![]() |
SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997 |
|
![]() |
#1 |
SUBSIM Newsman
|
I never open unknown files, they usually come to the spam pile and filtered out, lucky that you were able to restore the computer anyways.
__________________
Nothing in life is to be feard,it is only to be understood. Marie Curie ![]() |
![]() |
![]() |
![]() |
#2 |
Chief of the Boat
|
![]()
NEVER open anything from unknown sources...at the very least scan it with whatever programmes you have.
|
![]() |
![]() |
![]() |
#3 |
Navy Seal
![]() Join Date: May 2007
Location: On a mighty quest for the Stick of Truth
Posts: 5,963
Downloads: 52
Uploads: 0
|
It's artsy fartsy but, there's Trojans in that horse.
Leave it outside the gate. We're going to burn it in the morning.
![]() My mail stays on the server at my ISP and I never open attachments of any kind or click on embedded links.
__________________
![]() Tomorrow never comes |
![]() |
![]() |
![]() |
#4 |
Navy Seal
![]() |
![]()
Thanks for the warning, but remember he didn't open any attachment all he did is read it. If you are clicking next you can't help, but read the next one.
I wonder what the future holds for these bad guys? I wonder how they get their jolly's doing this? I wonder who ever gets caught and when they do get caught ... I wonder what kind of sentence do they get? Here's two more to watch out for: check card scam artist got me for close to $20.00 day after Christmas from somewhere overseas for items I did not order. checkcard TDWCS.com $9.84 checkcard CWEBCS.com $9.84 |
![]() |
![]() |
![]() |
#5 |
Eternal Patrol
![]() |
![]()
"Next"? My mail server doesn't have "Next" button. It just puts them all up for me to open or delete. I never open anything I don't recognize. The funny part is that there seems to be someone out there who sends me emails under the names of people I know. It's easy enough to avoid them because they are never about anything those people would send me.
__________________
“Never do anything you can't take back.” —Rocky Russo |
![]() |
![]() |
![]() |
#6 |
Sea Lord
![]() Join Date: Sep 2006
Location: Adelaide, South Australia
Posts: 1,952
Downloads: 207
Uploads: 0
|
![]()
Fed-Ex is another one that pops up quite regularly too.
|
![]() |
![]() |
![]() |
#7 |
Soaring
|
![]()
A system that got compromised, remains to be compromised, no matter what deletion, repair or clever mind stuff implemented - once compromised, forever compromised. You just cannot be certain that your repairing attempts were really successfull, you cannot rule out that something wicked survived. It's like with Carpenter's movie "The Thing".
And there is really some clever malware code out there these days. Stuff that you get infested by by said stuff landing on your HD , you must not even open or activate something anymore, or press a button. And that is email only. Drive-by-infections during normal browsing is a completely new ballgame. Your get directed by a pop up window to another website - and by that autodirection you already got infested. Thats why I am in a sandbox, tend to use TOR or VPN on occasions, but also have Java, Javascript, scripts and stuff like that usually shut down, and have switched off all automatically functioning stuff in the browser where possible. Well, almost all such stuff. Some less candy and FX that way, yes, but its worth it. If there is problems, or suspicion, do not trust system restore points, they already can be infested as well. Run the Klingon strategy instead: attack frontally and destroy the whole planet; delete the HD, means: re-format, switch off power, reformat again and switch off power again; copy an image from a HD that you stored physically disconnected form the system. Really clever malware even can survive formatting by harddrives and physically power interruption, just to scare you a bit. that's why it is good to cut power in a brute fashion: olull the plug, do not log off and close windows - some malware write itself to the HD again already, some code that protects the malware infested part of the HD from being formatted next time the format command is given. Regarding computers, paranoia is a virtue. I replace the complete HD every 18 months now. Regarding email management, in the past I used to change email addresses constantly,m every couple of moths, every time I started to receive spam. I used the same name, just added "01", "02", "03" to it, to all names I used for different email addresses. That made it easier to keep track of it. I also had several email addresses, some for trusted people, some for one-way interactions, some for a forum entry, and so on. 100% safety is impossible these days, none of the methods above give you that, nor do live scanners, firewalls and such. You can just reduce the probability of getting hit. When you step into dog sh!t, then you have stepped into dog sh!t. Overkill the system then. Most infestations get spread by private systems whose owners have no clue that their systems are infested. That's why I am extremely angry at people who sometimes boast on some forums that they do not care for security and do not use any protective measure at all, saying their surfing habits and guts feeling is their guidance. They are either extremely antisocial, or they do not know what they are talking of .
__________________
If you feel nuts, consult an expert. |
![]() |
![]() |
![]() |
#8 |
Navy Seal
![]() Join Date: Feb 2009
Location: Kentucky
Posts: 5,421
Downloads: 85
Uploads: 0
|
![]()
I recon that these scams must work well enough or they'd not bother.They most likely send out several thousand at a time and the majority do not bite but when it all just spamming out anyway it is not like it takes much effort.
I also have a feeling that many of these e-mails are coming from "zombie computers" that have already been infected and it just propagates even if the majority do not fall some will. http://en.wikipedia.org/wiki/File:Circle_of_spam.svg What Skybird said is true a system Restore will not do anything to a virus in most cases unless it is a real amateur job.Usually they simply hide themselves in the system restore temporary files which means they'll come right back and the better ones will lay dormant for a few hours or days. P.S. I love No Script. |
![]() |
![]() |
![]() |
Thread Tools | |
Display Modes | |
|
|