An interesting code
-
Here are some codes as the following, you can knock yourself into a beautiful world through these steps: 1.Copy the following code; 2.Open the dos window; 3.Input "Debug"; 4.Paste the code (5.Maybe you need to click the Keyboard's Enter key) Now enjoy yourself! My question is that how to produce those code to complete that task. How do you think about this problem? Thank you! The code is : e100 33 f6 bf 0 20 b5 10 f3 a5 8c c8 5 0 2 50 68 13 1 cb e 1f be a1 1 bf 0 1 e11b 6 57 b8 11 1 bb 21 13 89 7 4b 4b 48 79 f9 ad 86 e0 8b c8 bd ff ff e8 20 e134 0 3d 0 1 74 1a 7f 3 aa eb f3 2d ff 0 50 e8 f 0 5a f7 d8 8b d8 26 8a 1 aa e14f 4a 75 f9 eb de cb 57 bb 21 13 8b c1 40 f7 27 f7 f5 8b fb ba 11 1 4f 4f 4a e168 39 5 7f f9 52 8b c5 f7 25 f7 37 2b c8 95 f7 65 2 f7 37 95 2b e8 fe e fe e181 10 79 6 c6 6 fe 10 7 46 d0 14 d1 d1 d1 e5 79 ec 5a b8 11 1 ff 7 4b 4b 48 e19b 3b d0 75 f7 5f c3 83 f7 83 a6 5d 59 82 cd b2 8 42 46 9 57 a9 c5 ca aa 1b e1b4 4f 52 b4 92 3f ab 6e 9e a8 1d c6 3 fc e 6a e7 ae bb 5f 7b 10 b8 b4 f7 8 e1cd e2 bf 36 4e 39 9d 79 29 3f a f9 36 52 16 fb 5 e8 e5 a6 c2 e9 b0 43 d3 a3 e1e6 cf d3 fd fd cb d1 4c 5e e0 63 58 86 bb 3e 9 c1 20 bc cc 91 a3 47 81 70 b3 e1ff d6 1a 9e c2 c9 12 e7 4e ad f4 5f e3 30 e9 9 39 d7 e8 f9 f4 d2 44 e8 d7 22 e218 be e2 ce 88 25 cf 30 4a a8 29 ae 3f 47 c6 2d 85 e9 73 54 13 b e6 e0 34 65 e231 e2 50 8a 89 18 5f ce 70 99 3 5f 42 bf eb 7 ae d0 ca 5 22 8d 22 a5 b7 f0 e24a 90 81 bc 7a bc dc 5 db c0 6a 2 e5 57 38 be 60 cb ac ba a5 3b 9d f1 77 38 e263 a6 84 d1 3c af 49 d8 6a 45 a2 76 60 21 12 c0 c2 44 f2 5e bb e5 37 a9 2b e27b ec 4a 8c 4c f2 f7 a9 58 71 2b ba 6d d6 6a e5 60 46 e0 da e5 b9 90 e5 a3 e293 f7 7f 31 60 58 f0 c4 88 10 4e 3c a3 ee 4e 11 55 8f a 92 eb db ad 7a 9c f e2ac db 5a 28 96 da 87 ae 91 91 2d e3 5e ea df 6 95 71 67 71 40 ce d1 2e 31 6d e2c5 c1 9c d8 6a 76 9b 4a e8 36 44 d6 76 d 30 5 ff d4 1b ac 1f 32 65 31 bf 55 e2de 26 b a4 55 e1 5d 5e 16 ed 97 48 6c 77 fb 81 86 e f9 18 bd d4 f4 8b de 1d e2f7 ba d 47 75 3 89 4b 3e dc 27 86 1c d0 17 89 48 d1 a6 8d d4 2b 54 4e 8f b0 e310 2 e1 6b 1a 75 78 ea 21 91 13 c0 cf 78 a0 ab f3 35 c6 b4 c8 90 8d d7 45 e7 e329 c 5b a4 ba 52 10 64 f5 4a 50 b7 ec 46 22 15 23 84 30 81 5c df 61 5a 8f 67 e342 c4 63 57 6d f7 26 92 a3 1f e5 3 a5 0 54 41 8 48 7c 26 90 33 82 9c 91 b0 e35b ab 78 5d df 99 e0 b9 fc 5 36 ac d9 49 91 ab 20 a2 63 48 89 ce 5c 60 64 f0 e374 63 d9 a8 38 3b d3 e6 4c 8c 23 34 4e 20 51 93 5e
-
Here are some codes as the following, you can knock yourself into a beautiful world through these steps: 1.Copy the following code; 2.Open the dos window; 3.Input "Debug"; 4.Paste the code (5.Maybe you need to click the Keyboard's Enter key) Now enjoy yourself! My question is that how to produce those code to complete that task. How do you think about this problem? Thank you! The code is : e100 33 f6 bf 0 20 b5 10 f3 a5 8c c8 5 0 2 50 68 13 1 cb e 1f be a1 1 bf 0 1 e11b 6 57 b8 11 1 bb 21 13 89 7 4b 4b 48 79 f9 ad 86 e0 8b c8 bd ff ff e8 20 e134 0 3d 0 1 74 1a 7f 3 aa eb f3 