Jump to content

ShyWriter

Spam Hunters
  • Posts

    5,501
  • Joined

  • Last visited

Reputation

0 Neutral

About ShyWriter

  • Birthday 12/17/1943

Profile Information

  • Location
    TampaBay, FL
  • Interests
    Staying alive. ;)

Recent Profile Visitors

180,843 profile views
  1. @DD, They now make bullets that can penetrate duct tape as well as Saran Wrap, even if used together.. @FF I've seen that particular rifle setup in several action movies.. It's sweet.. And if you have enough enemies, well worth the $27,000. *grin*
  2. . You need to read the EULA that came with your software. It's the LICENSE.RTF file in the main Malwarebytes Anti-Malware directory. You had to AGREE with its terms when you did the install or the install would have ceased. I think this part of the EULA might cover it.. even for the older versions.. 2. Ownership. Each copy of the Software is licensed, not sold. For purposes of this Agreement, the terms “purchase,” “sell” and like terms refers to purchase or sale of a license to use the Software and not to a purchase or sale of title to or ownership of any rights or other interests in the Software. You own the media on which the Software is recorded, but you acknowledge and agree that Malwarebytes retains ownership of the Software itself and any related data or databases used by Malwarebytes or the Software (the “Database”), including all intellectual property rights therein. The Software and Database are protected by U.S. copyright law and international treaties. You will not delete or in any manner alter the copyright, trademark, and other proprietary rights notices or markings appearing on the Software as delivered to you. Malwarebytes reserves all rights in the Software and Database not expressly granted to you in this Agreement. Steve
  3. Weird.. since you changed the server IP, putting keepsthelightson.vpsboard.com in VT to do an analysis takes one to the admin page of the server (keepsthelightson.vpsboard.com) for login.? I'll stay out of this as I haven't a clue.. I just showed what the user that originally complained to you was seeing.. Which is no longer the case. Sorry for any insinuations my original research showed. Malwarebytes actually is fairly fast in resolving these problems. Steve Who may one day learn to stay out of other peoples' business.
  4. You are correct on being blocked. VT scan shows 0/63 *but* NoScript has a hissy fit along with MBPro.. Plus you are on 3 DNS Blacklists as a SPAMMER. (This is only research I did; I don't work here so don't yell at me ) See attachments: Just an FYI, Steve
  5. . ‘Like Cutting Off a Limb to Save the Body’ Brian Krebs | 3 August 2015 This author has spent many years chronicling the exploits of black hat spammers who use hacked computers to relay junk email. But I’ve dedicated comparatively little time delving into ways of email marketers who technically follow U.S. anti-spam laws yet nevertheless engage in spammy practices. The latter is able to ply their trade because there are thousands of Internet hosting companies operating on thin profit margins that are happy to host spammy but lucrative clients. This is the story of how one hosting company heroically kicked out all of its email marketing customers at great expense and ended up building a stronger, more profitable company in the process. A serial entrepreneur as a young teenager, Peter Holden founded several online companies by the time he turned 20 and started Tulsa, Okla.-based hosting firm HostWinds. The company grew modestly but steadily — relying on more than two dozen servers and bringing in revenues of about $15,000 per month. That is, until Holden got his first email marketing client who offered to double HostWind’s monthly income in one day. That one client’s business would not only double HostWind’s income, but it gave the company much-needed funds to invest in building out the firm’s technical infrastructure. Good thing, too, because the email marketing client soon referred more e-mailers to HostWinds, which was forced to petition the American Registry for Internet Numbers (ARIN) for thousands of additional Internet addresses to accommodate its new clientele. All of them swore up and down that they were following U.S. anti-spam laws to the letter. The CAN-SPAM Act was intended to make it more expensive and difficult for email marketers and spammers to send unsolicited junk email, but critics say it is essentially toothless and rarely enforced. Under CAN-SPAM, commercial emails can’t be spoofed (i.e., the address in the “from;” field can’t be faked or obfuscated), and the messages must give recipients a simple way to opt-out of receiving future missives. HOW MANY SPAMS CAN A SPAMMER SPAM IF A SPAMMER CAN-SPAM SPAMS? From the perspective of anti-spam groups, the main problem with the CAN-SPAM act is that it doesn’t require marketers to get opt-in approval from people before spamming them. Also, many large-scale junk email operations are not too dissimilar from spam campaigns run by cybercrooks — except instead of routing the mail through PCs that have been seeded with malware, commercial emailers send email from huge numbers of distinct Internet addresses that they rent from a vast network of hosting companies. (More:) Read the rest at: https://krebsonsecurity.com/2015/08/like-cutting-off-a-limb-to-save-the-body/#more-31399 Steve
