A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Microsoft Windows 7 » Windows 7 Forum
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

Hackers hid malware in CCleaner software



 
 
Thread Tools Rate Thread Display Modes
  #61  
Old September 21st 17, 02:19 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Blake Snyder
external usenet poster
 
Posts: 72
Default Hackers hid malware in CCleaner software

On Wed, 20 Sep 2017 17:26:56 -0500, in
news
Pretty hard to believe that a VPN server, which typically operates at
OSI Layer 3, would add (or remove) *anything* in the Layer 7 payload.


I'm with you in that I don't understand how or why the VPN service would
add both header lines and a signature to the posts.

There's more to the story here. If this so-called VPN server is able to
muck around at Layer 7 for Usenet posts, what else is it doing to your
other traffic? I'd steer far, very far, from that kind of service. VPN
server, they ain't.


That particular server is from http://vpngate.net
Come to think of it, *all* the VPN servers which had that problem were
likely from vpngate.net.

Take a look at their web site.
Do they look like proxy servers?

They have typical openvpn configuration files just like all the other vpn
services out there do.
Ads
  #62  
Old September 21st 17, 02:25 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Blake Snyder
external usenet poster
 
Posts: 72
Default Hackers hid malware in CCleaner software

On Wed, 20 Sep 2017 23:49:34 +0100, in
, p-0''0-h the cat (coder)
wrote:

Meethinks it's a proxy server list.


How/why are Avast headers & sig added to these messages?
https://groups.google.com/forum/#!to...rs/RPwLKAwflFY

The 1 of 200 openvpn config files that add Avast header crap are he
https://vpngate.net

All you have to do, if you have openvpn freeware installed, is doubleclick
on this file below and you'll be on VPN on the service that adds the Avast
header stuff and sig stuff.

I'm actually *using* that same server so you'll see header crap in this
message if it isn't blocked because Usenet thinks it's a binary file.

test1: Failed because the server said it was a "binary" file.
test2: I added a beginning angle bracket to each line.

################################################# ##############################
# OpenVPN 2.0 Sample Configuration File
# for PacketiX VPN / SoftEther VPN Server
#
# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
#
# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
#
# This configuration file is auto-generated. You might use this config file
# in order to connect to the PacketiX VPN / SoftEther VPN Server.
# However, before you try it, you should review the descriptions of the file
# to determine the necessity to modify to suitable for your real environment.
# If necessary, you have to modify a little adequately on the file.
# For example, the IP address or the hostname as a destination VPN Server
# should be confirmed.
#
# Note that to use OpenVPN 2.0, you have to put the certification file of
# the destination VPN Server on the OpenVPN Client computer when you use this
# config file. Please refer the below descriptions carefully.


################################################# ##############################
# Specify the type of the layer of the VPN connection.
#
# To connect to the VPN Server as a "Remote-Access VPN Client PC",
# specify 'dev tun'. (Layer-3 IP Routing Mode)
#
# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)

dev tun


################################################# ##############################
# Specify the underlying protocol beyond the Internet.
# Note that this setting must be correspond with the listening setting on
# the VPN Server.
#
# Specify either 'proto tcp' or 'proto udp'.

proto tcp


################################################# ##############################
# The destination hostname / IP address, and port number of
# the target VPN Server.
#
# You have to specify as 'remote HOSTNAME PORT'. You can also
# specify the IP address instead of the hostname.
#
# Note that the auto-generated below hostname are a "auto-detected
# IP address" of the VPN Server. You have to confirm the correctness
# beforehand.
#
# When you want to connect to the VPN Server by using TCP protocol,
# the port number of the destination TCP port should be same as one of
# the available TCP listeners on the VPN Server.
#
# When you use UDP protocol, the port number must same as the configuration
# setting of "OpenVPN Server Compatible Function" on the VPN Server.

remote vpn812712198.opengw.net 1380


################################################# ##############################
# The HTTP/HTTPS proxy setting.
#
# Only if you have to use the Internet via a proxy, uncomment the below
# two lines and specify the proxy address and the port number.
# In the case of using proxy-authentication, refer the OpenVPN manual.

;http-proxy-retry
;http-proxy [proxy server] [proxy port]


################################################# ##############################
# The encryption and authentication algorithm.
#
# Default setting is good. Modify it as you prefer.
# When you specify an unsupported algorithm, the error will occur.
#
# The supported algorithms are as follows:
# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
# RC2-40-CBC RC2-64-CBC RC2-CBC
# auth: SHA SHA1 MD5 MD4 RMD160

cipher AES-128-CBC
auth SHA1


################################################# ##############################
# Other parameters necessary to connect to the VPN Server.
#
# It is not recommended to modify it unless you have a particular need.

resolv-retry infinite
nobind
persist-key
persist-tun
client
verb 3
#auth-user-pass


################################################# ##############################
# The certificate file of the destination VPN Server.
#
# The CA certificate file is embedded in the inline format.
# You can replace this CA contents if necessary.
# Please note that if the server certificate is not a self-signed, you have to
# specify the signer's root certificate (CA) here.

ca
-----BEGIN CERTIFICATE-----
MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqh kiG9w0BAQwFADCB
hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY 2hlc3RlcjEQMA4G
A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpb Wl0ZWQxKzApBgNV
BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3Jpd HkwHhcNMTAwMTE5
MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR 0IxGzAZBgNVBAgT
EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZ DEaMBgGA1UEChMR
Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU 0EgQ2VydGlmaWNh
dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICD wAwggIKAoICAQCR
6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QV r2fcHK3YX/JSw8X
pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xk Nfs/Q36nGz637CC
9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV
/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cg oLEf
Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2 e7gUYPDCUZObT6Z
+pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0u qlWPc9vqv9JWL7w
qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09 qZah
SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDL XB0AuqLZxUpaVIC
u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y 1Dma/RMhnEw6abf
Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq
crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4 E
FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB
/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2y yTUEUAJNMnMvl
wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZR GxhNaKatBYSaVqM
4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYc wlYRm6mnPTXJ9OV
2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgt Zx8jb8uk2Intzna
FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ
CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK
boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKy vDb6KkBPvVWmcke
jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+H g4yRvv7E491f0yL
S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17 zbqD5daWb
QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl
0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmD oLnzc7ILaZRfyHB
NVOFBkpdn627G190
-----END CERTIFICATE-----

/ca


################################################# ##############################
# The client certificate file (dummy).
#
# In some implementations of OpenVPN Client software
# (for example: OpenVPN Client for iOS),
# a pair of client certificate and private key must be included on the
# configuration file due to the limitation of the client.
# So this sample configuration file has a dummy pair of client certificate
# and private key as follows.

cert
-----BEGIN CERTIFICATE-----
MIICxjCCAa4CAQAwDQYJKoZIhvcNAQEFBQAwKTEaMBgGA1UEA xMRVlBOR2F0ZUNs
aWVudENlcnQxCzAJBgNVBAYTAkpQMB4XDTEzMDIxMTAzNDk0O VoXDTM3MDExOTAz
MTQwN1owKTEaMBgGA1UEAxMRVlBOR2F0ZUNsaWVudENlcnQxC zAJBgNVBAYTAkpQ
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5h2lg QQYUjwoKYJbzVZA
5VcIGd5otPc/qZRMt0KItCFA0s9RwReNVa9fDRFLRBhcITOlv3FBcW3E8h1Us7 RD
4W8GmJe8zapJnLsD39OSMRCzZJnczW4OCH1PZRZWKqDtjlNca 9AF8a65jTmlDxCQ
CjntLIWk5OLLVkFt9/tScc1GDtci55ofhaNAYMPiH7V8+1g66pGHXAoWK6AQVH67
XCKJnGB5nlQ+HsMYPV/O49Ld91ZN/2tHkcaLLyNtywxVPRSsRh480jju0fcCsv6h
p/0yXnTB//mWutBGpdUlIbwiITbAmrsbYnjigRvnPqX1RNJUbi9Fp6C2c/HIFJGD
ywIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQChO5hgcw/4oWfoEFLu9kBa1B//kxH8
hQkChVNn8BRC7Y0URQitPl3DKEed9URBDdg2KOAz77bb6ENPi liD+a38UJHIRMqe
UBHhllOHIzvDhHFbaovALBQceeBzdkQxsKQESKmQmR832950U CovoyRB61UyAV7h
+mZhYPGRKXKSJI6s0Egg/Cri+Cwk4bjJfrb5hVse11yh4D9MHhwSfCOH+0z4hPUT
Fku7dGavURO5SVxMn/sL6En5D+oSeXkadHpDs+Airym2YHh15h0+jPSOoR6yiVp/
6zZeZkrN43kuS73KpKDFjfFPh8t4r1gOIjttkNcQqBccusnpl Q7HJpsk
-----END CERTIFICATE-----