2d ff 0 50 e8 f 0 5a f7 d8 8b d8 26 8a 1 aa e14f 4a 75 f9 eb de cb 57 bb 21 13 8b c1 40 f7 27 f7 f5 8b fb ba 11 1 4f 4f 4a e168 39 5 7f f9 52 8b c5 f7 25 f7 37 2b c8 95 f7 65 2 f7 37 95 2b e8 fe e fe e181 10 79 6 c6 6 fe 10 7 46 d0 14 d1 d1 d1 e5 79 ec 5a b8 11 1 ff 7 4b 4b 48 e19b 3b d0 75 f7 5f c3 83 f7 83 a6 5d 59 82 cd b2 8 42 46 9 57 a9 c5 ca aa 1b e1b4 4f 52 b4 92 3f ab 6e 9e a8 1d c6 3 fc e 6a e7 ae bb 5f 7b 10 b8 b4 f7 8 e1cd e2 bf 36 4e 39 9d 79 29 3f a f9 36 52 16 fb 5 e8 e5 a6 c2 e9 b0 43 d3 a3 e1e6 cf d3 fd fd cb d1 4c 5e e0 63 58 86 bb 3e 9 c1 20 bc cc 91 a3 47 81 70 b3 e1ff d6 1a 9e c2 c9 12 e7 4e ad f4 5f e3 30 e9 9 39 d7 e8 f9 f4 d2 44 e8 d7 22 e218 be e2 ce 88 25 cf 30 4a a8 29 ae 3f 47 c6 2d 85 e9 73 54 13 b e6 e0 34 65 e231 e2 50 8a 89 18 5f ce 70 99 3 5f 42 bf eb 7 ae d0 ca 5 22 8d 22 a5 b7 f0 e24a 90 81 bc 7a bc dc 5 db c0 6a 2 e5 57 38 be 60 cb ac ba a5 3b 9d f1 77 38 e263 a6 84 d1 3c af 49 d8 6a 45 a2 76 60 21 12 c0 c2 44 f2 5e bb e5 37 a9 2b e27b ec 4a 8c 4c f2 f7 a9 58 71 2b ba 6d d6 6a e5 60 46 e0 da e5 b9 90 e5 a3 e293 f7 7f 31 60 58 f0 c4 88 10 4e 3c a3 ee 4e 11 55 8f a 92 eb db ad 7a 9c f e2ac db 5a 28 96 da 87 ae 91 91 2d e3 5e ea df 6 95 71 67 71 40 ce d1 2e 31 6d e2c5 c1 9c d8 6a 76 9b 4a e8 36 44 d6 76 d 30 5 ff d4 1b ac 1f 32 65 31 bf 55 e2de 26 b a4 55 e1 5d 5e 16 ed 97 48 6c 77 fb 81 86 e f9 18 bd d4 f4 8b de 1d e2f7 ba d 47 75 3 89 4b 3e dc 27 86 1c d0 17 89 48 d1 a6 8d d4 2b 54 4e 8f b0 e310 2 e1 6b 1a 75 78 ea 21 91 13 c0 cf 78 a0 ab f3 35 c6 b4 c8 90 8d d7 45 e7 e329 c 5b a4 ba 52 10 64 f5 4a 50 b7 ec 46 22 15 23 84 30 81 5c df 61 5a 8f 67 e342 c4 63 57 6d f7 26 92 a3 1f e5 3 a5 0 54 41 8 48 7c 26 90 33 82 9c 91 b0 e35b ab 78 5d df 99 e0 b9 fc 5 36 ac d9 49 91 ab 20 a2 63 48 89 ce 5c 60 64 f0 e374 63 d9 a8 38 3b d3 e6 4c 8c 23 34 4e 20 51 93 5e
I haven't done what you suggest because if I'm not wrong your'e basically asking the reader to execute some binary code without any hint about where it comes or what it is supposed to do. It could format my drive for all the info we're given. Joaquín M López Muñoz Telefónica, Investigación y Desarrollo
-
I haven't done what you suggest because if I'm not wrong your'e basically asking the reader to execute some binary code without any hint about where it comes or what it is supposed to do. It could format my drive for all the info we're given. Joaquín M López Muñoz Telefónica, Investigación y Desarrollo
Yeah, you are right. However, have you thought that how to spend the remainder of my life if I acted like that? Please trust me! I have done as what I said. It is a beautiful movie! Can you tell me how to generate those binary code? Thank you!
-
Yeah, you are right. However, have you thought that how to spend the remainder of my life if I acted like that? Please trust me! I have done as what I said. It is a beautiful movie! Can you tell me how to generate those binary code? Thank you!
