Skip to main content

View Post [edit]

Poster: rabid47 Date: Mar 15, 2015 2:56pm
Forum: movies Subject: Re: Warning- More Suspicious programs-Attention Jeff

Hey, Noah-8,

Are you aware that Blue-Ray films automatically download availabe additional content from the Internet when an Internet connection is made by the Blue-Ray player? That's why people pay extra for Blue-Ray films.... for the extra content that is available on the Internet.

Your concern for peoples welfare is appreciated, but it really isn't necessaary to panic people into thinking they are downloading a 'suspicious' program.

Not every file is a trojan. Just a 'heads-up' before you report every film that is ever uploaded to IA.


This post was modified by rabid47 on 2015-03-15 21:50:32

This post was modified by rabid47 on 2015-03-15 21:56:25

Reply [edit]

Poster: Noah 8-? Date: Mar 18, 2015 6:36am
Forum: movies Subject: Department of Redundancy Department?

Well act-u-ally... the Archive machine said that my first reply didn't make it sooooooo......... I attempted to do it again using the word processor on the isolation machine and reverse the process.
==========================================


Was I aware? Nope - - don’t care either….

However when I attempted to execute some of THESE offerings all of a sudden I was in for attempted downloads from websites unknown nor trusted; and they weren’t ‘Blue-Ray’ enhancements. All kinds of programs were being attempted to settle even as deep as my BIOS/kernel.

Fortunately I had downloaded onto a flash drive then examined the first few with the isolation laptop ($60 pawn shop special) which has its cloning duplicator safely stored upon a shelf - - - over there. If a program tries to do mischief that I cannot recover… it’s only on the isolation laptop which is subsequently wiped and re-cloned; as is the flash drive which transported it.

I HAVE had downloads attempt to secretly install spyware, external control hacks, and an infinity of advertising from popups to response demanding lecture adverts. Once awhile back a download even attempted to overspeed the hard-drive when I failed to follow its directions and attempted to remove it. Not good!

These here are uploads that all have .exe suffixes and I suspect them ALL to be as naughty as the first few that I examined.

Danger – Danger – Will Robinson ….. (appendages flailing)

Naughty uploader - - - naughty naughty

Noah 8-?


This post was modified by Noah 8-? on 2015-03-18 13:36:15

Reply [edit]

Poster: rabid47 Date: Mar 20, 2015 10:31pm
Forum: movies Subject: Re: Department of Redundancy Department?

Hey, Noah8-?,

That's my point.. If the Blue-Ray player can't display the additional content, it will download a program into the Blue-Ray player that CAN display it. As these are executable files, they carry the .exe file type. If someone has ripped a Blue-Ray disk and posted it online, it will contain the instructions to play it,too. Your best bet is to use real-time virus/trojan/malware scanning on your PC that will recognize malicious files, should you accidentally download one. If you use a Windows based system, I recommend Microsoft Security Essentials. It's effective, and free. Make sure to download the right version for your OS.

http://windows.microsoft.com/en-GB/windows/security-essentials-download

The above link might only be available to GB, but you can search for the version that's available for USA

This post was modified by rabid47 on 2015-03-21 05:31:33

Reply [edit]

Poster: Noah 8-? Date: Mar 21, 2015 6:13am
Forum: movies Subject: Naughty contributions that wanna put stuff onto the recipient

That's well and good... But anti-badness recognition is only as good as the algorithms incorporated... and THAT is becoming a VERY large group. Of course we do have the file examiner programs involved BUT for an unbeatable protection (for my purposes) an off-line isolation system captures and eliminates ALL the baddies.

Had a Bible program once that sneaked the C-Virus into the BIOS and then a 'time bomb' (delayed activation) hidden in the registry. Whotta Mess! After purging the Isolation 'puter down to and including a complete EPROM reset we used a second set of observation software and psuedo home addresses imitating Windows but actually used a Unix based hardened platform. Screen one displayed a usual Windoes computer desktop with a handfull (fistfull) of data scattered around. The other screen showed the entire Isolated structure. Clock speed was set to 1/110th normal to allow us humans to watch the attack when the suspicious file was copied into the "download" subdirectory. A relational clock function brought the germ to its awakening point and then it began to invade what it thought was Jo Shmoe's home station. And THAT's as far as WE went. We put the Suspicious contribution onto a form of CD and shipped it off to wiser folks than us for a more thorough examination... MUCH more thorough.

Maybe you could get Jeff to burn you a few of these suspicious files onto a cd and get them mailed to you.... then you could see for yourself just what they were attempting.

For now they seem to be either safely quarantined or safely GONE.

I saw where another latest version of Beauty An The Beast showed up via torrent and shortly disappeared. I'l just betcha that was the latest and greatest version starring Emma Watson (Harry Potter movies) - an' I'm not sure of that particular version having even been released yet. I'd kinda liketa glom that one myself.

See you in the funny papers...

Noah 8-?

Reply [edit]

Poster: Noah 8-? Date: Mar 18, 2015 5:53am
Forum: movies Subject: Re: Warning- More Suspicious programs-Attention Jeff

Was I aware? Nope - - -

But these programs when the attempt was made to execute them began to suddenly attempt to download all kinds of other Shareware, Spyware, and Adware onto my remote that has no internet connection.

You see once I download something from here it goes to flash drive ant then to the isolation machine that has a completely cloned drive sitting on the shelf.

I HAVE downloaded a coupla real nasties that that attempted to take over and once attempted to destroy the onboard hard drive if it wasn't allowed to show all kinds of pop-up ads everywhere.

Ergo an isolation pre-view System... and some of these offering are naughty!

Noah 8-?