• Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
  • Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!

More than 450,000 computers are now part of zombie networks

Collapse
X
  •  
  • Filter
  • Time
  • Show
Clear All
new posts

    #11
    Originally posted by cojak View Post
    Well, that's me sorted...

    Apart from being dumb enough to download Chrome, obv....
    I had to manually remove most of the carp it left on the laptop when I tried it
    Confusion is a natural state of being

    Comment


      #12
      Originally posted by Diver View Post
      I had to manually remove most of the carp it left on the laptop when I tried it

      I still have to clean up after it - on a new machine too. What a stupid cow...

      I'll have to tackle it this afternoon.
      "I can put any old tat in my sig, put quotes around it and attribute to someone of whom I've heard, to make it sound true."
      - Voltaire/Benjamin Franklin/Anne Frank...

      Comment


        #13
        Originally posted by cojak View Post
        And I use the Noscript add-on.
        Tried it, binned it. Broke too much functionality.

        Oh, and network based forensics will tell you whether you have a rootkit, whatever, on your machine...
        Older and ...well, just older!!

        Comment


          #14
          You can get a definitive answer by firing up the suspect box, leaving it idle and running a packet sniffer or other monitor of network activity from a seperate, known to be clean, device and seeing what there is going on over the network.

          A compromised box will be sending traffic to odd places even when it is supposedly idle. Prime suspects are IRC traffic and outbound email traffic.
          Last edited by DaveB; 8 September 2008, 12:37.
          "Being nice costs nothing and sometimes gets you extra bacon" - Pondlife.

          Comment


            #15
            Originally posted by DiscoStu View Post
            AtW's got to get his distributed computing power from somewhere
            We only have just over 150, all legit of course.

            Comment

            Working...
            X