i made the p2 my self

    so not all is as it seems

    marty

  5. not sure if th9is ahs been posted or not

    marty

    1. Trend Micro Updates - Pattern File & Scan Engine Updates

    2. Frantic FILI – WORM_FILI.A (Low Risk)

    3. Microsoft Vulnerabilities (High Risk)

    4. Top 10 Most Prevalent Global Malware

    5. Trend Micro PC-cillin Internet Security 2005 Now Available

    NOTE: Long URLs may break into two lines in some mail readers.

    Should this occur, please copy and paste the URL into your browser window.

    ************************************************************************

    1. Trend Micro Updates - Pattern File & Scan Engine Updates

    ------------------------------------------------------------------------

    PATTERN FILE: 2.202.00 http://www.trendmicro.com/download/pattern.asp

    SCAN ENGINE: 7.100 http://www.trendmicro.com/download/engine.asp

    2. Frantic FILI – WORM_FILI.A (Low Risk)

    ------------------------------------------------------------------------

    WORM_FILI.A is a non-destructive worm that propagates via peer-to-peer

    applications by dropping copies of itself in default shared folders. It

    also propagates via email and Internet Relay Chat (IRC). It can disable the

    Windows Task Manager, thereby preventing an infected user from terminating

    its process. It also displays the Windows Shut Down menu (the window

    that pops out when CTRL+ALT+DEL keys are pressed) every few seconds to annoy

    the user. This worm is currently spreading in-the-wild, and infecting

    systems running Windows 95, 98, ME, NT, 2000, and XP.

    Upon execution, this worm drops a copy of itself in the Windows system

    folder as the file PILIF.EXE. It creates a registry entry that allows it

    automatically execute at every system startup.

    This worm drops copies of itself in the following folders found in the

    Program Files directory, which are default-shared folders of popular

    peer-to-peer (P2P) applications:

    \BearShare\Shared

    \BearShare\Shared\

    \Edonkey2000\Incoming

    \Edonkey2000\Incoming\

    \Grokster\My Grokster

    \Grokster\My Grokster\

    \icq\shared files\

    \Kazaa\My Shared Folder

    \Kazaa\My Shared Folder\

    \KMD\Shared Folder

    \limewire\Shared

    \limewire\Shared\

    \Morpheus\My Shared Folder

    \Morpheus\My Shared Folder\

    \Shareaza\downloads

    \WinMX\my shared folder\

    Shareaza\downloads

    It uses any of the following file names for its dropped copy, followed by

    an .EXE, .SCR, .PIF, .BAT, or .CMD extension:

    Anti-hacker Utility

    Cracks mega warez collection

    Dark Coderz Alliance

    Easy credit card validation

    Free porn sites accounts

    Kasperky AV Universal Key

    Norton 2004 crack

    Sex - totally free porn

    Webmail official hacker

    Yahoo hacker

    This worm searches for email addresses on .HTM and .HTML files found

    on the affected system. It then sends email messages to these addresses

    using MAPI. It sends email with the following details:

    Message body: (any of the following)

    Important legal notice!

    Do not delete this message. Analyse attachement and reply

    as soon as possible with manifesto details.

    Thank you!

    -------------------

    Please help us to save the right of freedom of expression!

    All details will be displayed in small attached file. Good luck and

    thank you.

    -------------------

    You personal manifesto details are attached. Take good care of them!

    -------------------

    Help us gather online votes for our anti-censore manifesto

    We need you help now! Attachement will automatically send a vote to our

    online database once you run it and will be redirected to our webpage!

    Thank you!

    -------------------

    Its curious, its scandalous... dont be so furious!

    Life is bitch so dont take it serious.

    -------------------

    Please help us be free! We need the basic right of expression.

    Enable an online vote for our manifesto with the help of the

    attachement.

    Many thanks!

    -------------------

    Music is beeing censored, journalists are afraid, law has not been

    respected for long time. Why? Because of corruption and lack of right

    of

    expression. Help us! Enable the attachement and our voting system

    will

    track and record you help. Many thanks!

    -------------------

    Parazitii need your help for the anti-censore campaign! See all details

    in the attachement. Thank you!

    -------------------

    Its just hip-hop. Nothing else. Enjoy!