shalala wrote: However, have you thought that how to spend the remainder of my life if I acted like that? Laughing? :mad: shalala wrote: Please trust me! I have done as what I said. It is a beautiful movie! What you try here is called 'social engineering' - to talk someone into doing something so incredibly stupid that he would certainly not do it if he got time to think about it. Besides - circumventing the firewall like this is enough to get you fired:eek: in most companies! You are an asshole or a moron - I can't decide with the limited information I have.
Who is 'General Failure'? And why is he reading my harddisk?!?
-
shalala wrote: However, have you thought that how to spend the remainder of my life if I acted like that? Laughing? :mad: shalala wrote: Please trust me! I have done as what I said. It is a beautiful movie! What you try here is called 'social engineering' - to talk someone into doing something so incredibly stupid that he would certainly not do it if he got time to think about it. Besides - circumventing the firewall like this is enough to get you fired:eek: in most companies! You are an asshole or a moron - I can't decide with the limited information I have.
Who is 'General Failure'? And why is he reading my harddisk?!?
I am sorry. Feeling heart-broken.:( Your word is a little heart-striking. 1-2-3 Maybe you are right and I should adjust myself to ... well, my English is not good, perhaps I have not expressed my idea rightly 1.Herein, it is impossible for me to post some message harmful to you all, I think so; 2.I got those code from one of my friends. 3... ...but your words are reasonable to some extent. And I will accept your suggestions. Thank you!:)
-
I am sorry. Feeling heart-broken.:( Your word is a little heart-striking. 1-2-3 Maybe you are right and I should adjust myself to ... well, my English is not good, perhaps I have not expressed my idea rightly 1.Herein, it is impossible for me to post some message harmful to you all, I think so; 2.I got those code from one of my friends. 3... ...but your words are reasonable to some extent. And I will accept your suggestions. Thank you!:)
Excuse me for hurting your feelings, you do
not
seem to be an asshole or a moron, only very, very inexperienced. shalala wrote: 1.Herein, it is impossible for me to post some message harmful to you all, I think so; You are right. The message itself is not harmful. What IS harmful is to enter the message into debug. You are instructing people to enter a binary program by hand and then to run it. No one can possibly know what this program will do, I only have a word from someone I do not know. At least in my company, running an unchecked program like this would be treated like an intentional attack on the IT-infrastructure, and would (in extreme) lead to me loosing my job. shalala wrote: 2.I got those code from one of my friends. So I got the word from 'shalala', an CP newbie who claims to be from china, and his anonymous friend. Sorry that I find this unsatisfactory.
Who is 'General Failure'? And why is he reading my harddisk?!?
