Munkie Lab! QuakeDragon vs Spyware!

A place to talk about... anything!
Post Reply
User avatar
Swipe
Housecat
Posts: 252
Joined: Mon Oct 20, 2003 5:37 am
Location: The Rocky Mountains, USA
Contact:

Munkie Lab! QuakeDragon vs Spyware!

Post by Swipe »

Under the username of QuakeDragon, I occasionally do 'munkie labs' -- reports on programs, utilities, hardware engineering and testing, as well as various other ideas. This one was found to be instantly popular. While I know most of the kitties here I talk with are moderately skilled with their computers, Some of you -may- still find this article to be of use. So, by my own accord, I've posted it here as well.
All the standard IP laws are applied to this, but it's 'reprinted' here with my permission; (duh. :roll: just gotta say it for the legal guys.) This document has not been error-corrected yet, as in doing so would have additional legalities on it. So, this is the final rough draft.
Good comments are welcome. :)

:::Start of report:::

So.. how many of you out there have spent hours working on spyware-related problems? How many have lost internet surfing ability because of them? I don't suspect many have here, but I can personally guarantee that I've been stuck on the phone with thousands that have. I've helped thousands of people with this.. and now, I'll teach some of my 'secrets' to you good folks, to toss into your bag-o-computer-tricks.


The infection » Why?!
The first question to ask usually, is why.
'Why would anyone want to put buggy or defective software on my computer? I've not got anything useful to anyone!'

Quite the contrary really.. in fact, you have everything they want. I'll explain:
Spyware was meant to infect computers any way possible, regardless of the negative side effects that come with it, including broken layered service providers, and damaged Winsock files that are CRITICAL to getting an internet connection. The reason why, is it's all for money. Here's how it works:

1. Spyware gets in, and begins monitoring your internet cache², and cookies³

2. The spyware can harvest information from cookies and cache. The sorts of things that can be collected are names, addresses, email addresses, phone numbers, usernames, passwords, and in the right circumstances, even credit card information.

3. After collection, the spyware 'phones home' to the maker of the software saying something along the lines of "Here's what I've learned about this person..."

4. The person receiving all this info then in turn collects it, and compiles it. They can then go to advertising companies and say something like "I have 10,000 names and their addresses. You can have them if you pay me $0.10 per name and address. And 10,000 names and phone numbers that I can let go for $0.05 per name & number. I've got 15,000 valid email addresses for $0.02 per address; Additionally, for another $0.03 per advertisement, I can send this advertisement via a popup ad to 100,000+ people's computers... saving your company thousands in advertisement costs."

As you can see.. that's a lot of money. $500 for that CD full of addresses, $300 for that phone number addresses, $450 for emails and easily over $3,000 (likely to be much more as they can send the ad to -all- of the people infected... whether their info was being successfully harvested or not.)

The end result? Not a bad deal... if you're the guy making the software. If you aren't, You get popup ads for crap you would never have any interest in, you get junk mail crammed into your mailbox, bucket loads of email spam, and you get more of those #%*&ing telemarketer calls, and when you try to remove that software, it breaks your internet connection!
Image Image Image Image

And here's the worst part... most of these instances, are legal. At some point or another, you or someone using your computer has unwittingly agreed to a terms of service agreement that states something along the lines of this:

Code: Select all

We may transmit our Subscribers' search queries to search partners, who use this information to provide us with search results and other information, which we then display to our Subscribers.

We may share information we collect with our Third Party Advertising Partners. If we do so, we will require by contract that they treat this information in accordance with our privacy promises.

We use data regarding Subscribers' online behavior to better understand how consumers use the Web. To that end, we may use aggregated, online traffic behavior to report emerging Web usage trends to the press or to the public. For example, we might issue a press release stating that Subscribers tend to visit certain websites more often than others. We may also use this information to develop reports for our corporate clients so that they can better understand trends in online consumer behavior and how those trends relate to their businesses.

Other Limited Circumstances. We may also share information with third parties who help us perform a business function (their use of such information is limited by our internal policies and/or confidentiality agreements, as applicable); to protect our rights, or if under a legal obligation.
And... because someone clicked the 'I agree' button, there's nothing you can legally do about it.

"I don't remember EVER seeing anything like that on the 'agree' screen when installing free software"

And you probably never will. Some retard in a high-ranking office made a law that states something along the lines of 'If the company puts a LINK to the terms of service, it is the equivalent of actually having the terms of service right in front of the user.'
So.. all they have to do is provide a link, even if it looks like just normal text with no apparent or obvious way to tell it's a link.

