Posted on 11/26/2004 11:49:59 AM PST by goldstategop
The site has multiple forums for various computing problems, but the overwhelming number of inquiries in the last year has dealt with spyware, which on the site has a variety of less neutral names, "scumware" being one of the more polite. Scumware had been an epidemic; in the last year it grew into a pandemic, said Steve Wechsler, one of those drawn to Eshelman's site.
Wechsler was tending bar at a public golf course in South San Francisco when he bought his first computer less than a decade ago.
"I brought it home and turned it on, clicked on Netscape and expected something to happen. I still think about how dumb I was," he said. That ignorance makes him empathize with other casual users, people who expect their computers to be tools, not obligations.
The muting of the usefulness of those tools is what motivates him most. "I hate bullies. I've hated bullies my whole life. They prey on people. I'm not going to sit by and do nothing," he said. "It's your computer. They have no right to assault it."
(Excerpt) Read more at latimes.com ...
I'm not sure what it is about family dinners and requests to fix computers, but it happened to me too (I suspect when I get the computers, the problem will be with spyware).
http://mvps.org/winhelp2002/hosts.htm
"What it does ... The Hosts file contains the mappings of IP addresses to host names. This file is loaded into memory at startup, then Windows checks the Hosts file before it queries any DNS servers, which enables it to override addresses in the DNS. This prevents access to the listed sites by redirecting any connection attempts back to the local machine. Another feature of the HOSTS file is it's ability to block other applications from connecting to the Internet, as long the the entry exists.
You can use a HOSTS file to block ads, banners, cookies, web bugs, and even most hijackers. This is accomplished by blocking the Server that supplies these little gems. Example - the following entry 127.0.0.1 ad.doubleclick.net blocks all files supplied by the DoubleClick Server to the web page you are viewing. This also prevents the server from tracking your movements.
Now includes most major parasites, hijackers and unwanted Search Engines!"
bttt
hahaha. I run about a dozen virus and intruder programs, mostly out of curiousity to see how they work.
Regrettably, sometimes one will find a 'problem' that all the others miss.
Recently, I downloaded a freeware program from a reputable download site: download.com. Only one of the programs I run notified me of a trojan; all the others missed it. I notfied download.com and within a couple of days, they had revised the file with a clean version.
OK I won't bother you with this problem, but seriously is there a good site to get help with fixing the dumb thing?
That's no lie! I got sick of old "friends" calling me for no other reason than because they were too dense to maintain their own stuff.
SO what I did was tell them that if they wanted me to fix their machines, that they'd have to pay me the same rate I charge for freelance work, which is $20 and hour and up. No exceptions.
I've heard the new Mandrake build is pretty slick. Trouble is, I don't have a spare machine on which to play with it. Don't want to mess with a dual-bott, either. I need to find an El Cheapo PC for just that purpose.
If I might interject, one other thing you might find useful is Zone Alarm Pro. You can set it up to block the ports that viruses usually attack, as well as pop-up controls, and lot of other neat stuff. Plus, it can stop a rogue program dead in its tracks from trying to contact its home server. Useful for manually tracking down baddies.
Be careful, though. The pimply-faced, overweight, teenage malcontents (who should be outside instead of pecking away at the keyboard anyway) are working on ways to attack the Mac.
/something of a spyware expert, slightly paranoid, with a penchant for network security ;-D
It's very hard to believe that existing laws don't already provide penalties sufficient to send these sneaky saboteurs to jail for many years. Some tech-savvy state Attorney General could launch a successful political career based on such prosecutions.
We all have our specialties. It amazes me when smart people do things that I would regard as completely asinine. They just don't know any better.
bimp
oops, bUmp. :-)
ping
LOL LOL LOL! That's the best take I've heard on the whole mess! (As well as the best way I've seen to teach small children the concepts of causality and how bureaucracies work)
"I don't know why
She Swallowed the fly
I guess she'll die"
WE HAVE A WINNER!
;-D
LOL When faced with spyware, I fly into total jihad mode and don't quit until I've exterminated every piece of spyware on the machine. I enjoy it, for some reason.
YES! I forgot about the hosts file trick! I've got a version that I downloaded as a text file, which lists most of the known IPs for spyware and ads. I haven't installed it, but I have it in case I get the whim to do so.
You're either with us, or you're with the spyware.
Drive cloning without ghostly bloatware: xxcopy
Network information: Netmon
Disk cleanup: BCWipe
"I offered to fix anyone's machine who brought it with them to dinner... "
You are a good person.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.