From: Dustin Cook on
~BD~ <BoaterDave(a)hotmail.co.uk> wrote in
news:C_edndT4OMbLSyXWnZ2dnUVZ7tmdnZ2d(a)bt.com:

> Beauregard T. Shagnasty wrote:
>> ~BD~ wrote:
>>
>>> TRT said
>>
>> Stop calling him "TRT". He is the exact opposite of the real truth.
>>
>> Have you bothered to do this?
>> http://www.google.com/search?q=pcbutts1+software+thief
>>
>> <quote>
>> From: "Intellectual Property and Licensing
>> Group"<[cut]@microsoft.com> To: "'pcbutts1'"
>> Sent: Monday, March 09, 2009 9:05 PM
>> Subject: RE: Logo use
>>
>> Please provide us your name to verify in our system.
>> </quote>
>>
>
> BTS - I have read everything anyone and everyone has thrown in front
> of me telling me that 'he/she' is one of life's bad guys. What I have
> read may, or may not, be true.

Fair enough. If it was published by the national inquirer (probably
spelled wrong, I don't care), I'd respect your view. However, in this
case, many many reputable sites are complaining about PcButts. Myself and
others have witnessed *and caught him* in the act of code theft (research
: pcbutts and rot13). So it goes beyond opinion to fact.

> Whilst I may have missed it, I didn't see anything on 'his/her' web
> site which stated that the picture of a blonde woman was a true
> representation of the MVP in question. Maybe it's there simply to
> cheer up an otherwise rather dull page!

Then you missed it. Chris has been trying to convince people he's a
female model for awhile now; Several threads were started about it. I
know it's a waste of time for me to even say this again, but I'd suggest
you do more reading about your idol and less posting. You might learn
what a tool you are.

> What you *think* you know from your Internet research may be totally
> incorrect - there really is no way of *knowing* the truth on line.

The internet isn't like religion where "faith" is a requirement. You can
know the absolute truth about someone here.

> Just remember, it was *you* who refused to have email contact with me,
> though of what you were afraid I have absolutely no idea. Mr Lipman
> will agree that email is a somewhat 'safer' medium than Usenet!

I can't speak for Dave, but I at one point took the bait and responded to
several of your emails; and as you can see, this is the end result of it.
I don't blame David for not wanting to take the same road.

> Happy Easter to you, regardless!

And to you as well, Dave.




--
"Hrrngh! Someday I'm going to hurl this...er...roll this...hrrngh..
nudge this boulder right down a cliff." - Goblin Warrior

From: ~BD~ on
FromTheRafters wrote:

> ...as a side note, I read somewhere, about a month ago, that 80% of the
> most popular legitimate websites had served up malware within that one
> week period. IIRC it was mostly through advertisements that they had
> hosted.
>
>

I read that too. I posted relevant article - the second post in this
thread - but maybe David was too distracted/frustrated to read it!

--
Dave
From: gufus on
Hello, ~BD~!

You wrote on Sun, 04 Apr 2010 18:55:23 +0100:

| I'm unsure of the point you were making, but it's good to meet you! ;)

What I was doing was teasing David Kaye, <evil grin>..

Nice to meet you too! have a /SUPER/ Easter. :-)
--
With best regards, gufus. E-mail: stop.nospam.gbbsg(a)shaw.ca


From: gufus on
Hello, David!

You wrote on Sat, 3 Apr 2010 20:13:30 -0400:

| The two are drinking the same K00laide.

Wobblypop's
|


--
With best regards, gufus. E-mail: stop.nospam.gbbsg(a)shaw.ca


From: Ant on
"David Kaye" wrote:

> "Ant" wrote:
>>You didn't say which browser was involved. Is it up-to-date? What
>>plugins and other applicatiuons are used as helpers to view embedded
>>content and are they sercurely configured and up-to-date? Think about
>>Java (not javascript), PDF and Flash viewers, ActiveX components and
>>other media players. Do you allow them to run automatically?
>
> Again, this particular computer is set up to imitate real world scenarios as
> are present in my customers' computers.

So that would be insecurely and typically lacking the latest (or any)
third party software updates or patches for bug fixes. They might be a
little better protected with Vista or Win7 if they haven't disabled
the nags.

> Prior to the infection I had visited
> several websites from Google links. I did not click on anything within those
> web pages. I don't recall if there was a pdf among the stuff I looked at or
> not. My machine is set up top warn about ActiveX, but not Java, Flash, or
> pdfs. However, downloading of exe and dll files should be triggering
> *something* to warn me.

You still haven't stated which browser and you don't need to click to
be infected. In the last few days there have been updates for IE6 & 7,
Firefox, Quicktime & Itunes and Foxit PDF reader. All of them correct
exploitable vulnerabilities. Take a look at http://isc.sans.org/

To convince yourself to not allow PDF files to display automatically
see the article "PDF Arbitrary Code Execution - vulnerable by design"
at isc.sans.org. Foxit have corrected it but Adobe Acrobat is probably
still vulnerable. In fact malicious PDFs, which are frequently used,
often don't display at all but just run code.

If you want some warning it's best to to have the appropriate OS
security policies and logging in place. Firewalls are usually only
concerned with network connections, not what you allow to run.

The only way you can find out what causes a problem like this is to do
an immediate investigation of all the recent HTTP (and perhaps other
protocol) requests and examine any cached pages, scripts, Java .jar
and .class files, etc when it happens so you can track down the bad
site and what exploit was used.

> As someone suggested, perhaps something else is being renamed as an exe.

An executable named temp.tmp, for example, is easily run without being
renamed by using the right API magic.

> I did notice one thing that may be a clue. I couldn't run exe files any
> longer until I entered the exe extension in the filetypes section to replace
> what had been there. This was after the registry rollback, so I'm not sure
> where the exe reference was being pulled from. It should have reverted just
> like all other registry entries.

That depends how you backup/restore the registry. File associations
are stored in HKLM\software\Classes which is in the software hive in
[win]\system32\config. Then there's the individual hives (ntuser.dat)
in each user profile directory. It may be that exe association can be
overrridden from those.

Once malware is running with administrator rights it can do anything
it wants, including elevating itself to have NT authority\system
privilege. Thus it has full access to protected areas of the registry,
the hard disk and the ability to load drivers.

> So, indeed it could well be that ave.exe is really something non-exe that got
> renamed and thus wasn't detected by Windows as being bogus. I have not saved
> the ave.exe file to look at it. Perhaps I should have, but I had to use this
> particular computer and just wanted to get rid of the malware.

More important is to find the vulnerable software component that
allowed it to run.