Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 06/28/2017 9:51:49 PM PDT by TigerLikesRooster
[ Post Reply | Private Reply | View Replies ]


To: TigerLikesRooster

Another CIA tool let loose.


2 posted on 06/28/2017 9:53:38 PM PDT by jospehm20
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster
A code segment altered for destroying data:


4 posted on 06/28/2017 9:56:49 PM PDT by TigerLikesRooster (dead parakeet + lost fishing gear = freep all day)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

Could be Russia. Or the US Deep State destroying incriminating evidence of its own crimes, under the cover of worldwide cyber chaos.


5 posted on 06/28/2017 9:56:50 PM PDT by rfp1234 (DinosorosExtinction)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

So, if it destroys the master boot record, use a utility to copy your disks master boot record to file so you can restore it later.


11 posted on 06/28/2017 10:02:45 PM PDT by eastexsteve
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

Interesting. Thanks for posting.


15 posted on 06/28/2017 10:34:32 PM PDT by PGalt
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster


FYI: turn OFF JavaScript, the most evil entity known to computing.

NEVER open email attachments. The info can always be conveyed another way.

Turn OFF HTML when downloading/reading email. This not only disables scripts, it provides privacy by not "phoning home" through embedded images.

NEVER install any application unless you are willing to bet your cyber life/security/privacy and everything else on its source. Installing an application gives the keys of your kingdom to that application. You've been warned.
17 posted on 06/28/2017 10:43:04 PM PDT by 867V309 (Lock Her Up)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

Hillary Clinton on line 2....


21 posted on 06/28/2017 11:39:46 PM PDT by relictele
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

Can they just target Mueller and his minions?


22 posted on 06/29/2017 12:03:44 AM PDT by Paladin2 (No spelchk nor wrong word auto substition on mobile dev. Please be intelligent and deal with it....)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster
Simple Windows vaccine for current version of Petya:

https://www.bleepingcomputer.com/news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak/

That page contains a link to this short batch file program:

https://download.bleepingcomputer.com/bats/nopetyavac.bat

Download it, right click the downloaded program, and run it as administrator.

Don't be surprised if a later version of Petya is not blocked by this technique.

24 posted on 06/29/2017 12:13:10 AM PDT by TChad
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster
From the article:

In almost all other aspects, Tuesday's malware was impressive. It used two exploits developed by and later stolen from the National Security Agency. It combined those exploits with custom code that stole network credentials so the malware could infect fully patched Windows computers. And it was seeded by compromising the update mechanism for M.E.Doc, a tax-filing application that is almost mandatory for companies that do business in Ukraine.

31 posted on 06/29/2017 3:21:04 AM PDT by dynachrome (When an empire dies, you are left with vast monuments in front of which peasants squat to defecate)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

Clinton Foundation has a lot of cash to help pay for such work around the globe to meet their ends.


38 posted on 06/29/2017 3:52:26 AM PDT by CincyRichieRich (We must never shut up. Covfefe: A great dish served piping hot!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

Now referred to as Hillaryware.


41 posted on 06/29/2017 4:12:59 AM PDT by Lockbox
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

Anyone who does this should become prime target #1 for the entire planet, and hunted down and summarily executed.

It will teach a lesson for the others.

Anyone who SPOTS a vulnerability and reports it, should get a huge reward.

This completely changes the motivation to find and act on them.


55 posted on 06/29/2017 7:08:45 AM PDT by Mr. K (***THERE IS NO CONSEQUENCE OF REPEALING OBAMACARE THAT IS WORSE THAN OBAMACARE ITSELF***)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

You cannot destroy data if it has been backed up. If you don’t back it up, you don’t care about it.


60 posted on 06/29/2017 7:31:45 AM PDT by AppyPappy (Don't mistake your dorm political discussions with the desires of the nation)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TigerLikesRooster

I suspect our own NSA-CIA with one of their cyber-children having been developed by contractors and it “escaped”.


65 posted on 06/29/2017 9:03:56 AM PDT by Wuli
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson