Jump to content

max power

Members
  • Posts

    16,115
  • Joined

  • Last visited

  • Days Won

    80

Everything posted by max power

  1. Its a bad one. The unit is now in the hospital fighting for its life. She is being operated on by one of the best IT surgeons that beer can buy. Please pray for my sweet old HP. Stupid Hackers!!
  2. Damn Kid, you fuckered that bike (& yourself) up good. Is the deer strung up in the barn?
  3. You mudafuckas just blew my mind. I'm calin in the cavalry. The OP.
  4. I ran the superantispyware and I think it removed the trojan, but now the desktop is fuckored. It wont even see the internet. It instantly says Firefox cant find the server at..... whenever I try to goto anything. I also tried to look at the router and it cant find that either. Any ideas or do I need to call in a professional? Casper! I got beeeeeeeer.
  5. max power

    Brass Balls

    The shit.... http://fruitfly.files.wordpress.com/2007/10/shit_fan.jpg (crap, stupid iBook) has hit the fan.
  6. I'm in, lets do this!! Oh shit, nevermind, its 10:00pm.
  7. Nobody's mad bubby. Are you? Need a hug?
  8. I was going to say that I know you are in IT and you were beating your chest about it with your yelling and telling me to jump and what not and I do have a sense of humor and sarcasm, but you were being a dick about it, so I mirrored your dickishness. But T says it well here. Thanks T. And yeah, Ben can attest that I'm no PC expert. I'm just a bubby with a problem asking my peers for some options.
  9. I called you bubby because you are being a bubby, bubby. I have symantec because it was free and was installed by a good friend who is also a fuckin IT genius like I'm sure you are. If you know of something better and free, stop beating your chest and post it up.
  10. So, should I turn system restore back on?
  11. I quarantined it. Its a javantnt.dll file and it looks like its location is c:\windows\system32\javantnt.dll
  12. How do I know when its done? Some fuckin solicitor called while it was running and by the time I got done speaking in tongues to him it was gone. The trojan is still showing up on a quick scan.
  13. max power

    Wow.

    Guests surfing our RedBaron pics.
  14. I was actually looking for a picture of the Loch Ness Monster needing tree fiddy on Google.
  15. cuz this told me to: http://www.symantec.com/security_response/writeup.jsp?docid=2001-062614-1754-99&tabid=3
  16. All I know is this: http://www.symantec.com/security_response/writeup.jsp?docid=2001-062614-1754-99&tabid=3 Backdoor.Trojan Risk Level 1: Very Low Printer Friendly Page SUMMARY TECHNICAL DETAILS REMOVAL Discovered: February 11, 1999 Updated: May 6, 2002 3:37:23 PM Type: Trojan Infection Length: Varies Systems Affected: Windows 98, Windows 95, Windows XP, Windows Me, Windows Vista, Windows NT, Windows Server 2003, Windows 2000 Backdoor.Trojan is a detection name used by Symantec to identify malicious software programs that share the primary functionality of enabling a remote attacker to have access to or send commands to a compromised computer. As the name suggests, these threats are used to provide a covert channel through which a remote attacker can access and control a computer. The Trojans vary in sophistication, ranging from those that only allow for limited functions to be performed to those that allow almost any action to be carried out, thus allowing the remote attacker to almost completely take over control of a computer. A computer with a sophisticated back door program installed may also be referred to as a "zombie" or a "bot". A network of such bots may often be referred to as a "botnet". Botnets have been well publicized in the news over the years, with different instances being given specific names such as Kraken, Mariposa, or Kneber, along with claims of hundreds of thousands of nodes belonging to certain networks. Typical back door capabilities may allow a remote attacker to: Collect information (system and personal) from the computer and any storage device attached to it Terminate tasks and processes Run tasks and processes Download additional files Upload files and other content Report on status Open remote command line shells Perform denial of service attacks on other computers Change computer settings Shut down or restart the computer Backdoor Trojan horse programs have become increasingly popular amongst malware creators over the years because of the shift in motivation from fame and glory to money and profit. In today's black market economy, a computer with a back door can be put to work performing various criminal activities that earn money for their controllers. Schemes such as pay per install, sending spam emails, and harvesting personal information and identities are all ways to generate revenue. If a Symantec antivirus product displays a detection alert for this threat, it means the computer is already protected and the Symantec product will effectively remove this threat from the computer. Protection Initial Rapid Release version February 11, 1999 Latest Rapid Release version April 15, 2010 revision 008 Initial Daily Certified version February 11, 1999 Latest Daily Certified version April 15, 2010 revision 003 Initial Weekly Certified release date February 17, 1999 Click here for a more detailed description of Rapid Release and Daily Certified virus definitions. Threat Assessment Wild Wild Level: Low Number of Infections: 0 - 49 Number of Sites: 0 - 2 Geographical Distribution: Low Threat Containment: Easy Removal: Easy Damage Damage Level: Medium Payload: Opens a back door Distribution Distribution Level: Low Writeup By: Hon Lau
  17. All jokes aside (I know there will be some) how do I get rid of it? I turned off system restore, but I'm not sure what to do next. I am running XP and Symantec virus protection.
  18. I could use some chicken wings. I'm gonna need bout tree fiddy.
×
×
  • Create New...