A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Windows 10 » Windows 10 Help Forum
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

tl;dr:



 
 
Thread Tools Rate Thread Display Modes
  #1  
Old May 19th 18, 02:22 PM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10
David B.[_7_]
external usenet poster
 
Posts: 195
Default tl;dr:

Do YOU agree with the prognosis/speculation of 'dcollins'?

https://forums.malwarebytes.com/topi...k-my-question/

aside

Great wedding today!

*Share YOUR love* :-D

--
D.
  #2  
Old May 19th 18, 04:21 PM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10,alt.uk.law
Shadow
external usenet poster
 
Posts: 1,638
Default tl;dr:

On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote:

Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ?


Don't know. Put YOUR technical opinion here and we'll discuss it.

I'm assuming you are not posting OT, in which case you will probably
be ignored.

CUT_POSSIBLE_MALICIOUS_LINK


To prevent yourself from being a victim of cyber
stalking, it's highly recommended you visit he
https://tekrider.net/pages/david-brooks-stalker.php

The site is safe. 10/10 on WOT.
[]'s

--
Don't be evil - Google 2004
We have a new policy - Google 2012
  #3  
Old May 20th 18, 09:55 AM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10,alt.uk.law
David B.[_7_]
external usenet poster
 
Posts: 195
Default tl;dr:

On 19/05/2018 16:21, Shadow wrote:
On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote:

Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ?


Don't know. Put YOUR technical opinion here and we'll discuss it.

I'm assuming you are not posting OT, in which case you will probably
be ignored.



That is the rc.common script, which should be found he
/etc/rc.common

This is a script that is no longer used on modern macOS, but it's still
present. It can be a means for providing persistence to malware (malware
can add malicious lines of code to this script). However, I've tested
this on systems from 10.7 and up, and that no longer works. I have been
unable to get custom code added to rc.common to actually run on those
systems.

=

That seems an adequate answer! :bananas:
  #4  
Old May 20th 18, 12:02 PM posted to alt.computer.workshop, comp.sys.mac.system, comp.sys.mac.misc, alt.comp.os.windows-10, alt.uk.law
Wolffan
external usenet poster
 
Posts: 20
Default tl;dr:

On 20 May 2018, David B. wrote
(in article ):

On 19/05/2018 16:21, Shadow wrote:
On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote:

Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ?


Don't know. Put YOUR technical opinion here and we'll discuss it.

I'm assuming you are not posting OT, in which case you will probably
be ignored.


That is the rc.common script, which should be found he
/etc/rc.common

This is a script that is no longer used on modern macOS, but it's still
present. It can be a means for providing persistence to malware (malware
can add malicious lines of code to this script). However, I've tested
this on systems from 10.7 and up, and that no longer works. I have been
unable to get custom code added to rc.common to actually run on those
systems.

=

That seems an adequate answer! :bananas:


Gee, trollboy, weren’t you bloviating about how it might have been an
eeeeevil malware script which might/might not have been dropped onto your
system by that well-known (to you, anyway) malware distribution tool
EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and
how _that_ is an even greater eeeeevil malware distribution tool. You’re a
lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic,
too.

  #5  
Old May 21st 18, 07:40 AM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10,alt.uk.law
Steve Carroll
external usenet poster
 
Posts: 4
Default tl;dr:

On 20/05/18 12:02, Wolffan wrote:
On 20 May 2018, David B. wrote
(in article ):

On 19/05/2018 16:21, Shadow wrote:
On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote:

Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ?

Don't know. Put YOUR technical opinion here and we'll discuss it.

I'm assuming you are not posting OT, in which case you will probably
be ignored.


That is the rc.common script, which should be found he
/etc/rc.common

This is a script that is no longer used on modern macOS, but it's still
present. It can be a means for providing persistence to malware (malware
can add malicious lines of code to this script). However, I've tested
this on systems from 10.7 and up, and that no longer works. I have been
unable to get custom code added to rc.common to actually run on those
systems.

=

That seems an adequate answer! :bananas:


Gee, trollboy, weren’t you bloviating about how it might have been an
eeeeevil malware script which might/might not have been dropped onto your
system by that well-known (to you, anyway) malware distribution tool
EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and
how _that_ is an even greater eeeeevil malware distribution tool. You’re a
lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic,
too.


