If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Rate Thread | Display Modes |
|
#1
|
|||
|
|||
tl;dr:
Do YOU agree with the prognosis/speculation of 'dcollins'?
https://forums.malwarebytes.com/topi...k-my-question/ aside Great wedding today! *Share YOUR love* :-D -- D. |
#2
|
|||
|
|||
tl;dr:
On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote: Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ? Don't know. Put YOUR technical opinion here and we'll discuss it. I'm assuming you are not posting OT, in which case you will probably be ignored. CUT_POSSIBLE_MALICIOUS_LINK To prevent yourself from being a victim of cyber stalking, it's highly recommended you visit he https://tekrider.net/pages/david-brooks-stalker.php The site is safe. 10/10 on WOT. []'s -- Don't be evil - Google 2004 We have a new policy - Google 2012 |
#3
|
|||
|
|||
tl;dr:
On 19/05/2018 16:21, Shadow wrote:
On Sat, 19 May 2018 14:22:39 +0100, "David B." wrote: Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ? Don't know. Put YOUR technical opinion here and we'll discuss it. I'm assuming you are not posting OT, in which case you will probably be ignored. That is the rc.common script, which should be found he /etc/rc.common This is a script that is no longer used on modern macOS, but it's still present. It can be a means for providing persistence to malware (malware can add malicious lines of code to this script). However, I've tested this on systems from 10.7 and up, and that no longer works. I have been unable to get custom code added to rc.common to actually run on those systems. = That seems an adequate answer! :bananas: |
#4
|
|||
|
|||
tl;dr:
On 20 May 2018, David B. wrote
(in article ): On 19/05/2018 16:21, Shadow wrote: On Sat, 19 May 2018 14:22:39 +0100, "David B." wrote: Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ? Don't know. Put YOUR technical opinion here and we'll discuss it. I'm assuming you are not posting OT, in which case you will probably be ignored. That is the rc.common script, which should be found he /etc/rc.common This is a script that is no longer used on modern macOS, but it's still present. It can be a means for providing persistence to malware (malware can add malicious lines of code to this script). However, I've tested this on systems from 10.7 and up, and that no longer works. I have been unable to get custom code added to rc.common to actually run on those systems. = That seems an adequate answer! :bananas: Gee, trollboy, weren’t you bloviating about how it might have been an eeeeevil malware script which might/might not have been dropped onto your system by that well-known (to you, anyway) malware distribution tool EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and how _that_ is an even greater eeeeevil malware distribution tool. You’re a lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic, too. |
#5
|
|||
|
|||
tl;dr:
On 20/05/18 12:02, Wolffan wrote:
On 20 May 2018, David B. wrote (in article ): On 19/05/2018 16:21, Shadow wrote: On Sat, 19 May 2018 14:22:39 +0100, "David B." wrote: Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ? Don't know. Put YOUR technical opinion here and we'll discuss it. I'm assuming you are not posting OT, in which case you will probably be ignored. That is the rc.common script, which should be found he /etc/rc.common This is a script that is no longer used on modern macOS, but it's still present. It can be a means for providing persistence to malware (malware can add malicious lines of code to this script). However, I've tested this on systems from 10.7 and up, and that no longer works. I have been unable to get custom code added to rc.common to actually run on those systems. = That seems an adequate answer! :bananas: Gee, trollboy, weren’t you bloviating about how it might have been an eeeeevil malware script which might/might not have been dropped onto your system by that well-known (to you, anyway) malware distribution tool EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and how _that_ is an even greater eeeeevil malware distribution tool. You’re a lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic, too. ClamXAV? Why does Apple enable it to run on Apple machines when it *IS* totally unnecessary and COULD be doing harm? Apple itself should check it out thoroughly now that ClamXav is no longer available from the App store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Snit is not running from this forger, he's running from me. -----BEGIN PGP SIGNATURE----- Comment: GPGTools -https://gpgtools.org iQIcBAEBCgAGBQJV5iqVAAoJEC03b6bOr/+dmLoQAIdHYN1feyWJ/SVZdvG6QxAa z8N7UmFjUAJUtwRzPEpDydU/beEoOGsa/M7MRHfOhRv4XJcQWjk6ouQfW0JyQFG9 rYQONKuvpypOTA4suPMHuRelgV8o5vsT6nsnkhu3A3Vl8JT8Qe YvwNlDUtsuPo67 TtJ11dKv9WmtqqV0jspikxaegpb4z8/ipc12/rl6ecLu9xadA/zaWCXinfjKtCdK sv1Y48I4mxhRzURDBf3ad/XteOCnYRum4IS4fP4WrMhjaOF/zrK2dSKtKdZ5BD6c DU1wnP52A35i/ZH02EA60sDBS23YBogMTkx3UJ9RW9wxz/x5derTSyK12z8IRAYE pypLNtDjIzuuebWu17TxVhYjrvy7E2VH5/7ElQmheMlQdAJmQG/GAXozseswBKnV X+jzVigbsOEHsYWvJuP38g9o1wUPp0lENdQpzu3IohaG9X7wGH Vz9cZ07he5ciCA tXLtNYcF0/9zoiX2LALGEAOrKkW/APTKkk4FsvPXNf78kdGu9aWd/bygshzUPY9o LnTVyDluUCSmFI70+FSXUy8pmWrgajv8hYqtlxCaxgQr8x1hnc/wnUSb2zPIfYJT dzrKAlFJ5HFJf8llwjKNksAVoU/RQ6Q+Yg3RufvoYH2D8b1pk5rLj9C9svPkU18X 7DDD35qwaoj2vKsXG31G =fwCb -----END PGP SIGNATURE----- -- E-commerce Simplified! https://www.youtube.com/watch?v=IhOfBmWwCVY http://jeff-relf.me/Cola_Regs.HTM Jonas Eklundh |
#6
|
|||
|
|||
tl;dr:
On 20-May-18 12:02 PM, Wolffan wrote:
