Latest Shouts In The Shoutbox -- View The Shoutbox
The shoutbox is currently offline!

[ Smilies | BBCodes ]

     
 
Click Here and visit PuPPs FREE StuFF

This website contains controversial information that may be disturbing to some viewers.
The theories, conclusions and commentaries are presented in an attempt to reveal the hidden truths.
It is up to the viewer to determine what they choose to believe after evaluating all available sources of information.

 
     

NO TAXATION WITHOUT REPRESENTATION
Does your government represent your best interests?


     
 
"Our lives begin to end the day we become silent about things that matter."
~ Dr. Martin Luther King Jr.



POLITICAL ART GALLERY



IMPORTANT TOPICS

1. U.S. NEWS MEDIA CAN LEGALLY LIE TO YOU
There is no law preventing the U.S. news media from intentionally lying to the public. Whistle blowers and honest reporters are fired for telling the truth.

2. FLUORIDE IS A TOXIN/POISON
Read the Poison Warning label on your toothpaste, then call the 800# and ask;
"Why do you put poison in my toothpaste?"

3. NEW FLU VACCINE IS LOADED WITH MERCURY
by Dr. Joseph Mercola

4. PEDOPHILES IN HIGH PLACES
Also: Conspiracy of Silence Video

5. ASPARTAME IS HARMFUL
Equal, Nutra-Sweet and over 6000 food and beverage products contain Aspartame

6. On September 10, 2001, Donald Rumsfeld held a press conference to disclose that over $2,000,000,000,000 (2 Trillion) in Pentagon funds could not be accounted for.
Such a disclosure normally would have sparked a huge scandal. However, the commencement of the [9/11] attack on the World Trade Center and The Pentagon the following morning would assure that the story remained buried.


http://drinkingwaterlosangeles.com
Serving the greater Los Angeles area,
Los Angeles Drinking Water is proud to offer Reverse Osmosis filtration systems
that remove trace elements such as arsenic, mercury, lead and fluoride
which are known to be in Los Angeles tap water according to
the 2013 DWP Water Quality report.
POLITICAL ART GALLERY









"If our nation is ever taken over, it will be taken over from within."
~ James Madison, President of the United States

  Reply to this topicStart new topicStart Poll

> Nailed by Website Trojan Virus, CAUTION: DO NOT CLICK ON SPAMMER LINKS


Master Of His Domain
******
Group: Admin
Posts: 12736
Member No.: 8
Mood: 



Posted: Jul 26 2006, 08:32 AM
Quote Post
Recently a new member, "publock" posted a link and instead of deleting it like I normally do, I decided to check it out.

(I believe the website was publock.com, but once I went there I was redirected to another website --- DO NOT go there unless you wish to be infected)

It ran some type of applet, and even with my high security settings, it infected my PC with a trojan virus from just opening the webpage.

Several new files magically appeared in my WINDOWS/SYSTEM folder
(I did NOT click on them nor did I download anything, I simply opened a webpage)

upnp.exe

regserv.dll
regserv.exe

scvhostw.dll
scvhostw.exe

The .exe files above were somehow installed into my start up menu and were attempting to send out information to these IP addresses:

65.19.154.28

69.50.176.34




--------------------
QUOTE
"Ye shall know them by their fruits"
~ Matthew 7:16

"Believe nothing. No matter where you read it, or who said it, even if I have said it, unless it agrees with your own reason and your own common sense."
~ Buddha
PMEmail PosterUsers WebsiteAOL
Top


Master Of His Domain
******
Group: Admin
Posts: 12736
Member No.: 8
Mood: 



Posted: Jul 27 2006, 07:39 AM
Quote Post
From another forum:

QUOTE
IP Address: 65.19.154.28
HostName: 65.19.154.28
DShield Profile:
Country: US US
Contact E-mail:
AS Number: 6939
AS Name: Hurricane Electric
AS Contact: abuse@he.net

Comments: This IP is used as a DNS server. False positives are common for DNS servers.

