Discussion:
Malware burrows deep into computer BIOS to escape AV
(too old to reply)
~BD~
2011-09-15 07:27:35 UTC
Permalink
Researchers have discovered one of the first pieces of malware ever used
in the wild that modifies the software on the motherboard of infected
computers to ensure the infection can't be easily eradicated.

Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early in a
computer's boot-up sequence. The instructions, in turn, alter a
computer's MBR, or master boot record, another system component that
gets executed prior to the loading of the operating system of an
infected machine. By corrupting the processes that run immediately after
a PC starts, the malware stands a better chance of surviving attempts by
antivirus programs to remove it.

http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
David H. Lipman
2011-09-15 11:44:56 UTC
Permalink
Researchers have discovered one of the first pieces of malware ever used in the wild
that modifies the software on the motherboard of infected computers to ensure the
infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it attacks to add
malicious instructions that are executed early in a computer's boot-up sequence. The
instructions, in turn, alter a computer's MBR, or master boot record, another system
component that gets executed prior to the loading of the operating system of an infected
machine. By corrupting the processes that run immediately after a PC starts, the malware
stands a better chance of surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
This is the FIRST malware to infiltrate the BIOS that's been in the wild, it is targeting
Chinese computers in China and ONLY targets Phoenix/Award BIOS.
--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp
~BD~
2011-09-15 11:48:46 UTC
Permalink
Post by David H. Lipman
Researchers have discovered one of the first pieces of malware ever used in the wild
that modifies the software on the motherboard of infected computers to ensure the
infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it attacks to add
malicious instructions that are executed early in a computer's boot-up sequence. The
instructions, in turn, alter a computer's MBR, or master boot record, another system
component that gets executed prior to the loading of the operating system of an infected
machine. By corrupting the processes that run immediately after a PC starts, the malware
stands a better chance of surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
This is the FIRST malware to infiltrate the BIOS that's been in the wild, it is targeting
Chinese computers in China and ONLY targets Phoenix/Award BIOS.
Please explain exactly how you can be so certain about this, Mr Lipman.
Peter Foldes
2011-09-15 12:08:45 UTC
Permalink
Post by ~BD~
Please explain exactly how you can be so certain about this, Mr Lipman
You are Trolling again ???
Did you read the article in the link you posted you dumbass??

This below was in your link you frickin dumb Troll

<snip>
Mebromi is able to attack only BIOS ROMs made by Award, a manufacturer that was
purchased by Phoenix in the late 1990s. The malware checks the BIOS ROM each time
the PC boots up. If it's made by Award and the malicious instructions aren't found,
Mebromi adds the code by reflashing the chip on the motherboard. According to
Giuliani, it was first documented by the Chinese security company Qihoo 360, and
primarily infects computers in that country.
<end snip>

JS
~BD~
2011-09-15 12:45:20 UTC
Permalink
Post by Peter Foldes
Post by ~BD~
Please explain exactly how you can be so certain about this, Mr Lipman
You are Trolling again ???
Did you read the article in the link you posted?
Of course I did.
Post by Peter Foldes
This below was in your link you frickin dumb Troll
<snip>
Mebromi is able to attack only BIOS ROMs made by Award, a manufacturer
that was purchased by Phoenix in the late 1990s. The malware checks the
BIOS ROM each time the PC boots up. If it's made by Award and the
malicious instructions aren't found, Mebromi adds the code by reflashing
the chip on the motherboard. According to Giuliani, it was first
documented by the Chinese security company Qihoo 360, and primarily
infects computers in that country.
<end snip>
That does *not* mean that other bad guys have not done the same thing
earlier, now does it?!!

Sometimes you are sooooooooo thick, PF (or JS, or Derek)! Doh!
Post by Peter Foldes
JS
David H. Lipman
2011-09-15 13:05:31 UTC
Permalink
That does *not* mean that other bad guys have not done the same thing earlier, now does
it?!!
FUD monger !

Yes it does. We would have known about it just as fast.
--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp
Bullwinkle.
2011-09-17 09:41:39 UTC
Permalink
Make up your mind.

Perhaps I am PF???


"~BD~" <~BD~@nomail.afraid.org> wrote in message news:j4ss1a$hfs$***@dont-email.me...

Sometimes you are sooooooooo thick, PF (or JS, or Derek)! Doh!
JS
Bear Bottoms
2011-09-20 15:51:41 UTC
Permalink
Post by Bullwinkle.
Make up your mind.
Perhaps I am PF???
Sometimes you are sooooooooo thick, PF (or JS, or Derek)! Doh!
JS
Shouldn't you be in school? You have the mentality of a bitchy teenage girl.
Leave him alone, and learn some tolerance.
--
Bear Bottoms, security consultant
http://bearware.info
Bullwinkle.
2011-09-21 08:08:08 UTC
Permalink
Your view is not worthy of consideration.

Move along.
Post by Bullwinkle.
Make up your mind.
Perhaps I am PF???
Sometimes you are sooooooooo thick, PF (or JS, or Derek)! Doh!
JS
Shouldn't you be in school? You have the mentality of a bitchy teenage girl.
Leave him alone, and learn some tolerance.
--
Bear Bottoms, security consultant
http://bearware.info
~BD~
2011-09-22 21:36:58 UTC
Permalink
Post by Bullwinkle.
Your view is not worthy of consideration.
Move along.
Methinks *you* are not qualified to judge, Moose!
Bullwinkle.
2011-09-23 06:44:19 UTC
Permalink
How many 'bad guys" have you exposed and caused to be prosecuted
and jailed?

Zero!

Methinks you are a loser and all mouth and a complete ignorant pussy man.

Ever since you failed out of flying you have never succeeded in anything
except telling lies and running off at the mouth.
Post by Bullwinkle.
Your view is not worthy of consideration.
Move along.
Methinks *you* are not qualified to judge, Moose!
Bear Bottoms
2011-09-28 15:01:20 UTC
Permalink
Post by Bullwinkle.
How many 'bad guys" have you exposed and caused to be prosecuted
and jailed?
Zero!
Methinks you are a loser and all mouth and a complete ignorant pussy man.
Ever since you failed out of flying you have never succeeded in anything
except telling lies and running off at the mouth.
I bet he couldn't fly anything.
--
Bear Bottoms, security consultant
http://bearware.info
~BD~
2011-09-28 16:18:28 UTC
Permalink
Post by Bear Bottoms
I bet he couldn't fly anything.
You'd lose the bet, BB! :-)

I flew a Chipmunk, a Jet Provost Mk3 and Mk4, a twin-seat Hawker Hunter T8,
a single-seat Hawker Hunter GA11 and a Buccaneer S2

http://en.wikipedia.org/wiki/Blackburn_Buccaneer
.Bullwinkle.
2011-09-28 16:33:27 UTC
Permalink
You washed out of flying...admit it, you loser.

You were forced to be a ground pounder.

Tell the Mrs I said Hay!

She will know.
Post by Bear Bottoms
I bet he couldn't fly anything.
You'd lose the bet, BB! :-)
Bear Bottoms
2011-09-30 09:47:03 UTC
Permalink
Post by ~BD~
Post by Bear Bottoms
I bet he couldn't fly anything.
You'd lose the bet, BB! :-)
I flew a Chipmunk, a Jet Provost Mk3 and Mk4, a twin-seat Hawker Hunter T8,
a single-seat Hawker Hunter GA11 and a Buccaneer S2
http://en.wikipedia.org/wiki/Blackburn_Buccaneer
In your dreams.

I mean real flying. You don't even have a PPL.
--
Bear
http://bearware.info
~BD~
2011-09-30 15:03:09 UTC
Permalink
Post by Bear Bottoms
Post by ~BD~
Post by Bear Bottoms
I bet he couldn't fly anything.
You'd lose the bet, BB! :-)
I flew a Chipmunk, a Jet Provost Mk3 and Mk4, a twin-seat Hawker Hunter T8,
a single-seat Hawker Hunter GA11 and a Buccaneer S2
http://en.wikipedia.org/wiki/Blackburn_Buccaneer
In your dreams.
Absolutely true, old pal! :-)
Post by Bear Bottoms
I mean real flying.
Define *real* flying.
Post by Bear Bottoms
You don't even have a PPL.
That's correct. One doesn't need a PPL to fly in the UK military.

HTH
Bullwinkle.
2011-09-30 17:56:38 UTC
Permalink
Tell them why they washed you out!
Post by Bear Bottoms
Post by ~BD~
Post by Bear Bottoms
I bet he couldn't fly anything.
You'd lose the bet, BB! :-)
I flew a Chipmunk, a Jet Provost Mk3 and Mk4, a twin-seat Hawker Hunter T8,
a single-seat Hawker Hunter GA11 and a Buccaneer S2
http://en.wikipedia.org/wiki/Blackburn_Buccaneer
In your dreams.
Absolutely true, old pal! :-)
Post by Bear Bottoms
I mean real flying.
Define *real* flying.
Post by Bear Bottoms
You don't even have a PPL.
That's correct. One doesn't need a PPL to fly in the UK military.

