December 31st, 2005 05:33 PM
Hi everybody on Antionline,
I am making this post here because of two main reasons:
1. Thank all AntiOnline members for the splendid work they are doing. Some of the wonderful
November 9th, 2005 08:43 AM
Wonder whether it has been covered here before.....
Here is the further reading for this story..
November 8th, 2005 12:04 PM
In order to keep track of Registry changes by trojans/worms etc. and clean them you may use
1. The Cleaner ( http://www.moosoft.com/products/cleaner/ )
2. A-Squared ( ...
November 8th, 2005 11:44 AM
Found it interesting and useful to discuss here.
I just came across the phrase 'code 431.322.12' in some website's Disclaimer.
The disclaimer reads as
The true story is here
November 3rd, 2005 07:45 AM
Well..I made the above post while actually working on the machine to find possible rootkits/malware on it... doing a bit more survey using google fetched me the following tools..
1. Rootkit Hunter...
November 3rd, 2005 05:24 AM
Going by This wonderful list of security tools.
But found that it does not list any tools to detect/eliminate rootkits from a system. Therefore I had to search for some more tools.
October 28th, 2005 10:43 AM
Such scams have become common..
Here I post a series of emails which I received from a phisher in Abidjan posing as Sonia Johnson. According to the scammer..........'SHe is Sonia Johnson.. Her...
October 20th, 2005 12:14 PM
Perfect.. I believe you.. At last I succeded in finding the real genius 'The Creator of Linux'...
My google search for the phrase 'where microsoft.com is hosted' has given me this result in...
October 17th, 2005 06:41 AM
Yeah ... Microsoft has acknowledged that there is a bug in the patch MS05-051
October 15th, 2005 07:00 AM
Well.... the discussion continuing on AO threads since a fortnight now... Its true that Internet has been developed by America... In fact the same is true for too many other technologies as well......
October 13th, 2005 09:03 AM
Their strategy seems to be similar as that of 'HoneyNet Project's'.
There too some systems configured as honeypots are used to track down the attacker. The system uses well...
October 5th, 2005 11:10 AM
Well... The exe created after compiling and linking a c++ code would ofcourse not be containing any variable names but it contains the references to the memory locations allocated for variables of...