Update Summary
Whois:

[Querying whois.arin.net]
[whois.arin.net]
Hurricane Electric HURRICANE-4 (NET-65-19-128-0-1)
65.19.128.0 - 65.19.191.255
McColo Corporation HURRICANE-CE1548-0926 (NET-65-19-154-0-1)
65.19.154.0 - 65.19.154.127

# ARIN WHOIS database, last updated 2006-07-26 19:10
# Enter ? for additional hints on searching ARIN's WHOIS database.
-----------------------

IP Address: 69.50.176.34
HostName: 69.50.176.34
DShield Profile:
Country: US US
Contact E-mail:
AS Number: 27595
AS Name: ATRIV Atrivo
AS Contact:

Comments: This IP is used as a DNS server. False positives are common for DNS servers.

Update Summary
Whois:

[Querying whois.arin.net]
[Redirected to rwhois.intercage.com:4321]
[Querying rwhois.intercage.com]
[rwhois.intercage.com]
%rwhois V-1.5:0010b4:00 rwhois.intercage.com (jrwhois.p5 V-0.6.0)
network:Class-Name:network
network:Auth-Area:69.50.160.0/19
network:ID:1160949792/29
network:Handle:CUSTBLK-69-50-176-32-29
network:IP-Network:69.50.176.32/29
network:IP-Network-Block:69.50.176.32 - 69.50.176.39
network:Org-Name:Cernel, Inc.
network:Street-Address:Legal Department (support@cernel.net)
23404 W. Lyons Ave #223
network:City:Santa Clarita
network:State:CA
network:Postal-Code:91321
network:Country-Code:USA

network:Class-Name:network
network:Auth-Area:69.50.160.0/19
network:ID:1160945664/19
network:Handle:69.50.160.0/19
network:Description:name
network:IP-Network:69.50.160.0/19
network:IP-Network-Block:69.50.160.0 - 69.50.191.255

%ok searched for 69.50.176.34/32 1160949794 and found 2 records




--------------------
QUOTE
"Ye shall know them by their fruits"
~ Matthew 7:16

"Believe nothing. No matter where you read it, or who said it, even if I have said it, unless it agrees with your own reason and your own common sense."
~ Buddha
PMEmail PosterUsers WebsiteAOL
Top


Master Of His Domain
******
Group: Admin
Posts: 12736
Member No.: 8
Mood: 



Posted: Jul 31 2006, 04:29 PM
Quote Post
This ole computer is thrashed, my Nortons Anti-virus cannot help me so I may be gone for awhile.

Peace, Mark

P.S. No new member registrations will be approved while I am gone and guest posting has been disabled.





--------------------
QUOTE
"Ye shall know them by their fruits"
~ Matthew 7:16

"Believe nothing. No matter where you read it, or who said it, even if I have said it, unless it agrees with your own reason and your own common sense."
~ Buddha
PMEmail PosterUsers WebsiteAOL
Top


Master Of His Domain
******
Group: Admin
Posts: 12736
Member No.: 8
Mood: 



Posted: Aug 3 2006, 06:45 AM
Quote Post
Due to weblink spammer invasion I may have accidently deleted some legitimate new members.

Please re-register again and you should be validated.

Email addresses using Cashette.com and Mail.ru will not be approved.




--------------------
QUOTE
"Ye shall know them by their fruits"
~ Matthew 7:16

"Believe nothing. No matter where you read it, or who said it, even if I have said it, unless it agrees with your own reason and your own common sense."
~ Buddha
PMEmail PosterUsers WebsiteAOL
Top


Minister Of Information
****
Group: Members
Posts: 393
Member No.: 581
Mood: 



Posted: Aug 6 2006, 03:33 PM
Quote Post
PCpunch.gif PCpunch.gif PCpunch.gif PCpunch.gif PCpunch.gif PCpunch.gif PCpunch.gif

Dumb Computer's at times. lol.gif
Well Yesterday my Comp got a HELL cleaning out.
What wre couldn't delete............................ we Disabled.
wow2.gif The difference is like . scratchinghead.gif
censored.gif Amazing.
I still have to increase my mb ...............but that's just nothing too big.