    Oh yeah! one more thing: its a censore-related manifesto :)

    -------------------

    This is my manifesto. You can stop this individual,

    but you can't stop us all...after all,we're all alike.

    -------------------

    Attachment: (any one of the following, followed by an .EXE, .SCR,

    .PIF, .BAT, or .CMD extension)

    · attachement

    · details

    · freedom

    · Freedom of expression

    · Goverment issue

    · JOS CeNzurA

    · manifesto

    · Manifesto anti pilif

    · Manifesto details

    · Parazitii

    · pilif

    · Simple solution

    · stolen rights

    · sustain cause

    This worm drops a modified SCRIPT.INI file in the following folders:

    C:\mirc\

    C:\mirc32\

    C:\mirc\32

    %Program Files%\mirc\

    %Program Files%\mirc32\

    This modified IRC script sends a copy of the worm to every user who enters

    the same chatroom as the infected user. It displays the following

    message upon file transfer:

    DCA are fighting for free speech. Get their manifesto now!

    It then sends out the following file:

    Manifesto Anti Censore Pilif.txt.exe

    This worm disables the Windows Task Manager to prevent an infected user

    from terminating its process. It also displays the Windows Shut Down menu

    every few seconds to annoy the user.

    If you would like to scan your computer for WORM_FILI.A or thousands of

    other worms, viruses, Trojans and malicious code, visit HouseCall, Trend

    Micro's free, online virus scanner at: http://housecall.trendmicro.com/

    WORM_FILI.A is detected and cleaned by Trend Micro pattern file

    #2.193.14

    and above.

    For additional information about WORM_FILI.A please visit: http://www.trendmicro.com/vinfo/virusencyc...ame=WORM_FILI.A

    3. Microsoft Vulnerabilities (High Risk)

    -------------------------------------------------------------------------

    The following set of ten Microsoft vulnerabilities were published by

    Microsoft on October 12, 2004:

    MS04-029_RPC_RUNTIME_LIBRARY

    MS04-030_WEBDAV_XML

    MS04-031_NETDDE

    MS04-032_MICROSOFT_WINDOWS

    MS04-033_MICROSOFT_EXCEL

    MS04-034_COMPRESSED_FOLDERS

    MS04-035_SMTP

    MS04-036_NNTP

    MS04-037_WINDOWS_SHELL

    MS04-038_INTERNET_EXPLORER

    A more detailed discussion of each vulnerability is available on the Trend

    Micro Security Advisories page: http://www.trendmicro.com/en/security/advi...es/overview.htm

    or by reading Microsoft's Vulnerability Bulletins.

    Trend Micro advises users to patch their system against these

    vulnerabilities, and to refrain from using their system until it has been completely

    patched against these vulnerabilities.

    4. Top 10 Most Prevalent Global Malware

    (from October 8, 2004 to October 14, 2004)

    ------------------------------------------------------------------------

    1. WORM_NETSKY.P

    2. PE_ZAFI.B

    3. HTML_NETSKY.P

    4. WORM_NETSKY.D

    5. JAVA_BYTEVER.A

    6. WORM_NETSKY.B

    7. WORM_NETSKY.C

    8. WORM_ANIG.A

    9. WORM_NETSKY.Q

    10. HTML_CITIFRAUD.C

    5. Trend Micro PC-cillin Internet Security 2005 Now Available

    ------------------------------------------------------------------------

    Trend Microâ„¢ PC-cillinâ„¢ Internet Security 2005 protects your PC and

    home network against all types of viruses, worms, Trojans, and blended

    threats—including network viruses such as MYDOOM and SASSER. It also blocks

    hackers, detects and removes spyware, guards against phishing attacks,

    filters unwanted content, and minimizes spam. New features include Home

    Network Control and Wi-Fi Intrusion Detection which extends desktop security to

    your home and wireless networks.

    Key Features:

    -Comprehensive Virus Security

    -Enhanced Spyware Detection and Removal

    -Anti-Phishing –New!

    -Home Network Control –New!

    -Wi-Fi Intrusion Detection –New!

    -Improved Spam Filtering

    -Personal Firewall

    Read more about Trend Micro PC-cillin Internet Security 2005:

    http://www.trendmicro.com/en/products/desk...te/overview.htm

    ********************************************************************************

    ***

    ______________________________________________________________________

    This message was sent by Trend Micro's Newsletters Editor using Responsys

    Interact .