HTH
David H. Lipman
2011-09-15 12:51:12 UTC
Permalink
Post by ~BD~
Post by David H. Lipman
Researchers have discovered one of the first pieces of malware ever used in the wild
that modifies the software on the motherboard of infected computers to ensure the
infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it attacks to add
malicious instructions that are executed early in a computer's boot-up sequence. The
instructions, in turn, alter a computer's MBR, or master boot record, another system
component that gets executed prior to the loading of the operating system of an
infected
machine. By corrupting the processes that run immediately after a PC starts, the
malware
stands a better chance of surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
This is the FIRST malware to infiltrate the BIOS that's been in the wild, it is targeting
Chinese computers in China and ONLY targets Phoenix/Award BIOS.
Please explain exactly how you can be so certain about this, Mr Lipman.
Its called reading and understanding and it wasn't from reading TheRegister we page.
--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp
~BD~
2011-09-15 13:07:19 UTC
Permalink
Post by David H. Lipman
Post by ~BD~
Post by David H. Lipman
Researchers have discovered one of the first pieces of malware ever used in the wild
that modifies the software on the motherboard of infected computers to ensure the
infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it attacks to add
malicious instructions that are executed early in a computer's boot-up sequence. The
instructions, in turn, alter a computer's MBR, or master boot record, another system
component that gets executed prior to the loading of the operating system of an
infected
machine. By corrupting the processes that run immediately after a PC starts, the
malware
stands a better chance of surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
This is the FIRST malware to infiltrate the BIOS that's been in the wild, it is
targeting
Chinese computers in China and ONLY targets Phoenix/Award BIOS.
Please explain exactly how you can be so certain about this, Mr Lipman.
Its called reading and understanding and it wasn't from reading TheRegister we page.
I think you are full of sh*t, Mr Lipman.

Btw - there is *no* "we page".

D.
David H. Lipman
2011-09-15 13:13:15 UTC
Permalink
Post by ~BD~
Post by David H. Lipman
Post by ~BD~
Post by David H. Lipman
Researchers have discovered one of the first pieces of malware ever used in the wild
that modifies the software on the motherboard of infected computers to ensure the
infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it attacks to
add
malicious instructions that are executed early in a computer's boot-up sequence. The
instructions, in turn, alter a computer's MBR, or master boot record, another system
component that gets executed prior to the loading of the operating system of an
infected
machine. By corrupting the processes that run immediately after a PC starts, the
malware
stands a better chance of surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
This is the FIRST malware to infiltrate the BIOS that's been in the wild, it is
targeting
Chinese computers in China and ONLY targets Phoenix/Award BIOS.
Please explain exactly how you can be so certain about this, Mr Lipman.
Its called reading and understanding and it wasn't from reading TheRegister we page.
I think you are full of sh*t, Mr Lipman.
Marco's writeup...
http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/

Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again

The sh!t is what spews from your fingertips.
--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp
~BD~
2011-09-15 16:32:14 UTC
Permalink
Post by David H. Lipman
Post by ~BD~
Post by David H. Lipman
Post by ~BD~
Post by David H. Lipman
Researchers have discovered one of the first pieces of malware ever used in the wild
that modifies the software on the motherboard of infected computers to ensure the
infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it attacks to
add
malicious instructions that are executed early in a computer's boot-up sequence. The
instructions, in turn, alter a computer's MBR, or master boot record, another system
component that gets executed prior to the loading of the operating system of an
infected
machine. By corrupting the processes that run immediately after a PC starts, the
malware
stands a better chance of surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
This is the FIRST malware to infiltrate the BIOS that's been in the wild, it is
targeting
Chinese computers in China and ONLY targets Phoenix/Award BIOS.
Please explain exactly how you can be so certain about this, Mr Lipman.
Its called reading and understanding and it wasn't from reading TheRegister we page.
I think you are full of sh*t, Mr Lipman.
Marco's writeup...
http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
The sh!t is what spews from your fingertips.
I recall you saying that this was impossible. I simply cannot trust what
you say. You are a fraud, Mr. Lipman.
David H. Lipman
2011-09-15 17:22:03 UTC
Permalink
Post by David H. Lipman
Post by ~BD~
Post by David H. Lipman
Post by ~BD~
Post by David H. Lipman
Researchers have discovered one of the first pieces of malware ever used in the
wild
that modifies the software on the motherboard of infected computers to ensure the
infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it attacks to
add
malicious instructions that are executed early in a computer's boot-up sequence.
The
instructions, in turn, alter a computer's MBR, or master boot record, another
system
component that gets executed prior to the loading of the operating system of an
infected
machine. By corrupting the processes that run immediately after a PC starts, the
malware
stands a better chance of surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
This is the FIRST malware to infiltrate the BIOS that's been in the wild, it is
targeting
Chinese computers in China and ONLY targets Phoenix/Award BIOS.
Please explain exactly how you can be so certain about this, Mr Lipman.
Its called reading and understanding and it wasn't from reading TheRegister we page.
I think you are full of sh*t, Mr Lipman.
Marco's writeup...
http://blog.webroot.com/2011/09/13/mebromi-the-first-bios-rootkit-in-the-wild/
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
The sh!t is what spews from your fingertips.
I recall you saying that this was impossible. I simply cannot trust what you say. You
are a fraud, Mr. Lipman.
You recall WRONG. I elaborated how difficult it was and all the obstacles there were to
overcome and said there was nothing in the wild at that time while you were creatiung FUD
trying to prove that there "could" and probably were cases in the wild.

NOW there is finally something in the wild yet this malware still has huge obstacles to
overcome making it a poor implementation form the POV of the malicious actor.
--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp
Peter Foldes
2011-09-15 17:37:19 UTC
Permalink
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the obstacles there
were to overcome and said there was nothing in the wild at that time while you
were creatiung FUD trying to prove that there "could" and probably were cases in
the wild.
NOW there is finally something in the wild yet this malware still has huge
obstacles to overcome making it a poor implementation form the POV of the
malicious actor.
He is Trolling on purpose David. He is also extremely clueless and only believes
what he decides in his brain and wont let go from that just like the pit-bull.

JS
David H. Lipman
2011-09-15 17:46:31 UTC
Permalink
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the obstacles there were
to overcome and said there was nothing in the wild at that time while you were
creatiung FUD trying to prove that there "could" and probably were cases in the wild.
NOW there is finally something in the wild yet this malware still has huge obstacles to
overcome making it a poor implementation form the POV of the malicious actor.
He is Trolling on purpose David. He is also extremely clueless and only believes what
he decides in his brain and wont let go from that just like the pit-bull.
JS
Unfortunately - yes
{ sigh }
--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp
G. Morgan
2011-09-16 03:05:47 UTC
Permalink
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the obstacles there were to
overcome and said there was nothing in the wild at that time
That's the way I remember it.

You said it was possible, but none had been seen in the wild yet.
~BD~
2011-09-16 16:38:10 UTC
Permalink
Post by G. Morgan
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the obstacles there were to
overcome and said there was nothing in the wild at that time
That's the way I remember it.
You said it was possible, but none had been seen in the wild yet.
LoJack can *already* do it!!!

Just because Mr Lipman hasn't seen versions 'in the wild' does *NOT*
mean that there aren't such malware scenarios.

I'll wager the bad guys are *way* ahead of those who try to catch them!
David H. Lipman
2011-09-16 18:35:46 UTC
Permalink
Post by ~BD~
Post by G. Morgan
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the obstacles there were
to
overcome and said there was nothing in the wild at that time
That's the way I remember it.
You said it was possible, but none had been seen in the wild yet.
LoJack can *already* do it!!!
Just because Mr Lipman hasn't seen versions 'in the wild' does *NOT* mean that there
aren't such malware scenarios.
I'll wager the bad guys are *way* ahead of those who try to catch them!
LoJack is a different animal altogether and CAN NOT be lumped together with mebromi
trojan.

Mebromi is malware. LoJack is not.

LoJack is loaded in an area of extra ROM at the factory and is designed to be there. For
malware to be loaded in ROM at the factory we would have a whole different scenario which
is called the Insider Threat.

Mebromi uses a cludgy method of ROM injection based upon the IceLord proof of concept.

LoJack in no way injects itself into ROM.