It's like I have a brand new Comp again. clapping.gif

so ...................................
right no- one read this. Cause now I will get hacked again. pullhair.gif

clubinhand.gif

DARKRAVENESS xxxxxx

crazy.gif




--------------------
"Foolish is the man who never reads a newspaper; even more foolish is the man who believes what he reads just because it is in the newspaper."

- August von Schlozer, German historian and journalist of the late 18th century.
PMEmail Poster
Top


Minister Of Information
****
Group: Members
Posts: 473
Member No.: 146
Mood: 



Posted: Aug 9 2006, 03:43 PM
Quote Post
I just tweaked my comp today...It was taking 2-3 for a page to load.



PMEmail Poster
Top


Hoss the SURVIVER
******
Group: Members
Posts: 1055
Member No.: 261
Mood: 



  Posted: Sep 25 2006, 02:02 PM
Quote Post
HI ALL

IT SEEMS we have a new IE hole.

Spyware, Bots, Rootkits Flooding Through Unpatched IE Hole
http://www.eweek.com/article2/0,1895,2017620,00.asp
ess than 24 hours after researchers at Sunbelt Software discovered an active malware attack against fully patched versions of Windows, virus hunters say the Web-based exploits are serving up botnet-building Trojans and installations of ad-serving spyware.
"This is a massive malware run," says Roger Thompson, chief technical officer at Atlanta-based Exploit Prevention Labs. In an interview with eWEEK, Thompson confirmed the drive-by attacks are hosing infected machines with browser tool bars and spyware programs with stealth rootkit capabilities.
The laundry list of malware programs seeded on Russian porn sites also includes a dangerous keystroke logger capable of stealing data from computers and a banker Trojan that specifically hijacks log-in information from financial Web sites.
According to Sunbelt Software researcher Eric Sites, the list of malware programs includes VirtuMonde, an ad-serving program that triggers pop-ups from Internet Explorer; Claria.GAIN.CommonElements, an adware utility; AvenueMedia.InternetOptimizer; and several browser plug-ins and tool bars and variants of the virulent Spybot worm.
eWEEK has confirmed the flaw—and zero-day attacks—on a fully patched version of Windows XP SP2 running IE 6.0. There are at least three sites hosting the malicious executables, which are being served up on a rotational basis.
In some cases, a visit to the site turns up an error message that reads simply: "Err: this user is already attacked."
The attack is closely linked to the WebAttacker do-it-yourself spyware installation tool kit. On one of the maliciously rigged Web sites, the attack code even goes as far as referencing the way Microsoft identifies its security patches, confirming fears that a well-organized crime ring is behind the attacks.
The URL that's serving up the exploit includes the following: "MS06-XMLNS&SP2," a clear reference to the fact that the flaw is a zero-day that will trigger a quick patch from Microsoft.
A Microsoft spokesman said the company is aware of the public release of detailed exploit code that could be used to exploit this vulnerability. "Based on our investigation, this exploit code could allow an attacker to execute arbitrary code on the user's system. Microsoft is aware of limited attacks that attempt to exploit the vulnerability," the spokesman said in a statement sent to eWEEK.
The company plans to ship an IE patch as part of its October batch of updates due Oct. 10. An emergency, out-of-cycle patch could be released if the attacks escalate.
Microsoft has added signature-based detection to its Windows OneCare anti-virus product. A formal security advisory with pre-patch workarounds will be posted within the next 24 hours.
Check out eWEEK.com's Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer's Weblog.
########################

Zero-Day Response Team Launches with Emergency IE Patch
http://www.eweek.com/article2/0,1895,2019162,00.asp


A high-profile group of computer security professionals scattered around the globe has created a third-party patch for the critical VML vulnerability as part of a broader effort to provide an emergency response system for zero-day malware attacks.