  6. UUUUMmmmmm... Anybody think it's more Big Brother with M$ keeping your network password "encrypted" somewhere in their cloud if you *DO* allow access?? Shy
  7. . It was only a matter of time before someone would figure out how to hack TrackingPoint's Wi-Fi-connected smart rifle. TrackingPoint makes an expensive smart rifle that easily lets novices hit targets a half mile away. It lets you digitally "tag" a target, then locks the trigger until the gun is perfectly positioned to nail it. And it connects to smartphones or tablets so a buddy can view what the shooter sees in the scope. Now, two security researchers have discovered software flaws in the computerized rifle. Anyone near enough for a Wi-Fi connection to a rifle can remotely tinker with controls. In the worst case, a hacker could force a police sniper to miss while shooting directly at a hostage-taking criminal -- and hit the hostage instead. Or a hacker could simply lock the rifle's controls, rendering it useless.(More) Read the rest and see the video at: http://money.cnn.com/2015/07/29/technology/hack-smart-rifle Steve
  8. . Windows 10 Shares Your Wi-Fi With Contacts Brian Krebs | 29 July 2015 Starting today, Microsoft is offering most Windows 7 and Windows 8 users a free upgrade to the software giant's latest operating system -- Windows 10. But there's a very important security caveat that users should know about before transitioning to the new OS: Unless you opt out, Windows 10 will by default share your Wi-Fi network password with any contacts you may have listed in Outlook and Skype -- and, with an opt-in, your Facebook friends! (More) Read the complete article at: http://krebsonsecurity.com/2015/07/windows-10-shares-your-wi-fi-with-contacts/ Steve Edited to repair link
  9. Heck Ron.. I don't even have to go looking for bugs.. They always seem to find me first! On a serious note tho' I've always wished I had the skills of a master hacker (whitehat; of course) and do that kind of stuff. Kind of like Tsutomu Shimomura who caught Kevin Mitnick. (Or Walter Obrien of Scorpion Computer Services - TV show SCORPION is very loosely based on his real life) Steve, The master cracker (Saltine® with sea salt, of course)
  10. . Oh Gosh! Four Zero Day Vulnerabilities Disclosed in Internet Explorer Friday, July 24, 2015 Swati Khandelwal How many Zero-Days do you think could hit Microsoft today? Neither one nor two; this times its Four. The Hewlett-Packard's Zero-Day Initiative (ZDI) has disclosed four new zero-day vulnerabilities in Microsoft's Internet Explorer browser that could be exploited to remotely execute malicious code on victim's machine. All the four zero-days originally were reported to Microsoft, affecting Internet Explorer on the desktop. However, later it was discovered that the zero-day vulnerabilities affected Internet Explorer Mobile on Windows Phones as well. Each of the four zero-day flaws affects different components of the browser, and all are remotely... (More) Read the rest at: https://thehackernews.com/2015/07/internet-explorer-browser.html Steve
  11. I have nothing to do with Software Updates / sub-forums any more; PM "hayc59" instead; please..

  12. A reminder to all as I still get PMs for posting updates, etc, to the Software Forums. Altho' I am still shown as Forum Leader in those forums, I resigned the position of Software Updater almost a year ago and cut all ties to the remaining Moderator as well as the Forums. Anything you find there that is wrong, broken or not updated needs a PM sent to hayc59 *directly* as I am simply a regular member with no "powers" to change/update anything nor does the PM section have a "forward PM" function. Thank you, Steve
  13. Adobe has released the patch: Flash Version 18.0.0.203 https://get.adobe.com/flashplayer/
  14. . Adobe to Patch Hacking Team’s Flash Zero-Day Brian Krebs | 7 July 2015 Adobe Systems Inc. said today it plans to issue a patch on Wednesday to fix a zero-day vulnerability in its Flash Player software that is reportedly being exploited in active attacks. The flaw was disclosed publicly over the weekend after hackers broke into and posted online hundreds of gigabytes of data from Hacking Team, a controversial Italian company that's long been accused of helping repressive regimes spy on dissident groups.(More...) Read more at: http://krebsonsecurity.com/2015/07/adobe-to-patch-hacking-teams-flash-zero-day/ Steve
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.