You have a *bad* reading and comprehension problem!
--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp
eeyore
2011-09-16 18:51:27 UTC
Permalink
Post by David H. Lipman
Post by ~BD~
Post by G. Morgan
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the
obstacles there were to
overcome and said there was nothing in the wild at that time
That's the way I remember it.
You said it was possible, but none had been seen in the wild yet.
LoJack can *already* do it!!!
Just because Mr Lipman hasn't seen versions 'in the wild' does *NOT*
mean that there aren't such malware scenarios.
I'll wager the bad guys are *way* ahead of those who try to catch them!
LoJack is a different animal altogether and CAN NOT be lumped together
with mebromi trojan.
Mebromi is malware. LoJack is not.
LoJack is loaded in an area of extra ROM at the factory and is designed
to be there. For malware to be loaded in ROM at the factory we would
have a whole different scenario which is called the Insider Threat.
Mebromi uses a cludgy method of ROM injection based upon the IceLord proof of concept.
LoJack in no way injects itself into ROM.
You have a *bad* reading and comprehension problem!
you might as well be talking to a wall...
--
max
Registered Linux User #393236
JD
2011-09-16 23:29:07 UTC
Permalink
Post by David H. Lipman
Post by ~BD~
Post by G. Morgan
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the obstacles there were
to
overcome and said there was nothing in the wild at that time
That's the way I remember it.
You said it was possible, but none had been seen in the wild yet.
LoJack can *already* do it!!!
Just because Mr Lipman hasn't seen versions 'in the wild' does *NOT* mean that there
aren't such malware scenarios.
I'll wager the bad guys are *way* ahead of those who try to catch them!
LoJack is a different animal altogether and CAN NOT be lumped together with mebromi
trojan.
Mebromi is malware. LoJack is not.
LoJack is loaded in an area of extra ROM at the factory and is designed to be there. For
malware to be loaded in ROM at the factory we would have a whole different scenario which
is called the Insider Threat.
Mebromi uses a cludgy method of ROM injection based upon the IceLord proof of concept.
LoJack in no way injects itself into ROM.
You have a *bad* reading and comprehension problem!
A characteristic of a troll. Which you and Peter keep feeding.
--
JD..
David H. Lipman
2011-09-17 00:41:25 UTC
Permalink
Post by JD
Post by David H. Lipman
Post by ~BD~
Post by G. Morgan
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the obstacles there
were
to
overcome and said there was nothing in the wild at that time
That's the way I remember it.
You said it was possible, but none had been seen in the wild yet.
LoJack can *already* do it!!!
Just because Mr Lipman hasn't seen versions 'in the wild' does *NOT* mean that there
aren't such malware scenarios.
I'll wager the bad guys are *way* ahead of those who try to catch them!
LoJack is a different animal altogether and CAN NOT be lumped together with mebromi
trojan.
Mebromi is malware. LoJack is not.
LoJack is loaded in an area of extra ROM at the factory and is designed to be there.
For
malware to be loaded in ROM at the factory we would have a whole different scenario which
is called the Insider Threat.
Mebromi uses a cludgy method of ROM injection based upon the IceLord proof of concept.
LoJack in no way injects itself into ROM.
You have a *bad* reading and comprehension problem!
A characteristic of a troll. Which you and Peter keep feeding.
You must realize that I am trying to get the facts straight for those who may read this
news group or pick it up on one of theose web forums that make believe they have forums
but really just link to Usenet.
--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp
JD
2011-09-17 02:26:57 UTC
Permalink
Post by David H. Lipman
snip
Post by JD
In a reply to BD
You have a *bad* reading and comprehension problem!
A characteristic of a troll. Which you and Peter keep feeding.
You must realize that I am trying to get the facts straight for those who may read this
news group or pick it up on one of theose web forums that make believe they have forums
but really just link to Usenet.
I understand what you're trying to do.

Trolls live for a reply.
--
JD..
Polk Salad
2011-09-17 04:05:32 UTC
Permalink
Post by JD
Post by David H. Lipman
Post by ~BD~
Post by G. Morgan
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the obstacles there were
to
overcome and said there was nothing in the wild at that time
That's the way I remember it.
You said it was possible, but none had been seen in the wild yet.
LoJack can *already* do it!!!
Just because Mr Lipman hasn't seen versions 'in the wild' does *NOT* mean that there
aren't such malware scenarios.
I'll wager the bad guys are *way* ahead of those who try to catch them!
LoJack is a different animal altogether and CAN NOT be lumped together with mebromi
trojan.
Mebromi is malware. LoJack is not.
LoJack is loaded in an area of extra ROM at the factory and is designed to be there. For
malware to be loaded in ROM at the factory we would have a whole different scenario which
is called the Insider Threat.
Mebromi uses a cludgy method of ROM injection based upon the IceLord proof of concept.
LoJack in no way injects itself into ROM.
You have a *bad* reading and comprehension problem!
A characteristic of a troll. Which you and Peter keep feeding.
Hey. Count me in!
Peter Foldes
2011-09-16 19:54:01 UTC
Permalink
Post by ~BD~
Post by G. Morgan
Post by David H. Lipman
You recall WRONG. I elaborated how difficult it was and all the obstacles there
were to
overcome and said there was nothing in the wild at that time
That's the way I remember it.
You said it was possible, but none had been seen in the wild yet.
LoJack can *already* do it!!!
Just because Mr Lipman hasn't seen versions 'in the wild' does *NOT* mean that
there aren't such malware scenarios.
I'll wager the bad guys are *way* ahead of those who try to catch them!
BD

Read what David posted and etch it in your mind. Do NOT start spreading FUD which is
what you do most of the time. LoJack is a different animal and does not belong into
the group that you are thinking of.

JS
FromTheRafters
2011-09-15 22:14:50 UTC
Permalink
"David H. Lipman" <DLipman~nospam~@Verizon.Net> wrote in message news:***@news2.newsguy.com...
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!

CIH didn't *infect* the BIOS, it corrupted it.

Anyway, it is one more step now that mobile code has *infected* the BIOS.

Not a BIOS virus either, as the BIOS code is a guardian program rather
than a copy of the infecting program. Still, expect some misinformation
to spread faster than the malware itself.
Emmett BADASS Gulley
2011-10-24 00:58:29 UTC
Permalink
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the BIOS.
Not a BIOS virus either, as the BIOS code is a guardian program rather
than a copy of the infecting program. Still, expect some misinformation
to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
FromTheRafters
2011-10-24 01:13:08 UTC
Permalink
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the BIOS.
Not a BIOS virus either, as the BIOS code is a guardian program rather
than a copy of the infecting program. Still, expect some misinformation
to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.

***
Within the context of my previous statement, "infection" referred to "viral
infection".

Viral infection is the attaching to code of 'a possibly mutated copy of the
virus'.

Since the new BIOS code Mebromi's installer drops does not contain a "virus",
it can't be considered to have been infected by a virus even if Mebromi were a
true virus in other aspects - which it isn't.
***
Rhonda Lea Kirk Fries
2011-10-24 17:36:34 UTC
Permalink
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS. Not a BIOS virus either, as the BIOS code is a guardian program
rather than a copy of the infecting program. Still, expect some
misinformation to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to
"viral infection".
Viral infection is the attaching to code of 'a possibly mutated copy
of the virus'.
Since the new BIOS code Mebromi's installer drops does not contain a
"virus", it can't be considered to have been infected by a virus even
if Mebromi were a true virus in other aspects - which it isn't.
***
The person who is trying to engage you is a toothless, homeless felon
with an IQ approaching freezer temps. He also has pretensions to
stalking, but he's not very good at it. You can read about his felony
conviction here:

http://www.washingtonpost.com/wp-srv/local/frompost/nov98/email01.htm

You can listen to a recording of the phone message that started it all
here:



He will make a nice playmate for BD.
FromTheRafters
2011-10-24 20:47:42 UTC
Permalink
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS. Not a BIOS virus either, as the BIOS code is a guardian program
rather than a copy of the infecting program. Still, expect some
misinformation to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to
"viral infection".
Viral infection is the attaching to code of 'a possibly mutated copy
of the virus'.
Since the new BIOS code Mebromi's installer drops does not contain a
"virus", it can't be considered to have been infected by a virus even
if Mebromi were a true virus in other aspects - which it isn't.
***
The person who is trying to engage you is a toothless, homeless felon with an
IQ approaching freezer temps.
Hi Rhonda.

I kinda suspected that - a first impression so to speak.

How does it handle spelling/grammar corrections?
He also has pretensions to stalking, but he's not very good at it. You can
http://www.washingtonpost.com/wp-srv/local/frompost/nov98/email01.htm
Maybe, if I get even more bored than I am now.
http://youtu.be/xxLkH99MMy8
He will make a nice playmate for BD.
I guess we'll see. :o)
Rhonda Lea Kirk Fries
2011-10-24 21:24:36 UTC
Permalink
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS. Not a BIOS virus either, as the BIOS code is a guardian
program rather than a copy of the infecting program. Still, expect
some misinformation to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to
"viral infection".
Viral infection is the attaching to code of 'a possibly mutated copy
of the virus'.
Since the new BIOS code Mebromi's installer drops does not contain a
"virus", it can't be considered to have been infected by a virus
even if Mebromi were a true virus in other aspects - which it isn't.
***
The person who is trying to engage you is a toothless, homeless
felon with an IQ approaching freezer temps.
Hi Rhonda.
I kinda suspected that - a first impression so to speak.
How does it handle spelling/grammar corrections?
The same way he handles any other criticism--ranting, threats, blatant
falsehoods.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
He also has pretensions to stalking, but he's not very good at it.
http://www.washingtonpost.com/wp-srv/local/frompost/nov98/email01.htm
Maybe, if I get even more bored than I am now.
Good call. A dose of Emmett could cause death by boredom.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
You can listen to a recording of the phone message that started it
all here: http://youtu.be/xxLkH99MMy8
He will make a nice playmate for BD.
I guess we'll see. :o)
Both Emmett and BD are in my killfile, so I--thankfully--will not see. I
wanted to give you (and the rest of the sane folks) fair warning, but
avoiding both of the aforementioned nutjobs is high on my list of things
to do.
Emmett BADASS Gulley
2011-10-25 01:10:15 UTC
Permalink
On Oct 24, 5:24 pm, "Rhonda Lea Kirk Fries"
Post by Rhonda Lea Kirk Fries
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS. Not a BIOS virus either, as the BIOS code is a guardian
program rather than a copy of the infecting program. Still, expect
some misinformation to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to
"viral infection".
Viral infection is the attaching to code of 'a possibly mutated copy
of the virus'.
Since the new BIOS code Mebromi's installer drops does not contain a
"virus", it can't be considered to have been infected by a virus
even if Mebromi were a true virus in other aspects - which it isn't.
***
The person who is trying to engage you is a toothless, homeless
felon with an IQ approaching freezer temps.
Hi Rhonda.
I kinda suspected that - a first impression so to speak.
How does it handle spelling/grammar corrections?
The same way he handles any other criticism--ranting, threats, blatant
falsehoods.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
He also has pretensions to stalking, but he's not very good at it.
http://www.washingtonpost.com/wp-srv/local/frompost/nov98/email01.htm
Maybe, if I get even more bored than I am now.
Good call. A dose of Emmett could cause death by boredom.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
You can listen to a recording of the phone message that started it
all http://youtu.be/xxLkH99MMy8
He will make a nice playmate for BD.
I guess we'll see. :o)
Both Emmett and BD are in my killfile, so I--thankfully--will not see. I
wanted to give you (and the rest of the sane folks) fair warning, but
avoiding both of the aforementioned nutjobs is high on my list of things
to do.
shut the fuck up bitch. You got your ass kicked in court by charles
novins.
Mettle Gel Yum
2011-10-27 20:06:26 UTC
Permalink
On Mon, 24 Oct 2011 18:10:15 -0700 (PDT), Emmett BADASS Gulley
Post by Emmett BADASS Gulley
On Oct 24, 5:24 pm, "Rhonda Lea Kirk Fries"
Post by Rhonda Lea Kirk Fries
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS. Not a BIOS virus either, as the BIOS code is a guardian
program rather than a copy of the infecting program. Still, expect
some misinformation to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to
"viral infection".
Viral infection is the attaching to code of 'a possibly mutated copy
of the virus'.
Since the new BIOS code Mebromi's installer drops does not contain a
"virus", it can't be considered to have been infected by a virus
even if Mebromi were a true virus in other aspects - which it isn't.
***
The person who is trying to engage you is a toothless, homeless
felon with an IQ approaching freezer temps.
Hi Rhonda.
I kinda suspected that - a first impression so to speak.
How does it handle spelling/grammar corrections?
The same way he handles any other criticism--ranting, threats, blatant
falsehoods.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
He also has pretensions to stalking, but he's not very good at it.
http://www.washingtonpost.com/wp-srv/local/frompost/nov98/email01.htm
Maybe, if I get even more bored than I am now.
Good call. A dose of Emmett could cause death by boredom.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
You can listen to a recording of the phone message that started it
all http://youtu.be/xxLkH99MMy8
He will make a nice playmate for BD.
I guess we'll see. :o)
Both Emmett and BD are in my killfile, so I--thankfully--will not see. I
wanted to give you (and the rest of the sane folks) fair warning, but
avoiding both of the aforementioned nutjobs is high on my list of things
to do.
shut the fuck up bitch. You got your ass kicked in court by charles
novins.
Watch out folks this guy Gulley isn't right in the head

