|
Donations |
|
|
|
|
|
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
|
|
|
Survey |
|
|
|
|
|
|
|
|
Translate |
|
|
|
|
|
|
|
|
|
|
View previous topic :: View next topic |
Author |
Message |
TMOV
Colonel
Premium Member
Joined: Feb 05, 2004
Posts: 1590
Location: hovering nearby
|
Posted: Tue Apr 27, 2004 8:04 pm Post subject: removed post found by parputt |
|
|
Ikeb wrote: |
Quote: |
The topic or post you requested does not exist |
|
very unusual
Inbox :: Message
From: parputt
To: TMOV
Posted: Tue Apr 27, 2004 3:17 pm
Subject: Re: removal of my post ????? what the heck, over.
OK, I found the post and have pasted it here. Please copy and save it for now on your computer. I still do not know why it was moved, but I am thinking that "someone" did not like where you put it. Let me do some more investigating and I will get back to you. Here is the original post:
merijn,
i'm posting this now so that i have a place to go to,, quickly,, when i get a brainstorm.
this list of hijackers , i'm sure that it can be turned into a comparative list where the program can immediately identify and select the items which are the biggest or most immediate threat, and then send them to a vault or quarantine like an anti-virus program.
then have it so that they can be wiped or deleted safely.
i'm sure that you have thought about that.
placing instructions in front of and behind the string of code can isolate the items then the suffix can have a [.exe ]of it's own to send the string to a vault or to overide its own instruction to execute.
any thoughts on this?
i don't want any non merijn or novice in-put here.
so if you aren't from the organization that is writing this software and if you feel that you just can't control yourself , start your own thread for abstract conceptualization.
rsvp
T
edited 27apr2004time1247am
you could make it so that the hijackthis program is active and not just on demand,
so that it acts like trojan hunter guard , but stops known hijackers before they get on the clients system.
T
edited27apr2004time0127am
this list from Tony klein could be a starting point for this definition list to beat-up the hijackers with.
http://www.computercops.net/CLSID.html
T
_________________
"Never argue with an idiot. They will only bring you down to their level and beat you with experience".
tmov
|
|
Back to top |
|
|
|
|
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum
|
Powered by phpBB 2.0.8a © 2001 phpBB Group
Version 2.0.6 of PHP-Nuke Port by Tom Nitzschner © 2002 www.toms-home.com
Version 2.2 by Paul Laudanski © 2003-2004 Computer Cops
|