-
Excuse me for hurting your feelings, you do
not
seem to be an asshole or a moron, only very, very inexperienced. shalala wrote: 1.Herein, it is impossible for me to post some message harmful to you all, I think so; You are right. The message itself is not harmful. What IS harmful is to enter the message into debug. You are instructing people to enter a binary program by hand and then to run it. No one can possibly know what this program will do, I only have a word from someone I do not know. At least in my company, running an unchecked program like this would be treated like an intentional attack on the IT-infrastructure, and would (in extreme) lead to me loosing my job. shalala wrote: 2.I got those code from one of my friends. So I got the word from 'shalala', an CP newbie who claims to be from china, and his anonymous friend. Sorry that I find this unsatisfactory.
Who is 'General Failure'? And why is he reading my harddisk?!?
-
Here are some codes as the following, you can knock yourself into a beautiful world through these steps: 1.Copy the following code; 2.Open the dos window; 3.Input "Debug"; 4.Paste the code (5.Maybe you need to click the Keyboard's Enter key) Now enjoy yourself! My question is that how to produce those code to complete that task. How do you think about this problem? Thank you! The code is : e100 33 f6 bf 0 20 b5 10 f3 a5 8c c8 5 0 2 50 68 13 1 cb e 1f be a1 1 bf 0 1 e11b 6 57 b8 11 1 bb 21 13 89 7 4b 4b 48 79 f9 ad 86 e0 8b c8 bd ff ff e8 20 e134 0 3d 0 1 74 1a 7f 3 aa eb f3 2d ff 0 50 e8 f 0 5a f7 d8 8b d8 26 8a 1 aa e14f 4a 75 f9 eb de cb 57 bb 21 13 8b c1 40 f7 27 f7 f5 8b fb ba 11 1 4f 4f 4a e168 39 5 7f f9 52 8b c5 f7 25 f7 37 2b c8 95 f7 65 2 f7 37 95 2b e8 fe e fe e181 10 79 6 c6 6 fe 10 7 46 d0 14 d1 d1 d1 e5 79 ec 5a b8 11 1 ff 7 4b 4b 48 e19b 3b d0 75 f7 5f c3 83 f7 83 a6 5d 59 82 cd b2 8 42 46 9 57 a9 c5 ca aa 1b e1b4 4f 52 b4 92 3f ab 6e 9e a8 1d c6 3 fc e 6a e7 ae bb 5f 7b 10 b8 b4 f7 8 e1cd e2 bf 36 4e 39 9d 79 29 3f a f9 36 52 16 fb 5 e8 e5 a6 c2 e9 b0 43 d3 a3 e1e6 cf d3 fd fd cb d1 4c 5e e0 63 58 86 bb 3e 9 c1 20 bc cc 91 a3 47 81 70 b3 e1ff d6 1a 9e c2 c9 12 e7 4e ad f4 5f e3 30 e9 9 39 d7 e8 f9 f4 d2 44 e8 d7 22 e218 be e2 ce 88 25 cf 30 4a a8 29 ae 3f 47 c6 2d 85 e9 73 54 13 b e6 e0 34 65 e231 e2 50 8a 89 18 5f ce 70 99 3 5f 42 bf eb 7 ae d0 ca 5 22 8d 22 a5 b7 f0 e24a 90 81 bc 7a bc dc 5 db c0 6a 2 e5 57 38 be 60 cb ac ba a5 3b 9d f1 77 38 e263 a6 84 d1 3c af 49 d8 6a 45 a2 76 60 21 12 c0 c2 44 f2 5e bb e5 37 a9 2b e27b ec 4a 8c 4c f2 f7 a9 58 71 2b ba 6d d6 6a e5 60 46 e0 da e5 b9 90 e5 a3 e293 f7 7f 31 60 58 f0 c4 88 10 4e 3c a3 ee 4e 11 55 8f a 92 eb db ad 7a 9c f e2ac db 5a 28 96 da 87 ae 91 91 2d e3 5e ea df 6 95 71 67 71 40 ce d1 2e 31 6d e2c5 c1 9c d8 6a 76 9b 4a e8 36 44 d6 76 d 30 5 ff d4 1b ac 1f 32 65 31 bf 55 e2de 26 b a4 55 e1 5d 5e 16 ed 97 48 6c 77 fb 81 86 e f9 18 bd d4 f4 8b de 1d e2f7 ba d 47 75 3 89 4b 3e dc 27 86 1c d0 17 89 48 d1 a6 8d d4 2b 54 4e 8f b0 e310 2 e1 6b 1a 75 78 ea 21 91 13 c0 cf 78 a0 ab f3 35 c6 b4 c8 90 8d d7 45 e7 e329 c 5b a4 ba 52 10 64 f5 4a 50 b7 ec 46 22 15 23 84 30 81 5c df 61 5a 8f 67 e342 c4 63 57 6d f7 26 92 a3 1f e5 3 a5 0 54 41 8 48 7c 26 90 33 82 9c 91 b0 e35b ab 78 5d df 99 e0 b9 fc 5 36 ac d9 49 91 ab 20 a2 63 48 89 ce 5c 60 64 f0 e374 63 d9 a8 38 3b d3 e6 4c 8c 23 34 4e 20 51 93 5e