http://bit.ly/vmRROr


Emmett BADASS Gulley
2011-10-28 15:36:56 UTC
Permalink
Post by Mettle Gel Yum
On Mon, 24 Oct 2011 18:10:15 -0700 (PDT), Emmett BADASS Gulley
Post by Emmett BADASS Gulley
On Oct 24, 5:24 pm, "Rhonda Lea Kirk Fries"
Post by Rhonda Lea Kirk Fries
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS. Not a BIOS virus either, as the BIOS code is a guardian
program rather than a copy of the infecting program. Still, expect
some misinformation to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to
"viral infection".
Viral infection is the attaching to code of 'a possibly mutated copy
of the virus'.
Since the new BIOS code Mebromi's installer drops does not contain a
"virus", it can't be considered to have been infected by a virus
even if Mebromi were a true virus in other aspects - which it isn't.
***
The person who is trying to engage you is a toothless, homeless
felon with an IQ approaching freezer temps.
Hi Rhonda.
I kinda suspected that - a first impression so to speak.
How does it handle spelling/grammar corrections?
The same way he handles any other criticism--ranting, threats, blatant
falsehoods.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
He also has pretensions to stalking, but he's not very good at it.
http://www.washingtonpost.com/wp-srv/local/frompost/nov98/email01.htm
Maybe, if I get even more bored than I am now.
Good call. A dose of Emmett could cause death by boredom.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
You can listen to a recording of the phone message that started it
all http://youtu.be/xxLkH99MMy8
He will make a nice playmate for BD.
I guess we'll see. :o)
Both Emmett and BD are in my killfile, so I--thankfully--will not see. I
wanted to give you (and the rest of the sane folks) fair warning, but
avoiding both of the aforementioned nutjobs is high on my list of things
to do.
shut the fuck up bitch. You got your ass kicked in court by charles
novins.
Watch out folks this guy Gulley isn't right in the head
http://bit.ly/vmRROr
http://youtu.be/BQICzsImPFI
hello albatross.
Mettle Gel Yum
2011-10-28 19:31:28 UTC
Permalink
On Fri, 28 Oct 2011 08:36:56 -0700 (PDT), Emmett BADASS Gulley
Post by Emmett BADASS Gulley
Post by Mettle Gel Yum
On Mon, 24 Oct 2011 18:10:15 -0700 (PDT), Emmett BADASS Gulley
Post by Emmett BADASS Gulley
On Oct 24, 5:24 pm, "Rhonda Lea Kirk Fries"
Post by Rhonda Lea Kirk Fries
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS. Not a BIOS virus either, as the BIOS code is a guardian
program rather than a copy of the infecting program. Still, expect
some misinformation to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to
"viral infection".
Viral infection is the attaching to code of 'a possibly mutated copy
of the virus'.
Since the new BIOS code Mebromi's installer drops does not contain a
"virus", it can't be considered to have been infected by a virus
even if Mebromi were a true virus in other aspects - which it isn't.
***
The person who is trying to engage you is a toothless, homeless
felon with an IQ approaching freezer temps.
Hi Rhonda.
I kinda suspected that - a first impression so to speak.
How does it handle spelling/grammar corrections?
The same way he handles any other criticism--ranting, threats, blatant
falsehoods.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
He also has pretensions to stalking, but he's not very good at it.
http://www.washingtonpost.com/wp-srv/local/frompost/nov98/email01.htm
Maybe, if I get even more bored than I am now.
Good call. A dose of Emmett could cause death by boredom.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
You can listen to a recording of the phone message that started it
all http://youtu.be/xxLkH99MMy8
He will make a nice playmate for BD.
I guess we'll see. :o)
Both Emmett and BD are in my killfile, so I--thankfully--will not see. I
wanted to give you (and the rest of the sane folks) fair warning, but
avoiding both of the aforementioned nutjobs is high on my list of things
to do.
shut the fuck up bitch. You got your ass kicked in court by charles
novins.
Watch out folks this guy Gulley isn't right in the head
http://bit.ly/vmRROr
http://youtu.be/BQICzsImPFI
hello albatross.
Hangups much? Checking out those public displays of doltishness of
yours shown on the inet is mirthful. You really that disturbed or just
stupid? Don't be shy, I wager you nothing more than hot air passing
through the inets bowels stomping for jollies.
Albätross
2011-10-29 23:16:10 UTC
Permalink
On Fri, 28 Oct 2011 08:36:56 -0700 (PDT), Emmett BADASS Gulley
Post by Emmett BADASS Gulley
Post by Mettle Gel Yum
On Mon, 24 Oct 2011 18:10:15 -0700 (PDT), Emmett BADASS Gulley
Post by Emmett BADASS Gulley
On Oct 24, 5:24 pm, "Rhonda Lea Kirk Fries"
Post by Rhonda Lea Kirk Fries
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS. Not a BIOS virus either, as the BIOS code is a guardian
program rather than a copy of the infecting program. Still, expect
some misinformation to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to
"viral infection".
Viral infection is the attaching to code of 'a possibly mutated copy
of the virus'.
Since the new BIOS code Mebromi's installer drops does not contain a
"virus", it can't be considered to have been infected by a virus
even if Mebromi were a true virus in other aspects - which it isn't.
***
The person who is trying to engage you is a toothless, homeless
felon with an IQ approaching freezer temps.
Hi Rhonda.
I kinda suspected that - a first impression so to speak.
How does it handle spelling/grammar corrections?
The same way he handles any other criticism--ranting, threats, blatant
falsehoods.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
He also has pretensions to stalking, but he's not very good at it.
http://www.washingtonpost.com/wp-srv/local/frompost/nov98/email01.htm
Maybe, if I get even more bored than I am now.
Good call. A dose of Emmett could cause death by boredom.
Post by FromTheRafters
Post by Rhonda Lea Kirk Fries
You can listen to a recording of the phone message that started it
all http://youtu.be/xxLkH99MMy8
He will make a nice playmate for BD.
I guess we'll see. :o)
Both Emmett and BD are in my killfile, so I--thankfully--will not see. I
wanted to give you (and the rest of the sane folks) fair warning, but
avoiding both of the aforementioned nutjobs is high on my list of things
to do.
shut the fuck up bitch. You got your ass kicked in court by charles
novins.
Watch out folks this guy Gulley isn't right in the head
http://bit.ly/vmRROr
http://youtu.be/BQICzsImPFI
hello albatross.
Nice try elf but wrong again. So where did Rhonda get her ass kicked
in court?

--
Life is 10% what happens to you and 90% how you choose to respond to it....

--

emma admits that everyone hated him:

Message-ID: <***@4ax.com>
"albatross, you seem to hate me like all the others did back then."

Emmett Earl Gulley Jr. threatens to kill me:

Message-ID: <34a57a9a-c5e0-40c3-8084-***@l7g2000vbz.googlegroups.com>
"I would go after albatross whether he had a gun or not, that's how
much he has pissed me off."

Message-ID: <***@posting.google.com>
"You need to shut the fuck up or i will kill you when i track you down
to put you in jail."