/cert

key
-----BEGIN RSA PRIVATE KEY-----
MIIEpAIBAAKCAQEA5h2lgQQYUjwoKYJbzVZA5VcIGd5otPc/qZRMt0KItCFA0s9R
wReNVa9fDRFLRBhcITOlv3FBcW3E8h1Us7RD4W8GmJe8zapJn LsD39OSMRCzZJnc
zW4OCH1PZRZWKqDtjlNca9AF8a65jTmlDxCQCjntLIWk5OLLV kFt9/tScc1GDtci
55ofhaNAYMPiH7V8+1g66pGHXAoWK6AQVH67XCKJnGB5nlQ+H sMYPV/O49Ld91ZN
/2tHkcaLLyNtywxVPRSsRh480jju0fcCsv6hp/0yXnTB//mWutBGpdUlIbwiITbA
mrsbYnjigRvnPqX1RNJUbi9Fp6C2c/HIFJGDywIDAQABAoIBAERV7X5AvxA8uRiK
k8SIpsD0dX1pJOMIwakUVyvc4EfN0DhKRNb4rYoSiEGTLyzLp yBc/A28Dlkm5eOY
fjzXfYkGtYi/Ftxkg3O9vcrMQ4+6i+uGHaIL2rL+s4MrfO8v1xv6+Wky33EEGC ou
QiwVGRFQXnRoQ62NBCFbUNLhmXwdj1akZzLU4p5R4zA3Qhdxw EIatVLt0+7owLQ3
lP8sfXhppPOXjTqMD4QkYwzPAa8/zF7acn4kryrUP7Q6PAfd0zEVqNy9ZCZ9ffho
zXedFj486IFoc5gnTp2N6jsnVj4LCGIhlVHlYGozKKFqJcQVG sHCqq1oz2zjW6LS
oRYIHgECgYEA8zZrkCwNYSXJuODJ3m/hOLVxcxgJuwXoiErWd0E42vPanjjVMhnt
KY5l8qGMJ6FhK9LYx2qCrf/E0XtUAZ2wVq3ORTyGnsMWre9tLYs55X+ZN10Tc75z
4hacbU0hqKN1HiDmsMRY3/2NaZHoy7MKnwJJBaG48l9CCTlVwMHocIECgYEA8jby
dGjxTH+6XHWNizb5SRbZxAnyEeJeRwTMh0gGzwGPpH/sZYGzyu0SySXWCnZh3Rgq
5uLlNxtrXrljZlyi2nQdQgsq2YrWUs0+zgU+22uQsZpSAftmh Vrtvet6MjVjbByY
DADciEVUdJYIXk+qnFUJyeroLIkTj7WYKZ6RjksCgYBoCFIwR Deg42oK89RFmnOr
LymNAq4+2oMhsWlVb4ejWIWeAk9nc+GXUfrXszRhS01mUnU5r 5ygUvRcarV/T3U7
TnMZ+I7Y4DgWRIDd51znhxIBtYV5j/C/t85HjqOkH+8b6RTkbchaX3mau7fpUfds
Fq0nhIq42fhEO8srfYYwgQKBgQCyhi1N/8taRwpk+3/IDEzQwjbfdzUkWWSDk9Xs
H/pkuRHWfTMP3flWqEYgW/LW40peW2HDq5imdV8+AgZxe/XMbaji9Lgwf1RY005n
KxaZQz7yqHupWlLGF68DPHxkZVVSagDnV/sztWX6SFsCqFVnxIXifXGC4cW5Nm9g
va8q4QKBgQCEhLVeUfdwKvkZ94g/GFz731Z2hrdVhgMZaU/u6t0V95+YezPNCQZB
wmE9Mmlbq1emDeROivjCfoGhR3kZXW1pTKlLh6ZMUQUOpptdX va8XxfoqQwa3enA
M7muBbF0XN7VO80iJPv+PmIZdEIAkpwKfi201YB+BafCIuGxI F50Vg==
-----END RSA PRIVATE KEY-----

/key

  #63  
Old September 21st 17, 02:36 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Blake Snyder
external usenet poster
 
Posts: 72
Default Hackers hid malware in CCleaner software

On Thu, 21 Sep 2017 01:25:37 -0000 (UTC), in
news
Here is the complete unadulterated config file which was valid today which
produces not only the signature but also the header lines.


Here is a corresponding openvpn config file which I'm using at this exact
moment which does NOT produce the Avast header and signature in Usenet
posts.

Notice you can make two consecutive posts, where the first post uses one
VPN config file and the second post uses the second VPN config file with
nothing else changed - and guess what - one will have the Avast headers and
sig while the other won't.

One caveat, as Marek knows, these config files come and go so while they're
working at this very moment, they might not work ten minutes from now -
which is why Marek wrote all those scripts a few years ago for me and
others to benefit from where he tests them out and puts the good ones in a
bucket and the bad ones in a different bucket.

It's also why I have over six thousand of them by now, because the wget
scripts pull down a few hundred a day (but some are duplicates) so that's
why we use the geolocate scripts to ensure that they're the same even when
the name changes. It's all horribly simple and horribly complex at the same
time but it randomizes everything quite nicely and has been working for two
years now.

Anyway, remove the leading angle bracket which is the only change I had to
make to post this working file below that does NOT have the Avast
signatures and header lines.

################################################# ##############################
# OpenVPN 2.0 Sample Configuration File
# for PacketiX VPN / SoftEther VPN Server
#
# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
#
# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
#
# This configuration file is auto-generated. You might use this config file
# in order to connect to the PacketiX VPN / SoftEther VPN Server.
# However, before you try it, you should review the descriptions of the file
# to determine the necessity to modify to suitable for your real environment.
# If necessary, you have to modify a little adequately on the file.
# For example, the IP address or the hostname as a destination VPN Server
# should be confirmed.
#
# Note that to use OpenVPN 2.0, you have to put the certification file of
# the destination VPN Server on the OpenVPN Client computer when you use this
# config file. Please refer the below descriptions carefully.


################################################# ##############################
# Specify the type of the layer of the VPN connection.
#
# To connect to the VPN Server as a "Remote-Access VPN Client PC",
# specify 'dev tun'. (Layer-3 IP Routing Mode)
#
# To connect to the VPN Server as a bridging equipment of "Site-to-Site VPN",
# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)

dev tun


################################################# ##############################
# Specify the underlying protocol beyond the Internet.
# Note that this setting must be correspond with the listening setting on
# the VPN Server.
#
# Specify either 'proto tcp' or 'proto udp'.

proto udp


################################################# ##############################
# The destination hostname / IP address, and port number of
# the target VPN Server.
#
# You have to specify as 'remote HOSTNAME PORT'. You can also
# specify the IP address instead of the hostname.
#
# Note that the auto-generated below hostname are a "auto-detected
# IP address" of the VPN Server. You have to confirm the correctness
# beforehand.
#
# When you want to connect to the VPN Server by using TCP protocol,
# the port number of the destination TCP port should be same as one of
# the available TCP listeners on the VPN Server.
#
# When you use UDP protocol, the port number must same as the configuration
# setting of "OpenVPN Server Compatible Function" on the VPN Server.

remote vpn100895633.opengw.net 1698


################################################# ##############################
# The HTTP/HTTPS proxy setting.
#
# Only if you have to use the Internet via a proxy, uncomment the below
# two lines and specify the proxy address and the port number.
# In the case of using proxy-authentication, refer the OpenVPN manual.

;http-proxy-retry
;http-proxy [proxy server] [proxy port]


################################################# ##############################
# The encryption and authentication algorithm.
#
# Default setting is good. Modify it as you prefer.
# When you specify an unsupported algorithm, the error will occur.
#
# The supported algorithms are as follows:
# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
# RC2-40-CBC RC2-64-CBC RC2-CBC
# auth: SHA SHA1 MD5 MD4 RMD160

cipher AES-128-CBC
auth SHA1


################################################# ##############################
# Other parameters necessary to connect to the VPN Server.
#
# It is not recommended to modify it unless you have a particular need.

resolv-retry infinite
nobind
persist-key
persist-tun
client
verb 3
#auth-user-pass


################################################# ##############################
# The certificate file of the destination VPN Server.
#
# The CA certificate file is embedded in the inline format.
# You can replace this CA contents if necessary.
# Please note that if the server certificate is not a self-signed, you have to
# specify the signer's root certificate (CA) here.

ca
-----BEGIN CERTIFICATE-----
MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqh kiG9w0BAQwFADCB
hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY 2hlc3RlcjEQMA4G
A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpb Wl0ZWQxKzApBgNV
BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3Jpd HkwHhcNMTAwMTE5
MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR 0IxGzAZBgNVBAgT
EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZ DEaMBgGA1UEChMR
Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU 0EgQ2VydGlmaWNh
dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICD wAwggIKAoICAQCR
6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QV r2fcHK3YX/JSw8X
pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xk Nfs/Q36nGz637CC
9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV
/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cg oLEf
Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2 e7gUYPDCUZObT6Z
+pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0u qlWPc9vqv9JWL7w
qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09 qZah
SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDL XB0AuqLZxUpaVIC
u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y 1Dma/RMhnEw6abf
Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq
crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4 E
FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB
/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2y yTUEUAJNMnMvl
wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZR GxhNaKatBYSaVqM
4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYc wlYRm6mnPTXJ9OV
2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgt Zx8jb8uk2Intzna
FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ
CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK
boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKy vDb6KkBPvVWmcke
jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+H g4yRvv7E491f0yL
S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17 zbqD5daWb
QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl
0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmD oLnzc7ILaZRfyHB
NVOFBkpdn627G190
-----END CERTIFICATE-----

/ca


################################################# ##############################
# The client certificate file (dummy).
#
# In some implementations of OpenVPN Client software
# (for example: OpenVPN Client for iOS),
# a pair of client certificate and private key must be included on the
# configuration file due to the limitation of the client.
# So this sample configuration file has a dummy pair of client certificate
# and private key as follows.

cert
-----BEGIN CERTIFICATE-----
MIICxjCCAa4CAQAwDQYJKoZIhvcNAQEFBQAwKTEaMBgGA1UEA xMRVlBOR2F0ZUNs
aWVudENlcnQxCzAJBgNVBAYTAkpQMB4XDTEzMDIxMTAzNDk0O VoXDTM3MDExOTAz
MTQwN1owKTEaMBgGA1UEAxMRVlBOR2F0ZUNsaWVudENlcnQxC zAJBgNVBAYTAkpQ
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5h2lg QQYUjwoKYJbzVZA
5VcIGd5otPc/qZRMt0KItCFA0s9RwReNVa9fDRFLRBhcITOlv3FBcW3E8h1Us7 RD
4W8GmJe8zapJnLsD39OSMRCzZJnczW4OCH1PZRZWKqDtjlNca 9AF8a65jTmlDxCQ
CjntLIWk5OLLVkFt9/tScc1GDtci55ofhaNAYMPiH7V8+1g66pGHXAoWK6AQVH67
XCKJnGB5nlQ+HsMYPV/O49Ld91ZN/2tHkcaLLyNtywxVPRSsRh480jju0fcCsv6h
p/0yXnTB//mWutBGpdUlIbwiITbAmrsbYnjigRvnPqX1RNJUbi9Fp6C2c/HIFJGD
ywIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQChO5hgcw/4oWfoEFLu9kBa1B//kxH8
hQkChVNn8BRC7Y0URQitPl3DKEed9URBDdg2KOAz77bb6ENPi liD+a38UJHIRMqe
UBHhllOHIzvDhHFbaovALBQceeBzdkQxsKQESKmQmR832950U CovoyRB61UyAV7h
+mZhYPGRKXKSJI6s0Egg/Cri+Cwk4bjJfrb5hVse11yh4D9MHhwSfCOH+0z4hPUT
Fku7dGavURO5SVxMn/sL6En5D+oSeXkadHpDs+Airym2YHh15h0+jPSOoR6yiVp/
6zZeZkrN43kuS73KpKDFjfFPh8t4r1gOIjttkNcQqBccusnpl Q7HJpsk
-----END CERTIFICATE-----

/cert

key
-----BEGIN RSA PRIVATE KEY-----
MIIEpAIBAAKCAQEA5h2lgQQYUjwoKYJbzVZA5VcIGd5otPc/qZRMt0KItCFA0s9R
wReNVa9fDRFLRBhcITOlv3FBcW3E8h1Us7RD4W8GmJe8zapJn LsD39OSMRCzZJnc
zW4OCH1PZRZWKqDtjlNca9AF8a65jTmlDxCQCjntLIWk5OLLV kFt9/tScc1GDtci
55ofhaNAYMPiH7V8+1g66pGHXAoWK6AQVH67XCKJnGB5nlQ+H sMYPV/O49Ld91ZN
/2tHkcaLLyNtywxVPRSsRh480jju0fcCsv6hp/0yXnTB//mWutBGpdUlIbwiITbA
mrsbYnjigRvnPqX1RNJUbi9Fp6C2c/HIFJGDywIDAQABAoIBAERV7X5AvxA8uRiK
k8SIpsD0dX1pJOMIwakUVyvc4EfN0DhKRNb4rYoSiEGTLyzLp yBc/A28Dlkm5eOY
fjzXfYkGtYi/Ftxkg3O9vcrMQ4+6i+uGHaIL2rL+s4MrfO8v1xv6+Wky33EEGC ou
QiwVGRFQXnRoQ62NBCFbUNLhmXwdj1akZzLU4p5R4zA3Qhdxw EIatVLt0+7owLQ3
lP8sfXhppPOXjTqMD4QkYwzPAa8/zF7acn4kryrUP7Q6PAfd0zEVqNy9ZCZ9ffho
zXedFj486IFoc5gnTp2N6jsnVj4LCGIhlVHlYGozKKFqJcQVG sHCqq1oz2zjW6LS
oRYIHgECgYEA8zZrkCwNYSXJuODJ3m/hOLVxcxgJuwXoiErWd0E42vPanjjVMhnt
KY5l8qGMJ6FhK9LYx2qCrf/E0XtUAZ2wVq3ORTyGnsMWre9tLYs55X+ZN10Tc75z
4hacbU0hqKN1HiDmsMRY3/2NaZHoy7MKnwJJBaG48l9CCTlVwMHocIECgYEA8jby
dGjxTH+6XHWNizb5SRbZxAnyEeJeRwTMh0gGzwGPpH/sZYGzyu0SySXWCnZh3Rgq
5uLlNxtrXrljZlyi2nQdQgsq2YrWUs0+zgU+22uQsZpSAftmh Vrtvet6MjVjbByY
DADciEVUdJYIXk+qnFUJyeroLIkTj7WYKZ6RjksCgYBoCFIwR Deg42oK89RFmnOr
LymNAq4+2oMhsWlVb4ejWIWeAk9nc+GXUfrXszRhS01mUnU5r 5ygUvRcarV/T3U7
TnMZ+I7Y4DgWRIDd51znhxIBtYV5j/C/t85HjqOkH+8b6RTkbchaX3mau7fpUfds
Fq0nhIq42fhEO8srfYYwgQKBgQCyhi1N/8taRwpk+3/IDEzQwjbfdzUkWWSDk9Xs
H/pkuRHWfTMP3flWqEYgW/LW40peW2HDq5imdV8+AgZxe/XMbaji9Lgwf1RY005n
KxaZQz7yqHupWlLGF68DPHxkZVVSagDnV/sztWX6SFsCqFVnxIXifXGC4cW5Nm9g
va8q4QKBgQCEhLVeUfdwKvkZ94g/GFz731Z2hrdVhgMZaU/u6t0V95+YezPNCQZB
wmE9Mmlbq1emDeROivjCfoGhR3kZXW1pTKlLh6ZMUQUOpptdX va8XxfoqQwa3enA
M7muBbF0XN7VO80iJPv+PmIZdEIAkpwKfi201YB+BafCIuGxI F50Vg==
-----END RSA PRIVATE KEY-----

