fattymcbluff Posted May 25, 2005 CID Share Posted May 25, 2005 I was reading the paper and i saw that someone came out with a new trogen that locks most of you .doc .jpg .exl files and you have to send then some $$$ to get the key to unlock the files ill serch more about this thing, thank god I use firefox Quote Link to comment Share on other sites More sharing options...
8526_1443013986 Posted May 25, 2005 CID Share Posted May 25, 2005 Its All Here =] http://msn-cnet.com.com/Online+extortionists+encrypt+files%2C+hold+them+for+ransom/2100-7349_3-5718678.html?part=msn-cnet&subj=ns_5718678&tag=msn_security Quote Link to comment Share on other sites More sharing options...
fattymcbluff Posted May 25, 2005 Author CID Share Posted May 25, 2005 hers a link if they ask for a id and pass use mine [email protected] pass=3403584 http://www.venturacountystar.com/vcs/business/article/0,1375,VCS_128_3804545,00.html Quote Link to comment Share on other sites More sharing options...
peepnklown Posted May 25, 2005 CID Share Posted May 25, 2005 Fire-fox Quote Link to comment Share on other sites More sharing options...
fattymcbluff Posted May 25, 2005 Author CID Share Posted May 25, 2005 THATS WHEN THEY DO Quote Link to comment Share on other sites More sharing options...
fattymcbluff Posted May 25, 2005 Author CID Share Posted May 25, 2005 READ THE ARTICAL IT A FLAW IN IE Quote Link to comment Share on other sites More sharing options...
peepnklown Posted May 26, 2005 CID Share Posted May 26, 2005 You don Quote Link to comment Share on other sites More sharing options...
Azag Posted May 26, 2005 CID Share Posted May 26, 2005 Both peepnklown and CRE8OR make excellent well thought out points. And I myself as a matter of personal opinion and experience have no browser allegiance to either the IE or Firefox bandwagons. I think the complexity of using an exploit plus cryptographic techniques was brilliant and I am quite sure you will see this sort of technique in net worms and botnets in the very near future. I'd guess over this next year since I've seen the idea talked about for a while now but only a few have tried this and even less in public eye until now. The dumb part was the implementation of how the dummy sent a ransom note with his/her email to be tracked back but neat try... The truth is I haven't seen any browser or software that doesn't have a security hole found or could be found or created if someone wanted too. As is pointed out by both the posters I previously mention the exploit game relies heavily on the sheer number of people using the software the more people using some software the more likely that you can find a vulnerable system and thus many more victims than is the case with software not as common place. Many Linux and Mac OS and or less popular operating systems often advocate the use of their OS and it's software is more secure and their arguments that they have security MS is evil and they never see security holes/exploits or worms is quite ignorant and idiotic in my opinion and hopefully anyone who takes an unbiased look around for some truth. Popular software will always be the 1st and biggest target period. But don't think Linux or other distros or even Firefox is immune or a really hardened target this takes programming and user diligence to stay on top of exploits. I see Linux, Samba, Debian, and other less commonly used OS and software getting new Proof of Concept (PoC) and run of the mill security holes all the time they are neither immune nor without flaw. If you want some links for such things just ask. If anything the Open Source software would actually be more ripe for the sploiting than proprietary software by it's nature because if you can see the code it's much easier to find potential holes in it or situtations the author(s) might never had made a contingency for them yet. And don't get me wrong I support open source and full disclosure of security exploits and issues. On the good side and a great benefit of Open Source software is the community who has the sources can then work on patches and help development and further improve the software like a hive of bees building a stronger nest and will many more bees than say a small proprietary software company with limited resources and people to fix or check for potential problems. Also much the same could be said for distributed computing to solve a password for really strong encryption vs a single brute force hacker. Well you get the point. Anyway before FireFox fans get to comfortable in their towers of babel (pun intended lol ) take a look at the link below and realize that this one guy is probably why FireFox is on v1.0.4 and not on v1.0.3 or earlier at the moment And for those whom might want to flame me about bashing FF, well I really am not, in fact I'm using FireFox right now... Here is the link to many exploits for which the writer has collected the bounty awards for finding 5 confirmed holes in FireFox so far. It's a good thing he is on the nice side of hacking and not silently exploiting people in the underground en mass ROFLMAO :haha: Here is link already before I ramble any more, chew on this for a while: http://www.mikx.de/ Peace, Azag Quote Link to comment Share on other sites More sharing options...
fattymcbluff Posted May 26, 2005 Author CID Share Posted May 26, 2005 i dident try to i was playing cs and caps is my walk button and it was on ok Quote Link to comment Share on other sites More sharing options...
resijs Posted May 26, 2005 CID Share Posted May 26, 2005 That's, just messed up. lol, use / for run. Quote Link to comment Share on other sites More sharing options...
xyther4523 Posted May 26, 2005 CID Share Posted May 26, 2005 ctrl - crouch left shift - walk auto run always on ) haha i play CS when i can =P Quote Link to comment Share on other sites More sharing options...
fattymcbluff Posted May 26, 2005 Author CID Share Posted May 26, 2005 i like my way Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.