The group, known as ZERT (Zero Day Emergency Response Team), was formed in the aftermath of the WMF (Windows Metafile) attacks of December 2005 and is now emerging from stealth mode with an unofficial patch that offers temporary respite from a spate of drive-by malware downloads aimed at users of Microsoft's Internet Explorer browser.
The patch, which was created and tested by a roster of reverse engineering gurus and virus research experts, is available from the ZERT Web site for Windows 2000 SP4, Windows XP (SP1 and SP2), Windows Server 2003 (SP1 and R2 inclusive).
http://isotf.org/zert/download.htm


"Something has to be done about Microsoft's patching cycle. In some ways, it works. But, in other ways, it fails us," says Joe Stewart, a senior security researcher with SecureWorks, in Atlanta.
"It is clear that we are dealing with an underground group of people who are writing exploits for profits. They are waiting for Patch Tuesday to pass, then it becomes Exploit Wednesday. We're seeing these zero-days in the wild, timed precisely to guarantee at least an entire month to spread," Stewart said in an interview with eWEEK.
Stewart, who is volunteering his reverse-engineering skills and time to ZERT in his private capacity, wrote an early version of the VML (Vector Markup Language) patch the group released Sept. 22 and worked closely with others to fine-tune the update to minimize potential glitches.
Other volunteers involved with the ZERT initiative include Halvar Flake, CEO and head of research at Sabre Security; Ilfak Guilfanov, author of the IDA Pro binary analysis tool; Paul Vixie, founder of the ISC (Internet Software Consortium; Roger Thompson, chief technology officer of Exploit Prevention Labs; and Florian Weimer, a German computer expert specializing in Linux and DNS (Domain Name System) security..
Gadi Evron, an Internet security operations specialist well-known in botnet-hunting circles, is operations manager for ZERT. Nick FitzGerald, former editor of Virus Bulletin, is serving as liaison between the group and the anti-virus community while Dan Hubbard, senior director of security and technology research at Websense Security Labs, is volunteering technical assistance during zero-day outbreaks.
Hank Nussbacher, an Internet consultant specializing in Cisco IOS, routing design and threat analysis, is serving as go-between for ZERT and FIRST, an international forum for incident response and security teams.
"Whenever there's a vulnerability in the wild that is critical enough to threaten the health of the Internet, we want to have a mechanism to respond immediately. We can't afford to sit around and wait a month for a vendor [to release a patch]," Evron said in an interview.
Evron, who works as a security evangelist for Beyond Security, in Netanya, Israel, said ZERT volunteers have worked "literally around-the-clock" in coordination with several Internet operational security and incident response groups to create and perform quality-assurance testing on the VML patch.
"We're not here to replace [software] vendors. The idea is to provide quick, immediate response to threats when we determine that a zero-day threat is posing a serious risk to the public and the infrastructure of the Internet. We're saying, 'here's a temporary patch that we tested and we're confident will help mitigate the risk'. We can't guarantee it is fit for every environment, but we're offering it as an option," Evron added.
Microsoft has historically frowned on the idea of third-parties providing security fixes. At the height of the WMF exploits earlier this year, the company slapped a "buyer-beware" tag on an unofficial hotfix created and released by Guilfanov, and although its own fix for the latest VML bug is scheduled for delivery on Oct. 10—more than two weeks away—the company's stance hasn't changed.
[We] carefully review and test security updates and workarounds to ensure that they are of high quality and have been evaluated thoroughly for application compatibility. Microsoft cannot provide similar assurance for independent third-party security updates or mitigations," a Microsoft spokesperson said in a statement sent to eWEEK. "Customers should obtain security updates and guidance from the original software vendor," it added.

