Jump to content


Highest Reputation Content

#81968 You Should Update Adobe Flash Right Now

Posted by err0r on 08 April 2016 - 03:46 PM

Adobe issued a security update April 7 that addresses what the software maker calls “critical vulnerabilities” in its Flash Player that could allow intruders to take control of a victim’s computer.

The vulnerability affects Flash running on Windows, Mac, Linux, and Chrome OS operating systems. Trend Micro, one of the companies involved in spotting the issue, said that the vulnerability was found to be spreading what’s been called the “Locky ransomware.” Ransomware is a type of malware (malicious software) that essentially holds a victim’s computer hostage. The attacker typically blocks off access to the system until a sum of money is paid over the Internet.

Adobe is urging users to update their Flash Player as quickly as possible. To do this, right click on Flash content in your browser and select “About Adobe Flash Player” to see which version you’re running. You can also check this by navigating to Adobe’s version information page here. This will tell you if your computer is running an outdated version edition of Flash.

Adobe notes that the vulnerability has been actively exploited on devices running Windows 10 and earlier with Flash Player version and earlier.

Researchers from Trend Micro’s Zero Day Initiative, Google’s Project Zero, Microsoft’s security team, FireEye, and others are credited with discovering the problem. Adobe hasn’t said how many users have been affected by the ransomware.

Read full article @ http://time.com/4286...ecurity-update/
  • 3

#82119 Vb6 Irc Client ))

Posted by ROMEO on 17 September 2017 - 09:29 AM



IRCD Client Test version :)


Mp3 play command 


Sample :

Mp3: http://user.ceng.metu.edu.tr/~e1514876/mp3/Burcu%20Gunes-Ay%20Sahit.mp3



http://www.ataber.co... IRC Client.exe

  • 2

#82029 You Should Update Adobe Flash Right Now

Posted by BoNnie25O on 27 October 2016 - 01:24 PM

I read this article, thanks for the link!
Really Locky causes significant damage to the computer in addition, one of its features is:
"This ransomware configures a new desktop wallpaper to be displayed instead of the user’s preferred image. The text in the background poses a warning message and recovery basics at the same time. The _WHAT_is.html and _WHAT_is.bmp ransom notes fulfill the same function, providing the victim with several Tor links to receive their private key. By following one of these links, the user will end up on the Locky Decryptor page, where they will learn how much and in what way to pay the ransom. The size thereof is usually about 0.5 Bitcoin, or a little over $300. However, there is no certainty that the automatic decryptor will become available after the payment, so it’s strongly recommended to try recovery methods that don’t involve interaction with the extortionists."
Here is a link to the article http://myspybot.com/shit-files-virus/

  • 2

#81442 Ransomware authors streamline attacks, infections rise

Posted by err0r on 10 February 2015 - 11:52 PM

Ransomware authors continue improving file-encrypting programs and infection methods for Windows and Android, making these nightmarish attacks harder to avoid.

The biggest ransomware threat for Windows users is CryptoWall, a sophisticated malware program that encrypts a wide range of files and demands that victims pay a ransom in Bitcoin cryptocurrency to recover them.

CryptoWall uses uncrackable encryption algorithms and hides its control servers on the Tor and I2P anonymity networks, making it harder for security researchers and law enforcement to shut them down.
[ Insider Exclusive: How an acute shortage of cyber talent gave rise to 'spooks as a service' ]

CryptoWall 3.0, the malicious program’s latest version, was launched in January after a two-month break by its creators. One notable change: it no longer bundles local privilege escalation exploits, according to Cisco Systems.

Privilege escalation exploits allow attackers to execute malware programs with administrator or system-level privileges instead of using the victim’s local user account, which might be restricted. CryptoWall needs this level of access to disable security features on the compromised systems, so the lack of privilege escalation exploits in its installer—or dropper—might be surprising at first.

In fact, this suggests that the CryptoWall authors plan to rely more on Web-based drive-by download attacks to infect systems, Cisco researchers said Monday in a blog post that includes a technical analysis of the new version.

Drive-by download attacks are launched from compromised websites or through malicious ads and usually exploit vulnerabilities in browser plug-ins like Flash Player, Java, Adobe Reader or Silverlight. The tools used for such attacks are known as exploit kits and they already have the functionality to achieve privilege escalation, according to the researchers.

Exploit kits can affect many users and can be hard to defend against, as highlighted by the recent malvertising attacks that exploited zero-day—previously unknown—vulnerabilities in Flash Player. They likely have a much higher success rate than other methods of malware distribution such as malicious email attachments.