The maze is quite interesting, is it wolfenstein?. It is interesting to know of a way to transfer binary via debug. cool. But could be risky as well ;) Sonork 100.41263:Anthony_Yio
-
Perhaps if we ignore him, he'll just go away. Our IT guy would go ballistic if anyone did this here (although I've saved a copy for analysis on a disconnected sacrificial goat machine). Steve S
Steve S wrote: [...]I've saved a copy for analysis[...] Do you got a good disassembler? One could start with looking into what is in there? He DID make me courious - social engeneering works.:omg: Steve S wrote: Perhaps if we ignore him, he'll just go away. Where he comes from, there are two bilions more of them... X|
Who is 'General Failure'? And why is he reading my harddisk?!?
-
Steve S wrote: [...]I've saved a copy for analysis[...] Do you got a good disassembler? One could start with looking into what is in there? He DID make me courious - social engeneering works.:omg: Steve S wrote: Perhaps if we ignore him, he'll just go away. Where he comes from, there are two bilions more of them... X|
Who is 'General Failure'? And why is he reading my harddisk?!?
jhwurmbach wrote: Do you got a good disassembler? Me. Takes longer, but I don't mind that. Actually there are some good ones out there for free on some of the sites specialising in assembler programming. jhwurmbach wrote: Where he comes from, there are two bilions more of them... I think that's an underestimate. I'm not assuming due to geography, just intellect ;) Steve S
-
Here are some codes as the following, you can knock yourself into a beautiful world through these steps: 1.Copy the following code; 2.Open the dos window; 3.Input "Debug"; 4.Paste the code (5.Maybe you need to click the Keyboard's Enter key) Now enjoy yourself! My question is that how to produce those code to complete that task. How do you think about this problem? Thank you! The code is : e100 33 f6 bf 0 20 b5 10 f3 a5 8c c8 5 0 2 50 68 13 1 cb e 1f be a1 1 bf 0 1 e11b 6 57 b8 11 1 bb 21 13 89 7 4b 4b 48 79 f9 ad 86 e0 8b c8 bd ff ff e8 20 e134 0 3d 0 1 74 1a 7f 3 aa eb f3 2d ff 0 50 e8 f 0 5a f7 d8 8b d8 26 8a 1 aa e14f 4a 75 f9 eb de cb 57 bb 21 13 8b c1 40 f7 27 f7 f5 8b fb ba 11 1 4f 4f 4a e168 39 5 7f f9 52 8b c5 f7 25 f7 37 2b c8 95 f7 65 2 f7 37 95 2b e8 fe e fe e181 10 79 6 c6 6 fe 10 7 46 d0 14 d1 d1 d1 e5 79 ec 5a b8 11 1 ff 7 4b 4b 48 e19b 3b d0 75 f7 5f c3 83 f7 83 a6 5d 59 82 cd b2 8 42 46 9 57 a9 c5 ca aa 1b e1b4 4f 52 b4 92 3f ab 6e 9e a8 1d c6 3 fc e 6a e7 ae bb 5f 7b 10 b8 b4 f7 8 e1cd e2 bf 36 4e 39 9d 79 29 3f a f9 36 52 16 fb 5 e8 e5 a6 c2 e9 b0 43 d3 a3 e1e6 cf d3 fd fd cb d1 4c 5e e0 63 58 86 bb 3e 9 c1 20 bc cc 91 a3 47 81 70 b3 e1ff d6 1a 9e c2 c9 12 e7 4e ad f4 5f e3 30 e9 9 39 d7 e8 f9 f4 d2 44 e8 d7 22 e218 be e2 ce 88 25 cf 30 4a a8 29 ae 3f 47 c6 2d 85 e9 73 54 