/key

  #64  
Old September 21st 17, 03:21 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Blake Snyder
external usenet poster
 
Posts: 72
Default Hackers hid malware in CCleaner software

On Thu, 21 Sep 2017 01:36:22 -0000 (UTC), in
news
Here is a corresponding openvpn config file which I'm using at this exact
moment which does NOT produce the Avast header and signature in Usenet
posts.


Since I can easily choose any of scores of nntp servers, I just chose
netfront which allows me to post the file naked (mixmin forced me to add an
angle bracket).

For anyone who knows how to use openvpn freeware on any platform...
1. Save this message as whatever.ovpn and strip out the ovpn file part.
2. Run it inside of openVPN (I just doubleclick on it) on any platform.
3. Post a message to Usenet. You'll get the Avast headers & sig lines!

I'm using *this* very file myself right not to post so it will add the
Avast headers and sig.

Notice I switched manually to netfront (I have scores of news servers to
choose from) so you will see the IP address of my nntp host in the header
too.

Be advised these openvpn config files go stale so the sooner you test it
out the better.

################################################## #############################
# OpenVPN 2.0 Sample Configuration File
# for PacketiX VPN / SoftEther VPN Server
#
# !!! AUTO-GENERATED BY SOFTETHER VPN SERVER MANAGEMENT TOOL !!!
#
# !!! YOU HAVE TO REVIEW IT BEFORE USE AND MODIFY IT AS NECESSARY !!!
#
# This configuration file is auto-generated. You might use this config file
# in order to connect to the PacketiX VPN / SoftEther VPN Server.
# However, before you try it, you should review the descriptions of the
file
# to determine the necessity to modify to suitable for your real
environment.
# If necessary, you have to modify a little adequately on the file.
# For example, the IP address or the hostname as a destination VPN Server
# should be confirmed.
#
# Note that to use OpenVPN 2.0, you have to put the certification file of
# the destination VPN Server on the OpenVPN Client computer when you use
this
# config file. Please refer the below descriptions carefully.


################################################## #############################
# Specify the type of the layer of the VPN connection.
#
# To connect to the VPN Server as a "Remote-Access VPN Client PC",
# specify 'dev tun'. (Layer-3 IP Routing Mode)
#
# To connect to the VPN Server as a bridging equipment of "Site-to-Site
VPN",
# specify 'dev tap'. (Layer-2 Ethernet Bridgine Mode)

dev tun


################################################## #############################
# Specify the underlying protocol beyond the Internet.
# Note that this setting must be correspond with the listening setting on
# the VPN Server.
#
# Specify either 'proto tcp' or 'proto udp'.

proto tcp


################################################## #############################
# The destination hostname / IP address, and port number of
# the target VPN Server.
#
# You have to specify as 'remote HOSTNAME PORT'. You can also
# specify the IP address instead of the hostname.
#
# Note that the auto-generated below hostname are a "auto-detected
# IP address" of the VPN Server. You have to confirm the correctness
# beforehand.
#
# When you want to connect to the VPN Server by using TCP protocol,
# the port number of the destination TCP port should be same as one of
# the available TCP listeners on the VPN Server.
#
# When you use UDP protocol, the port number must same as the configuration
# setting of "OpenVPN Server Compatible Function" on the VPN Server.

remote vpn812712198.opengw.net 1380


################################################## #############################
# The HTTP/HTTPS proxy setting.
#
# Only if you have to use the Internet via a proxy, uncomment the below
# two lines and specify the proxy address and the port number.
# In the case of using proxy-authentication, refer the OpenVPN manual.

;http-proxy-retry
;http-proxy [proxy server] [proxy port]


################################################## #############################
# The encryption and authentication algorithm.
#
# Default setting is good. Modify it as you prefer.
# When you specify an unsupported algorithm, the error will occur.
#
# The supported algorithms are as follows:
# cipher: [NULL-CIPHER] NULL AES-128-CBC AES-192-CBC AES-256-CBC BF-CBC
# CAST-CBC CAST5-CBC DES-CBC DES-EDE-CBC DES-EDE3-CBC DESX-CBC
# RC2-40-CBC RC2-64-CBC RC2-CBC
# auth: SHA SHA1 MD5 MD4 RMD160

cipher AES-128-CBC
auth SHA1


################################################## #############################
# Other parameters necessary to connect to the VPN Server.
#
# It is not recommended to modify it unless you have a particular need.

resolv-retry infinite
nobind
persist-key
persist-tun
client
verb 3
#auth-user-pass


################################################## #############################
# The certificate file of the destination VPN Server.
#
# The CA certificate file is embedded in the inline format.
# You can replace this CA contents if necessary.
# Please note that if the server certificate is not a self-signed, you have
to
# specify the signer's root certificate (CA) here.

ca
-----BEGIN CERTIFICATE-----
MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhk iG9w0BAQwFADCB
hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2 hlc3RlcjEQMA4G
A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbW l0ZWQxKzApBgNV
BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdH kwHhcNMTAwMTE5
MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0 IxGzAZBgNVBAgT
EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZD EaMBgGA1UEChMR
Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0 EgQ2VydGlmaWNh
dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDw AwggIKAoICAQCR
6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr 2fcHK3YX/JSw8X
pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkN fs/Q36nGz637CC
9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV
/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cg oLEf
Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e 7gUYPDCUZObT6Z
+pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uq lWPc9vqv9JWL7w
qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09 qZah
SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLX B0AuqLZxUpaVIC
u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1 Dma/RMhnEw6abf
Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq
crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4 E
FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB
/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2y yTUEUAJNMnMvl
wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRG xhNaKatBYSaVqM
4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcw lYRm6mnPTXJ9OV
2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZ x8jb8uk2Intzna
FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ
CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK
boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyv Db6KkBPvVWmcke
jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg 4yRvv7E491f0yL
S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17 zbqD5daWb
QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl
0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDo Lnzc7ILaZRfyHB
NVOFBkpdn627G190
-----END CERTIFICATE-----