On 20 May 2018, David B. wrote (in article ): On 19/05/2018 16:21, Shadow wrote: On Sat, 19 May 2018 14:22:39 +0100, "David B." wrote: Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ? Don't know. Put YOUR technical opinion here and we'll discuss it. I'm assuming you are not posting OT, in which case you will probably be ignored. That is the rc.common script, which should be found he /etc/rc.common This is a script that is no longer used on modern macOS, but it's still present. It can be a means for providing persistence to malware (malware can add malicious lines of code to this script). However, I've tested this on systems from 10.7 and up, and that no longer works. I have been unable to get custom code added to rc.common to actually run on those systems. = That seems an adequate answer! :bananas: Gee, trollboy, weren’t you bloviating about how it might have been an eeeeevil malware script which might/might not have been dropped onto your system by that well-known (to you, anyway) malware distribution tool EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and how _that_ is an even greater eeeeevil malware distribution tool. You’re a lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic, too. Good morning, 'sock' - how sad it is that you feel a need to hide your identity. :-( People who do so invariable raise my suspicions about them. What this means, in effect, is that visitors to the Apple Support Communities have to put their complete faith and trust into what is said by, effectively, complete strangers. From what I have already determined, advice given is not necessarily checked by Apple staff. Why the 'Hosts' chose to delete the whole discussion about ClamXav intrigued me. It wasn't 'logical' as Spock might have said. The developer of ClamXav, if genuine, should have been only too pleased to answer questions on the forums. When one approves the installation of software like ClamXav onto one's Apple machine, one is giving 'carte blanche' for that software to do *anything it wishes* on one's computer. (Carte blanche, a French phrase, meaning "unlimited discretionary power to act; unrestricted authority".) You, as the user, will have absolutely no idea whether or not your computer has been compromised. I believe this to be a FACT! Just in case you are wondering about the :bananas: ................... https://www.bleepingcomputer.com/for...-one-might-do/ By the way, I'm confident in the advice given by Thomas Reed, now a Director of Malwarebytes Inc and someone who has a profile on LinkedIn. https://forums.malwarebytes.com/topi...omment-1243073 What's YOUR view of John Daniel? https://www.linkedin.com/in/etresoft/ "Etresoft, Inc. is a Canadian software development and consulting corporation in business since 2015. Etresoft's most popular product is EtreCheck, a macOS diagnostic tool used by over half a million people and frequently recommended on Apple Support Communities." http://www.etresoft.com/ He elected to terminate email contact with me and became quite hostile on the ASC. That really bothers me. :-( -- David B. |
#7
|
|||
|
|||
tl;dr:
In article , David B.
wrote: Why the 'Hosts' chose to delete the whole discussion about ClamXav intrigued me. It wasn't 'logical' as Spock might have said. it was very logical. there was zero benefit. The developer of ClamXav, if genuine, should have been only too pleased to answer questions on the forums. not when they're from dumb**** trolls. When one approves the installation of software like ClamXav onto one's Apple machine, one is giving 'carte blanche' for that software to do *anything it wishes* on one's computer. no different than *any* software. |
#8
|
|||
|
|||
tl;dr:
On Mon, 21 May 2018 08:02:55 +0100, "David B."
wrote: On 20-May-18 12:02 PM, Wolffan wrote: On 20 May 2018, David B. wrote (in article ): On 19/05/2018 16:21, Shadow wrote: On Sat, 19 May 2018 14:22:39 +0100, "David B." wrote: Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ? Don't know. Put YOUR technical opinion here and we'll discuss it. I'm assuming you are not posting OT, in which case you will probably be ignored. That is the rc.common script, which should be found he /etc/rc.common This is a script that is no longer used on modern macOS, but it's still present. It can be a means for providing persistence to malware (malware can add malicious lines of code to this script). However, I've tested this on systems from 10.7 and up, and that no longer works. I have been unable to get custom code added to rc.common to actually run on those systems. = That seems an adequate answer! :bananas: Gee, trollboy, weren’t you bloviating about how it might have been an eeeeevil malware script which might/might not have been dropped onto your system by that well-known (to you, anyway) malware distribution tool EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and how _that_ is an even greater eeeeevil malware distribution tool. You’re a lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic, too. Good morning, 'sock' - how sad it is that you feel a need to hide your identity. Makes STALKING hard, heh ? It IS the norm on Usenet, though, for that very reason. (and weird, coming from someone with 20 nyms.) CUT_OFF_TOPIC_STALKING_CONTENT To prevent yourself from being a victim of cyber stalking, it's highly recommended you visit he https://tekrider.net/pages/david-brooks-stalker.php The site is safe. 10/10 on WOT. []'s -- Don't be evil - Google 2004 We have a new policy - Google 2012 |
#9
|
|||
|
|||
tl;dr:
On Sun, 20 May 2018 09:55:42 +0100, "David B."