ClamXAV? Why does Apple enable it to run on Apple machines when it *IS*
totally unnecessary and COULD be doing harm? Apple itself should check
it out thoroughly now that ClamXav is no longer available from the App
store.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Snit is not running from this forger, he's running from me.
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools -https://gpgtools.org

iQIcBAEBCgAGBQJV5iqVAAoJEC03b6bOr/+dmLoQAIdHYN1feyWJ/SVZdvG6QxAa
z8N7UmFjUAJUtwRzPEpDydU/beEoOGsa/M7MRHfOhRv4XJcQWjk6ouQfW0JyQFG9
rYQONKuvpypOTA4suPMHuRelgV8o5vsT6nsnkhu3A3Vl8JT8Qe YvwNlDUtsuPo67
TtJ11dKv9WmtqqV0jspikxaegpb4z8/ipc12/rl6ecLu9xadA/zaWCXinfjKtCdK
sv1Y48I4mxhRzURDBf3ad/XteOCnYRum4IS4fP4WrMhjaOF/zrK2dSKtKdZ5BD6c
DU1wnP52A35i/ZH02EA60sDBS23YBogMTkx3UJ9RW9wxz/x5derTSyK12z8IRAYE
pypLNtDjIzuuebWu17TxVhYjrvy7E2VH5/7ElQmheMlQdAJmQG/GAXozseswBKnV
X+jzVigbsOEHsYWvJuP38g9o1wUPp0lENdQpzu3IohaG9X7wGH Vz9cZ07he5ciCA
tXLtNYcF0/9zoiX2LALGEAOrKkW/APTKkk4FsvPXNf78kdGu9aWd/bygshzUPY9o
LnTVyDluUCSmFI70+FSXUy8pmWrgajv8hYqtlxCaxgQr8x1hnc/wnUSb2zPIfYJT
dzrKAlFJ5HFJf8llwjKNksAVoU/RQ6Q+Yg3RufvoYH2D8b1pk5rLj9C9svPkU18X
7DDD35qwaoj2vKsXG31G
=fwCb
-----END PGP SIGNATURE-----

--
E-commerce Simplified!
https://www.youtube.com/watch?v=IhOfBmWwCVY
http://jeff-relf.me/Cola_Regs.HTM
Jonas Eklundh
  #6  
Old May 21st 18, 08:02 AM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10,alt.uk.law
David B.[_7_]
external usenet poster
 
Posts: 195
Default tl;dr:

On 20-May-18 12:02 PM, Wolffan wrote:
On 20 May 2018, David B. wrote
(in article ):

On 19/05/2018 16:21, Shadow wrote:
On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote:

Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ?

Don't know. Put YOUR technical opinion here and we'll discuss it.

I'm assuming you are not posting OT, in which case you will probably
be ignored.


That is the rc.common script, which should be found he
/etc/rc.common

This is a script that is no longer used on modern macOS, but it's still
present. It can be a means for providing persistence to malware (malware
can add malicious lines of code to this script). However, I've tested
this on systems from 10.7 and up, and that no longer works. I have been
unable to get custom code added to rc.common to actually run on those
systems.

=

That seems an adequate answer! :bananas:


Gee, trollboy, weren’t you bloviating about how it might have been an
eeeeevil malware script which might/might not have been dropped onto your
system by that well-known (to you, anyway) malware distribution tool
EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and
how _that_ is an even greater eeeeevil malware distribution tool. You’re a
lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic,
too.


Good morning, 'sock' - how sad it is that you feel a need to hide your
identity. :-(

People who do so invariable raise my suspicions about them. What this
means, in effect, is that visitors to the Apple Support Communities have
to put their complete faith and trust into what is said by, effectively,
complete strangers. From what I have already determined, advice given is
not necessarily checked by Apple staff.

Why the 'Hosts' chose to delete the whole discussion about ClamXav
intrigued me. It wasn't 'logical' as Spock might have said. The
developer of ClamXav, if genuine, should have been only too pleased to
answer questions on the forums.

When one approves the installation of software like ClamXav onto one's
Apple machine, one is giving 'carte blanche' for that software to do
*anything it wishes* on one's computer.

(Carte blanche, a French phrase, meaning "unlimited discretionary power
to act; unrestricted authority".)