Message-ID: <0d403fe5-7ef0-4b95-8f78-***@dp9g2000vbb.googlegroups.com>
"i think you need to shut the fuck up before i kick your damn ass."
Emmett BADASS Gulley
2011-10-25 01:08:27 UTC
Permalink
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the BIOS.
Not a BIOS virus either, as the BIOS code is a guardian program rather
than a copy of the infecting program. Still, expect some misinformation
to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to "viral
infection".
Viral infection is the attaching to code of 'a possibly mutated copy of the
virus'.
Since the new BIOS code Mebromi's installer drops does not contain a "virus",
it can't be considered to have been infected by a virus even if Mebromi were a
true virus in other aspects - which it isn't.
On the contrary. Evidently you don't know that there are several BIOS
type viruses out there. I got the CMOS years ago when it was unheard
of for CMOS to even get virus'

You act like this is just isolated but it's not. This is just like
rootkits that nobody ever knew existed until sony got busted.
Post by Emmett BADASS Gulley
***
FromTheRafters
2011-10-25 15:42:49 UTC
Permalink
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the BIOS.
Not a BIOS virus either, as the BIOS code is a guardian program rather
than a copy of the infecting program. Still, expect some misinformation
to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
***
Within the context of my previous statement, "infection" referred to "viral
infection".
Viral infection is the attaching to code of 'a possibly mutated copy of the
virus'.
Since the new BIOS code Mebromi's installer drops does not contain a "virus",
it can't be considered to have been infected by a virus even if Mebromi were a
true virus in other aspects - which it isn't.
On the contrary. Evidently you don't know that there are several BIOS
type viruses out there

***
No there aren't. There were some that used the same kind of payload
that CIH used (I think Kriz and maybe Magistr?). That payload did write
to the BIOS, but the code written there was garbage code collected from
an arbitrary area of memory and not in itself *viral*. To *infect* the BIOS
the code needs to be viable (else it is just corruption) and to *virally infect*
the BIOS the valid code needs to be, itsel,f a virus - able to further the viral
infection.
***

I got the CMOS years ago when it was unheard
of for CMOS to even get virus'

***
While it may have been *affected*, the CMOS was not *infected* - there
*is* a difference. The same things as above apply to any code area, and
these code areas are a necessity for a *virus infection* to take place.

Viruses attach viable (possibly mutated) copies of themselves to code.
***

You act like this is just isolated but it's not. This is just like
rootkits that nobody ever knew existed until sony got busted.

***
LOL., Rootkits are as old as the hills, and what are being called rootkits
in the Windows world are mostly only old school stealth tactics revisited.
***
~BD~
2011-10-25 16:46:24 UTC
Permalink
Post by FromTheRafters
***
LOL., Rootkits are as old as the hills, and what are being called rootkits
in the Windows world are mostly only old school stealth tactics revisited.
***
Wikipedia agrees with you!

*

Lane Davis and Steven Dake wrote the earliest known rootkit in 1990 for
Sun Microsystems' SunOS UNIX operating system. Ken Thompson of Bell
Labs, one of the creators of Unix, subverted the C compiler in a Unix
distribution and discussed the exploit in the lecture he gave upon
receiving the Turing award in 1983.

The modified compiler would detect attempts to compile the Unix "login"
command and generate altered code that would accept not only the user's
correct password, but an additional password known to the attacker.
Additionally, the compiler would detect attempts to compile a new
version of the compiler, and would insert the same exploits into the new
compiler. A review of the source code for the "login" command or the
updated compiler would not reveal any malicious code. This exploit was
equivalent to a rootkit.

The first malicious rootkit for the Windows NT operating system appeared
in 1999: a trojan called NTRootkit created by Greg Hoglund.[7] It was
followed by HackerDefender in 2003.[1] The first rootkit targeting Mac
OS X appeared in 2009, while the Stuxnet worm was the first to target
programmable logic controllers (PLC).

http://en.wikipedia.org/wiki/Rootkit

<aside>

Will you help me out with this please, FTR?
Message-ID: <j86f3h$rgk$***@dont-email.me>
FromTheRafters
2011-10-25 17:14:28 UTC
Permalink
Post by ~BD~
Post by FromTheRafters
***
LOL., Rootkits are as old as the hills, and what are being called rootkits
in the Windows world are mostly only old school stealth tactics revisited.
***
Wikipedia agrees with you!
Ouch! (j/k)

[...]
Dustin
2011-10-26 03:36:18 UTC
Permalink
Post by ~BD~
Post by FromTheRafters
***
LOL., Rootkits are as old as the hills, and what are being called
rootkits in the Windows world are mostly only old school stealth
tactics revisited. ***
Wikipedia agrees with you!
No shit. Rootkits isn't even proper wording when discussing a windows OS.
Windows doesn't have any such user as root.
--
I am a sinner
Hold my prayers upto the sun
I am a sinner
Heaven's closed for what I've done.
Dustin
2011-10-24 20:40:32 UTC
Permalink
messagenews:j4st
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the BIOS.
Not a BIOS virus either, as the BIOS code is a guardian program rather
than a copy of the infecting program. Still, expect some misinformation
to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
You are a stupid fucker. I'll give you that.

Changing registry keys isn't infecting your computer. Creating new data
files isn't infecting your computer. Fucking stupid tard.
--
I am a sinner
Hold my prayers upto the sun
I am a sinner
Heaven's closed for what I've done.
Emmett BADASS Gulley
2011-10-25 01:09:20 UTC
Permalink
Post by Dustin
messagenews:j4st
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS.
Post by Emmett BADASS Gulley
Post by FromTheRafters
Not a BIOS virus either, as the BIOS code is a guardian program rather
than a copy of the infecting program. Still, expect some misinformation
to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
You are a stupid fucker. I'll give you that.
Changing registry keys isn't infecting your computer. Creating new data
files isn't infecting your computer. Fucking stupid tard.
who fucking said anything about registry's you fucking asswipe???
Post by Dustin
--
I am a sinner
Hold my prayers upto the sun
I am a sinner
Heaven's closed for what I've done.
Irkin Invader Zim
2011-10-25 02:29:52 UTC
Permalink
Post by Emmett BADASS Gulley
Post by Dustin
messagenews:j4st
Post by Emmett BADASS Gulley
Post by FromTheRafters
[...]
Post by David H. Lipman
Symantec's writeup...
http://www.symantec.com/connect/blogs/bios-threat-showing-again
Ugh!
CIH didn't *infect* the BIOS, it corrupted it.
Anyway, it is one more step now that mobile code has *infected* the
BIOS.
Post by Emmett BADASS Gulley
Post by FromTheRafters
Not a BIOS virus either, as the BIOS code is a guardian program rather
than a copy of the infecting program. Still, expect some misinformation
to spread faster than the malware itself.
WRONG!!!!!! any virus that changes anything is considered to have
INFECTED the system. Damn your a fucknut.
You are a stupid fucker. I'll give you that.
Changing registry keys isn't infecting your computer. Creating new data
files isn't infecting your computer. Fucking stupid tard.
who fucking said anything about registry's you fucking asswipe???
eMutt, no matter what newsgroup you post in, you are still an
illiterate, misinformed, stupid little bastard.
FromTheRafters
2011-09-15 22:00:05 UTC
Permalink
Post by David H. Lipman
Its called reading and understanding and it wasn't from reading TheRegister we page.
LOL.
Peter Foldes
2011-09-15 22:26:33 UTC
Permalink
Thanks David for catching it and removing it. Awful when he does that. It has no
business in the other group
~BD~
2011-09-16 06:07:30 UTC
Permalink
Post by Peter Foldes
Thanks David for catching it and removing it. Awful when he does that.
It has no business in the other group
Explain here in *this* group why you posted dangerous code in SE which
triggered this warning from MSE Loading Image...

MSE asked for the information to be sent to Microsoft for examination.
Such request was actioned.
FromTheRafters
2011-09-16 22:03:49 UTC
Permalink
Post by ~BD~
Post by Peter Foldes
Thanks David for catching it and removing it. Awful when he does that.
It has no business in the other group
Explain here in *this* group why you posted dangerous code in SE which
triggered this warning from MSE http://i56.tinypic.com/2uf6idx.jpg
MSE asked for the information to be sent to Microsoft for examination.
Such request was actioned.
Good, they should know that their AV detects non-threats so
that they can fix their software. :o)
FromTheRafters
2011-09-15 21:55:59 UTC
Permalink
Researchers have discovered one of the first pieces of malware ever used in
the wild that modifies the software on the motherboard of infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early in a computer's
boot-up sequence. The instructions, in turn, alter a computer's MBR, or master
boot record, another system component that gets executed prior to the loading
of the operating system of an infected machine. By corrupting the processes
that run immediately after a PC starts, the malware stands a better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD

Now that it is ITW so they say, the naysayers will be silenced. But
you might want to consider that BIOS thing to be more like a
payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to its being
a user-mode, kernel mode, *and* an MBR mode rootkit - plus a
virus - than to its being a BIOS modder. Just wait until some
wormable exploit is written to spread it or it gets adopted by evil
botnets.