    To unsubscribe from Trend Micro's Newsletters Editor:

    http://trendnewsletter.rsc03.net/servlet/o...RFpgLmDgLmDgSE0

    To update your subscription preference, or to change your email address:

    http://trendnewsletter.rsc03.net/servlet/w...kNlyLihkm_UT_UY

  6. hi team just been to g4 .

    and i had a pm from some one ive never heard of before.asking me to click on a link.for gaming..my Q has any one else experienced this.

    does any one get pm's from unknown people.i wondered if the person was targetting people at will.i deleted it because im not a gamer and because i dont open pm"s from some one im not sure off.

    am i being over precautious or. can we strike trouble by opening pm links.

    perhaps im having a suspicious day

    thanks

    marty

  7. hey i like that some thing different .

    when i first joined g4 i think masta matt posted a sound audio made up of microsoft applis from the windows sound sys.it was really clever.i put it on a disk but cant find it at the moment.

    marty

  8. yes ram can be the cause.one bad stick can send the others over the hill as well.

    not sure if the make is any different i had a 100 and a 133 in the slots.

    and friends said it wouldnt work at the time i wasn experienced enough to know better.however i put them in and they worked fine still got them in a p2

    and ile keep them there .sorry they are both 128mgs

    so what workds for some may not work for others

    good luck ghorjus.

    marty

  9. hi team sorry i havent been able to get back to this thread for some time.i made the mistake of installing the beta version .that was some time ago now when i was a member of techtv.and i had heaps of trouble with it .

    at the time i posted to the c.f.h board.

    and petecovell answered and said as a new user wait until some one else test the beta version .some one with more knowledge than you .once it is tested than install it.and i found those were very wise words .

    i havent used a beta version of any appli since .

    strangly i havent tried to use any of foxes.i have my hands full trying to use IE.

    so the point of my original p[ost was these browsers are starting to become popular,and obviously as they become targets for the sadist

    marty

  10. did this come with sp2 .

    if you go to the windows update and insrall the DIRECTX RUNTIME.with sp1. with sp2 i think ti is installed automatically

                                                        marty

    hi if you go to winupdate.type directx runtime in the search bar there are plentyof options in there you can choose what you need to fix your problem

    marty

    sorry bout the double post

    lm

  11. hi team ive been off the board for several days so im not sure if this ahs been posted or not.just to make sure here goes

    marty

    To read an HTML version of this newsletter, go to:

    http://www.trendmicro.com/en/security/report/overview.htm

    Issue Preview:

    1. Trend Micro Updates - Pattern File & Scan Engine Updates

    2. Bag it Up – WORM_BAGZ.A (Low Risk)

    3. Top 10 Most Prevalent Global Malware

    4. Test Your Knowledge - Complete the Virus & Security Crossword Puzzle

    5. Attend our Webinar - "Protect Your Enterprise from Web-based

    Attack"**

    NOTE: Long URLs may break into two lines in some mail readers.

    Should this occur, please copy and paste the URL into your browser window.

    ************************************************************************

    1. Trend Micro Updates - Pattern File & Scan Engine Updates

    ------------------------------------------------------------------------

    PATTERN FILE: 2.192.00 http://www.trendmicro.com/download/pattern.asp

    SCAN ENGINE: 7.100 http://www.trendmicro.com/download/engine.asp

    2. Bag it Up – WORM_BAGZ.A (Low Risk)

    ------------------------------------------------------------------------

    WORM_BAGZ.A is a memory-resident, mass-mailing worm uses SMTP (Simple

    Mail

    Transfer Protocol) to propagate. It arrives as an attachment to an email

    with

    a spoofed From field and varying subjects, message bodies, and attachment

    file

    names. This non-destructive worm also drops multiple components in the

    Windows system folder upon execution. It runs on Windows 95, 98, ME, NT,

    2000

    and XP, and is currently spreading in-the-wild.

