Results 11 to 18 of 18
Enjoy an ad free experience by logging in. Not a member yet? Register.
- 02-21-2012 #11
What do we want?
When do we want 'em?
Doesn't really matter does it!?
The Fifth Continent
- 02-22-2012 #12
lol elija... Yeah or either you've been deleted entirely from there data.
It would be interesting to drag it along in a virtual machine running Windows, and then after a week of not using the machine delete it. hehehe
Although i don't know if it possible for malware like that can get out of the virtual machine without a shared linked between host and guest.
- 02-22-2012 #13
It might be interesting to run in a vm, while you feed it phony data such as contacts that are really FBI cyber crimes, etc.Registered Linux user #526930
- 02-22-2012 #14
The adventure of a life time.
Linux User #296285
- 02-22-2012 #15
- 02-22-2012 #16
- 02-23-2012 #17
- 02-23-2012 #18
I've just received a different one, but I might as well put it under the same thread. This email comes from someone in France who writes: "I have visited this website and I found you in the spammer list. Is this true?" There is a zipped attachment called Websitelist01_(your_name).zip.
From what I quacked, this contains a well-known worm called netsky (even I have heard of it!) which spreads itself via email. It installs a .exe file into C:\Windows and registers it to autorun under the name Norton Antivirus. How cheeky is that!?
I guess that the worm we were talking about earlier installs itself the same way and that's how it manages to run as soon as you unpack it. If you run a certain famous OS, that is."I'm just a little old lady; don't try to dazzle me with jargon!"