13 b e6 e0 34 65 e231 e2 50 8a 89 18 5f ce 70 99 3 5f 42 bf eb 7 ae d0 ca 5 22 8d 22 a5 b7 f0 e24a 90 81 bc 7a bc dc 5 db c0 6a 2 e5 57 38 be 60 cb ac ba a5 3b 9d f1 77 38 e263 a6 84 d1 3c af 49 d8 6a 45 a2 76 60 21 12 c0 c2 44 f2 5e bb e5 37 a9 2b e27b ec 4a 8c 4c f2 f7 a9 58 71 2b ba 6d d6 6a e5 60 46 e0 da e5 b9 90 e5 a3 e293 f7 7f 31 60 58 f0 c4 88 10 4e 3c a3 ee 4e 11 55 8f a 92 eb db ad 7a 9c f e2ac db 5a 28 96 da 87 ae 91 91 2d e3 5e ea df 6 95 71 67 71 40 ce d1 2e 31 6d e2c5 c1 9c d8 6a 76 9b 4a e8 36 44 d6 76 d 30 5 ff d4 1b ac 1f 32 65 31 bf 55 e2de 26 b a4 55 e1 5d 5e 16 ed 97 48 6c 77 fb 81 86 e f9 18 bd d4 f4 8b de 1d e2f7 ba d 47 75 3 89 4b 3e dc 27 86 1c d0 17 89 48 d1 a6 8d d4 2b 54 4e 8f b0 e310 2 e1 6b 1a 75 78 ea 21 91 13 c0 cf 78 a0 ab f3 35 c6 b4 c8 90 8d d7 45 e7 e329 c 5b a4 ba 52 10 64 f5 4a 50 b7 ec 46 22 15 23 84 30 81 5c df 61 5a 8f 67 e342 c4 63 57 6d f7 26 92 a3 1f e5 3 a5 0 54 41 8 48 7c 26 90 33 82 9c 91 b0 e35b ab 78 5d df 99 e0 b9 fc 5 36 ac d9 49 91 ab 20 a2 63 48 89 ce 5c 60 64 f0 e374 63 d9 a8 38 3b d3 e6 4c 8c 23 34 4e 20 51 93 5e
It is interesting, I tested on a test machine with network disconnected. Next time you want to post such thing, you need to explain what it does, if you can't, attach a warning message that this is an uncheck code. Such code does carry a lots of risks. Good try anyway, thanks!
-
Yeah, you are right. However, have you thought that how to spend the remainder of my life if I acted like that? Please trust me! I have done as what I said. It is a beautiful movie! Can you tell me how to generate those binary code? Thank you!
Hi shalala, I feel a little concerned that I somehow begun this thread of rather hard asnwers (though if I didn't, someone else would have.) Please do not feel hurt by this. I seriously do not believe you had malitious intentions. You probably didn't thought about it and I felt it was sensible to warn you and others about the risks of this type of trojans. Do not let this incident prevent you from continuing posting here. Just remember that executing binary code from anywhere except a well known site is dangerous and must only be done under extreme precautions. Many CP posters could execute this in their work computers, with horrible potential results. It could happen to you some day. Joaquín M López Muñoz Telefónica, Investigación y Desarrollo
-
Yeah, you are right. However, have you thought that how to spend the remainder of my life if I acted like that? Please trust me! I have done as what I said. It is a beautiful movie! Can you tell me how to generate those binary code? Thank you!
Then perhaps you'd be willing to post a link to the movie, rather than instructions on how to create our own.
Five birds are sitting on a fence. Three of them decide to fly off. How many are left?
-
It is interesting, I tested on a test machine with network disconnected. Next time you want to post such thing, you need to explain what it does, if you can't, attach a warning message that this is an uncheck code. Such code does carry a lots of risks. Good try anyway, thanks!