Combat » Choosing the right weapons and tools
Now that we've covered the 'why', we move on to how to fight it. First thing when fighting this stuff is to know your enemy. These programs are coming from roughly the same 200 companies all the time. Give or take a few. They just keep coming up with new innovations to infect their victims. Additionally, these people are typically in places like France, Sweden, Korea, China and other places where America and the UK have no authority. Additionally, there's the fact that someone agreed to the terms given with some free game or that flashy new animated screensaver.

So much for the legal system. Let's take a look at a few options:

Antivirus Software & Firewalls
I cannot count the number of times I've been told by a n00b that they have norton/mcaffee/panda antivirus to keep that junk off. Let's break this down just a little bit: Antivirus is not total protection for your computer, though the makers of the software would all like you to think it is. All an antivirus does, is watch for commonly known virus activity. All viruses try to procreate and spread. Spyware doesn't breed to spread and infect... it just infects. As far as the antivirus or firewall is concerned, it's no different than a program you would run on your computer, such as MS Paint.
((this is not true for all firewalls... Tiny Firewall is an exception to this; but it's a bit to advanced to suggest to n00bies.)) Image

Popup Blocker
"So why don't we just block their popup ads?"
Because, that's a farce. You're still being victimized by the malware, as it can still harvest information and you can still get hit with spam emails, telemarketers and junk mail.

Hosts File
You can use a HOSTS file to block ads, banners, cookies, web bugs, and even most hijackers. This is accomplished by blocking the Server that supplies these little gems. Example - the following entry 127.0.0.1 ad.doubleclick.net blocks all files supplied by that DoubleClick Server to the web page you are viewing. This also prevents the server from tracking your movements. For full instructions and details about it, please visit http://www.mvps.org/winhelp2002/hosts.htm
Pros: This is a simple, and quick fix with no download or software needed.
Cons: This does not solve the problem. It still doesn't clean off the software that has been installed, and doesn't stop things from popping up, even though the popup pages will be blank, or 'page cannot be displayed.'

So, as you can tell... the really only good option would be to clean the garbage up so it's no longer a problem.

Spyware Removal Tools
"Wolf in sheep's clothing." This statement could not be any more true than when it comes to spyware removal tools. Nowadays there's a ton of them coming out with their own 'free' version of spyware removal tools (McAffe, Norton, Earthlink, AOL, Yahoo, webroot, etc.)
These cheap, sloppy, wasteful and destructive programs are as much, or even more of a mistake to use than just leaving the spyware alone! There are more that you can pay for, but they are just as bad, if not worse. So, save your money.
Lavasoft's AdAware personal is their free version, they have another pay-for version that is supposedly better, but to pay for spyware removal is like paying to breathe free air.
Another program called Spybot Search & Destroy is a good little tool. They ask for a donation, but don't demand payment like Lavasoft does, and the program is actually worth supporting with a donation, no matter how small the donation is.

While these two programs are okay to clean the system up, but the problem is they don't offer a long term solution. You have to scan the computer to check for spyware, they don't scan it for you... they don't get updated automatically, and they don't detect the latest threats very well, and they both have problems when repairing hijacked browsers. Between these two programs you could get rid of the majority of the problems, but they have their weak points.

Microsoft has also just released an antispyware tool... and this time someone did their research. This program is still in its Beta stage testing. It's not perfect, but it's more efficient and effective at removing spyware than both adaware and spybot. It can be downloaded free here.

Today, I'll be using my nice involuntary volunteer, ForestRain. She had amassed some spyware awhile back, but I never got around to fixing it all the way until just today. I'll be using Microsoft's antispyware software for these lab tests.

Step 1: Prepare for the worst. Remember, removing spyware can break your Winsock and Layered Service Providers which are needed to get online. So, to start, I download a tool for fixing LSP's. The tool I picked up was located at http://www.cexx.org/lspfix.htm -- For your convenience, I have linked the file HERE from crystalrecipes.com.

Here is the description of the program, quoted from cexx.org:

Code: Select all

LSP-Fix
Repairs Winsock 2 settings, caused by buggy or improperly-removed Internet software, that result in loss of Internet access

LSP-Fix is a free utility to repair a specific type of problem associated with certain Internet software. This type of software is known as a Layered Service Provider or LSP, a piece of software that can be inserted into the Windows TCP/IP handler like a link in a chain. However, due to bugs in the LSP software or deletion of the software, this chain can get broken, rendering the user unable to access the Internet.