    Upon execution, this worm drops the following files in the Windows system

    folder:

    DRIVERS\NDISRD.SYS

    DL.EXE – downloads and executes a file from a remote site

    IPDB.DLL

    JOBDB.DLL

    NDISAPI.DLL

    NDISRD.SYS

    SYSLOGIN.EXE – a mass-mailing component of this worm

    TUTORIAL.DOC<numerous space characters>.EXE – a copy of this worm

    TUTORIAL.ZIP - a .ZIP archive that contains the file

    TUTORIAL.DOC<numerous

    space characters>.EXE

    It also adds a registry entry that allows it to automatically execute at

    every

    system startup, and uses Simple Mail Transfer Protocol (SMTP) to send

    multiple copies

    of itself.

    It arrives on a system as an attachment to an email with following

    details:

    From: <spoofed>

    Subject: (any of the following)

    [Fwd: Broken link]

    big announcements

    building maintenance

    Cost Inquiry

    Deactivation Notice

    failure notice

    find a solution with this customer

    Fwd: Password

    Fwd: Your Funds are Eligible for Withdrawal

    Knowledge Base Article

    last request before refunding

    Message recieved, please confirm

    My funny stories

    Need help pls

    No Subject

    Open Invoices

    Order Approval

    progress news

    Questions

    Re: Help Desk Registration

    Re: payment

    RE: quote request

    RE: Re: A question

    Re: User ID Update

    referrences

    Returned mail: see transcript for details

    troubles are back again

    units available

    Webmail Invite

    What is this ????

    when should i call you?

    WinXP

    You have recieved an eCard!

    Message body: (any of the following)

    ***URGENT: SERVICE SHUTDOWN NOTICE***

    Due to your failure to comply with our email

    Rules and Regulations, your email account has been

    temporarily suspended for 24 hours unless we are contacted regarding this

    situation. You must read the attached document for further

    instructions. Failure

    to comply will result in termination of your account.

    Regards, Net Operator

    ***URGENT: SERVICE SHUTDOWN NOTICE***

    ***ATTENTION: YOUR EMAIL IS NOT BEING DELIVERED!***

    You are currently unable to send emails.

    This may be a billing issue.

    Please call the billing center.

    The # for the billing office is located in the attached

    contact list for your convenience.

    ***ATTENTION: YOUR EMAIL IS NOT BEING DELIVERED!***

    ***YOUR MESSAGE HAS BEEN RECOGNIZED AS SPAM***

    Hello

    The previous email you sent has been recognized as spam.

    This means your email was not delivered to your friend or client.

    You must open the attached file to receive more information.

    ***YOUR MESSAGE HAS BEEN RECOGNIZED AS SPAM***

    Hello,

    What version of windows you are using?

    This last document I received from you came out weird.

    Please see the attached word file and resend the file to me.

    Many thanks,

    User

    Hello,

    My PC crashed while I was sending that last email.

    I have re-attached the document of yours that I discovered.

    Please read attached document and respond ASAP.

    Sincerely,

    User,0

    Hello,

    Your email was sent in an INVALID format.

    To verify this email was sent from you,

    simply open the attached email (.eml) file

    and click yes in the sender options box.

    Thank You,

    User

    Hello,

    Your email was received.

    YOUR REPLY IS URGENT!

    Please view the attached text file for instructions.

    Regards,

    User

    Hello,

    I was in a hurry and I forgot to attach an important

    document. Please see attached.

    Best Regards,

    User

    Hello,

    I resent this email as attachment because

    it was previously blocked by your email filters.

    Please read the attachment and respond.

    Thanks,User

    Hello,

    Sorry, I forgot to attach the new contact information.

    Please view the attached (.pdf) contact sheet.

    Sincerely,

    User

    Attachment: (any of the following)

