| Welcome to Pumpitout. We hope you enjoy your visit. You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free. Join our community! If you're already a member please log in to your account to access all of our features: |
| The Sky Is Falling! The Sky Is Falling!; Ya wanna Cry about it? | |
|---|---|
| Tweet Topic Started: May 16 2017, 12:43 PM (180 Views) | |
| A Storm is Coming | May 16 2017, 12:43 PM Post #1 |
|
OMG OMG OMG Everyone using Windows XP is BAD! Upgrade to Microsoft Spyware Platform 10 RIGHT NOW! http://www.theregister.co.uk/2017/05/16/microsoft_stockpiling_flaws_too/ http://www.theregister.co.uk/2017/05/14/microsoft_to_spooks_wannacrypt_was_inevitable_quit_hoarding/ http://www.zdnet.com/article/if-youre-still-using-windows-xp-youre-a-menace-to-society/ Jason Perlow, author of the ZDNet article is a Liar and an Idiot He was employed by MICROSOFT and only writes Pro M.S. - B.S. As for me....... https://www.youtube.com/watch?v=Ktx4NN3P_q4 I say Microsoft is the PROBLEM, not the SOLUTION! I'm posting this using Windows XP-SERVICE PACK 2 (not 3) without ANY M.S. critical updates I'm running as FULL ADMIN with an outdated antivirus and outdated browser Am I worried about WannaCry Ransomware? NOT ONE BIT! I block ALL Microsoft components from Internet access in an aftermarket firewall I block the antivirus and all other software (except browser) as well I don't run any javascripts, Flash, Silverlight or Net Framework malware File and printer sharing is blocked I never use Adobe Reader malware The operating system is locked down as a READ ONLY system using Driveshield Plus a few other precautions and tweaks I haven't had a single malware infection in over a year and I research malware sites DAILY! If YOU, the NSA/Russia/N. Korea/China/Israel or anyone else believe they can wreck this box with Wannacrypt or any other malware, then take your best shot as I could use a few more ZeroDays to analyze CLOSE THE BACKDOORS MICROSOFT!!!!!!! you are the problem ---------------------------------------- In other news.... US spymasters trash Kaspersky: AV tools can't be trusted http://www.theregister.co.uk/2017/05/11/us_security_chiefs_dont_trust_kaspersky/ Here's my take on the situation A popular GTA-V ISO that has been on several torrent sites for over 2 years will appear to be clean in both Avast (May 2017) as well as Kaspersky (May 2017) when scanning from Windows After installing the ISO, it will still appear clean when scanning from your Windows boot drive HOWEVER.... Scanning the Installed game from a Kaspersky Rescue Disk (CD-ROM) will show zero infections, BUT, Scanning the Installed game from an Avast Rescue Disk will show 96 Infections Additionally, scanning the same installed game from a separate Windows Boot drive (not the drive it was installed to) will show a Pagefile.Sys Infection that keeps returning and cannot be deleted with Avast Windows ISO's are also a problem The ISO scans as Clean The installed Windows boot drive cannot find any infections when scanning from THAT drive but the infections become readily apparent when scanning from a separate boot drive So the question is.... Do Russian Antiviruses find Russian malware? |
![]() |
|
| A Storm is Coming | May 18 2017, 08:52 AM Post #2 |
|
PLEASE READ: Disclaimer ---------- PLEASE do not try this at home! The Windows XP system that I am currently posting with has been tweaked over many years to find only certain classes of malware ALL of the tweaks have not been listed in the post above Many other tweaks were employed, such as uninstalling Internet Explorer 6 before ever connecting to the Internet and many (But not ALL) of the tweaks listed in a portable application called Safe XP The point is that this system (or any other Operating System) will not stop certain types of online attacks such as phishing attacks/redirectors/MITM/DDos/Spoofing of your online Bank website etc. etc. etc. But it IS great for finding zero days of specific classes of malware such as wannacry Will it protect me from online thieves stealing my Login credentials from this website? NO, and neither will Windows 10 IOS/Linux/Android or Chrome It will also not stop attacks on the browser, but WILL stop the vast majority of malware coming in through the backdoors that will not be closed by Microsoft So Please, DO NOT TRY THIS AT HOME KIDS! Edited by A Storm is Coming, May 18 2017, 08:55 AM.