wrote: On 19/05/2018 16:21, Shadow wrote: On Sat, 19 May 2018 14:22:39 +0100, "David B." wrote: Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ? Don't know. Put YOUR technical opinion here and we'll discuss it. I'm assuming you are not posting OT, in which case you will probably be ignored. That is the rc.common script, which should be found he /etc/rc.common This is a script that is no longer used on modern macOS Or old Apples. It was present but inactive on MOST machines. WTF are you going on and on about it ? Who's your target this time ? (the question was rhetorical, we don't want names). To prevent yourself from being a victim of cyber stalking, it's highly recommended you visit he https://tekrider.net/pages/david-brooks-stalker.php The site is safe. 10/10 on WOT. []'s -- Don't be evil - Google 2004 We have a new policy - Google 2012 |
#10
|
|||
|
|||
(OT) David Brooks A known stalker!
Just a public service announcement which concerns your online safety.
For your own good, if you presently interact with David Brooks, it's recommended you cease doing so immediately. Whatever information you've already provided him with will be abused at a later date, but you can prevent him from learning more about you for future abuse by ceasing conversation with him. You don't need to take my word for it, google for david brooks stalker and educate yourself. He's practically infamous for it! MID: http://al.howardknight.net/msgid.cgi?ID=152222085100 Here's some MIDs and urls showing the message where you're clearly, STALKING. It's hard to deny it when your own posts show you doing it. I just thought i'd remind you about some of them. G Begin Davids efforts in rec photo: MID: http://al.howardknight.net/msgid.cgi?ID=149437329500 Request denied. David tries again: MID: http://al.howardknight.net/msgid.cgi?ID=149461165500 Request denied, again. David doesn't give up easily. MID: http://al.howardknight.net/msgid.cgi?ID=149461088500 Gets no where, again. So, David comes clean with the group in public on his intentions towards me: MID: http://al.howardknight.net/msgid.cgi?ID=149456200100 Doesn't really get anywhere. Makes little progress.. Until... MID: http://al.howardknight.net/msgid.cgi?ID=152201851200 Evidently goes nowhere on him, as I'm still here. But, yes, he did try turning things around and painting himself as a victim of some kind. Neat huh? Another go at stalking me and asking others to help. He even keeps screenshots incriminating his own stalking behaviors. ROFL! MID: http://al.howardknight.net/msgid.cgi?ID=149603382000 He's basically told to pound sand, continues, releasing more 'information' he thinks he knows about me to speed things up MID: http://al.howardknight.net/msgid.cgi?ID=152201858800 Perhaps this additional information regarding his date of birth will be helpful in identifying his ACTUAL address? Davids real upset with me, asks rec.photo for help! MID: http://al.howardknight.net/msgid.cgi?ID=149456200100 David stalking a domain site owner MID: http://al.howardknight.net/msgid.cgi?ID=152201905200 David Stalking Paul Adare MID: http://al.howardknight.net/msgid.cgi?ID=152201910900 David specifying an .exe malware file that he knew wasn't on tekrider domain. After claiming it was previously. MID: http://al.howardknight.net/msgid.cgi?ID=151796841900 David trying to dox me again with a new signature MID: http://al.howardknight.net/msgid.cgi?ID=151805918800 I can be trusted to 'shop' you and bring you to justice! You really shouldn't have used a new signature. Perhaps you'll refrain from so doing now that I've got one too? David threatens me with a bigger? doxing. MID: al.howardknight.net/msgid.cgi?ID=152201932100 Would you like me to publish YOUR personal details Dustin? I have them. They were disclosed to me by a 'friend' who lives in the USA. Genuine stuff - REAL LIFE info! Just say the word and I'll post same in all 110,000 plus Usenet groups held by Giganews! -- Don't become the next David Brooks cyberstalking victim! Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT) to learn more. If you've already become a victim or know someone who has, you can provide the following information to them, your lawyer, local law enforcement, etc. https://www.devon-cornwall.police.uk - His local police. Report? David Brooks (BoaterDave) Jersey Cottage 86 Granary Lane Budleigh Salterton Devon EX9 6ER United Kingdom Phone: 44-1395-443340 (H) 07974-193550 (M) Email(s): , |
Thread Tools | |
Display Modes | Rate This Thread |
|
|