Chowur Posted March 6, 2010 Share Posted March 6, 2010 I know some if not a few of us has ran,3rd party Illegal software @ one time or another.My main question is has anyone installed,Windows 7.Then installed some type of not so,Legal software? Afterwards had any trouble doing so? Quote Link to comment Share on other sites More sharing options...
mlangdn Posted March 6, 2010 Share Posted March 6, 2010 Discussion of illegal software is not a good thing to be doing. You won't get any help with that here either. Quote Link to comment Share on other sites More sharing options...
Frank Golden Posted March 6, 2010 Share Posted March 6, 2010 (edited) Discussion of illegal software is not a good thing to be doing. You won't get any help with that here either.I would be willing to bet that most folks here have not knowingly used illegal software.You are definately in the wrong forum.Basically if a person uses software obtained from a pirate site then they should expect trouble. Edited March 6, 2010 by Frank Golden Quote Link to comment Share on other sites More sharing options...
goretsky Posted March 9, 2010 Share Posted March 9, 2010 Hello,I work at an anti-malware company, and we receive calls from prospective customers who have done this and infected themselves with something (rootkit, adware, spyware, password-stealer, et cetera). Regards,Aryeh Goretsky Quote Link to comment Share on other sites More sharing options...
goretsky Posted March 14, 2010 Share Posted March 14, 2010 Hello,The scenario can be soemthing along the following lines: Computer operator installs software they should not have, such as something claiming to be a cracked copy of a popular application or a license key generator ("keygen") for it. Customer runs program, which is, in fact, a type of malware called a Trojan downloader. After the Trojan downloader is executed, it introduces a rootkit onto the system to maintain access and make removal more difficult, and then downloads whatever other malicious software (adware, keyloggers, spyware, bots, rogue/fake antivirus, etc.) the criminal gang running the Trojan downloader have been paid to deploy by their customer (another criminal gang who specializes in creating a particular type of threat, but not in its distribution). In this case, let's say the secondary download is as rogue antivirus software. It disables the existing security software; blocks access to security web sites (Windows Update servers, various vendors, et cetera); disables the Windows Installer, Automatic Updates and BITS services to make it more difficult to install security software and patches; disables loading of drivers required to start the computer in Safe Mode to make removal more difficult; and so forth. When they call tech support, they are going to spend an hour or two on the phone working with a support engineer delousing the system and getting it secured and running again. Regards,Aryeh Goretsky Quote Link to comment Share on other sites More sharing options...
Corrine Posted March 15, 2010 Share Posted March 15, 2010 When they call tech support, they are going to spend an hour or two on the phone working with a support engineer delousing the system and getting it secured and running again.With that kind of a mess, it would be questionable as to whether the system could truly be secured. The best bet is to follow the instructions at http://iminfectednowwhat.com Quote Link to comment Share on other sites More sharing options...
Urmas Posted March 15, 2010 Share Posted March 15, 2010 With that kind of a mess, it would be questionable as to whether the system could truly be secured. The best bet is to follow the instructions at http://iminfectednowwhat.com Quote Link to comment Share on other sites More sharing options...
Cluttermagnet Posted March 15, 2010 Share Posted March 15, 2010 (edited) Ahhh- isn't that "Format C:"? :whistling:Bad Clutter! Bad!(Smacks self on top of hand) Edited March 16, 2010 by Cluttermagnet Quote Link to comment Share on other sites More sharing options...
Corrine Posted March 16, 2010 Share Posted March 16, 2010 Smack not necessary . . . in this case. Consider that not everyone uses C: as the primary drive. Quote Link to comment Share on other sites More sharing options...
Cluttermagnet Posted March 16, 2010 Share Posted March 16, 2010 (edited) Smack not necessary . . . in this case. Consider that not everyone uses C: as the primary drive.Hi, Corrine!Hmmm, which flame warrior am I tonight?Aw, heck, nuke all partitions. Ask questions later. Ahhh- Troglodyte! Edited March 16, 2010 by Cluttermagnet Quote Link to comment Share on other sites More sharing options...
goretsky Posted March 16, 2010 Share Posted March 16, 2010 Hello,Sometimes that is what the technician has to tell the customer, but not until they've made an effort to re-secure the system.Regards,Aryeh Goretsky With that kind of a mess, it would be questionable as to whether the system could truly be secured. The best bet is to follow the instructions at http://iminfectednowwhat.com Quote Link to comment Share on other sites More sharing options...
Corrine Posted March 18, 2010 Share Posted March 18, 2010 great website, corrine!! Compliments of Aaron from LzD. (Not sure if Aryeh has met Aaron at Summit.) Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.