TPM anyone?
G. Morgan
2011-09-16 03:12:52 UTC
Permalink
Post by FromTheRafters
TPM anyone?
Big Brother.
~BD~
2011-09-16 05:43:25 UTC
Permalink
Post by G. Morgan
Post by FromTheRafters
TPM anyone?
Big Brother.
?????????? An explanation will be appreciated!
FromTheRafters
2011-09-16 22:07:50 UTC
Permalink
Post by ~BD~
Post by G. Morgan
Post by FromTheRafters
TPM anyone?
Big Brother.
?????????? An explanation will be appreciated!
Some people have expressed privacy concerns over some
aspects of TPM implementation. IMO it does make diddling
with the boot axis by malware problematic.
Polk Salad
2011-09-17 04:01:12 UTC
Permalink
Post by FromTheRafters
Post by ~BD~
Post by G. Morgan
Post by FromTheRafters
TPM anyone?
Big Brother.
?????????? An explanation will be appreciated!
Some people have expressed privacy concerns over some
aspects of TPM implementation. IMO it does make diddling
with the boot axis by malware problematic.
hehe... that should hold him for a bit.
BTW, what has all this got to do with politics?
Gramsterdam
2011-09-17 09:13:57 UTC
Permalink
Post by FromTheRafters
Post by ~BD~
Post by G. Morgan
Post by FromTheRafters
TPM anyone?
Big Brother.
?????????? An explanation will be appreciated!
Some people have expressed privacy concerns over some
aspects of TPM implementation. IMO it does make diddling
with the boot axis by malware problematic.
I've read some internal 'white papers' HP published to some staff
regarding future potential uses of the chip. It was scary. Five years
ago they were already cooking up ideas/uses for the chip (other than its
primary purpose).

One that is semi-harmless, but might cost you more money for Internet in
the future is using TPM's for auth. credentials for Internet access. In
essence, they may charge you for each device you hookup; as opposed to
the current MAC address or PPPoE authentication. This is a long way
off, obviously because most machines/routers are not equipped with the
chip today.
~BD~
2011-10-25 20:06:49 UTC
Permalink
Post by Gramsterdam
Post by FromTheRafters
Post by ~BD~
Post by G. Morgan
Post by FromTheRafters
TPM anyone?
Big Brother.
?????????? An explanation will be appreciated!
Some people have expressed privacy concerns over some
aspects of TPM implementation. IMO it does make diddling
with the boot axis by malware problematic.
I've read some internal 'white papers' HP published to some staff
regarding future potential uses of the chip. It was scary. Five years
ago they were already cooking up ideas/uses for the chip (other than its
primary purpose).
One that is semi-harmless, but might cost you more money for Internet in
the future is using TPM's for auth. credentials for Internet access. In
essence, they may charge you for each device you hookup; as opposed to
the current MAC address or PPPoE authentication. This is a long way
off, obviously because most machines/routers are not equipped with the
chip today.
It's good to have the view of a professional! :-)
Peter Foldes
2011-10-25 20:43:19 UTC
Permalink
Post by ~BD~
It's good to have the view of a professional! :-)
Lonely by any chance ? 1 month and 7 days after giving and posting a line to a post
as you just did is really stretching your loneliness.

JS
~BD~
2011-10-25 20:57:42 UTC
Permalink
Post by Peter Foldes
Post by ~BD~
It's good to have the view of a professional! :-)
Lonely by any chance ? 1 month and 7 days after giving and posting a
line to a post as you just did is really stretching your loneliness.
I'm a people person, Peter. I am *never* lonely.

Yesterday, I had a Skype video call with a guy which lasted over three
hours.

What's your Skype name? I'll give *you* a call! :-)
Peter Foldes
2011-10-25 21:26:57 UTC
Permalink
Post by ~BD~
What's your Skype name? I'll give *you* a call! :-)
BoaterDaveAKABrooks and you have to set your notice of incoming call to me to
ILoveYouAlwaysandForgiveMe. When I hear that I will pick up and connect to you.


JS
Bullwinkle.
2011-10-26 09:28:03 UTC
Permalink
So, jenn is really a transgender butt fucker?
Post by ~BD~
Yesterday, I had a Skype video call with a guy which lasted over three
hours.
Emmett BADASS Gulley
2011-10-24 00:57:21 UTC
Permalink
Post by FromTheRafters
Researchers have discovered one of the first pieces of malware ever used in
the wild that modifies the software on the motherboard of infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early in a computer's
boot-up sequence. The instructions, in turn, alter a computer's MBR, or master
boot record, another system component that gets executed prior to the loading
of the operating system of an infected machine. By corrupting the processes
that run immediately after a PC starts, the malware stands a better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced. But
you might want to consider that BIOS thing to be more like a
payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to its being
a user-mode, kernel mode, *and* an MBR mode rootkit - plus a
virus - than to its being a BIOS modder. Just wait until some
wormable exploit is written to spread it or it gets adopted by evil
botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS virus
but only affects bios.
Irkin Invader Zim
2011-10-25 00:36:57 UTC
Permalink
Post by Emmett BADASS Gulley
Post by FromTheRafters
Researchers have discovered one of the first pieces of malware ever used in
the wild that modifies the software on the motherboard of infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early in a computer's
boot-up sequence. The instructions, in turn, alter a computer's MBR, or master
boot record, another system component that gets executed prior to the loading
of the operating system of an infected machine. By corrupting the processes
that run immediately after a PC starts, the malware stands a better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced. But
you might want to consider that BIOS thing to be more like a
payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to its being
a user-mode, kernel mode, *and* an MBR mode rootkit - plus a
virus - than to its being a BIOS modder. Just wait until some
wormable exploit is written to spread it or it gets adopted by evil
botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS virus
but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.

Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy shit,
can you get any stupider?
Emmett BADASS Gulley
2011-10-25 01:05:01 UTC
Permalink
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Researchers have discovered one of the first pieces of malware ever used in
the wild that modifies the software on the motherboard of infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early in a computer's
boot-up sequence. The instructions, in turn, alter a computer's MBR, or master
boot record, another system component that gets executed prior to the loading
of the operating system of an infected machine. By corrupting the processes
that run immediately after a PC starts, the malware stands a better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced. But
you might want to consider that BIOS thing to be more like a
payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to its being
a user-mode, kernel mode, *and* an MBR mode rootkit - plus a
virus - than to its being a BIOS modder. Just wait until some
wormable exploit is written to spread it or it gets adopted by evil
botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS virus
but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy shit,
can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
Irkin Invader Zim
2011-10-25 02:31:42 UTC
Permalink
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Researchers have discovered one of the first pieces of malware ever used in
the wild that modifies the software on the motherboard of infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early in a computer's
boot-up sequence. The instructions, in turn, alter a computer's MBR, or master
boot record, another system component that gets executed prior to the loading
of the operating system of an infected machine. By corrupting the processes
that run immediately after a PC starts, the malware stands a better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced. But
you might want to consider that BIOS thing to be more like a
payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to its being
a user-mode, kernel mode, *and* an MBR mode rootkit - plus a
virus - than to its being a BIOS modder. Just wait until some
wormable exploit is written to spread it or it gets adopted by evil
botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS virus
but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy shit,
can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
"Ya'll?"

If your intention was to sound like the toothless redneck walking
Halloween mask you appear in your photos, nice job.

Second, you can't get "banned" from a "NG," you dumbshit.

Emmett, you have barely made six posts in alt.privacy.spyware and they
have already recognized you and called you out as being a dumbshit.
FromTheRafters
2011-10-25 17:06:30 UTC
Permalink
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Researchers have discovered one of the first pieces of malware ever used in
the wild that modifies the software on the motherboard of infected
computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early in a
computer's
boot-up sequence. The instructions, in turn, alter a computer's MBR,
or master
boot record, another system component that gets executed prior to the
loading
of the operating system of an infected machine. By corrupting the processes
that run immediately after a PC starts, the malware stands a better
chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced. But
you might want to consider that BIOS thing to be more like a
payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to its being
a user-mode, kernel mode, *and* an MBR mode rootkit - plus a
virus - than to its being a BIOS modder. Just wait until some
wormable exploit is written to spread it or it gets adopted by evil
botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS virus
but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy shit,
can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
[...]

Second, you can't get "banned" from a "NG," you dumbshit.

