From: Ant on
"~BD~" wrote:
> Tell me, then, about the expertise and 'qualifications' of Mr
> Lipman. I suspect that he's a 'professional' but seems reluctant to say
> so. You talk as if you *know* him!

How do you get the impression I know him from my previous post when I
never mentioned or referred to him?

As it happens, both he and I are long-time contributors to acv and
acav, he offers advice to help people clean their machines and
provides a useful tool to do that in the form of Multi-AV. So yes,
I know him on usenet and from a private forum of researchers and
anti-malware people and have corresponded with him in email. I don't
know what he does for a living or what qualifications he has and
neither do I care because the advice he gives is sound. All
indications are that he has a wide knowledge of computer security,
viruses and other malware.

As for my expertise, I've previously mentioned I'm a long-time
programmer with a particular interest in reverse engineering
malicious code. I know about the capabilities of most currently
circulating malware and popular exploits as you may have noticed from
other posts I've made to these groups. Of course, in this field it's
a constant learning experience as computer systems and software evolve
and the bay guys try out new methods.

I tend not to dispense advice about security or AV software because
that's not my area of interest or expertise and I don't use such
applications. If I have to clean infected systems I use my low-level
system knowledge and basic or specialist tools.


From: Dustin Cook on
"Ant" <not(a)home.today> wrote in
news:HvKdnUrh5o0HVEHWnZ2dnUVZ8tEAAAAA(a)brightview.co.uk:

> "~BD~" wrote:
>> Tell me, then, about the expertise and 'qualifications' of Mr
>> Lipman. I suspect that he's a 'professional' but seems reluctant to
say
>> so. You talk as if you *know* him!
>
> How do you get the impression I know him from my previous post when I
> never mentioned or referred to him?
>
> As it happens, both he and I are long-time contributors to acv and
> acav, he offers advice to help people clean their machines and
> provides a useful tool to do that in the form of Multi-AV. So yes,
> I know him on usenet and from a private forum of researchers and
> anti-malware people and have corresponded with him in email. I don't
> know what he does for a living or what qualifications he has and
> neither do I care because the advice he gives is sound. All
> indications are that he has a wide knowledge of computer security,
> viruses and other malware.
>
> As for my expertise, I've previously mentioned I'm a long-time
> programmer with a particular interest in reverse engineering
> malicious code. I know about the capabilities of most currently
> circulating malware and popular exploits as you may have noticed from
> other posts I've made to these groups. Of course, in this field it's
> a constant learning experience as computer systems and software evolve
> and the bay guys try out new methods.
>
> I tend not to dispense advice about security or AV software because
> that's not my area of interest or expertise and I don't use such
> applications. If I have to clean infected systems I use my low-level
> system knowledge and basic or specialist tools.

+1


--
"Hrrngh! Someday I'm going to hurl this...er...roll this...hrrngh.. nudge
this boulder right down a cliff." - Goblin Warrior

From: ~BD~ on
FromTheRafters wrote:
> "~BD~"<BoaterDave(a)hot.mail.co.uk> wrote in message
> news:JOSdndli_pDIk0HWnZ2dnUVZ8vqdnZ2d(a)bt.com...
>
> [...]
>
>> At that link it says - quote:-
>>
>> "When you run the fdisk command to create, delete, or change a
>> partition, all of the data on that partition is permanently deleted".
>>
>> I've always understood that to mean that any malware would be
>> destroyed too!
>
> Bad sectors (or sectors *marked* as bad) in this case might be
> considered "outside" any partition.
>
> [...]
>
>> That is my understanding too. My niggling concern has always been that
>> malware (call it what you will) might remain 'somewhere' within a box
>> ready to continue with it's malicious activity even though it's been
>> flattened and windows reinstalled (or even if a *new* hard disk has
>> been installed!).
>
> Warning - - an analogy follows:
>
> Some vaguely described monster has finally been *killed* by the monster
> hunter and you have an uneasy feeling that the monster can rise from the
> blood at the scene of the killing. Well, it ain't gonna happen, but when
> you asked an expert if an entity like that could be resurrected from its
> blood - he said yes and told you about DNA and sheep, cats, etc...
>
> The thing is, the expert wasn't asked if the entity could self-resurrect
> from the blood left behind after the killing of the monster.
>


You should try your hand at writing stories for children, FTR! :)
From: ~BD~ on
Dustin Cook wrote:

>
> Wouldn't this be more appropriate in another newsgroup? This one, and the
> ones I see you've set as followup don't really apply...
>

You are probably right, Dustin :)

Which group(s) do you suggest?

BD
From: Max Wachtel on
On Sun, 02 May 2010 04:23:31 -0400, ~BD~ <BoaterDave(a)hot.mail.co.uk> wrote:

> Which group do you suggest?

alt.usenet.kooks -you'll find some real charmers in there.
--
This post was created using Opera(a)USB: http://www.opera-usb.com
Virus Removal Instructions
http://sites.google.com/site/keepingwindowsclean/home
Max's Favorite Freeware
http://sites.google.com/site/keepingwindowsclean/freeware