/ca


################################################## #############################
# The client certificate file (dummy).
#
# In some implementations of OpenVPN Client software
# (for example: OpenVPN Client for iOS),
# a pair of client certificate and private key must be included on the
# configuration file due to the limitation of the client.
# So this sample configuration file has a dummy pair of client certificate
# and private key as follows.

cert
-----BEGIN CERTIFICATE-----
MIICxjCCAa4CAQAwDQYJKoZIhvcNAQEFBQAwKTEaMBgGA1UEAx MRVlBOR2F0ZUNs
aWVudENlcnQxCzAJBgNVBAYTAkpQMB4XDTEzMDIxMTAzNDk0OV oXDTM3MDExOTAz
MTQwN1owKTEaMBgGA1UEAxMRVlBOR2F0ZUNsaWVudENlcnQxCz AJBgNVBAYTAkpQ
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5h2lgQ QYUjwoKYJbzVZA
5VcIGd5otPc/qZRMt0KItCFA0s9RwReNVa9fDRFLRBhcITOlv3FBcW3E8h1Us7 RD
4W8GmJe8zapJnLsD39OSMRCzZJnczW4OCH1PZRZWKqDtjlNca9 AF8a65jTmlDxCQ
CjntLIWk5OLLVkFt9/tScc1GDtci55ofhaNAYMPiH7V8+1g66pGHXAoWK6AQVH67
XCKJnGB5nlQ+HsMYPV/O49Ld91ZN/2tHkcaLLyNtywxVPRSsRh480jju0fcCsv6h
p/0yXnTB//mWutBGpdUlIbwiITbAmrsbYnjigRvnPqX1RNJUbi9Fp6C2c/HIFJGD
ywIDAQABMA0GCSqGSIb3DQEBBQUAA4IBAQChO5hgcw/4oWfoEFLu9kBa1B//kxH8
hQkChVNn8BRC7Y0URQitPl3DKEed9URBDdg2KOAz77bb6ENPil iD+a38UJHIRMqe
UBHhllOHIzvDhHFbaovALBQceeBzdkQxsKQESKmQmR832950UC ovoyRB61UyAV7h
+mZhYPGRKXKSJI6s0Egg/Cri+Cwk4bjJfrb5hVse11yh4D9MHhwSfCOH+0z4hPUT
Fku7dGavURO5SVxMn/sL6En5D+oSeXkadHpDs+Airym2YHh15h0+jPSOoR6yiVp/
6zZeZkrN43kuS73KpKDFjfFPh8t4r1gOIjttkNcQqBccusnplQ 7HJpsk
-----END CERTIFICATE-----

/cert

key
-----BEGIN RSA PRIVATE KEY-----
MIIEpAIBAAKCAQEA5h2lgQQYUjwoKYJbzVZA5VcIGd5otPc/qZRMt0KItCFA0s9R
wReNVa9fDRFLRBhcITOlv3FBcW3E8h1Us7RD4W8GmJe8zapJnL sD39OSMRCzZJnc
zW4OCH1PZRZWKqDtjlNca9AF8a65jTmlDxCQCjntLIWk5OLLVk Ft9/tScc1GDtci
55ofhaNAYMPiH7V8+1g66pGHXAoWK6AQVH67XCKJnGB5nlQ+Hs MYPV/O49Ld91ZN
/2tHkcaLLyNtywxVPRSsRh480jju0fcCsv6hp/0yXnTB//mWutBGpdUlIbwiITbA
mrsbYnjigRvnPqX1RNJUbi9Fp6C2c/HIFJGDywIDAQABAoIBAERV7X5AvxA8uRiK
k8SIpsD0dX1pJOMIwakUVyvc4EfN0DhKRNb4rYoSiEGTLyzLpy Bc/A28Dlkm5eOY
fjzXfYkGtYi/Ftxkg3O9vcrMQ4+6i+uGHaIL2rL+s4MrfO8v1xv6+Wky33EEGC ou
QiwVGRFQXnRoQ62NBCFbUNLhmXwdj1akZzLU4p5R4zA3QhdxwE IatVLt0+7owLQ3
lP8sfXhppPOXjTqMD4QkYwzPAa8/zF7acn4kryrUP7Q6PAfd0zEVqNy9ZCZ9ffho
zXedFj486IFoc5gnTp2N6jsnVj4LCGIhlVHlYGozKKFqJcQVGs HCqq1oz2zjW6LS
oRYIHgECgYEA8zZrkCwNYSXJuODJ3m/hOLVxcxgJuwXoiErWd0E42vPanjjVMhnt
KY5l8qGMJ6FhK9LYx2qCrf/E0XtUAZ2wVq3ORTyGnsMWre9tLYs55X+ZN10Tc75z
4hacbU0hqKN1HiDmsMRY3/2NaZHoy7MKnwJJBaG48l9CCTlVwMHocIECgYEA8jby
dGjxTH+6XHWNizb5SRbZxAnyEeJeRwTMh0gGzwGPpH/sZYGzyu0SySXWCnZh3Rgq
5uLlNxtrXrljZlyi2nQdQgsq2YrWUs0+zgU+22uQsZpSAftmhV rtvet6MjVjbByY
DADciEVUdJYIXk+qnFUJyeroLIkTj7WYKZ6RjksCgYBoCFIwRD eg42oK89RFmnOr
LymNAq4+2oMhsWlVb4ejWIWeAk9nc+GXUfrXszRhS01mUnU5r5 ygUvRcarV/T3U7
TnMZ+I7Y4DgWRIDd51znhxIBtYV5j/C/t85HjqOkH+8b6RTkbchaX3mau7fpUfds
Fq0nhIq42fhEO8srfYYwgQKBgQCyhi1N/8taRwpk+3/IDEzQwjbfdzUkWWSDk9Xs
H/pkuRHWfTMP3flWqEYgW/LW40peW2HDq5imdV8+AgZxe/XMbaji9Lgwf1RY005n
KxaZQz7yqHupWlLGF68DPHxkZVVSagDnV/sztWX6SFsCqFVnxIXifXGC4cW5Nm9g
va8q4QKBgQCEhLVeUfdwKvkZ94g/GFz731Z2hrdVhgMZaU/u6t0V95+YezPNCQZB
wmE9Mmlbq1emDeROivjCfoGhR3kZXW1pTKlLh6ZMUQUOpptdXv a8XxfoqQwa3enA
M7muBbF0XN7VO80iJPv+PmIZdEIAkpwKfi201YB+BafCIuGxIF 50Vg==
-----END RSA PRIVATE KEY-----

/key

---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus

  #65  
Old September 21st 17, 05:54 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Char Jackson
external usenet poster
 
Posts: 10,449
Default Hackers hid malware in CCleaner software

On Thu, 21 Sep 2017 01:18:59 -0000 (UTC), Blake Snyder
wrote:

On Wed, 20 Sep 2017 17:26:56 -0500, in
news
Pretty hard to believe that a VPN server, which typically operates at
OSI Layer 3, would add (or remove) *anything* in the Layer 7 payload.


I'm with you in that I don't understand how or why the VPN service would
add both header lines and a signature to the posts.


Thanks for mentioning VPN Gate. A quick Google solved the mystery of the
additional headers and sig lines.

There's more to the story here. If this so-called VPN server is able to
muck around at Layer 7 for Usenet posts, what else is it doing to your
other traffic? I'd steer far, very far, from that kind of service. VPN
server, they ain't.


That particular server is from http://vpngate.net
Come to think of it, *all* the VPN servers which had that problem were
likely from vpngate.net.

Take a look at their web site.
Do they look like proxy servers?


Yes. Proxy servers with a VPN front end that clients connect to.

