Tuesday, February 8, 2011

send him the MTCN number if he asks for it

You can send him a fake question and answer, so he hotfoots it down to his local western union outlet and makes a fool of himself.


Then you can act all surprised when he complains and then say you were told the wrong answer so here is the correct one. so off he goes again to westy, who will be getting a little fed up of him by now and maybe call security. Rinse and repeat.

Do not send him the MTCN number if he asks for it as he can check the movements online so he will see there is no money.

You friend may need to do some scans as her PC security may be compromised.

You can ask them to download and run "Sophos' and "malwarebytes" to detect and remove any KL's. They need to download the " anti root kit" part.
Both programs are free and very good. They can also use "threatfire" this is also a good free AV.

@Joe. If you have a keylogger on your PC they can read everything you type, including passwords and bank details. It is as if they are sat in front of your PC.


Your Mum and friend also need to contact everyone in their address books as the nasty bits could be passed along.

The av programs I gave you should detect and remove most of the earlier type of KL's if you still have problems please PM me and I will give you some more advanced ones to use.

The Root kit is a kind of delivery system for the KL's You need to remove all trojans and every thing else you find and refrain from contacting any in your address book from your PC until they are cleaned as well.

It would be wise to continue to change passwords regularly until all this has been cleared.

If those affected need help they can go to AFI and we have teams available who can assist them.

Soyl you know better than that, stop trying to deflect the issue.


@Joe this explains about TROJANS:


"Trojan horses may allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system, a hacker may have access to the computer remotely and perform various operations, limited by user privileges on the target computer system and the design of the Trojan horse.

Operations that could be performed by a hacker on a target computer system include:

* Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks)

* Data theft (e.g. retrieving passwords or credit card information)

* Installation of software, including third-party malware

* Downloading or uploading of files on the user's computer

* Modification or deletion of files

* Keystroke logging

* Watching the user's screen

* Crashing the computer



Trojan horses in this way require interaction with a hacker to fulfill their purpose, though the hacker need not be the individual responsible for distributing the Trojan horse. It is possible for individual hackers to scan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.[3]


As mentioned earlier on, the term "Trojan horse" was taken from a clever Greek plan described by Homer in the Iliad. After seemingly abandoning the siege of Troy, the Greeks placed armed men inside a huge wooden horse. The horse was welcomed into the city by the Trojans, who believed it was a symbol of peace; they slept while the Greeks exited the horse and opened the gates allowing the Greek army into Troy, conquering the city."


Please note this part= * Keystroke logging
* Watching the user's screen"

No comments:

Post a Comment