Evron acknowledged that it's impossible for ZERT to test its patches with every possible system configuration and in every usage scenario. "We [will] validate patches to the best of our ability, noting the environments in which the tests were performed and the test results. We're not pretending to be the official patch, we're simply offering an alternative during high-risk incidents," he added.
He said the nonprofit group will prepare and release emergency patches for any affected vendor if an incident escalates to become a major threat. "We have the expertise to create patches for non-Microsoft related issues, such as network gear and other operating systems," Evron explained.
The source code for all of ZERT's unofficial fixes will be released along with the testing methodologies used during the patch preparation. Any known reduction in functionality as a result of the patch will be noted along with instructions to install or remove the updates.
The group will update the patch if a conflict, instability or vulnerability is discovered in it, and Evron said all ZERT updates will include a complete rollback option. The patches will be provided in GUI and command-prompt versions, he said.
When the official, vendor-supplied update is eventually released, ZERT will withdraw its patch.
The VML patch being released Sept. 22 was the combined effort of SecureWorks' Stewart; Israeli programmer and reverse engineering enthusiast Gil Dabah; Michael Hale Ligh, a vulnerability researcher and computer forensics expert; and a batch of volunteer testers around the world.
Dabah said he started working on the patch on Sept. 19, just hours after the first wave of zero-day VML attacks started dumping a massive collection of bots, Trojan downloaders, spyware and rootkits on Windows machines.
"It's been about 19 hours of work, almost nonstop. It may be easy to build a patch, but testing is a lot of work. There are just too many versions of Windows," he said with a laugh.
Stewart, who wrote a version of the patch and submitted it to the group for consideration, said the creation of the actual fix is "very straightforward."
The challenge, he says, lies in figuring out how to deploy it in a robust fashion, for several different operating system versions and service pack levels.
The group did not coordinate its response with Microsoft and Stewart stressed that the aim is not to serve as a replacement for the software vendor. "Our goal is to get Microsoft to realize that there is a demand out there for an emergency patch. We're not looking for [Windows] users to prefer us over Microsoft. We're simply offering an alternative in a crisis," Stewart added.
"Microsoft needs to start paying attention and recognize that there's a need for an out-of-band patch. It's somewhat irresponsible to tell customers to wait two weeks for Patch Tuesday while computers are being hosed with malware," he declared.

Release notes, legal notice and disclaimer
Please read our release notes and testing methodology prior to downloading the patch.
By downloading this patch you agree that the patch is a non-vendor supplied patch and you are using this patch of your own accord. You also agree ISOTF/ZERT supplies this patch on an AS-IS basis and that you are using this patch at your own risk.
Download and instructions
To download the patch follow the link http://isotf.org/zert/download.htm
: (60KB md5:78721c4a3b2493c13c8bb0c3f9d9786b )
This file contains GUI and command-line versions of patch, a readme and source code.
You need to close Internet Explorer, Outlook and other programs that may be using the DLL before you attempt to patch.
Test your system once you are patched! by using our test page:
After installing this patch you can test your IE browser by visiting a special page. A patched browser will not crash when it visits this page. http://www.isotf.org/zert/testvml.htm


If your browser shows a red-square when visiting the page, your browser is patched or does not need the patch.
Warning! If you visit the above test page with an unpatched version of Internet Explorer it will crash.
Important note about the vendor's eventual patch
It is important to rollback the ZERT patch (unpatch - remove our patch) before applying any future vendor patch.
We unregister the vulnerable DLL, replace the vulnerable function and register vgxnew.dll as the handler for VML.
A Microsoft patch would potentially fix a DLL not being used, so unpatching is important at that stage. We enable complete rollback in our patch
Installation options
Before installing the patch you must close both Internet Explorer and Outlook. To install the patch first extract the folder, ZPatch, from the archive.
You may use either the GUI interface which is located in ZPatch\Release or the command line version with is located in Zpatch\Console\Release.
The archive includes a Microsoft Visual Studio project for each version of the patch.
To use the patch, run the GUI executable and click on "Patch". To remove the patch click on "Rollback".
For the command prompt version, use --patch and --unpatch respectively.
When patching an AMD64 system, browse (by clicking on Br) and choose the DLL manually.
N before igo leig all trembling in fear a litt good advive

From E –news about piracy stuff?
XP Question Corner

What can victims of piracy do?