From the perspective of the remote user, you for example, they look just
like a VPN server. However, instead of popping out of the VPN tunnel
directly onto the Internet, traffic apparently flows through a proxy.
From there, it can be examined, stored, modified, whatever.

HOWEVER, since the actual servers that VPN Gate steers clients to are
simply volunteered for use by their owners, there could indeed be a
large helping of actual VPN servers in the mix. They don't all have to
be shady.

They have typical openvpn configuration files just like all the other vpn
services out there do.


Yep. Anyone can set up one of those and submit it to VPN Gate for use by
unsuspecting clients.

  #66  
Old September 21st 17, 06:01 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Char Jackson
external usenet poster
 
Posts: 10,449
Default Hackers hid malware in CCleaner software

On Wed, 20 Sep 2017 23:49:34 +0100, "p-0''0-h the cat (coder)"
wrote:

On Wed, 20 Sep 2017 17:26:56 -0500, Char Jackson
wrote:

On Wed, 20 Sep 2017 17:18:13 -0000 (UTC), Blake Snyder
wrote:

On Wed, 20 Sep 2017 17:11:36 -0000 (UTC), in
news
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus

I thought I removed the errant VPN server but I realized that there was a
duplicate because there it TCP and UDP based configuration files.

So I disabled both the TCP and UDP VPN config file for the VPN server that
adds that Avast sig and header.

I can't promise the *next* VPN service won't do it but 99 out of 100 don't
add that line so most of the time this will work.

Each day there are another hundred servers that get added while another
hundred are deprecated so the list fluctuates daily.

This is a new free VPN server (just added today) so we'll see what it does.


Pretty hard to believe that a VPN server, which typically operates at
OSI Layer 3, would add (or remove) *anything* in the Layer 7 payload.

There's more to the story here. If this so-called VPN server is able to
muck around at Layer 7 for Usenet posts, what else is it doing to your
other traffic? I'd steer far, very far, from that kind of service. VPN
server, they ain't.


Meethinks it's a proxy server list.


VPN Gate clearly doesn't advertise it that way, but I think you're
right. Since the actual VPN servers are just a loose assortment of
privately owned servers running VPN software, there's no telling what
else they do to passing traffic.

I'm tempted to set one up myself, just to see what kind of goodness
passes through on a daily basis. I could free up about 20TB of drive
space to use as temp storage until I can run scripts to find the good
stuff.

On the other hand, nah, forget it.

  #67  
Old September 21st 17, 07:48 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Andy
external usenet poster
 
Posts: 645
Default Hackers hid malware in CCleaner software

Yes windows 95 Char

--
AL'S COMPUTERS
"Char Jackson" wrote in message
...
On Wed, 20 Sep 2017 21:31:43 -0000 (UTC), Blake Snyder
wrote:

On Wed, 20 Sep 2017 13:36:09 -0500, in
, Char Jackson wrote:

If that's how you pitch the idea to people, I'd say they're right to
push back. As a user, you haven't *needed* to use 8.3 syntax since
nearly forever, but by default Windows can use it behind the scenes. And
of course, you can use it yourself, whether you intentionally name
something with 8.3 or you simply let Windows create the 8.3 name and you
simply start using what Windows assigned. The dir command can show you
the 8.3 names when you use the /x argument.


All I can tell you in response is that the 8+3 shows up on its own.


Yes, of course it does. I thought I said that.

For example, I am super duper positive I never created any folder using
capital letters and a tilde - but there it is - in my Windows 10 junk
folder for the temp variables for both Windows and VIM.

http://i.cubeupload.com/GFf3Bx.jpg

Who created it and put it there if not Windows herself?


Windows! I thought I said that.

You can very easily test it for yourself. Create a file name or a folder
name that's longer than 8 characters or that has one or more spaces in
it. Now use dir /x to view it. There's the 8.3 name, created
automatically by Windows. From that point on, you can access that object
by either its long name or its short name. They are equivalent to each
other in that they both reference the exact same object.

That example holds for scenarios where the user created an object, but
if Windows needs to create an object for its own purposes, it's
perfectly free to skip the long name entirely and simply create the
object using the short name.

This behavior has existed since, what, Win 95?



  #68  
Old September 21st 17, 07:50 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Andy
external usenet poster
 
Posts: 645
Default Hackers hid malware in CCleaner software

As long as something works for you char that's all that matters.
I my self use 5,6 ,7 and like them all.


--
AL'S COMPUTERS
"Char Jackson" wrote in message
...
On Wed, 20 Sep 2017 17:11:35 -0000 (UTC), Blake Snyder
wrote:

Do you do these half dozen tasks with freeware?
If so, what freeware do you use for those tasks that you do?

1. Registry cleaning = what is the best freeware for this?
2. File cleaning = what is the best freeware for this?
3. Autorun disabling = Mark Russinovich's autoruns freeware
4. Browser plugin disabling = what is the best freeware for this?
5. Program uninstaller = Revo uninstaller freeware
6. Duplicate finder = http://www.top5freeware.com/duplicate-file-finder
7. Drive wiper =
https://www.pcworld.com/article/254509/free_tools_to_wipe_your_drives_securely.html


Of those 6 items, I only (occasionally) do #6. I use a tool called
Duplicate Cleaner Free (https://www.digitalvolcano.co.uk/).
No idea if it's the best, but I apparently like it well enough that I've
been using it for quite a few years without wanting to find a
replacement.

I have no use for the other 6 tasks. Yes, I know what each task is
about, so no need to assume something else.



  #69  
Old September 21st 17, 10:07 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
p-0''0-h the cat (coder)
external usenet poster
 
Posts: 114
Default Hackers hid malware in CCleaner software

On Thu, 21 Sep 2017 00:01:16 -0500, Char Jackson
wrote:

On Wed, 20 Sep 2017 23:49:34 +0100, "p-0''0-h the cat (coder)"
wrote:

On Wed, 20 Sep 2017 17:26:56 -0500, Char Jackson
wrote:

On Wed, 20 Sep 2017 17:18:13 -0000 (UTC), Blake Snyder
wrote:

On Wed, 20 Sep 2017 17:11:36 -0000 (UTC), in
news
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus

I thought I removed the errant VPN server but I realized that there was a
duplicate because there it TCP and UDP based configuration files.

So I disabled both the TCP and UDP VPN config file for the VPN server that
adds that Avast sig and header.

I can't promise the *next* VPN service won't do it but 99 out of 100 don't
add that line so most of the time this will work.

Each day there are another hundred servers that get added while another
hundred are deprecated so the list fluctuates daily.

This is a new free VPN server (just added today) so we'll see what it does.

Pretty hard to believe that a VPN server, which typically operates at
OSI Layer 3, would add (or remove) *anything* in the Layer 7 payload.

There's more to the story here. If this so-called VPN server is able to
muck around at Layer 7 for Usenet posts, what else is it doing to your
other traffic? I'd steer far, very far, from that kind of service. VPN
server, they ain't.


Meethinks it's a proxy server list.


VPN Gate clearly doesn't advertise it that way, but I think you're
right. Since the actual VPN servers are just a loose assortment of
privately owned servers running VPN software, there's no telling what
else they do to passing traffic.

I'm tempted to set one up myself, just to see what kind of goodness
passes through on a daily basis. I could free up about 20TB of drive
space to use as temp storage until I can run scripts to find the good
stuff.

On the other hand, nah, forget it.


The bottom line is if you need to use a VPN use a company you pay. With
payment you have a legal contract, and with that the ability to sue.
Pick someone who likely fears being sued and having their reputation
tarnished. So a long time player with a good reputation is ideal. Check
the service they offer in particular retention of log files and AVOID
like the plague any company that even suggests operating outside of the
law. I'd also look for a company that targets business at least as much
as individuals. Businesses are more likely to sue and sue hard if
shenanigans are uncovered.