Unfortunately, this type of software is sometimes quietly installed by unrelated software such as file-sharing programs, sneaking onto a system unannounced. In fact, in many cases, the user does not know of its existence until something goes wrong, and he/she can no longer access Web sites. Common offenders include New.net* (NEWDOTNET) and WebHancer*, which are often bundled with file-sharing utilities, DVD player software, and other free downloads. LSP-Fix repairs the Winsock LSP chain by removing the entries left behind when LSP software is removed by hand (or when errors in the software itself break the LSP chain), and removing any gaps in the chain.

LSP-Fix is not a malware removal utility and does not target specific products. LSP-Fix does not delete any files. 
Ok, now that I am ready to repair winsock should it break, I ran a scan from Spybot and Adaware. Both programs were entierly up-to-date and they found no threats; but I knew better. There was something still here.

I downloadedand installed the software from Microsoft, then run the scan.

For configuration I ran the following settings:
Automatic Updater = Enabled
Real-time Security Agent = Enabled
Join SpyNet Community = Yes
Auto-scan computer daily at 2 AM = Enabled

I began the scan, and right off checked the CPU usage. It remained at less than 10% for the majority of the scan. Though the memory usage was a little high at just under 24 megabytes, it scanned the computer noticeably quicker than Adaware and Spybot ever could!
The end result: 22 detected problems that Spybot and AdAware missed.
I had it remove the problem files, then rescanned the system. On the second scan, it showed a file that I recalled being in the first one. Here's a screenshot:
Image

Image Ok... let's see the details of the file... Well, it certainly reports useful information... I know what the problem file is, and more importantly, where it's located. (C:\windows\system32\vx.nls)

Ok.. I know how to deal with files that won't disappear.. but I'll give Microsoft's tool the benefit of the doubt. I let it try remove the problem again.
Run the scan after removal, and there it is again..
Image

I looked at the detailed results, and found that actually, the spyware removal tool did remove the first file that was named vx.nls... but now there is a new one: C:\windows\system32\vx1.nls
Image

Occasionally, you'll find viruses like this too, where no matter how much you delete it, somehow it puts the file back on. Now, I could go into explaining how to find and remove what is causing the files to be re-created, but it's so complex, that it's easier for me just to show you how to fix the file :P

One of the most powerful tools you can ever use in windows, is a tiny little program called notepad.exe. So, I open up notepad, go to File > Open, then in the filename section I type out the entire location of the file (C:\windows\system32\vx1.nls) and click open.
I examine the file to see if I can find details to its origins.. and sure enough, I see "Bullseye Network" in the list, as well as it's file install location (C:\Program Files\Bullseye network) and the website locations where the ads come from. Take a look:

Image

Interesting, isn't it? Well.. now that we know where its from and what it's doing, we fix the problem. First, I select all the code in the file by holding the 'Ctrl' button, and pressing 'A'. Now all the text is selected. Next, I press the 'Delete' key on my keyboard.. *POOF* .. there goes all that precious code that was needed for the spyware to get installed. To finish up, I go to File > Save. Now the file is saved as a totally blank document. Image Image

Run the scan again, and here's the final results:
Image

Score:
QuakeDragon 1
Spyware 0
Image

The final Verdict » Labmunkie Wins!
For once, Microsoft has released something that would be almost universally useful to all windows users. I decree this file as a good, recommended download. The downside is that the program will not work after July 31st 2005. By that time, I'm sure the final version of this program will have been released.

« Footnotes »
² - Internet Cache -
When you get online, any website you view or pictures you open is actually physically downloaded to your computer, into a special folder that's called the internet cache. It is saved there for a period of time, and depending on the file, can even be there forever, until you go and erase it. To clean cache for IE use the following steps:

{Windows XP Home/Pro} go to start > Control Panel > Classic view > Internet Options, then click the Delete files button, then check the 'delete all offline content' box.

{Windows 95/98/ME/2000} go to start > Settings > Control Panel > Internet Options, then click the Delete files button, then check the 'delete all offline content' box.

This should be done about once a week for clean optimized surfing.


³ - Cookies -
A 'cookie' is a file that's created on your computer whenever you log into a website. Any website, even these forums, create a cookie file on your computer. It's just a natural part of being online, and it cannot be avoided. To clean cookies in IE, do the following:

{Windows XP Home/Pro} go to start > Control Panel > Classic view > Internet Options, Delete Cookies.