QUESTION:
I've been overtaken on the high seas by a band of marauders flying a skull and crossbones - Oh wait a second, that was a different life. But I did buy a used laptop on Ebay running pirated XP-Pro software. I found this out because I had automatic update turned on and the Microsoft site informed me that this was the case. Further, I would no longer receive security patches leaving my machine vulnerable. The only "fix" offered was to purchase a legal copy of XP-Pro from the Microsoft update site.

I suggested that Microsoft go after the perpetrator (who is probably still in business) rather than the victim. I felt that by doing this they would provide a service to themselves, Ebay and the folks who shop on Ebay. No response.

I don't expect you to tell me why Microsoft prefers persecuting victims rather than perpetrators - I think I know the answer; it's easier and they have leverage. But how about moving a downgrade copy of the OS from one machine to the other? Does that expose me to potential problems? Is there anything special I need to do so that it will be recognized as legal?
-- Pete

ANSWER:
You probably aren't going to like my response, but actually, both you and Microsoft are victims of software piracy in this case. To say Microsoft is "persecuting" you is like saying your bank is persecuting you if they refuse to accept a counterfeit bill that you try to deposit just because someone passed you the bill without your knowledge. If you tried telling the bank that they should credit your account anyway and go after the perpetrator to get their money back, you'd get the same response.

All that aside, Microsoft makes security patches available to all Windows users whether or not their systems pass the validation test. That's because having unpatched computers out there poses a danger to everyone. But if your system can't be validated, you'll have to download and install the patches manually instead of getting them automatically through Windows Update.

If you got a copy of the XP software with the laptop, you can send it in to Microsoft and fill out a piracy report telling them where you bought it, and they'll send you a valid copy of Windows at no charge. If you don't have a copy of the CD or proof of purchase, you can still fill out the piracy report and get a copy at a slightly discounted price.

No, it's not fair that you didn't get what you thought you were paying for when you bought the laptop, but keep in mind that it was the eBay seller who treated you unfairly. As always when buying used goods or items from venues like this, buyers should beware. Depending on your state laws, you might be able to inexpensively file a suit in small claims court against the seller.

Hoss upsetforgiven.gif nyuknyuk.gif scoping.gif
EGM waving.gif scratchinghead.gif waving.gif waving.gif waving.gif waving.gif




--------------------
MONGERAL & WORKIN AT IT
*&*
THERE ARE FOUR KINDS OF PEOPLE IN THE WORLD....

THOSE THAT LIKE YOU FOR THE RIGHT REASONS
THOSE THAT LIKE YOU FOR THE WRONG REASONS
THOSE THAT DON'T LIKE YOU FOR THE WRONG REASONS
THOSE THAT DON'T LIKE YOU FOR THE RIGHT REASONS

IT IS ONLY THE LAST GROUP YOU NEED TO WORRY ABOUT

So go tell me DOGS

PMEmail Poster
Top


I'm not The One
**
Group: Members
Posts: 18
Member No.: 243
Mood: 



Posted: Jan 14 2007, 11:24 PM
Quote Post
Don't click on any links from the spammers.

If you really want some porn videos, just ask and maybe a new "Erotica" section will be created.




--------------------
QUOTE
"The Matrix is a system, Neo. That system is our enemy. But when you're inside, you look around, what do you see? Businessmen, teachers, lawyers, carpenters. The very minds of the people we are trying to save. But until we do, these people are still a part of that system and that makes them our enemy. You have to understand, most of these people are not ready to be unplugged. And many of them are so inert, so hopelessly dependent on the system, that they will fight to protect it."
user posted image -- Morpheus 
PM
Top

Topic Options Reply to this topicStart new topicStart Poll

 



[ Script Execution time: 0.0391 ]   [ 16 queries used ]   [ GZIP Enabled ]

"Whoever controls the volume of money in any country is absolute master of all industry and commerce."
~ James A. Garfield, President of the United States


MORE POLITICAL ART

"Permit me to issue and control the money of a nation, and I care not who makes its laws."
~ Amschel Mayer Rothschild