That doesn’t mean that ransomware pushers have abandoned email-based infection methods. Researchers from antivirus firm F-Secure reported Monday that they’ve observed a significant increase this month in infections with another file-encrypting ransomware program called CTB-Locker.

CTB-Locker is most commonly spread through emails with a malicious zip file attachment. The rogue zip file contains another zip file which houses a .scr or .cab executable file, the F-Secure researchers said in a blog post. Running any of those executable files will result in a CTB-Locker infection.

Like CryptoWall, CTB uses strong cryptography that makes it impossible for victims to recover their files without paying the ransom, if they don’t have unaffected backups. The CTB ransom is 3 Bitcoins, or around US$650, higher than the $500 ransom asked by the CryptoWall gang.

Android users are not immune to such threats either. After producing the first file-encrypting ransomware program for Android, the creators of Simplocker became the laughingstock of the anti-malware industry when it was discovered that they used the same hardcoded encryption key on all infected devices, making it easy to recover the affected files.

But they’re now back, researchers from antivirus firm Avast Software warn. And they’ve unfortunately corrected their error, with a new, more sophisticated variant of Simplocker that infected more than 5,000 unique users within days of being discovered.

“The reason why this variant is more dangerous than its predecessor is that it generates unique keys for each infected device, making it harder to decrypt infected devices,” Avast researcher Nikolaos Chrysaidos said in a blog post Tuesday.

Simplocker is distributed through rogue ads on shady websites that tell users they need Flash Player to watch videos. The Flash Player app served by those ads is actually Simplocker.

By default, Android blocks the installation of apps that are not downloaded from Google Play. However, attackers often use social engineering to convince users to disable this protection and allow the installation of apps from unknown sources.

Once Simplocker is installed, it will display a fake message that claims to be from the FBI and alerts victims that illegal pornographic material was detected on their devices. The message demands that victims to pay $200 to have their phones unlocked.

Security researchers advise against paying such ransoms to cybercriminals, because there’s no guarantee of getting the decryption key and because it encourages them to continue their scheme. However, there are many publicly reported cases of users, companies and even government organizations who gave in to the extortion and paid to recover their critical files.

Because of this, it’s important to establish a backup routine. Files should be backed up to drives or network shares that are only temporarily connected to the computer or that require a username and password to be accessed. That’s because ransomware programs will also encrypt files from folders accessible over the network if they can write to them.
  • 2

#82037 Ransomware authors streamline attacks, infections rise

Posted by stevemendoza on 29 November 2016 - 05:49 AM

Thank you for another essential article. Where else could anyone get that kind of information in such a complete. I am also starting new blog please check this http://emedsretail.com/blog/

  • 1

#82036 Ransomware authors streamline attacks, infections rise

Posted by AleXXX on 22 November 2016 - 02:04 PM

A lot of information, thank you! My laptop was attacked by locky ransomware. All photos and video files were encrypted. I was terrified! It is good that a friend told me to use this site: http://soft2secure.com/knowledgebase/aesir-file-virus Now all is well, laptop is working perfectly!  :yes:

  • 1

#81747 Why Windows 10 is the most secure Windows ever

Posted by err0r on 19 September 2015 - 04:47 AM

Microsoft added two game-changing security features for enterprise users in Windows 10, but until recently, the company has been relatively quiet about them.

So far the buzz has mainly been about Windows Hello, which supports face and fingerprint recognition. But Device Guard and Credential Guard are the two standout security features of Windows 10—they protect the core kernel from malware and prevent attackers from remotely taking control of the machine. Device Guard and Credential Guard are intended for business systems and are available only in Windows 10 Enterprise and Windows 10 Education.

“Clearly, Microsoft thought a lot about the kind of attacks taking place against enterprise customers and is moving security forward by leaps and bounds,” said Ian Trump, a security lead at LogicNow.

Device Guard relies on Windows 10’s virtualization-based security to allow only trusted applications to run on devices. Credential Guard protects corporate identities by isolating them in a hardware-based virtual environment. Microsoft isolates critical Windows services in the virtual machine to block attackers from tampering with the kernel and other sensitive processes. The new features rely on the same hypervisor technology already used by Hyper-V.

Using hardware-based virtualization to extend whitelisting and protecting credentials was a “brilliant move” by Microsoft, said Chester Wisniewski, senior security strategist for Sophos Canada, an antivirus company.

Microsoft published technical guides for Device Guard and Credential Guard on TechNet last week.