***
Yes, you can. Some groups are private and moderated.
***
çu
2011-10-25 19:13:50 UTC
Permalink
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of
malware ever used in
the wild that modifies the software on the motherboard of
infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early
in a computer's
boot-up sequence. The instructions, in turn, alter a
computer's MBR, or master
boot record, another system component that gets executed
prior to the loading
of the operating system of an infected machine. By corrupting
the processes
that run immediately after a PC starts, the malware stands a
better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered
/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced.
But you might want to consider that BIOS thing to be more like
a payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to
its being a user-mode, kernel mode, *and* an MBR mode rootkit -
plus a virus - than to its being a BIOS modder. Just wait until
some wormable exploit is written to spread it or it gets
adopted by evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS
virus but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy shit,
can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
[...]
Second, you can't get "banned" from a "NG," you dumbshit.
***
Yes, you can. Some groups are private and moderated.
***
and if all of the other posters choose to ignore you or plonk you, it
becomes pretty much the same. i remember you, alt.crackers.delicious. or
was that alt.snackers.nutritious?
--
@}`-,-- *with bells and motley*
%
2011-10-25 19:24:32 UTC
Permalink
Post by çu
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of
malware ever used in
the wild that modifies the software on the motherboard of infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early in a computer's
boot-up sequence. The instructions, in turn, alter a
computer's MBR, or master
boot record, another system component that gets executed
prior to the loading
of the operating system of an infected machine. By corrupting the processes
that run immediately after a PC starts, the malware stands a better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered
/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced.
But you might want to consider that BIOS thing to be more like
a payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to
its being a user-mode, kernel mode, *and* an MBR mode rootkit -
plus a virus - than to its being a BIOS modder. Just wait until
some wormable exploit is written to spread it or it gets
adopted by evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS
virus but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy shit,
can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
[...]
Second, you can't get "banned" from a "NG," you dumbshit.
***
Yes, you can. Some groups are private and moderated.
***
and if all of the other posters choose to ignore you or plonk you, it
becomes pretty much the same. i remember you, alt.crackers.delicious.
or was that alt.snackers.nutritious?
who cares if anyone can see what you say say it anyway
Checkmate
2011-10-25 19:25:11 UTC
Permalink
Warning! Always wear ANSI approved safety goggles when reading posts by
Post by çu
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of
malware ever used in
the wild that modifies the software on the motherboard of
infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of
computers it
attacks to add malicious instructions that are executed early
in a computer's
boot-up sequence. The instructions, in turn, alter a
computer's MBR, or master
boot record, another system component that gets executed
prior to the loading
of the operating system of an infected machine. By corrupting
the processes
that run immediately after a PC starts, the malware stands a
better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered
/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced.
But you might want to consider that BIOS thing to be more like
a payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to
its being a user-mode, kernel mode, *and* an MBR mode rootkit -
plus a virus - than to its being a BIOS modder. Just wait until
some wormable exploit is written to spread it or it gets
adopted by evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS
virus but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy shit,
can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
[...]
Second, you can't get "banned" from a "NG," you dumbshit.
***
Yes, you can. Some groups are private and moderated.
***
and if all of the other posters choose to ignore you or plonk you, it
becomes pretty much the same. i remember you, alt.crackers.delicious. or
was that alt.snackers.nutritious?
I could have sworn I newgrouped alt.crackers.delicious about 7-8 years ago, but
it doesn't seem to exist... yet.
--
Checkmate
Copyright © 2011
all rights reserved

"Oh, there are rumblings, are there?"
"No, there is fear."
-Bounty


Read what others are saying about Checkmate!
____________________________________________________________________

"You have got to be the biggest butt fucking moron in this place.
You use socks and then admit to it? What the fuck is the point?"

-Wildhare
____________________________________________________________________

"Perhaps homeland security would be interested in you internet
surfing habits. Perhaps I should give them your name and news reader
info so that they can crawl up your ass with a microscope."

-Ragnar
_____________________________________________________________________

"You can sit there all you want and spit out all the denial you can
muster, it still doesn't change the fact that you are the current
king shit of the puppeteers in this group."

-Ragnar
____________________________________________________________________


Read about some of my favorite idiots:
====================================================================

"there is no sense in being stupid unless you show it off."

-Ragnar the Stupid
____________________________________________________________________

"Nor do I engage in juvenile gay lames like others do."

-Ragnar the Hypocrite, right after posting numerous gay lames.
____________________________________________________________________

"Mature, intelligent people don't consider being gay a derogatory issue
worthy of name calling."

-Ragnar the Liar, right after posting another bunch of gay lames.
____________________________________________________________________

"Shouldn't you be making a blanket, doing the dishes or some other form
of woman's work?

-Ragnar the Hypocrite to Kachina, right after flaming Greg for being a racist.
____________________________________________________________________

"i might be a wank job i'll give you that"

-%
____________________________________________________________________

"Try some English the next time you need to get your point accross."

-Ragnar the spelling cop, who apparently can't spell "across."
____________________________________________________________________

"As we all can tell by the fact that you spend half you fucking life
right here, casing me around."

-Ragnar the Hypocrite, right after criticizing Kachina for her typos.
____________________________________________________________________

"I guess insinuating that you like black cocks is now racist."

-Ragnar the Hypocrite, who thinks that he can improve on a fag lame
by specifying that it's with a black man.
____________________________________________________________________

"you are of the misguided opinion that there is something derogatory
attached to an affinity for African American cock"

-Ragnar, who knows what he likes
____________________________________________________________________
William Bagwell
2011-10-27 00:10:11 UTC
Permalink
Post by Checkmate
I could have sworn I newgrouped alt.crackers.delicious about 7-8 years ago, but
it doesn't seem to exist... yet.
Tis on NewsReader.com so perhaps you only requested it, or sent a non
propagating control message? The name seems familiar to me too.

http://groupsearch.alt-config.net/cgi-bin/prop.pl?action=search&group=alt.crackers.delicious&sorting=group
--
William

http://www.alt-config.net/Link_to_the_FAQs.html
Checkmate
2011-10-27 00:43:21 UTC
Permalink
Warning! Always wear ANSI approved safety goggles when reading posts by
Checkmate. Oh, yeah... I should also mention that William Bagwell said the
Post by William Bagwell
Post by Checkmate
I could have sworn I newgrouped alt.crackers.delicious about 7-8 years ago, but
it doesn't seem to exist... yet.
Tis on NewsReader.com so perhaps you only requested it, or sent a non
propagating control message? The name seems familiar to me too.
http://groupsearch.alt-config.net/cgi-bin/prop.pl?action=search&group=alt.crackers.delicious&sorting=group
Well, I'll be damned. I must have at least attempted to send it way back when.
--
Checkmate
Copyright © 2011
all rights reserved

"Oh, there are rumblings, are there?"
"No, there is fear."
-Bounty


Read what others are saying about Checkmate!
____________________________________________________________________

"You have got to be the biggest butt fucking moron in this place.
You use socks and then admit to it? What the fuck is the point?"

-Wildhare
____________________________________________________________________

"Perhaps homeland security would be interested in you internet
surfing habits. Perhaps I should give them your name and news reader
info so that they can crawl up your ass with a microscope."

-Ragnar
_____________________________________________________________________

"You can sit there all you want and spit out all the denial you can
muster, it still doesn't change the fact that you are the current
king shit of the puppeteers in this group."

-Ragnar
____________________________________________________________________


Read about some of my favorite idiots:
====================================================================

"there is no sense in being stupid unless you show it off."

-Ragnar the Stupid
____________________________________________________________________

"Nor do I engage in juvenile gay lames like others do."

-Ragnar the Hypocrite, right after posting numerous gay lames.
____________________________________________________________________

"Mature, intelligent people don't consider being gay a derogatory issue
worthy of name calling."

-Ragnar the Liar, right after posting another bunch of gay lames.
____________________________________________________________________

"Shouldn't you be making a blanket, doing the dishes or some other form
of woman's work?

-Ragnar the Hypocrite to Kachina, right after flaming Greg for being a racist.
____________________________________________________________________

"i might be a wank job i'll give you that"

-%
____________________________________________________________________

"Try some English the next time you need to get your point accross."

-Ragnar the spelling cop, who apparently can't spell "across."
____________________________________________________________________

"As we all can tell by the fact that you spend half you fucking life
right here, casing me around."

-Ragnar the Hypocrite, right after criticizing Kachina for her typos.
____________________________________________________________________

"I guess insinuating that you like black cocks is now racist."

-Ragnar the Hypocrite, who thinks that he can improve on a fag lame
by specifying that it's with a black man.
____________________________________________________________________

"you are of the misguided opinion that there is something derogatory
attached to an affinity for African American cock"