|
![]() |
|
| A Storm is Coming | May 22 2017, 07:23 PM Post #3 |
|
http://www.computerworld.com/article/3197703/windows-pcs/no-windows-xp-didnt-fuel-wannacry.html |
![]() |
|
| A Storm is Coming | May 23 2017, 05:56 AM Post #4 |
|
Does this sound like more Microsoft Propaganda or what? http://www.zdnet.com/article/eugene-kaspersky-shrugs-his-shoulders-at-use-of-windows-xp/ I find it odd that ZDNET would post such a response from Kaspersky when ZDNET and several other Tech Sites demand that you make yourself vulnerable to malicious Javascript attacks just to read and/or post comments at their sites Also, ZDNET, under the direction of "Jason Perlow" banned me for posting that he was either a Liar "OR" an Idiot for stating that Windows 10 is NOT a Spyware Platform I now see the error of my post Jason Perlow is not a Liar "OR" an Idiot Jason Perlow is both a Liar "AND" an Idiot So, sorry Jason, my bad! It is odd that Kaspersky would 1st find that wannacry infected mostly Windows 7 machines and not XP, then turn around and shill for Microsoft like this (And, do so in collusion with ZDNet no less) Curiouser and Curiouser Edited by A Storm is Coming, May 23 2017, 06:08 AM.
|
![]() |
|
| A Storm is Coming | May 28 2017, 11:36 AM Post #5 |
|
Kaspersky to US: Check Our Source Code! http://www.technewsworld.com/story/Kaspersky-to-US-Check-Our-Source-Code-84564.html Cybersecurity expert Eugene Kaspersky has volunteered to turn over his company's software source code to allay fears about possible ties with the Russian government -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- This was already addressed in my first post above Who cares if the source code is clean if your antivirus doesn't find certain types of malware? When a cracked O.S. / game or other program has been sitting on a Torrent Site for over two years, you would think that Avast would be aware of False Positives by now, and, if it is NOT a False Positive, you would think that Kaspersky would identify the malware by now Looking at the source code does not instill TRUST in your software For trust, you must identify FALSE POSITIVE as well as ACTUAL MALWARE! The only reason an antivirus Company cannot find a known problem at a Torrent Site or a crack/Keygen site is because these sites are playgrounds for the so called "Intelligence" Services Trust but Verify Ronald Reagan Ronnie's Logic might be a bit too confusing for me, so I just go with.... I don't trust myself sometimes..... So why the hell would I trust these guys? Bullwinkle J Moose Edited by A Storm is Coming, May 28 2017, 02:53 PM.
|
![]() |
|
| A Storm is Coming | Jul 6 2017, 06:57 AM Post #6 |
|
Who Dunnit? The past week was real "who done it" in servers across the Planet No, Microsoft did not release the Petya Wiper to force laggards onto their Windows 10 Spyware Platform Though they did use the event to push you all towards Windows 10 even though fully updated copies of Windows 10 were also being encrypted Yes, The U.S. Government "Could" have encrypted the Companies hit with Petya if those Companies had been under Investigation and then decrypted the evidence under Court Order at a later date, but....... They Diddn't! The Companies affected have mostly all complied with Forensic Investigators and that is where the mystery begins How can they investigate data that cannot be decrypted? They are most likely looking for evidence of malware and spyware in backups and peripheral data that have not been encrypted and now for the news..... https://arstechnica.com/security/2017/07/heavily-armed-police-raid-company-that-seeded-last-weeks-notpetya-outbreak/ http://www.eweek.com/security/cyber-security-experts-view-petya-malware-as-nation-state-attack https://www.cnet.com/news/hackers-linked-to-latest-ransomware-attack-demand-250000-goldeneye-not-petya/ Afterthoughts.... So why is Kaspersky Antivirus not wanted in Gov't systems ? They offered to show their source-code after all Is it the demand that you connect to Russian servers when you install the antivirus? Is it because the Antivirus won't find certain pieces of malware that have been on the Internet for over a year? Is it because of all the leftover files Kaspersky leaves on your drive after you scan with the Rescue disk? A full scan of all your system weaknesses with the Rescue Disk "could" (not saying they are) be left in Kaspersky logs to be used later in a "targeted" attack A targeted exploit could use those logs without rescanning your drive which might raise a red flag Again, "not saying they are", but why leave all this crap on my drive after a scan? The source-code can be clean and free of malware but that doesn't really tell us what we need to know ![]() Edited by A Storm is Coming, Jul 6 2017, 07:05 AM.
|
![]() |
|
| A Storm is Coming | Jul 13 2017, 01:20 PM Post #7 |
|
Kaspersky Lab removed from US government's approved vendors list https://www.techspot.com/news/70113-kaspersky-lab-removed-government-approved-vendor-list.html |
![]() |
|
| A Storm is Coming | Aug 21 2017, 11:20 AM Post #8 |
|
FBI Reportedly Advising Companies To Sever Ties With Kaspersky Apps https://hothardware.com/news/fbi-advising-companies-sever-ties-kaspersky-apps |
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| « Previous Topic · General Discussion · Next Topic » |








3:53 AM Jul 11