SpyWare BeWare! ASAP
February 27, 2017, 10:45:40 PM *
Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
News:
 
   Home   Help Search Calendar Donations Login Register Chat  



Google It!
Pages: [1] 2 3 ... 10
 1 
 on: February 16, 2017, 12:28:22 PM 
Started by hayc59 - Last post by hayc59
test

 2 
 on: February 12, 2017, 02:38:25 PM 
Started by Maddoktor2 - Last post by Corrine
Hi, Android 8888. 

Unfortunately, the private site for submitting applications to the ASAP Council for review was never restored and there is no way to contact the Council members since the "membership" was only available from that site.

You are a member of UNITE so have those "credentials" to add to your completion of training at SWI.

Based on the inability to review applicants for ASAP, this thread will be closed.

 3 
 on: February 12, 2017, 07:23:17 AM 
Started by Maddoktor2 - Last post by Android 8888
Dear ASAP Council,

My name is Android 8888 and I am applying to be a member of ASAP.


Application for Individual ASAP Membership
  • URL of site(s) where help is provided: SpywareInfo Forum

  • Nickname/alias used: Android 8888

  • Position/title at site(s): Helper

  • Provide the nicknames/alias of the individuals who agreed to provide recommendations

    1. Rocket Grannie (SWI Administrator)
    2. Budfred (SWI Administrator)
    3. TheJoker (SWI Boot Camp Moderator)

  • Do you agree to the ASAP Charter? Yes
  • Additional information requested only from Applicants who provide assistance in log analysis/malware removal

    The name and location (URL) of the school(s) where trained
    SpywareInfo Forum
    http://www.spywareinfoforum.com/

    Link to profile: Android 8888

Thank you.

Android 8888

 4 
 on: February 10, 2017, 05:16:58 PM 
Started by Android 8888 - Last post by Android 8888
Hello everyone.  Smiley

I am Portuguese and I'm a great enthusiast in IT and computers. Since I discovered and became a member of SpywareInfo forum in April 2013, I acquired a great interest and enthusiasm in learning to help users get rid of malware.

Over the last three years I have devoted many hours to study and learn the techniques of removing malware from computers with Windows OS and today I am a proud Helper at SWI forum. Of course all this would not have been possible without the excellent teachers such as Rocket Grannie, cnm, TheJoker, Budfred, screen317, nasdaq, among others.

I am also a member of UNITE and of the Malwarebytes forum.

A big thank you to all who make possible the existence of these forums in the fight against malware.  thumbsup

Android8888

 5 
 on: January 22, 2016, 12:09:24 PM 
Started by Maddoktor2 - Last post by Juisterr
Hello Corrine,

You're welcome!  Smiley

 thumbsup
Still the same at the moment.

 6 
 on: January 03, 2016, 11:42:02 AM 
Started by amyrose33 - Last post by amyrose33
I just discovered that when I remember to use 'Site:' in my Google-pharmacy search, the hacked pages show up, NOT when I forget to use 'Site:'.  It's possible that the hacked pages never did actually disappear.

Upon Deeper Investigation:

Using https://aw-snap.info/file-viewer (with User Agent, Googlebot), the first of the pharmacy search results, 'http://****.org/ydhu-watch arjuna online' gives a "404 Not Found" result.

One of results, 'http://www.****.org/?page%3Abuy-online-steinberg-cubase-5%26page_id%3D4353&usg=AFQjCNHCzTsITLDmMWakqwOrrxPPbyBUWA&bvm=bv.110151844,d.eWE' gives a response of: "200 OK", "Set-Cookie: 864854e11328f635937114a993643a94=-; path=/", and "Content after the < /html> tag should be considered suspicious. < !-- 1451837145 --> "

Giving the fully decoded url of 'http://www.****.org/?page:buy-online-steinberg-cubase-5&page_id=4353&usg=AFQjCNHCzTsITLDmMWakqwOrrxPPbyBUWA&bvm=bv.110151844,d.eWE', the result is "410 Gone".

Using that decoded weblink with https://aw-snap.info/base64-decoder/ outputs:
1:  hxxp://****.org/?page:buy-online-steinberg-cubase-5
2:  AFQjCNHCzTsITLDmMWakqwOrrxPPbyBUWA

I still don't know the rules about including one's url; I did not see any on the forum pages that I visited.  Are one's urls only for PM's?

With much appreciation,
Amy

 7 
 on: December 29, 2015, 01:24:43 PM 
Started by amyrose33 - Last post by amyrose33
Hi,

I read, "ASAP ensures that quality support and assistance will be freely available"  That's super fabulous, tremendously generous - because I need HELP!!!!!

I am a novice who has been tasked with migrating a site from Joomla 1.0.15 to Joomla 3.x.  I know; I know.  This site belongs to a highly regarded non-profit, who has and does help homeowners who have received inferior (sometimes unlivable homes) from unscrupulous builders / contractors.  I am having trouble migrating the site, but constant hacking assaults keep forcing me to take 2 steps back for every one forward. 