-Ragnar, who knows what he likes
____________________________________________________________________
%
2011-10-27 01:01:21 UTC
Permalink
Post by Checkmate
Warning! Always wear ANSI approved safety goggles when reading posts
by Checkmate. Oh, yeah... I should also mention that William Bagwell
On Tue, 25 Oct 2011 12:25:11 -0700, Checkmate
Post by Checkmate
I could have sworn I newgrouped alt.crackers.delicious about 7-8
years ago, but it doesn't seem to exist... yet.
Tis on NewsReader.com so perhaps you only requested it, or sent a non
propagating control message? The name seems familiar to me too.
http://groupsearch.alt-config.net/cgi-bin/prop.pl?action=search&group=alt.crackers.delicious&sorting=group
Well, I'll be damned. I must have at least attempted to send it way back when.
nobody listens to what fat guys say
FromTheRafters
2011-10-25 19:28:39 UTC
Permalink
Post by çu
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of
malware ever used in
the wild that modifies the software on the motherboard of
infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early
in a computer's
boot-up sequence. The instructions, in turn, alter a
computer's MBR, or master
boot record, another system component that gets executed
prior to the loading
of the operating system of an infected machine. By corrupting
the processes
that run immediately after a PC starts, the malware stands a
better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered
/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced.
But you might want to consider that BIOS thing to be more like
a payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to
its being a user-mode, kernel mode, *and* an MBR mode rootkit -
plus a virus - than to its being a BIOS modder. Just wait until
some wormable exploit is written to spread it or it gets
adopted by evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS
virus but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy shit,
can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
[...]
Second, you can't get "banned" from a "NG," you dumbshit.
***
Yes, you can. Some groups are private and moderated.
***
and if all of the other posters choose to ignore you or plonk you, it
becomes pretty much the same. i remember you, alt.crackers.delicious. or
was that alt.snackers.nutritious?
It's been many things in past years, but never as dead as it is now. The only
activity in there seems to be when crossposted from the likes of kooky groups
like <looks up> oh nevermind.
%
2011-10-25 20:11:40 UTC
Permalink
Post by FromTheRafters
Post by çu
. On Oct 24, 9:05 pm, Emmett BADASS Gulley
Post by Emmett BADASS Gulley
On Oct 23, 8:57 pm, Emmett BADASS Gulley
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of
malware ever used in
the wild that modifies the software on the motherboard of infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of computers it
attacks to add malicious instructions that are executed early in a computer's
boot-up sequence. The instructions, in turn, alter a
computer's MBR, or master
boot record, another system component that gets executed prior to the loading
of the operating system of an infected machine. By corrupting the processes
that run immediately after a PC starts, the malware stands a better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered
/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced.
But you might want to consider that BIOS thing to be more like
a payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to
its being a user-mode, kernel mode, *and* an MBR mode rootkit -
plus a virus - than to its being a BIOS modder. Just wait until
some wormable exploit is written to spread it or it gets
adopted by evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS
virus but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy
shit, can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by
just about every NG on usenet.
[...]
Second, you can't get "banned" from a "NG," you dumbshit.
***
Yes, you can. Some groups are private and moderated.
***
and if all of the other posters choose to ignore you or plonk you, it
becomes pretty much the same. i remember you,
alt.crackers.delicious. or was that alt.snackers.nutritious?
It's been many things in past years, but never as dead as it is now.
The only activity in there seems to be when crossposted from the
likes of kooky groups like <looks up> oh nevermind.
checkmate wrecked it
çu
2011-10-26 06:22:07 UTC
Permalink
Post by FromTheRafters
Post by çu
.. . On Oct 24, 9:05 pm, Emmett BADASS Gulley
Post by Emmett BADASS Gulley
On Oct 23, 8:57 pm, Emmett BADASS Gulley
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of
malware ever used in
the wild that modifies the software on the motherboard of
infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of
computers it
attacks to add malicious instructions that are executed
early in a computer's
boot-up sequence. The instructions, in turn, alter a
computer's MBR, or master
boot record, another system component that gets executed
prior to the loading
of the operating system of an infected machine. By
corrupting the processes
that run immediately after a PC starts, the malware stands
a better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discover
ed /
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be
silenced. But you might want to consider that BIOS thing to
be more like a payload that *might* sink the roots deeper
than was otherwise possible. It is likely to owe more of its
wilding ability to its being a user-mode, kernel mode, *and*
an MBR mode rootkit - plus a virus - than to its being a BIOS
modder. Just wait until some wormable exploit is written to
spread it or it gets adopted by evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS
virus but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out.
Oh wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy
shit, can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by
just about every NG on usenet.
[...]
Second, you can't get "banned" from a "NG," you dumbshit.
***
Yes, you can. Some groups are private and moderated.
***
and if all of the other posters choose to ignore you or plonk you, it
becomes pretty much the same. i remember you, alt.crackers.delicious.
or was that alt.snackers.nutritious?
It's been many things in past years, but never as dead as it is now.
The only activity in there seems to be when crossposted from the likes
of kooky groups like <looks up> oh nevermind.
[shhhhhhh. it's the trolls.]

mheh.
--
@}`-,-- *with bells and motley*
meowmix
2011-10-26 17:27:27 UTC
Permalink
On Tue, 25 Oct 2011 15:28:39 -0400, "FromTheRafters"
Post by FromTheRafters
Post by çu
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of
malware ever used in
the wild that modifies the software on the motherboard of
infected computers
to ensure the infection can't be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of
computers it
attacks to add malicious instructions that are executed early
in a computer's
boot-up sequence. The instructions, in turn, alter a
computer's MBR, or master
boot record, another system component that gets executed
prior to the loading
of the operating system of an infected machine. By corrupting
the processes
that run immediately after a PC starts, the malware stands a
better chance of
surviving attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered
/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced.
But you might want to consider that BIOS thing to be more like
a payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to
its being a user-mode, kernel mode, *and* an MBR mode rootkit -
plus a virus - than to its being a BIOS modder. Just wait until
some wormable exploit is written to spread it or it gets
adopted by evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS
virus but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out.
Wow. That is some failure you have. a drop-out drop-out. Holy shit,
can you get any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
[...]
Second, you can't get "banned" from a "NG," you dumbshit.
***
Yes, you can. Some groups are private and moderated.
***
and if all of the other posters choose to ignore you or plonk you, it
becomes pretty much the same. i remember you, alt.crackers.delicious. or
was that alt.snackers.nutritious?
It's been many things in past years, but never as dead as it is now. The only
activity in there seems to be when crossposted from the likes of kooky groups
like <looks up> oh nevermind.
k00ks in the flonk! whatever next? trolls?



--

mhm x v i x i i i
pandora
2011-10-25 19:08:07 UTC
Permalink
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of malware
ever used in the wild that modifies the software on the
motherboard of infected computers to ensure the infection can't
be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of
computers it attacks to add malicious instructions that are
executed early in a computer's boot-up sequence. The
instructions, in turn, alter a computer's MBR, or master boot
record, another system component that gets executed prior to
the loading of the operating system of an infected machine. By
corrupting the processes that run immediately after a PC
starts, the malware stands a better chance of surviving
attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced.
But you might want to consider that BIOS thing to be more like a
payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to its
being a user-mode, kernel mode, *and* an MBR mode rootkit - plus
a virus - than to its being a BIOS modder. Just wait until some
wormable exploit is written to spread it or it gets adopted by
evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS virus
but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out. Wow. That is
some failure you have. a drop-out drop-out. Holy shit, can you get
any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
"Ya'll?"
If your intention was to sound like the toothless redneck walking
Halloween mask you appear in your photos, nice job.
Second, you can't get "banned" from a "NG," you dumbshit.
Emmett, you have barely made six posts in alt.privacy.spyware and they
have already recognized you and called you out as being a dumbshit.
Indeed. Besides, I thought he wasn't supposed to post to usenet or loose
his bet?
%
2011-10-25 19:27:31 UTC
Permalink
Post by pandora
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of malware
ever used in the wild that modifies the software on the
motherboard of infected computers to ensure the infection can't
be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of
computers it attacks to add malicious instructions that are
executed early in a computer's boot-up sequence. The
instructions, in turn, alter a computer's MBR, or master boot
record, another system component that gets executed prior to
the loading of the operating system of an infected machine. By
corrupting the processes that run immediately after a PC
starts, the malware stands a better chance of surviving
attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced.
But you might want to consider that BIOS thing to be more like a
payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to its
being a user-mode, kernel mode, *and* an MBR mode rootkit - plus
a virus - than to its being a BIOS modder. Just wait until some
wormable exploit is written to spread it or it gets adopted by
evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS
virus but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out. Wow. That is
some failure you have. a drop-out drop-out. Holy shit, can you get
any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
"Ya'll?"
If your intention was to sound like the toothless redneck walking
Halloween mask you appear in your photos, nice job.
Second, you can't get "banned" from a "NG," you dumbshit.
Emmett, you have barely made six posts in alt.privacy.spyware and
they have already recognized you and called you out as being a
dumbshit.
Indeed. Besides, I thought he wasn't supposed to post to usenet or
loose his bet?
and you believed that , LOL
Warren Oates
2011-10-25 21:01:37 UTC
Permalink
Post by pandora
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by Irkin Invader Zim
Post by Emmett BADASS Gulley
Post by FromTheRafters
Post by ~BD~
Researchers have discovered one of the first pieces of malware
ever used in the wild that modifies the software on the
motherboard of infected computers to ensure the infection can't
be easily eradicated.
Known as Trojan.Mebromi, the rootkit reflashes the BIOS of
computers it attacks to add malicious instructions that are
executed early in a computer's boot-up sequence. The
instructions, in turn, alter a computer's MBR, or master boot
record, another system component that gets executed prior to
the loading of the operating system of an infected machine. By
corrupting the processes that run immediately after a PC
starts, the malware stands a better chance of surviving
attempts by antivirus programs to remove it.
http://www.theregister.co.uk/2011/09/14/bios_rootkit_discovered/
--
Dave - exactly what *I've* suspected for years! ;-)
For years, you've been wrong. :oD
Now that it is ITW so they say, the naysayers will be silenced.
But you might want to consider that BIOS thing to be more like a
payload that *might* sink the roots deeper than was otherwise
possible. It is likely to owe more of its wilding ability to its
being a user-mode, kernel mode, *and* an MBR mode rootkit - plus
a virus - than to its being a BIOS modder. Just wait until some
wormable exploit is written to spread it or it gets adopted by
evil botnets.
TPM anyone?
ROTFLMFAO!!!! This is just another version of the famous CMOS virus
but only affects bios.
eMutt you don't even know what STFU means let alone CMOS or bios.
Please stop trying to be a computer expert you Keiser drop-out. Oh
wait you have to GO THERE FIRST to become a drop-out. Wow. That is
some failure you have. a drop-out drop-out. Holy shit, can you get
any stupider?
Ya'll don't pay any attention to this dork. He's been banned by just
about every NG on usenet.
"Ya'll?"
If your intention was to sound like the toothless redneck walking
Halloween mask you appear in your photos, nice job.
Second, you can't get "banned" from a "NG," you dumbshit.
Emmett, you have barely made six posts in alt.privacy.spyware and they
have already recognized you and called you out as being a dumbshit.
Indeed. Besides, I thought he wasn't supposed to post to usenet or loose
his bet?
No darlin'. If you look it up, it's just AUK. Mr. Hall never said "all
of Usenet" he just said AUK.
--
Why do we say Chicken of the Sea but not Tuna of the Farm?
-- Thomas Pynchon
Loading...