Read full article @ http://www.pcworld.c...ndows-ever.html
  • 1

#80885 Multiconn Project

Posted by Eyecu on 23 June 2013 - 10:18 PM

net4110 uses aDSERV as far as I can tell. Being an msnocx server some might like it but it will be interesting to see how it progresses.

  • 1

#80788 Helpdesk

Posted by err0r on 14 May 2013 - 03:46 AM

This should work

on *:VOICE:#Helpdesk: { set -c %helpedby. $+ $vnick $nick } 
on *:DEVOICE:#Helpdesk: { $iif(%helpedby. [ $+ [ $vnick ] ], msg $chan Thanks for visiting HelpDesk. I hope that the GUIDE ( %helpedby. [ $+ [ $vnick ] ] ) was able to help you) | unset %helpedby. [ $+ [ $vnick ] ] } 

  • 1

#79949 Gatekeeperpassports

Posted by oasiz on 12 May 2012 - 08:57 AM


The "passport" is just a unique (likely random) string applied to each member account, and is application/server independent, there's no protocol as such.

For example on Oasiz a passport is generated during the very first account connection to the chat server and is made up of an md5 hash of different account fields (ID, account creation date, email address etc) to ensure uniqueness, cut down to 16 digits and capitalised.

Example: 4027E1445E6E24A0

After a successful server authentication this is used as the ident within the hostmask.


Hope this helps! :)

Edit: I cannot stand this new WYSIWYG editor, it's horrible software.
  • 1

#79520 Mozilla releases Firefox 10, adds developer tools

Posted by chain on 01 February 2012 - 03:19 PM

Mozilla has released version 10 of its Firefox browser as part of its accelerated six-week build cycle, and has also included a pack of developer tools aimed at simplifying life for website operators.
Firefox 10, available for Windows, Mac, Linux, and Android, includes eight security fixes, but the most noticeable change in upgrading is the way the browser handles add-on software. According to Mozilla, most add-ons will now work by default (after the changes made by Firefox 8), rather than having to be reloaded to suit the new version. HTML5-support APIs for full-screen viewing are also new to the build.
In addition, Mozilla claims to have fixed the crashable conflicts caused by Java for Mac OS X users of Firefox, and similar stability problems that occurred when trying to shift bookmarks around. Anti-aliasing for WebGL and CSS3 3D-transforms are also included in the new release.

For developers, Mozilla has added a function dubbed Page Inspector, which allows a website creator to examine the HTML structure and layout of a site without leaving the browser window. Site Inspector gives the ability to edit a page, and to access CSS properties.
There are, however, still issues. Gmail users will find scrolling a tad slow, and notifications won't work with Growl 1.3 and above. Two-digit browser version numbers can also still cause crashes, and Firefox won't scroll down with some Synaptics touchpads.

Source: Register
  • 1

#79054 Buzzen Connection Issue

Posted by Snoopz on 05 October 2011 - 04:54 PM

I have a sattelite connection through Hugesnet, any info would be greatly appreciated, am using IE9

Attached Thumbnails

  • Buzzen.jpg

  • 1

#77884 Old Msn Chat Wavs

Posted by d33j4y on 17 December 2010 - 03:00 AM

Heres a few in a zip I had located!

Attached Files

  • 1

#77883 Old Msn Chat Wavs

Posted by d33j4y on 17 December 2010 - 02:52 AM

I have queried several keywords both here, on Google, and other search engines, but I couldn't seem to find a collection of the .wav files for the sounds of MSN Chat from back in the day. Is there any chance that someone is still hanging on to these and would be willing to share them?

Which exact ones are you looking for? I can dig around my externel and see if I can locate some and post them here.. let me check around!! :)
  • 1

#77673 New Server Up & Running

Posted by err0r on 13 October 2010 - 09:29 AM

sorry to tell you this but you have an err0r on your server!
  • 1

#77472 What Is Wrong With This Code

Posted by Bloodyboss on 31 August 2010 - 03:05 AM

hey , I have this code in remote

on *:input:#:{
if ($1 == !msg) { timer 0 60 /amsg  $!+ $!rand(1,12) $!read(wize.txt) }

it reads random lines from the file wize.txt I wanna a code that reads lines in order

X-Fusion helped me with this code

alias wize {
inc %wize.number
timer 0 60 amsg $rand(1,12) $read(wize.txt, $+ %wize.number $+ )
and in variables ( %wize.number 0 )
but when it works it keeps send the first line in the file wiz.txt to channel

I tried
alias wize {
inc %wize.number
timer 0 60 amsg $rand(1,12) $!read(wize.txt, $+ %wize.number $+ )
but also it sends the first line only

May anyone tells me what's wrong ?
  • 1