Hans-Christian Andersen
hans.andersen at phulse.com
Sun Feb 17 00:36:20 CST 2013
With all the many exploits we hear every month with Java and Flash, it doesn't take a serious hacker or government agency to pown a machine (or many thousands). And, since the tools exists out there to achieve this, we have to assume that serious hackers bundle these up into toolkits for sale to anyone who sees a profit motive... unfortunately, this is how the black market for hackers works, take it or leave it. Old aunt or small business may not be billionaires, but a hacker can still make a nice profit off of them. In fact, its probably easier for them to make a better profit, since they are less likely to notice a little bit of money missing here and there, since they can't afford a team of financial experts to handle their money. - Hans On 2013-02-16, at 6:04 PM, "Jim Lawrence" <accessd at shaw.ca> wrote: > Hi Hans: > > This may be true but how many serious hackers or government agencies are > going to target some old aunt or small business? The type of hacker alluded > to in the article are bottom feeders...penny-anti type crooks. > > They may know all the registry hacks, boot-up run-time scripts and maybe a > SMTP call or two that is it. It would not take long for any tech, in the > business, to see what level of infection the client has been injured with > and be able to decide on the appropriate exorcism. > > Rest assured ninety-nine percent of malware falls within the nuisance > category...easy for most techs to remove. > > That one percent left that might require a re-image. I doubt whether most > techs have even seen the type of major attacks and system corruption you are > describing. Real attackers make it their business not to be discovered. > > Jim > > -----Original Message----- > From: dba-tech-bounces at databaseadvisors.com > [mailto:dba-tech-bounces at databaseadvisors.com] On Behalf Of Hans-Christian > Andersen > Sent: Saturday, February 16, 2013 4:21 PM > To: Discussion of Hardware and Software issues > Subject: Re: [dba-Tech] How to remove Malware > > What part of what I said was paranoid? Rootkits are oldhat by now and cyber > attacks are so sophisticated that it can be customised to target a specific > facility half way across the world that isn't even connected to the internet > (aka. sneakernet)... and you call it paranoid? Do you follow security news? > :p > > - Hans > > > > On 2013-02-16, at 4:02 PM, "John Bartow" <john at winhaven.net> wrote: > >> Let's just throw our arms and the air and give up! Wow, not really buying >> into that paranoia. >> >> -----Original Message----- >> From: dba-tech-bounces at databaseadvisors.com >> [mailto:dba-tech-bounces at databaseadvisors.com] On Behalf Of Hans-Christian >> Andersen >> Sent: Saturday, February 16, 2013 3:32 PM >> To: Discussion of Hardware and Software issues >> Subject: Re: [dba-Tech] How to remove Malware >> >> I wouldn't trust a compromised system as far as I can try it, even if I > did >> try to remove the malware. The bad guys are far more advanced than we are. >> Format and reinstall is usually the quicker and best option. >> >> - Hans >> >> >> On 2013-02-16, at 10:55 AM, "Jim Lawrence" <accessd at shaw.ca> wrote: >> >>> Hi All: >>> >>> Many people depend on their various security software packages to >>> detect and destroy all threats. When a user has done something really >>> stupid and a piece of malware has secured itself within their OS what >>> steps do you take to remove it? >>> >>> Over the years I would suspect that you, techs have done much of this >>> type work already but here is a concise little article on the step by >>> step removal and recovery process. >>> >>> http://blogs.technet.com/b/markrussinovich/archive/2013/01/07/3543763. >>> aspx >>> >>> Hope this helps someone. >>> Jim >>> >>> _______________________________________________ >>> dba-Tech mailing list >>> dba-Tech at databaseadvisors.com >>> http://databaseadvisors.com/mailman/listinfo/dba-tech >>> Website: http://www.databaseadvisors.com >> >> _______________________________________________ >> dba-Tech mailing list >> dba-Tech at databaseadvisors.com >> http://databaseadvisors.com/mailman/listinfo/dba-tech >> Website: http://www.databaseadvisors.com >> >> _______________________________________________ >> dba-Tech mailing list >> dba-Tech at databaseadvisors.com >> http://databaseadvisors.com/mailman/listinfo/dba-tech >> Website: http://www.databaseadvisors.com > > > _______________________________________________ > dba-Tech mailing list > dba-Tech at databaseadvisors.com > http://databaseadvisors.com/mailman/listinfo/dba-tech > Website: http://www.databaseadvisors.com > > _______________________________________________ > dba-Tech mailing list > dba-Tech at databaseadvisors.com > http://databaseadvisors.com/mailman/listinfo/dba-tech > Website: http://www.databaseadvisors.com