{Windows 95/98/ME/2000} go to start > Settings > Control Panel > Internet Options, Delete Cookies.
This should be done about once a week for clean optimized surfing.
[size=92]~ Swipe ~ World of Midgardsormr ~ Rank 5 in the legions of Windurst ~[/size]
[img]http://www.crystalrecipies.com/qd/Badgercub/New_swipe_sig.jpg[/img]
Sivara
Big Cat
Posts: 211
Joined: Sat Feb 21, 2004 6:00 pm

Post by Sivara »

Very good article! Although I didn't understand some of the stuff you were doing. :D

I hate spyware. HATE HATE HATE HATE HATE. :x

I use Firefox, and I run AdAware and Spybot Search and Destroy. I haven't found anything in a long time...especially after changing to Firefox (which I assume blocks out a lot of the crap).

I've also stopped downloading desktop theme files. These contain some pretty nasty spyware, which just appalls me! Themes! Putting up pretty wallpaper and icons and maybe a screensaver, while slipping spyware into the depths of the hard drive! It just ticks me off!

I've been looking around for some that are .zip files and not .exe (as the .exes ALWAYS install some sort of superfluous crap), but unfortunately almost all of the people/companies who make themes have partnered with larger websites that package their themes with spyware. Even if I click "no" on every piece of junk that it tries to install, I STILL get spyware/malware. I've given up on themes entirely unless they are in .zip files I can pick through. I tend to make my own themes whenever possible.
User avatar
Kopopo
Teh Cutaru
Posts: 907
Joined: Fri Nov 21, 2003 1:48 am
Location: SATX, USA
Contact:

Post by Kopopo »

Window Blinds is all I need for "themes."
User avatar
Anathema
Kitten
Posts: 24
Joined: Sat Jan 08, 2005 3:18 am
Location: /em readies Sneak Attack!

Post by Anathema »

Great info Swipe!
Ima go home and try that Microsoft spyware protection

OT:Window Blinds doesnt work for my XP, I usta use StyleXP
Cats are like potatoe chips, you can't have just one. ,,,^..^,,,

THF50/NIN25
Windursian kitty, Rank 5
THF52/NIN25
Artifact:
Hands[O] Head [O] Legs [X] Body [X] Feet [X]
[url=http://ffxi.allakhazam.com/profile.xml?69797]Anathema[/url], As of 20Jan05
Kahvi
Krazy Kat
Posts: 814
Joined: Mon Oct 11, 2004 11:07 am
Location: Urdr's Well, Yggdrasil

Post by Kahvi »

(1) great info.

(2) I'm surprised Microsoft actually made something that is useful and works... now if they could just clean up thier OS's...


Too bad you cant "build your own" G5 Mac or i would have switched ages ago...
Windurst Rank 10
Fight together, die together, leave no one behind.

[url=http://www.sloganizer.net/en/][img]http://www.sloganizer.net/en/style7,Kahvi.png[/img][/url]
Klenath
Big Cat
Posts: 176
Joined: Mon May 03, 2004 1:26 pm

Post by Klenath »

Mac's problem: Too much of a niche product.
Linux's problem: Far from 'user friendly.'
Windows' problem: Too much bad press from ages past despite many recent positive advances with the Windows OS.
User avatar
Swipe
Housecat
Posts: 252
Joined: Mon Oct 20, 2003 5:37 am
Location: The Rocky Mountains, USA
Contact:

Post by Swipe »

Sivara wrote:Very good article! Although I didn't understand some of the stuff you were doing. :D
I did get some questions about this also from other people. I'll paste their questions and my replies:
GameGuy wrote: when you delete all that code in notepad and save it. You just save it to its orginal location? but why dont you just delete that code and delete the file all together? will it just come back??? So thats why you delete all the code and just leave it there, as an empty bucket?
To explain this, I'll use the instance of the vx.nls and vx1.nls files again.

vx.nls gets deleted by the antispyware. Now somewhere there is a loaded dll that is watching to make sure that vx.nls is still there. The moment that file disappears, the dll reacts and creates a new file. Since vx.nls was detected, it creates a new file, named vx1.nls. This ensures that no matter how many times the file is deleted, it will be re-created. Here is a simplified verson of how the program works...

Code: Select all

file = vx.nls

IF [file_exsists] = TRUE

THEN
DO nothing.

IF [file_exsists] = FALSE
THEN
[make_file] vx[+1].nls
So.. from reading the code here, as you can see that it watches to make sure the file exsists... That's all. If we delete it, the evil cycle would start making vx2.nls, and vx3.nls, and so on, in an infinite never-ending vx#.nls, no matter how many we delete. Therfore, to prevent us from loosing our sanity, we just erase the code in that file that it's watching. So now the program will see that [file_exsists] = True, and will do nothing.