You only need to use a little imagination to realise quite what you
could do if you had criminal or state surveillance intent.

Sent from my iFurryUnderbelly.

--
p-0.0-h the cat

Internet Terrorist, Mass sock puppeteer, Agent provocateur, Gutter rat,
Devil incarnate, Linux user#666, ******* hacker, Resident evil, Monkey Boy,
Certifiable criminal, Spineless cowardly scum, textbook Psychopath,
the SCOURGE, l33t p00h d3 tr0ll, p00h == lam3r, p00h == tr0ll, troll infâme,
the OVERCAT [The BEARPAIR are dead, and we are its murderers], lowlife troll,
shyster [pending approval by STATE_TERROR], cripple, sociopath, kook,
smug prick, smartarse, arsehole, moron, idiot, imbecile, snittish scumbag,
liar, total ******* retard, shill, pooh-seur, scouringerer, jumped up chav,
lycanthropic schizotypal lesbian, the most complete ignoid, joker, and furball.

NewsGroups Numbrer One Terrorist

Honorary SHYSTER and FRAUD awarded for services to Haberdashery.
By Appointment to God Frank-Lin.

Signature integrity check
md5 Checksum: be0b2a8c486d83ce7db9a459b26c4896

I mark any message from »Q« the troll as stinky

  #70  
Old September 21st 17, 10:08 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
David B.[_7_]
external usenet poster
 
Posts: 195
Default Hackers hid malware in CCleaner software

On 21-Sep-17 1:24 AM, J. P. Gilliver (John) wrote:
In message , Blake Snyder
writes:
[]
I think that the Ccleaner "leatherman" approach of doing lots of
things is
OK but the approach of having a single tool do a single job (like
uninstalling apps) is a better approach.


I used to use another "Leatherman" tool - EasyCleaner, by Toni Helenius,
a young Finn. (Well, he was young when I used it!) I can't remember if
it did all the things Cc does, but it had a nice (IMO) user interface to
select them from. I've no idea whether it still exists; I do know he was
URL-squatted at one point, by a company that charged for his freeware.


It's still he-

http://personal.inet.fi/business/toniarts/ecleane.htm

I first came across it on Pierre's web site:-

http://pierre.szwarc.free.fr/en/ln.php

Pierre, of course, is one of the stalwart 'advisers' from the User2User
group which used to be hosted on the Annexcafe newsserver. Now, of
course, it's hosted on the 'news.dogagent.com' server.

--
David B.



  #71  
Old September 21st 17, 10:13 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
David B.[_7_]
external usenet poster
 
Posts: 195
Default Hackers hid malware in CCleaner software

On 21-Sep-17 10:07 AM, p-0''0-h the cat (coder) wrote:
On Thu, 21 Sep 2017 00:01:16 -0500, Char Jackson
wrote:

On Wed, 20 Sep 2017 23:49:34 +0100, "p-0''0-h the cat (coder)"
wrote:

On Wed, 20 Sep 2017 17:26:56 -0500, Char Jackson
wrote:

On Wed, 20 Sep 2017 17:18:13 -0000 (UTC), Blake Snyder
wrote:

On Wed, 20 Sep 2017 17:11:36 -0000 (UTC), in
news
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus

I thought I removed the errant VPN server but I realized that there was a
duplicate because there it TCP and UDP based configuration files.

So I disabled both the TCP and UDP VPN config file for the VPN server that
adds that Avast sig and header.

I can't promise the *next* VPN service won't do it but 99 out of 100 don't
add that line so most of the time this will work.

Each day there are another hundred servers that get added while another
hundred are deprecated so the list fluctuates daily.

This is a new free VPN server (just added today) so we'll see what it does.

Pretty hard to believe that a VPN server, which typically operates at
OSI Layer 3, would add (or remove) *anything* in the Layer 7 payload.

There's more to the story here. If this so-called VPN server is able to
muck around at Layer 7 for Usenet posts, what else is it doing to your
other traffic? I'd steer far, very far, from that kind of service. VPN
server, they ain't.

Meethinks it's a proxy server list.


VPN Gate clearly doesn't advertise it that way, but I think you're
right. Since the actual VPN servers are just a loose assortment of
privately owned servers running VPN software, there's no telling what
else they do to passing traffic.

I'm tempted to set one up myself, just to see what kind of goodness
passes through on a daily basis. I could free up about 20TB of drive
space to use as temp storage until I can run scripts to find the good
stuff.

On the other hand, nah, forget it.


The bottom line is if you need to use a VPN use a company you pay. With
payment you have a legal contract, and with that the ability to sue.
Pick someone who likely fears being sued and having their reputation
tarnished. So a long time player with a good reputation is ideal. Check
the service they offer in particular retention of log files and AVOID
like the plague any company that even suggests operating outside of the
law. I'd also look for a company that targets business at least as much
as individuals. Businesses are more likely to sue and sue hard if
shenanigans are uncovered.

You only need to use a little imagination to realise quite what you
could do if you had criminal or state surveillance intent.


IAWTP

The same can probably be said about newsservers! ;-)

--
David B.
  #72  
Old September 21st 17, 10:40 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
p-0''0-h the cat (coder)
external usenet poster
 
Posts: 114
Default Hackers hid malware in CCleaner software

On Thu, 21 Sep 2017 10:13:48 +0100, "David B."
wrote:

On 21-Sep-17 10:07 AM, p-0''0-h the cat (coder) wrote:
On Thu, 21 Sep 2017 00:01:16 -0500, Char Jackson
wrote:

On Wed, 20 Sep 2017 23:49:34 +0100, "p-0''0-h the cat (coder)"
wrote:

On Wed, 20 Sep 2017 17:26:56 -0500, Char Jackson
wrote:

On Wed, 20 Sep 2017 17:18:13 -0000 (UTC), Blake Snyder
wrote:

On Wed, 20 Sep 2017 17:11:36 -0000 (UTC), in
news
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus

I thought I removed the errant VPN server but I realized that there was a
duplicate because there it TCP and UDP based configuration files.

So I disabled both the TCP and UDP VPN config file for the VPN server that
adds that Avast sig and header.

I can't promise the *next* VPN service won't do it but 99 out of 100 don't
add that line so most of the time this will work.

Each day there are another hundred servers that get added while another
hundred are deprecated so the list fluctuates daily.

This is a new free VPN server (just added today) so we'll see what it does.

Pretty hard to believe that a VPN server, which typically operates at
OSI Layer 3, would add (or remove) *anything* in the Layer 7 payload.

There's more to the story here. If this so-called VPN server is able to
muck around at Layer 7 for Usenet posts, what else is it doing to your
other traffic? I'd steer far, very far, from that kind of service. VPN
server, they ain't.

Meethinks it's a proxy server list.

VPN Gate clearly doesn't advertise it that way, but I think you're
right. Since the actual VPN servers are just a loose assortment of
privately owned servers running VPN software, there's no telling what
else they do to passing traffic.

I'm tempted to set one up myself, just to see what kind of goodness
passes through on a daily basis. I could free up about 20TB of drive
space to use as temp storage until I can run scripts to find the good
stuff.

On the other hand, nah, forget it.


The bottom line is if you need to use a VPN use a company you pay. With
payment you have a legal contract, and with that the ability to sue.
Pick someone who likely fears being sued and having their reputation
tarnished. So a long time player with a good reputation is ideal. Check
the service they offer in particular retention of log files and AVOID
like the plague any company that even suggests operating outside of the
law. I'd also look for a company that targets business at least as much
as individuals. Businesses are more likely to sue and sue hard if
shenanigans are uncovered.

You only need to use a little imagination to realise quite what you
could do if you had criminal or state surveillance intent.


