New Virus threat

Message boards : Science (non-SETI) : New Virus threat
Message board moderation

To post messages, you must log in.

AuthorMessage
Profile skildude
Avatar

Send message
Joined: 4 Oct 00
Posts: 9541
Credit: 50,759,529
RAC: 60
Yemen
Message 1190944 - Posted: 2 Feb 2012, 13:52:17 UTC - in response to Message 1190929.  

why did my computer say loading after I clicked on the link ; )


In a rich man's house there is no place to spit but his face.
Diogenes Of Sinope
ID: 1190944 · Report as offensive
Profile Gary Charpentier Crowdfunding Project Donor*Special Project $75 donorSpecial Project $250 donor
Volunteer tester
Avatar

Send message
Joined: 25 Dec 00
Posts: 31001
Credit: 53,134,872
RAC: 32
United States
Message 1190959 - Posted: 2 Feb 2012, 14:45:31 UTC

Just tell your computer to ignore HTML and you will be fine. Hasn't this been around forever? Wasn't the first wave jpg files that automatically load when you read the e-mail? So now it is java scripts in HTML. BFD. Insist on ASCII.


ID: 1190959 · Report as offensive
Profile tullio
Volunteer tester

Send message
Joined: 9 Apr 04
Posts: 8797
Credit: 2,930,782
RAC: 1
Italy
Message 1190988 - Posted: 2 Feb 2012, 16:32:34 UTC

I am using NoScript, an add-on on Firefox.
Tullio
ID: 1190988 · Report as offensive
Profile Cheng Fan Soon

Send message
Joined: 3 Oct 05
Posts: 76
Credit: 4,581,394
RAC: 15
Malaysia
Message 1191518 - Posted: 4 Feb 2012, 19:34:01 UTC

Am i right of saying this:

"When my pc infected with malicious software (sent by the hacker),
and the hacker take over my pc (or my pc got hijacked by the hacker).
It is like the hacker sitting infront of my pc.
He can do what ever he like...download/upload any files/pictures he like.

But the person who face the consequences is me because it is my pc and the internet account is under my name. The hacker is totally hidden, i don't know who the hacker is, and the ISP also unable to trace who the hacker is?

ID: 1191518 · Report as offensive
Profile SciManStev Crowdfunding Project Donor*Special Project $75 donorSpecial Project $250 donor
Volunteer tester
Avatar

Send message
Joined: 20 Jun 99
Posts: 6658
Credit: 121,090,076
RAC: 0
United States
Message 1191526 - Posted: 4 Feb 2012, 19:44:28 UTC - in response to Message 1191518.  

Am i right of saying this:

"When my pc infected with malicious software (sent by the hacker),
and the hacker take over my pc (or my pc got hijacked by the hacker).
It is like the hacker sitting infront of my pc.
He can do what ever he like...download/upload any files/pictures he like.

But the person who face the consequences is me because it is my pc and the internet account is under my name. The hacker is totally hidden, i don't know who the hacker is, and the ISP also unable to trace who the hacker is?


Yes, you are right. Many times a computer can be turned into a zombie, directed to attack anything from government installations, to power companies, all without the knowledge of the computers owner. It is usually easy to determine the attack didn't come from your computer, but it requires the police, or other law enforcement organizations coming into your home and confiscating your computer to find out what's going on. Your computer will be returned to you, but not before it has been gone through thoroughly for a second time. The virus writer has most likely already gone through it once you were infected the first time, so your system and privacy can be violated two or even more times through no fault of your own.

Steve
Warning, addicted to SETI crunching!
Crunching as a member of GPU Users Group.
GPUUG Website
ID: 1191526 · Report as offensive

Message boards : Science (non-SETI) : New Virus threat


 
©2024 University of California
 
SETI@home and Astropulse are funded by grants from the National Science Foundation, NASA, and donations from SETI@home volunteers. AstroPulse is funded in part by the NSF through grant AST-0307956.