    ACCOUNT.DOC<numerous space characters>.EXE

    ACCOUNT.ZIP

    ARCH.DOC<numerous space characters>.EXE

    ARCH.ZIP

    ARCHIVE.DOC<numerous space characters>.EXE

    ARCHIVE.ZIP

    ATACH.DOC<numerous space characters>.EXE

    ATACH.ZIP

    ATT.DOC<numerous space characters>.EXE

    ATT.ZIP

    CONTACT.DOC<numerous space characters>.EXE

    CONTACT.ZIP

    DB.DOC<numerous space characters>.EXE

    DB.ZIP

    DOCUMENTS.DOC<numerous space characters>.EXE

    DOCUMENTS.ZIP

    FILE.DOC<numerous space characters>.EXE

    FILE.ZIP

    MAIL.DOC<numerous space characters>.EXE

    MAIL.ZIP

    MESSAGE.DOC<numerous space characters>.EXE

    MESSAGE.ZIP

    MESSAGES.DOC<numerous space characters>.EXE

    MESSAGES.ZIP

    MSG.DOC<numerous space characters>.EXE

    MSG.ZIP

    READ.DOC<numerous space characters>.EXE

    READ.ZIP

    README.DOC<numerous space characters>.EXE

    README.ZIP

    SUPPORT.DOC<numerous space characters>.EXE

    SUPPORT.ZIP

    WARNING.DOC<numerous space characters>.EXE

    WARNING.ZIP

    If you would like to scan your computer for WORM_BAGZ.A or thousands of

    other worms, viruses, Trojans and malicious code, visit HouseCall, Trend

    Micro's free, online virus scanner at: http://housecall.trendmicro.com/

    WORM_BAGZ.A is detected and cleaned by Trend Micro pattern file

    #2.189.04

    and above.

    For additional information about WORM_BAGZ.A please visit: http://www.trendmicro.com/vinfo/virusencyc...ame=WORM_BAGZ.A

    3. Top 10 Most Prevalent Global Malware

    (from October 1, 2004 to October 7, 2004)

    ------------------------------------------------------------------------

    1. WORM_NETSKY.P

    2. HTML_NETSKY.P

    3. PE_ZAFI.B

    4. WORM_NETSKY.D

    5. JAVA_BYTEVER.A

    6. WORM_NETSKY.C

    7. WORM_ANIG.A

    8. WORM_NETSKY.DAM

    9. WORM_NETSKY.B

    10. HTML_CITIFRAUD.C

    4. Test Your Knowledge - Complete the Virus & Security Crossword Puzzle

    -------------------------------------------------------------------------

    So, you think you know about computer viruses? Test your virus and

    security

    knowledge with our crossword puzzle:

    http://www.trendmicro.com/en/security/report/puzzle.htm

    Curious about how well you did? You may view and download the answers to

    the

    crossword puzzle here:

    http://www.trendmicro.com/en/security/report/answer-key.htm

    5. Attend our Webinar - "Protect Your Enterprise from Web-based

    Attack"**

    ------------------------------------------------------------------------

    Trend Micro invites its U.S. and Canadian Enterprise customers to

    attend a

    free, one-hour webinar on October 14 at 11:00 am PST, entitled “Protect

    Your

    Enterprise From Web-based Attack: Viruses, Spyware, Phishing, and

    Employee

    Misuseâ€.

    During this informative webinar Jack Marsal, Senior Product Marketing

    Manager

    for Trend Micro’s Enterprise Messaging, IMSS/SPS, and IWSS products

    will

    discuss:

    *The nature of Internet-based attacks (phishing, spyware and viruses), and

    why

    they are growing faster than any other type of threat

    *The latest innovations being applied by virus writers and other authors

    of

    malicious code

    *How you can efficiently protect your enterprise from Internet-based attacks

    Mr. Marsal has more than 16 years of experience in messaging, IT

    infrastructure management, and security. His real-world understanding provides a

    rich

    background of case histories of the success and failure of different

    security

    strategies over the years.

    To register for this informative webinar, please visit: http://trendmicro.webex.com/trendmicro/ons...hp?MK=761736485

    **For residents of the U.S. and Canada only.

    ********************************************************************************

    ***

    ______________________________________________________________________

    This message was sent by Trend Micro's Newsletters Editor using Responsys

    Interact .

    To unsubscribe from Trend Micro's Newsletters Editor:

    http://trendnewsletter.rsc03.net/servlet/o...RFpgLmDgLmDgSE0

    To update your subscription preference, or to change your email address:

    http://trendnewsletter.rsc03.net/servlet/w...pkNlyLihkm_UT_B

    To view our permission marketing policy:

    http://www.rsvp0.net

    Copyright 1989-2004 Trend Micro, Inc. All rights reserved

    Trend Micro, Inc., 10101 N. De Anza Blvd., Suite 200, Cupertino, CA

    95014