IAWTP

The same can probably be said about newsservers! ;-)


It depends on the T&Cs of exactly what they offer of course but sure if
they offer privacy and anonymity and deletion of log files after a
lawful period etc and they fail to deliver you have greater recourse to
law with a contract. Proving loss might be more difficult. The service
is more limited and wanting to pay for legal recourse in this case is
unlikely. The fact is though that companies are more likely to work
within the law and provide what they contract to do. There are plenty of
honest people around. No guarantees though, ever. Set up your own
service if you want to approach that.

Don't think I didn't notice the nym shift. One false move and my itchy
paw will descend.

Sent from my iFurryUnderbelly.

--
p-0.0-h the cat

Internet Terrorist, Mass sock puppeteer, Agent provocateur, Gutter rat,
Devil incarnate, Linux user#666, ******* hacker, Resident evil, Monkey Boy,
Certifiable criminal, Spineless cowardly scum, textbook Psychopath,
the SCOURGE, l33t p00h d3 tr0ll, p00h == lam3r, p00h == tr0ll, troll infâme,
the OVERCAT [The BEARPAIR are dead, and we are its murderers], lowlife troll,
shyster [pending approval by STATE_TERROR], cripple, sociopath, kook,
smug prick, smartarse, arsehole, moron, idiot, imbecile, snittish scumbag,
liar, total ******* retard, shill, pooh-seur, scouringerer, jumped up chav,
lycanthropic schizotypal lesbian, the most complete ignoid, joker, and furball.

NewsGroups Numbrer One Terrorist

Honorary SHYSTER and FRAUD awarded for services to Haberdashery.
By Appointment to God Frank-Lin.

Signature integrity check
md5 Checksum: be0b2a8c486d83ce7db9a459b26c4896

I mark any message from »Q« the troll as stinky

  #73  
Old September 21st 17, 11:06 AM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
J. P. Gilliver (John)[_4_]
external usenet poster
 
Posts: 2,679
Default Hackers hid malware in CCleaner software

In message , David B.
writes:
On 21-Sep-17 1:24 AM, J. P. Gilliver (John) wrote:

[]
I used to use another "Leatherman" tool - EasyCleaner, by Toni
Helenius, a young Finn. (Well, he was young when I used it!) I can't
remember if it did all the things Cc does, but it had a nice (IMO)
user interface to select them from. I've no idea whether it still
exists; I do know he was URL-squatted at one point, by a company that
charged for his freeware.


It's still he-

http://personal.inet.fi/business/toniarts/ecleane.htm


Good to know. Though it seems to have stopped at 2007 (Vista), so
probably unwise to use on later Windowses (what's the plural of
Windows?). Pity; I liked it - and an installer of only 2.81 MB, 5.13 MB
installed!

I first came across it on Pierre's web site:-

http://pierre.szwarc.free.fr/en/ln.php

Pierre, of course, is one of the stalwart 'advisers' from the User2User
group which used to be hosted on the Annexcafe newsserver. Now, of
course, it's hosted on the 'news.dogagent.com' server.

Pierre's page says 2010 at the bottom. Looks like it was good.
--
J. P. Gilliver. UMRA: 1960/1985 MB++G()AL-IS-Ch++(p)Ar@T+H+Sh0!:`)DNAf

`Computers are useless. They can only give you answers.' Pablo Picasso, 1968
  #74  
Old September 21st 17, 03:13 PM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Brian Gregory
external usenet poster
 
Posts: 648
Default Hackers hid malware in CCleaner software

On 19/09/2017 01:21, Blake Snyder wrote:
On Mon, 18 Sep 2017 17:13:49 -0600, in news Buffalo wrote:

Thanks, it sure gets you to that page a lot quicker, clever boy


What free software do you recommend for checking this in the future?

I have Wireshark, for example, but it's complex to use (as you may know).
I also have Fiddler4, & TCPView, & Glasswire.

None of those would have caught it though because all are active sniffers.

What free software, as a passive sniffer, do you recommend that
would/should have caught the spyware in CCleaner when even Avast & Kapersky
didn't catch it?

---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus


I think even Microsoft Security Essentials would stop the malware part
installing.

Also remember only 32 bit versions of Windows were affected.

--

Brian Gregory (in the UK).
To email me please remove all the letter vee from my email address.
  #75  
Old September 21st 17, 03:24 PM posted to alt.comp.os.windows-10,alt.comp.freeware,alt.windows7.general
Char Jackson
external usenet poster
 
Posts: 10,449
Default Hackers hid malware in CCleaner software

On Thu, 21 Sep 2017 10:40:47 +0100, "p-0''0-h the cat (coder)"
wrote:

On Thu, 21 Sep 2017 10:13:48 +0100, "David B."
wrote:

On 21-Sep-17 10:07 AM, p-0''0-h the cat (coder) wrote:
On Thu, 21 Sep 2017 00:01:16 -0500, Char Jackson
wrote:

On Wed, 20 Sep 2017 23:49:34 +0100, "p-0''0-h the cat (coder)"
wrote:

On Wed, 20 Sep 2017 17:26:56 -0500, Char Jackson
wrote:

On Wed, 20 Sep 2017 17:18:13 -0000 (UTC), Blake Snyder
wrote:

On Wed, 20 Sep 2017 17:11:36 -0000 (UTC), in
news
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus

I thought I removed the errant VPN server but I realized that there was a
duplicate because there it TCP and UDP based configuration files.

So I disabled both the TCP and UDP VPN config file for the VPN server that
adds that Avast sig and header.

I can't promise the *next* VPN service won't do it but 99 out of 100 don't
add that line so most of the time this will work.

Each day there are another hundred servers that get added while another
hundred are deprecated so the list fluctuates daily.

This is a new free VPN server (just added today) so we'll see what it does.

Pretty hard to believe that a VPN server, which typically operates at
OSI Layer 3, would add (or remove) *anything* in the Layer 7 payload.

There's more to the story here. If this so-called VPN server is able to
muck around at Layer 7 for Usenet posts, what else is it doing to your
other traffic? I'd steer far, very far, from that kind of service. VPN
server, they ain't.

Meethinks it's a proxy server list.

VPN Gate clearly doesn't advertise it that way, but I think you're
right. Since the actual VPN servers are just a loose assortment of
privately owned servers running VPN software, there's no telling what
else they do to passing traffic.

I'm tempted to set one up myself, just to see what kind of goodness
passes through on a daily basis. I could free up about 20TB of drive
space to use as temp storage until I can run scripts to find the good
stuff.

On the other hand, nah, forget it.

The bottom line is if you need to use a VPN use a company you pay. With
payment you have a legal contract, and with that the ability to sue.
Pick someone who likely fears being sued and having their reputation
tarnished. So a long time player with a good reputation is ideal. Check
the service they offer in particular retention of log files and AVOID
like the plague any company that even suggests operating outside of the
law. I'd also look for a company that targets business at least as much
as individuals. Businesses are more likely to sue and sue hard if
shenanigans are uncovered.

You only need to use a little imagination to realise quite what you
could do if you had criminal or state surveillance intent.


IAWTP

The same can probably be said about newsservers! ;-)


It depends on the T&Cs of exactly what they offer of course but sure if
they offer privacy and anonymity and deletion of log files after a
lawful period etc and they fail to deliver you have greater recourse to
law with a contract. Proving loss might be more difficult. The service
is more limited and wanting to pay for legal recourse in this case is
unlikely. The fact is though that companies are more likely to work
within the law and provide what they contract to do. There are plenty of
honest people around. No guarantees though, ever. Set up your own
service if you want to approach that.

Don't think I didn't notice the nym shift. One false move and my itchy
paw will descend.


Nym shift? That was just David (resident stalker, but trying to play
nice for now) chiming in.

 




Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off






All times are GMT +1. The time now is 09:24 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.