If the program ever tries to run, it will go to the vx1.nls, and say
"Computer, run all the code found in this vx1.nls file!"

the computer looks at vx1.nls, and says
"OK. Since there is nothing to run in this file, I will run nothing. Just like the program told me to. I will go back to the program that asked me to run it, and tell him I did exactly what he told me to do."

Neat huh?
GameGuy wrote:But what about that .dll that watching that file. cant we just delete it so we dont have to worry about it making more and more of that file?? Or was that the bit that you didnt want to explain cause it would be to confusing?
OK.. I will do my best to 'simply' describe how that dll is loading....

When IE loads, it normally opens up something called Third Party Browser Extensions. Now, if you'll notice... when you open a .pdf file, IE will automatically make that file open up with Acrobat Reader. That is because Adobe created a browser extension to open acrobat reader whenever a .pdf file was clicked on. So, the 'trigger' for the acrobat reader is anything with a .pdf after it. If we removed acrobat readers' browser extension, acrobat would no longer open the .pdf files. As you can see... browser extensions are based off a specific action.

Spyware also can be input as a browser extension.. and their action can be something as simple as loading any time -any- window is opened. Every time we open any window, the spyware will check to make sure the file (vx1.nls) is still present. We do not know where the dll is hiding, but it is possible to find it using a tool called Hijack This (which can be obtained HERE.) I'm afraid this is where I will stop, as you will have to locate and check every single browser extension yourself, as I'm not up to reviewing logs for hours on end.

As an alternative, you can turn off third party browser extensions... however I don't reccomend it, as it will cripple your browser to an extent.
PDF files will no longer open, shockwave/flash will not play, media enhancements will not work, and other negative side effects await anyone who disables this option.

To disable it, open IE and go Tools > Internet Options > Advanced, then under the "Browsing" section locate "Enable third-party browser extensions (requires restart)" and un-check the box. Then restart your system.

Now, if I've totally lost you in the proccess of explaining all this.. don't worry. You don't HAVE to remove the dll file, as it will be a pain in the butt to do. Just save the empty file like we did with notepad, and you'll run just peachy! ^_^
[size=92]~ Swipe ~ World of Midgardsormr ~ Rank 5 in the legions of Windurst ~[/size]
[img]http://www.crystalrecipies.com/qd/Badgercub/New_swipe_sig.jpg[/img]
JediKitsune
Mad Cat
Posts: 551
Joined: Mon Jan 10, 2005 8:25 am
Location: Tatebayashi, Gunma
Contact:

Post by JediKitsune »

I suppose I won't hold it against them because it's a beta, but the AntiSpyware program flat out doesn't work on my machine. Well, it hangs whenever I try to run a scan and doesn't do anything after that.

I guess it's fine, though. AdAware is still effective.
Kahvi
Krazy Kat
Posts: 814
Joined: Mon Oct 11, 2004 11:07 am
Location: Urdr's Well, Yggdrasil

Post by Kahvi »

i read somewhere that the RIAA and MPAA have been making spyware trojans in WMV and such.. maybe this is Microsofts way to try and even the score?
Windurst Rank 10
Fight together, die together, leave no one behind.

[url=http://www.sloganizer.net/en/][img]http://www.sloganizer.net/en/style7,Kahvi.png[/img][/url]
User avatar
Kopopo
Teh Cutaru
Posts: 907
Joined: Fri Nov 21, 2003 1:48 am
Location: SATX, USA
Contact:

Post by Kopopo »

Sounds like crazed paranoia o.0
User avatar
Eviticus
'Insignificant Adventurer'
Posts: 1178
Joined: Thu Oct 07, 2004 5:43 pm
Location: South Western Illinois, USA

Post by Eviticus »

The only tv I watch pretty much anymore is Cartoon Network for Adult Swim, or TechTV (Was bought out and now named G4-TV, but whatver).

And there is a tech support show called The Screen Savers, and recently they brought up this thing with the Microsoft Anti-Spyware program. What apparenly happened, was that the mightly sloth of Microsoft looked around from it's pearch, watching all these little companies scurry about. It grabbed out and snatched a little furry mammal, and ate it....

Erm....right, anyways there was a company making some top of the line anti-spyware software for a price, and Microsoft outright bought them. They finished up a product that company was in the process of making, and released it completely free. Or something like that.