Google (Webmaster Tools) has notified me that we are hacked AGAIN.  This time the hack is different.  Google called it, url-injection (examples below).  In the past, I was always able to find the infected FILES.  I'm not having any luck this time, even though I've researched online for two weeks, now.

I read that I can protect the site with htaccess entries such as:
RewriteEngine On
RewriteCond %{REQUEST_METHOD} GET
RewriteCond %{QUERY_STRING} ^page\: [NC]
​​RewriteRule .* - [L,G]

On the flip side, I read that "Using .htaccess files slows down your Apache http server.";  AND in the first trial (content above) the Google results disappeared for awhile, but now they show up again when I do a search for: 'site:****.org pharmacy'

Examples of hack:  (I'm new to this forum & don't know the policy about links.)
http://www.****.org/?aciclovir-costco-otau&Id=890&aciclovir
http://www.****.org/?alli-ebay-uk-otau&Id=2127&alli

I did (stupidly, but I think my comp did not catch anything) open the two pages above, and looked at the source-code.  The hackers injected their url into the 'top of page' link and our PayPal module.  I have removed the 2 PayPal files (php & xml) for the time being.  I plan to update that code with prepared statements (having a little trouble).

How do I find (or debug) all the injected script?  How do I clean it?

With much appreciation,
Amy

 8 
 on: December 21, 2015, 02:07:32 PM 
Started by hayc59 - Last post by hayc59
CCleaner v5.13.5460 Released
21 DEC 2015

Whats New
• Added Opera and Chrome Media Cache cleaning.
• Improved Chrome Extension and Cache cleaning.
• Improved Windows 10 Registry cleaning.
• Optimized 64-bit build architecture.
• Improved Auto-Update checking process.
• Improved Unicode text support.
• Minor GUI Improvements.
• Minor bug fixes.

Download CCleaner 5.13
Other Builds
Whats New

 9 
 on: December 18, 2015, 03:15:08 PM 
Started by hayc59 - Last post by hayc59
SpywareBlaster v.5.4 Released
Dec 18th 2015

Defend your security and privacy while browsing the web. Prevent the installation of spyware, malware, and other potentially unwanted software!
SpywareBlaster works alongside your web browser and existing security setup, to provide a powerful multi-layered defense against the bad side of the web. No need to choose - keep your existing tools and your favorite software, and add on SpywareBlaster's complementary, no-nonsense protection.


This 5.4 release provides enhanced protection, browser support, performance, and bug fixes.

New in this version
• Enhanced Google Chrome support
• Enhanced Windows 10 support
• Improved Windows 8/8.1 support
• Improved detection of Google Chrome.
• Improved support for the latest versions of Google Chrome.
• Improved support for the latest versions of Mozilla Firefox.
• Improved handling of network issues when updating.
• Numerous other bug fixes, optimizations, and tweaks.

UPDATING OPTIONS IN SPYWAREBLASTER
SpywareBlaster still offers the built-in Check for Updates feature. This feature is completely free and allows you to keep up-to-date by clicking on a button in the SpywareBlaster interface.

SpywareBlaster also offers SpywareBlaster AutoUpdate - a brand-new updating solution. Just set it up, and AutoUpdate will check at every system boot for the latest updates and enable the newest protection (other options are available).

Upgrading Tips:
To upgrade SpywareBlaster from a previous version you can either:
(a) Uninstall the old version of SpywareBlaster first. Please see the detailed upgrade instructions Here:
http://www.javacoolsoftware.com/sbupdate.html
(B) Download and install the new version of SpywareBlaster "over-the-top".

System Requirements: Windows 2000, XP, Vista, 7, 8, and 10. (32 and 64-bit)

Download: SpywareBlaster 5.4

 10 
 on: December 01, 2015, 11:14:36 AM 
Started by hayc59 - Last post by hayc59
Outpost All Version Pro 9.3
Build number: 4934.708.2079
Release Date: December 1, 2015

What’s New
The following improvements have been made:
• Digital signatures verification logic is improved
• Significant optimization of product start process is performed. Product start time is reduced in
several times, system responsiveness during boot up and product updates download is improved
The following issues have been fixed:
• Issue with network operations driver start during installation on Windows 10 is fixed
• Issue with descriptor leak during product operation is fixed
• Issue with installation on systems with CPU lacking SSE2 support is fixed
• Inability to update version 9.1 with specified configuration password is fixed
• Issue with database update infinite loop during installation over version 9.1 with
import of configuration with specific time for updates check is fixed
• Setup wizard operation logic on systems with installed ESET Antivirus is improved
• Issue with display of some processes in File and Registry Monitor on 64-bit platforms is fixed

Download: All Versions
View: Whats New

Pages: [1] 2 3 ... 10

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2013, Simple Machines Valid XHTML 1.0! Valid CSS!