You, as the user, will have absolutely no idea whether or not your
computer has been compromised. I believe this to be a FACT!

Just in case you are wondering about the :bananas: ...................

https://www.bleepingcomputer.com/for...-one-might-do/

By the way, I'm confident in the advice given by Thomas Reed, now a
Director of Malwarebytes Inc and someone who has a profile on LinkedIn.

https://forums.malwarebytes.com/topi...omment-1243073

What's YOUR view of John Daniel?

https://www.linkedin.com/in/etresoft/

"Etresoft, Inc. is a Canadian software development and consulting
corporation in business since 2015. Etresoft's most popular product is
EtreCheck, a macOS diagnostic tool used by over half a million people
and frequently recommended on Apple Support Communities."

http://www.etresoft.com/

He elected to terminate email contact with me and became quite hostile
on the ASC. That really bothers me. :-(

--
David B.



  #7  
Old May 21st 18, 02:20 PM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10,alt.uk.law
nospam
external usenet poster
 
Posts: 4,718
Default tl;dr:

In article , David B.
wrote:


Why the 'Hosts' chose to delete the whole discussion about ClamXav
intrigued me. It wasn't 'logical' as Spock might have said.


it was very logical. there was zero benefit.

The
developer of ClamXav, if genuine, should have been only too pleased to
answer questions on the forums.


not when they're from dumb**** trolls.

When one approves the installation of software like ClamXav onto one's
Apple machine, one is giving 'carte blanche' for that software to do
*anything it wishes* on one's computer.


no different than *any* software.
  #8  
Old May 21st 18, 10:42 PM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10,alt.uk.law
Shadow
external usenet poster
 
Posts: 1,638
Default tl;dr:

On Mon, 21 May 2018 08:02:55 +0100, "David B."
wrote:

On 20-May-18 12:02 PM, Wolffan wrote:
On 20 May 2018, David B. wrote
(in article ):

On 19/05/2018 16:21, Shadow wrote:
On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote:

Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ?

Don't know. Put YOUR technical opinion here and we'll discuss it.

I'm assuming you are not posting OT, in which case you will probably
be ignored.

That is the rc.common script, which should be found he
/etc/rc.common

This is a script that is no longer used on modern macOS, but it's still
present. It can be a means for providing persistence to malware (malware
can add malicious lines of code to this script). However, I've tested
this on systems from 10.7 and up, and that no longer works. I have been
unable to get custom code added to rc.common to actually run on those
systems.

=

That seems an adequate answer! :bananas:


Gee, trollboy, weren’t you bloviating about how it might have been an
eeeeevil malware script which might/might not have been dropped onto your
system by that well-known (to you, anyway) malware distribution tool
EtreCheck? Why, yes you were, in between more bloviating about ClamXAV and
how _that_ is an even greater eeeeevil malware distribution tool. You’re a
lying scumbag troll, and dimmer than a yard up a pig’s ass. Less hygienic,
too.


Good morning, 'sock' - how sad it is that you feel a need to hide your
identity.


Makes STALKING hard, heh ? It IS the norm on Usenet, though,
for that very reason.
(and weird, coming from someone with 20 nyms.)

CUT_OFF_TOPIC_STALKING_CONTENT


To prevent yourself from being a victim of cyber
stalking, it's highly recommended you visit he
https://tekrider.net/pages/david-brooks-stalker.php

The site is safe. 10/10 on WOT.
[]'s
--
Don't be evil - Google 2004
We have a new policy - Google 2012
  #9  
Old May 20th 18, 02:31 PM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10,alt.uk.law
Shadow
external usenet poster
 
Posts: 1,638
Default tl;dr:

On Sun, 20 May 2018 09:55:42 +0100, "David B."
wrote:

On 19/05/2018 16:21, Shadow wrote:
On Sat, 19 May 2018 14:22:39 +0100, "David B."
wrote:

Do YOU agree with the prognosis/speculation of CUT_PERSONAL_NAME ?


Don't know. Put YOUR technical opinion here and we'll discuss it.

I'm assuming you are not posting OT, in which case you will probably
be ignored.



That is the rc.common script, which should be found he
/etc/rc.common

This is a script that is no longer used on modern macOS


Or old Apples. It was present but inactive on MOST machines.
WTF are you going on and on about it ?
Who's your target this time ? (the question was rhetorical, we
don't want names).