Made by actual people, Sold by Gates. And whatnot....
In the end, I'm just talking out of my ass. So take it all with a grain of salt.
~~~~~~~~~~~~~~~~~~~~~~
[b]Rank 10 Bastok. Rank 2 Sandy.[/b] Pup 75, Drg 72, Brd 71, Thf 37, War 39, Sam 38, Blm 40, Rdm 22, Whm 40, Mnk 37, Nin 14, Pld 38, Bst 15, Drk 30, Smn 15, Blu 19, Rng 13, Dnc 24, Cor 11.
Paragon of Dragoon Excellence.
Paragon of Bard Excellence.
Paragon of Puppetmaster Excellence.
[quote="Keavy"]Evi still winnarz.[/quote]

[img]http://e.1asphost.com/AJSB1986/wyv-burn.jpg[/img]
User avatar
Fayin
Feral Cat
Posts: 368
Joined: Sun Oct 05, 2003 6:09 pm
Contact:

Post by Fayin »

Interesting info Swipe. I did learn something from it. Did not know that if the terms and conditions are in a LINK then it counts. *sigh* What moron judge made that ruling?
[b]-Fayin-[/b]
46WHM   43BLM   48THF   21WAR
59+1 Cooking   58+1 Woodworking   25 Fishing

[b]-Entourage-[/b]
Name                     Lv     GB   MHE Aketon  Warp
Fayinsjeunomule   1BLM   V    III     [  ]       [  ]
Fayinssandymule  1BLM   V    III     [  ]       [  ]
Fayinswindymule  1BLM   V    III     [  ]       [  ]
Fayinsbastymule   1BLM   V    III     [  ]       [  ]

[size=75]"omg Ebay..."[/size]
Kahvi
Krazy Kat
Posts: 814
Joined: Mon Oct 11, 2004 11:07 am
Location: Urdr's Well, Yggdrasil

Post by Kahvi »

you may think its paranoia talking but i got a news link from p2pnet

http://p2pnet.net/story/3421
Windurst Rank 10
Fight together, die together, leave no one behind.

[url=http://www.sloganizer.net/en/][img]http://www.sloganizer.net/en/style7,Kahvi.png[/img][/url]
Klenath
Big Cat
Posts: 176
Joined: Mon May 03, 2004 1:26 pm

Post by Klenath »

In the world of peer-to-peer, you're playing with fire. You don't know the person you're downloading files from, where he or she acquired the file, or what he or she has done to the file while it's been in his or her posession.

With heavy use of peer-to-peer you're bound to get burned eventually.
User avatar
Sirc
Tomcat
Posts: 148
Joined: Fri Mar 19, 2004 4:12 pm
Location: Dayton, OH USA

Post by Sirc »

Wow! Excellent post Swipe. /praise
Sirc [Rank 2] - Lvl 25 MNK, 15 WAR, 15 THF
JediKitsune
Mad Cat
Posts: 551
Joined: Mon Jan 10, 2005 8:25 am
Location: Tatebayashi, Gunma
Contact:

Post by JediKitsune »

Klenath wrote:In the world of peer-to-peer, you're playing with fire. You don't know the person you're downloading files from, where he or she acquired the file, or what he or she has done to the file while it's been in his or her posession.

With heavy use of peer-to-peer you're bound to get burned eventually.
From my experience, or at least when usuing Emule, the files with the most sources tend to be the safest.

I've only gotten one trojan from using Emule and that in a fake no-cd crack, I think. I don't download those anymore anyway.
User avatar
Ryerya
Kitten
Posts: 38
Joined: Fri Nov 05, 2004 2:16 am
Location: South Florida

Post by Ryerya »

Indeed one of the most informative articles I've read in a long time. :)

Swipe good work on your research...
[img]http://i2.photobucket.com/albums/y26/Ryerya/signiture.jpg[/img]
xaresity
Queen Cat
Posts: 20188
Joined: Mon Mar 11, 2024 7:46 am

Re: Munkie Lab! QuakeDragon vs Spyware!

Post by xaresity »

xaresity
Queen Cat
Posts: 20188
Joined: Mon Mar 11, 2024 7:46 am

Re: Munkie Lab! QuakeDragon vs Spyware!

Post by xaresity »

инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфо
инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфо
инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфо
инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинйоинфоинфоинфоинфоинфо
инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфо
инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфо
инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфо
инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфо
инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфо
инфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоинфоtuchkasинфоинфо
Post Reply