Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Eat your words MENIAL... apk (Score 1) 288

Newsflash: if you got paid $100 once, as a prize, you are not a professional.

You still don't understand malware or botnets. The domain changes more often than you would get updates, so your list is always out of date.

As I showed you with the Python code, it's trivial to bypass hosts files.

As I showed you with a previous link, malware (e.g. Ramnit) can disable the firewall and change DNS settings, anyway.

Comment Re:1st you have to catch it... apk (Score 1) 288

My layered security guide stops that & you saw it http://it.slashdot.org/comment...

I saw the PCpitstop page earlier, but all the guide links were dead then, too.

It's on multiple sites as stated searching "How to Secure Windows 2000/XP" as you yourself already know liar from your post there in that link above, lol!

Then it shouldn't be hard for you to find a link to your own paper.

Hosts don't stop botnets? Ok - they block access to their C&C servers easily also like Zeus -> https://zeustracker.abuse.ch/m... [abuse.ch] easily by host-domain-subdomain names fool...

Oh really? Hosts files cannot stop DGA botnets. Read the following from Gameover Zeus begins using DGA:

The Domain Generation Algorithm is a method for a criminal to regain access to his botnet. Based on the current date, random-looking domain names are calculated and the malware reaches out via the Internet to see if that domain exists.

bmo0ve7lxujkiid9sycsfxb.biz
borwxz16ctey4fmc99y1t8nw9s.biz
bttkygongoew1himlrd1889yui.net
bzi7vw1f0iw5r1qy1pax1sgl3z0.biz
[...]

There is a new set of domains every day. For some DGAs, the domains are only up an hour. By the time you find them on a blog somewhere, they are not being used anymore.

(Yes, we all KNOW IT'S YOU *trying* to "support yourself" via truly unidentifiable anonymous coward 'supporters' Bouldin, lol, & THAT IS HILARIOUS + piss poor 'tactics', moron... totally transparent.)

Yeah genius, I was making fun of you for doing exactly the same thing. It is hilarious!

Comment Re:LMAO: My security guide covers those...apk (Score 1) 288

YOU PROVIDED THE PEFECT EXAMPLE with your doubtless STOLEN Python code example - UAC + WFP + Windows Firewall cuts those off, detecting them, BEFORE THEY CAN DO DAMAGE, stupid!

Uh, no, the malware disables all that. When a PC has been infected, the malware will disable a series of Windows security features (Windows Defender, Windows Firewall, User Account Control), Windows Update, and remove the ability to install other antivirus software.

Comment Re:Patches & security hardening...apk (Score 1) 288

Patches & security hardening...apk

I KNEW YOU'D TRY THAT CRAP... looking for "edge cases"!

(... & how did that get in IN THE FIRST PLACE? You didn't mention that a USER HAS TO GET IT FIRST, stupid... things in my security guide using "layered-security"/"defense-in-depth" cuts off those avenues!)

So.. now you're saying you can block botnets if you use hosts + windows firewall + patches + security hardening + don't run executables + don't plug in USB drives? Hosts FTW! U R rock solid security!

Comment Re:Ok: Explain this then...apk (Score 1) 288

Windows Firewall can block by IP (TCP/UDP), port, vs. *any* threat really w/ hosts combined with it!

Yeah! That's how they blocked the Ramnit botnet! OH wait, once that malware is installed it "will disable a series of Windows security features (Windows Defender, Windows Firewall, User Account Control), Windows Update, and remove the ability to install other antivirus software." Windows firewall FTW!

You've spent HOURS 'scouring the net', days actually, looking for *ANYTHING* you can stooge, to make that "not true"

Nope, took a 3-minute Google search to find that. Kinda like the Python code that bypasses your hosts file!

Slashdot Top Deals

If a train station is a place where a train stops, what's a workstation?

Working...