Heres my xp security 'recipe'.

Status
Not open for further replies.

Jesse1984

New Member
jayd, a trojan can be picked up on a daily basis by who? everyday web, email users who share photos, goto myspace, hotmail and review sites? or people visiting sites for cracks, porn, illegal downloads ect. ect. ?
 

jayd

New Member
Limewire (or any download site, whether mp3, music, videos)

Newsgroups

Grapevine

E.Mail

Unsafe Websites (the obvious)

IRC

Chat sites

To name a few. And chat sites are probably one of the primary places that this sort of activity takes place. The sad part to that is, 80% are not even
aware of it.
 

n00b9287

New Member
I disagree with you Jayd, I am happy with real time protection from AVG and a scan of my PC using Ewido's online feature every couple of weeks. You can't get Virus' from media files so if you only download music etc then you have nothing to worrie about. The bulk of Trojans are files posing as keygen's and cracks etc for illegal software found on P2P an torrent sites. As for someone directly hacking your PC then.....well :rolleyes: it's not going to happen, maybe at worst you will take part in a DOS attack as a zombie computer but with AVG kept upto date and running from boot why be so paranoid?

BTW jayd, you asked for people to play critic and then argue and tell them they are wrong or call them kiddo, dosent that sound stupid?
 

jayd

New Member
Some of the very few, but most commonly used are:

• <anything>.com
• <anything>.exe
• <anything>.txt.vbs


There are no reasons whatsoever for the user to use any of these formats, unless their main priority is to infect the receivers computer. Period.

I can also assure you there is no reason a file should have a double extension. But that does'nt stop (ignorant) people falling victim who have no idea how to tell if a file has a double extension or not.

Whether you click a link in an e.mail, or click a link on a site, as simple as that.

And after the Trojan installs itself on your computer, it will then simply send a message from your computer to the hacker telling him the following information.

Username: (A name they call you)
IP Address: (Your IP address)
Online: (Your victim is online)

And it doesn’t matter if you are on dial up. The 'potential hacker' will automatically be notified when you log on to your computer. With that information, it is not a task to gain access to ones comp with a few clicks.

Oh, and critique with a respectful manner, or not at all. :)
 

n00b9287

New Member
jayd said:
Some of the very few, but most commonly used are:

• <anything>.com
• <anything>.exe
• <anything>.txt.vbs


There are no reasons whatsoever for the user to use any of these formats, unless their main priority is to infect the receivers computer. Period.

I can also assure you there is no reason a file should have a double extension. But that does'nt stop (ignorant) people falling victim who have no idea how to tell if a file has a double extension or not.

Whether you click a link in an e.mail, or click a link on a site, as simple as that.

And after the Trojan installs itself on your computer, it will then simply send a message from your computer to the hacker telling him the following information.

Username: (A name they call you)
IP Address: (Your IP address)
Online: (Your victim is online)

And it doesn’t matter if you are on dial up. The 'potential hacker' will automatically be notified when you log on to your computer. With that information, it is not a task to gain access to ones comp with a few clicks.

Oh, and critique with a respectful manner, or not at all. :)

Gosh, so thats how these trojan things work :eek:
 

Jars

New Member
n00b9287 said:
I You can't get Virus' from media files so if you only download music etc then you have nothing to worrie about.


I am sorry to bust your bubble, but you are wrong. The bulk of viruses,Trojans come from media files that you have Downloaded illiegaly. They also come from keygen sites, but most of the time it is a music file that has infected your computer.
 

Motoxrdude

Active Member
So jayd, basicly, from what i am reading with your posts is, you download illegal music, visit porn sites, and download illegal cracks?
 

Jars

New Member
Motoxrdude said:
So jayd, basicly, from what i am reading with your posts is, you download illegal music, visit porn sites, and download illegal cracks?

haha, im sorry but that was a good laugh.
 

jayd

New Member
Motoxrdude said:
So jayd, basicly, from what i am reading with your posts is, you download illegal music, visit porn sites, and download illegal cracks?


How about I personally hack you..? :)
 

Jars

New Member
no no, please i must insit you hack me. I mean come on. :), why hack him when you can TRY to hack me? I don't have a firewall either :).

Please?
 

jayd

New Member
Motoxrdude said:
Hhaha, you can't. But hell, humor me:)


Have a little search on the net and see if you can come back with the answer to the following question:

What is a Sub Seven Trojan and what can a 'hacker' access of mine if used?

:)
 

Jars

New Member
wow dude. Wow. You need to really stop. Your going to make me cry in laughter.

For some kid who was infected with all this maleware/spyware/viruses, now you say you can hack? HAHA? Im sorry but a true hacker knows how to use the net.

Ever hear of a deepthroat trojan?

How about BackDoor?

I mean i can name them all. Considering you get alerts everytime you connect to irc, or least i do.
 

Motoxrdude

Active Member
jayd said:
Have a little search on the net and see if you can come back with the answer to the following question:

What is a Sub Seven Trojan and what can a 'hacker' access of mine if used?

:)
Heh, dude stop bluffing, come one, hack me! I have very important credit card data on my computer and if anyone got them, i would be screwed!
 

Jars

New Member
wow dude. Wow. You need to really stop. Your going to make me cry in laughter.

For some kid who was infected with all this maleware/spyware/viruses, now you say you can hack? HAHA? Im sorry but a true hacker knows how to use the net.

Ever hear of a deepthroat trojan?

How about BackDoor?

I mean i can name them all. Considering you get alerts everytime you connect to irc, or least i do. =D
 

jayd

New Member
Jars said:
wow dude. Wow. You need to really stop. Your going to make me cry in laughter.

For some kid who was infected with all this maleware/spyware/viruses, now you say you can hack? HAHA? Im sorry but a true hacker knows how to use the net.

Ever hear of a deepthroat trojan?

How about BackDoor?

I mean i can name them all. Considering you get alerts everytime you connect to irc, or least i do. =D

And hey, who pulled your chain?!

:)
 
Status
Not open for further replies.
Top