User Name: Password:
New User Registration
Moderator: toedder 
 Computers

Have computer questions, hints, or tips?

BBW's Tips on how to speed up page load the brainking site
Computers (BIG BAD WOLF, 2007-03-12 20:16:01)


Messages per page:

What is new about blu-ray?
List of discussion boards
You are not allowed to post messages to this board. Minimum level of membership required for posting on this board is Brain Pawn.
Mode: Everyone can post
Search in posts:  

11. May 2004, 00:41:59
Lythande 
<Google it. There's a sh*tload of links. ;>

2. May 2004, 22:31:26
Lythande 
Harley: One could edit the registry, but that's not something that should be done by the casual user. TweakUI might help, but I don't know if it comes in a flavour compatible with your friends computer, since you didn't mention the OS. Outhouse is a PITA to make behave, especially when you have the audacity to not use Bill Gate's favourite.

18. April 2004, 03:16:07
Lythande 
Subject: <Re: (_) | N > Kb
Actually (I think I forgot the b) it was coffee (or beer or whatever) piped through Nose into (or onto) Keyboard. ;)

13. April 2004, 12:15:21
Lythande 
<(_) | N > K

13. April 2004, 11:36:21
Lythande 
lol

13. April 2004, 10:58:17
Lythande 
<You may have to do it from DOS, which in the newer M$CRap products is a lot harder than it used to be, which is why I still have 95OSR2 and will have until debian gets installed. ;>

24. March 2004, 09:24:20
Lythande 
Subject: Re: hackers vs security experts
Oooh.. sounds like so much fun... could be my chance to be that quiet little fly-on-wall and watch fishy and rek in live action, throwing around their b---- erm.. *blushes* nevermind 'notherstory.. Except that now I think they're both certified security experts and as to hacking, the less said, the better.

13. March 2004, 08:02:38
Lythande 
Subject: Re: Spyhunter
File transfer protocol, yes (part of the tcp/ip suite). Web-page constructor, no. Though it is often used to -upload- 'pages' (or files), so I suppose you could say it aids in the construction of sites. It's simply a means of (gasp!) transfering files from one machine to another. :)

12. March 2004, 20:14:29
Lythande 
What has ftp clients to do with spyware or the removal thereof?

26. February 2004, 10:51:09
Lythande 
I dont'use quicken (or have it installed), so I've no idea what the .exe is named. I wondered about that myself, but didn't check. I will say this, again, though. Do not open _any_ attachment unless you know exactly what it is, and if it's a pif, dll, exe, bat, com, vb (and a slew of other application type files), use a -good- antivirus to scan it with -first-. Always be aware that even your best friend could be affected by a worm propogating itself without their awareness. And if you -don't- run an antivirus program and you run windows, the same goes for you. There are more ways to contract unfavorable code than just opening the wrong email attachment. And the further we advance, more 'methods' are discovered every day.

25. February 2004, 12:03:33
Lythande 
Subject: Re: Lythande
What happens with the stolen passwords depends on what the theif wants to do with them, if anything. :/ The other 'check' was probably testing your ports. Password stealers can be some type of keystroke capture program which sends it's data to a particular place (ftp/http location, email address, irc channel, whatever). Passwords can be located in a variety of different files (cookies, pwl files 'wallet' files, etc. They're supposed to be encrypted, but windows encryption is notoriously inept.

The fact that your machines share a router does not necessarily mean they're all corrupted, but they could be, especially if you share files or programs between them. All of them should be checked, and disinfected if necessary.

If by 'wipe out everything and start from scratch' you mean a low-level format of all drives and re-installation of everything from CD, you should be safe. Just be sure when you re-load you include an up-to-date antivirus program. :)

25. February 2004, 08:40:34
Lythande 
Subject: Re: Lythande
These files are major programs, but if you have the disks you could replace them. The problem is that most trojans deposit other programs onto your system (often hidden) which carry out their 'dirty work' (or 'payload'). Your entire system needs 'disinfected'. PWSteal.Trojan (PassWord steal) tells me you also need to change every password you use, right down to the one you use to log on to your ISP.

A good antivirus can often 'disinfect' files, but sometimes it is necessary to delete these files and replace them from a non-contaminated CD. You may have to reinstall quicken and others from your windows CD. You -must- keep your antivirus program updated, otherwise new virii (which are released daily) can slip past your defenses.

NEVER open an email attachment without checking it first, even when it appears to be from a trusted source. They may be infected and don't yet realize it.

The links I gave you will often have detailed instructions for disinfecting your system from certain virii, but it sounds like you are infected with more than one. If you are unsure of your abilities, then you need to find someone who knows what they're doing to help you clean your system.

24. February 2004, 21:54:19
Lythande 
Subject: Re: DVD Player
Please! :)

24. February 2004, 21:15:42
Lythande 
usually you won't find them 'by name'. Your best bet is to find a good anti-virus program. And just for future reference, here are some good links to check out if you think you have (or hear about) a virus:

Virus information
Hoax information
Virus Descriptions

3. February 2004, 21:25:49
Lythande 
<You could just install debian. :> <ducks>

3. February 2004, 10:37:18
Lythande 
<Do you have a link to that story? :>

2. February 2004, 05:22:50
Lythande 
That's because it loads the page as it reads it. I believe IE renders the whole page before displaying any of it, which is one of the reasons it seems so slow sometimes. (I say, "I believe," because I haven't used IE (or even had it on my machine) in about six or eight years... other than at my brother's house, and that's rarely.)

9. January 2004, 07:59:06
Lythande 
Subject: Re:
All that means is that you're setting the attributes of the file non-hidden, -read-only, and -system all at once. :)

8. January 2004, 19:59:20
Lythande 
Subject: Re: deltree
If they're +h files, you may have to attrib -h -r -s first (though some of those may not apply, it can't hurt). Not sure how 98's 'dos' works with that.

8. January 2004, 19:56:51
Lythande 
Be careful using the /y switch. Like BBW said, if you make a mistake, you could be in big trouble. Deltree works just as well if you leave off the /y, and you can -read- what tree you're about to delete, giving you a chance to double-check and change if necessary.

8. January 2004, 19:28:36
Lythande 
Harley: Were you at a DOS prompt, and exactly what command did you type?

Date and time
Friends online
Favourite boards
Fellowships
Tip of the day
Copyright © 2002 - 2024 Filip Rachunek, all rights reserved.
Back to the top