Skip to main content

View Post [edit]

Poster: rabid47 Date: Mar 20, 2015 10:31pm
Forum: movies Subject: Re: Department of Redundancy Department?

Hey, Noah8-?,

That's my point.. If the Blue-Ray player can't display the additional content, it will download a program into the Blue-Ray player that CAN display it. As these are executable files, they carry the .exe file type. If someone has ripped a Blue-Ray disk and posted it online, it will contain the instructions to play it,too. Your best bet is to use real-time virus/trojan/malware scanning on your PC that will recognize malicious files, should you accidentally download one. If you use a Windows based system, I recommend Microsoft Security Essentials. It's effective, and free. Make sure to download the right version for your OS.

http://windows.microsoft.com/en-GB/windows/security-essentials-download

The above link might only be available to GB, but you can search for the version that's available for USA

This post was modified by rabid47 on 2015-03-21 05:31:33

Reply [edit]

Poster: Noah 8-? Date: Mar 21, 2015 6:13am
Forum: movies Subject: Naughty contributions that wanna put stuff onto the recipient

That's well and good... But anti-badness recognition is only as good as the algorithms incorporated... and THAT is becoming a VERY large group. Of course we do have the file examiner programs involved BUT for an unbeatable protection (for my purposes) an off-line isolation system captures and eliminates ALL the baddies.

Had a Bible program once that sneaked the C-Virus into the BIOS and then a 'time bomb' (delayed activation) hidden in the registry. Whotta Mess! After purging the Isolation 'puter down to and including a complete EPROM reset we used a second set of observation software and psuedo home addresses imitating Windows but actually used a Unix based hardened platform. Screen one displayed a usual Windoes computer desktop with a handfull (fistfull) of data scattered around. The other screen showed the entire Isolated structure. Clock speed was set to 1/110th normal to allow us humans to watch the attack when the suspicious file was copied into the "download" subdirectory. A relational clock function brought the germ to its awakening point and then it began to invade what it thought was Jo Shmoe's home station. And THAT's as far as WE went. We put the Suspicious contribution onto a form of CD and shipped it off to wiser folks than us for a more thorough examination... MUCH more thorough.

Maybe you could get Jeff to burn you a few of these suspicious files onto a cd and get them mailed to you.... then you could see for yourself just what they were attempting.

For now they seem to be either safely quarantined or safely GONE.

I saw where another latest version of Beauty An The Beast showed up via torrent and shortly disappeared. I'l just betcha that was the latest and greatest version starring Emma Watson (Harry Potter movies) - an' I'm not sure of that particular version having even been released yet. I'd kinda liketa glom that one myself.

See you in the funny papers...

Noah 8-?