I've been watching a couple recent threads here; with something between amusement and alarm.![]()
You may have heard the hacker term of Social Engineering- that's how hackers con vital info out of trusting people so they can penetrate computer security systems- by just asking for it. Because of ego involvement, they also usually 'sign' their work.
Well, OK. The threads here are: How do you get infected? and Who is this guy that is trying so hard??? As of now, just the first has 52 replies and well over 1100 looks.
1. The author is fLYtRap. Now, handles usually mean something to their owner.
So here we have flytrap, hmmm; which also contains LYR (liar?)
The title also is the interesting double entender :how do you get infected?
(I should make a special point of this: I am not saying fLYtRap is a bad guy, I'm just saying his threads make a near perfect example.)
This thread starts out more or less suggesting you don't really need antivirus, tho the subject changes fast enough...
I am wondering if having an antivirus software makes any sense.
My point is that right now I have been online pretty much 24/7 since 2001 and I haven't catch anything except for spy cookies. As for Trojans I have a pretty good firewall, and this is been taking care of. So how do you get viruses on your machines?
Notice also that English doesn't seem to be his native language.
Before long, he has a 2nd thread going about firewalls.
My point is, with all the things that should have urged caution, us good-hearted folks explained in detail- with links- all about which protections are on our computers...
& in amongst all those helpful download links could easily be a link to a bogus site with the malware binaries, as discussed in this major Google overview:
The Ghost In The Browser
Unfortunately, even a single visit to an infected web site enables the attacker to detect vulnerabilities in the user’s applications and force the download a multitude of malware binaries.
Frequently, this malware allows the adversary to gain full control of the compromised systems leading to the ex-filtration of sensitive information or installation of utilities that facilitate remote control of the host.
more at: http://www.usenix.org/events/hotbots07/tech/full_papers/provos/provos.pdf
hmmm... you went ahead and clicked that link, didn't ya? well, in this case its really a Google article, but it might not have been.
thanks again to fLYtRap for a rare chance to publicly discuss social engineering!![]()
+ Reply to Thread
Results 1 to 4 of 4
-
-
you read my mind..
I am just a worthless liar,
I am just an imbecil -
dunno why this reminds me of some lamer wanting everyone to make movs and flv's for the internet because his box couldn't read wmv's
-
I read his posts and they seem innocent enough,I think you're being a little paranoid.
Now if Flytrap asked how to hack a computer then I would be suspicious.
"Notice also that English doesn't seem to be his native language."
So does that mean anybody who doesn't speak English is a script kiddie?
Similar Threads
-
ghost effect
By rcwright in forum Newbie / General discussionsReplies: 15Last Post: 11th Sep 2009, 08:39 -
ghost
By huminity in forum ComputerReplies: 3Last Post: 12th Apr 2009, 10:03 -
Bootable ghost CD
By romanstopme in forum ComputerReplies: 4Last Post: 14th Nov 2008, 18:17 -
Norton Ghost 14 Advise
By Squid_uk in forum ComputerReplies: 9Last Post: 21st Oct 2008, 13:24 -
What causes this Ghost Effect?
By NBninja8 in forum Camcorders (DV/HDV/AVCHD/HD)Replies: 4Last Post: 27th Jan 2008, 14:41