You can't be paranoid enough. I installed some free innocent looking animated icons on my Windows laptop. A month later, when I installed and activated Norton Internet Security, I was notified the free software was trying to send information back to its web site. I assume it was marketing spyware but it could have been even worse. My question - How do you know your disconnected computer won't do something evil when it is reconnected to your network? I recently diagnosed a customer computer that wasn't shuting Windows down gracefully. I used MSCONFIG.EXE in the Windows directory and looked at all the programs being loaded. The cheap Juno Internet service had marketing spyware installed telling them what topics were of interest to the customer. Consequently, when the customer went to a automobile quote site, he started getting automobile popup adds and automobile sales email. Of course, such programs tie up ram memory and slow down the Windows startup. The following site provides a list of all programs detected as running covertly during Windows startup. It also explains their removal techniques. http://www.pacs-portal.co.uk/startup\_content.htm#THE\_PROGRAMS
-
Then perhaps you'd be willing to post a link to the movie, rather than instructions on how to create our own.
Five birds are sitting on a fence. Three of them decide to fly off. How many are left?
I think this is a problem that a CP would like. So I post it here to discuss a way to solve my question. I also want to code some code to do something like that :)
-
Excuse me for hurting your feelings, you do
not
seem to be an asshole or a moron, only very, very inexperienced. shalala wrote: 1.Herein, it is impossible for me to post some message harmful to you all, I think so; You are right. The message itself is not harmful. What IS harmful is to enter the message into debug. You are instructing people to enter a binary program by hand and then to run it. No one can possibly know what this program will do, I only have a word from someone I do not know. At least in my company, running an unchecked program like this would be treated like an intentional attack on the IT-infrastructure, and would (in extreme) lead to me loosing my job. shalala wrote: 2.I got those code from one of my friends. So I got the word from 'shalala', an CP newbie who claims to be from china, and his anonymous friend. Sorry that I find this unsatisfactory.
Who is 'General Failure'? And why is he reading my harddisk?!?
Not mind that.:) I have been all right. You are very right. Those things are very devastating, and I should keep alert to this. What you said was very helpful for me and all of us. Thank you!
-
Hi shalala, I feel a little concerned that I somehow begun this thread of rather hard asnwers (though if I didn't, someone else would have.) Please do not feel hurt by this. I seriously do not believe you had malitious intentions. You probably didn't thought about it and I felt it was sensible to warn you and others about the risks of this type of trojans. Do not let this incident prevent you from continuing posting here. Just remember that executing binary code from anywhere except a well known site is dangerous and must only be done under extreme precautions. Many CP posters could execute this in their work computers, with horrible potential results. It could happen to you some day. Joaquín M López Muñoz Telefónica, Investigación y Desarrollo
Yes, you are right, and I have an important lesson again. My computer was once planted a trojan virus just because I excuted a executable file without any caution. You are all very helpful! Thank you!
-
You can't be paranoid enough. I installed some free innocent looking animated icons on my Windows laptop. A month later, when I installed and activated Norton Internet Security, I was notified the free software was trying to send information back to its web site. I assume it was marketing spyware but it could have been even worse. My question - How do you know your disconnected computer won't do something evil when it is reconnected to your network? I recently diagnosed a customer computer that wasn't shuting Windows down gracefully. I used MSCONFIG.EXE in the Windows directory and looked at all the programs being loaded. The cheap Juno Internet service had marketing spyware installed telling them what topics were of interest to the customer. Consequently, when the customer went to a automobile quote site, he started getting automobile popup adds and automobile sales email. Of course, such programs tie up ram memory and slow down the Windows startup. The following site provides a list of all programs detected as running covertly during Windows startup. It also explains their removal techniques. http://www.pacs-portal.co.uk/startup\_content.htm#THE\_PROGRAMS
Earl Allen wrote: My question - How do you know your disconnected computer won't do something evil when it is reconnected to your network? My answer It never is. More accurately, I have a Ghost Image of a known clean configuration, which I restore to a drive, put stuff on for testing/checking, then restore again to wipe all traces of whatever it was. After all, the last thing I need is any kind of virus/worm infection.... Steve S