To prevent yourself from being a victim of cyber
stalking, it's highly recommended you visit he
https://tekrider.net/pages/david-brooks-stalker.php

The site is safe. 10/10 on WOT.
[]'s

--
Don't be evil - Google 2004
We have a new policy - Google 2012
  #10  
Old May 29th 18, 12:32 AM posted to alt.computer.workshop,comp.sys.mac.system,comp.sys.mac.misc,alt.comp.os.windows-10
Diesel
external usenet poster
 
Posts: 937
Default (OT) David Brooks A known stalker!

Just a public service announcement which concerns your online safety.
For your own good, if you presently interact with David Brooks, it's
recommended you cease doing so immediately. Whatever information
you've already provided him with will be abused at a later date, but
you can prevent him from learning more about you for future abuse by
ceasing conversation with him. You don't need to take my word for it,
google for david brooks stalker and educate yourself. He's
practically infamous for it!

MID:
http://al.howardknight.net/msgid.cgi?ID=152222085100

Here's some MIDs and urls showing the message where you're clearly,
STALKING. It's hard to deny it when your own posts show you doing it.

I just thought i'd remind you about some of them. G

Begin Davids efforts in rec photo:

MID:
http://al.howardknight.net/msgid.cgi?ID=149437329500

Request denied. David tries again:

MID:
http://al.howardknight.net/msgid.cgi?ID=149461165500

Request denied, again. David doesn't give up easily.

MID:
http://al.howardknight.net/msgid.cgi?ID=149461088500

Gets no where, again. So, David comes clean with the
group in public on his intentions towards me:

MID:
http://al.howardknight.net/msgid.cgi?ID=149456200100

Doesn't really get anywhere. Makes little progress.. Until...

MID:
http://al.howardknight.net/msgid.cgi?ID=152201851200

Evidently goes nowhere on him, as I'm still here. But, yes, he did
try turning things around and painting himself as a victim of some
kind. Neat huh?

Another go at stalking me and asking others to help. He even keeps
screenshots incriminating his own stalking behaviors. ROFL!

MID:
http://al.howardknight.net/msgid.cgi?ID=149603382000

He's basically told to pound sand, continues, releasing more
'information' he thinks he knows about me to speed things up

MID:
http://al.howardknight.net/msgid.cgi?ID=152201858800

Perhaps this additional information regarding his date of birth will
be helpful in identifying his ACTUAL address?

Davids real upset with me, asks rec.photo for help!
MID:
http://al.howardknight.net/msgid.cgi?ID=149456200100

David stalking a domain site owner
MID:
http://al.howardknight.net/msgid.cgi?ID=152201905200

David Stalking Paul Adare
MID:
http://al.howardknight.net/msgid.cgi?ID=152201910900

David specifying an .exe malware file that he knew wasn't on
tekrider domain. After claiming it was previously.
MID:
http://al.howardknight.net/msgid.cgi?ID=151796841900

David trying to dox me again with a new signature
MID:
http://al.howardknight.net/msgid.cgi?ID=151805918800

I can be trusted to 'shop' you and bring you to justice!
You really shouldn't have used a new signature. Perhaps you'll
refrain from so doing now that I've got one too?

David threatens me with a bigger? doxing.
MID:
al.howardknight.net/msgid.cgi?ID=152201932100

Would you like me to publish YOUR personal details Dustin? I have
them. They were disclosed to me by a 'friend' who lives in the USA.
Genuine stuff - REAL LIFE info! Just say the word and I'll post same
in all 110,000 plus Usenet groups held by Giganews!


--
Don't become the next David Brooks cyberstalking victim!
Visit https://tekrider.net/pages/david-brooks-stalker.php (10/10 WOT)
to learn more. If you've already become a victim or know someone who
has, you can provide the following information to them, your lawyer,
local law enforcement, etc.
https://www.devon-cornwall.police.uk - His local police. Report?
David Brooks (BoaterDave)
Jersey Cottage 86 Granary Lane
Budleigh Salterton Devon EX9 6ER United Kingdom
Phone: 44-1395-443340 (H) 07974-193550 (M)
Email(s): ,
 




Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off






All times are GMT +1. The time now is 10:06 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.