Jump to content

Free Legal Advice


Butsoy

Recommended Posts

-PWSteal.Trojan

PWSteal.Trojan is a Trojan that attempts to steal login names and passwords

These passwords are often sent to an anonymous email address. It usually drops a file named "mine.exe" and it is loaded from the Windows registry.

 

Solution 1

To remove this Trojan, most of the steps are performed in Safe mode. Please follow the instructions in each section.

 

NOTE: The following procedure instructs you to delete files, file entries, and registry values. In some cases, they may have already been removed by your anti virus software, or they were never added by the Trojan. If you do not find a particular file or entry, make sure that you followed the instructions exactly. If the file or entry does not exist, then proceed to the next step or section.

 

Removal Instructions:

-Solution 1-

 

+Enable show all files

Follow these steps to configure Windows to show all files:

 

1. Start Windows Explorer.

2. Click View (Windows 95/98) or Tools (Windows Me), and click Options or Folder Options.

3. Click the View tab, and uncheck "Hide file extensions for known file types" if it is checked.

4. Click Show all files, and click OK.

 

 

Restart the computer in Safe mode

 

* If you are running Windows 95:

1. Exit all programs, and then shut down the computer. If the computer will not shut down normally, then proceed to the next step.

2. Turn off the computer, and wait 30 seconds. You must turn off the computer to remove the virus from memory. Do not use the reset button.

3. Turn on the computer. When you see the "Starting Windows 95" message, press F8.

4. Press the number for Safe mode, and then press Enter.

* If you are running Windows 98:

1. Click Start, and click Run.

2. Type msconfig and click OK. The System Configuration Utility dialog box appears.

3. Click the General tab, and click Advanced.

4. Check Enable Startup Menu, click OK, and then click OK again.

5. Exit all programs, and then shut down the computer. If the computer will not shut down normally, proceed to the next step.

6. Turn off the computer, and wait 30 seconds. You must turn off the computer to remove the virus from memory. Do not use the reset button.

7. Turn on the computer, and wait for the menu to appear.

8. Press the number for Safe mode, and then press Enter.

 

 

+Find and delete files

Follow these steps to locate and delete the files that were placed on your hard disk by the Trojan:

 

1. Click Start, point to Find or Search, and then click Files or Folders.

2. Make sure that "Look in" is set to (C:) and that "Include subfolders" is checked.

3. In the Named box, type (or copy and paste) the following file names:

 

msdos98.exe uninstallms.exe mine.exe mi*.zip readme.txt

4. Click Find Now.

 

CAUTIONS:

* The next step is to delete these files from your computer. Make sure that you delete only the files listed, and if you typed the file names, that they were typed exactly as shown. Deleting the wrong file could prevent your system from starting. (The entry mi*.zip may result in several files being found, such as Mi29.zip, or Mine.zip. All such files should be deleted.)

* If you are running Windows Me, the search may find the Winmine.exe file. This is the executable for the Windows Minesweeper game, and it is not necessary to delete this file.

* This search will almost certainly find several files named Readme.txt. Each will be in a different location. Make sure that you delete only the one in the C:\Windows\System folder.

5. Delete each file in the Results pane; click Yes to confirm each deletion.

 

NOTE: If you see a message saying that the file is in use when you try to delete the Msdos98.exe file, then you cannot remove it at this point. Complete as many of the Solution 1 instructions as possible, and then proceed to Solution 2. Follow the instructions in the first two sections of that solution. You only need to enter the first two commands in the section Remove infected files. When the Msdos98.exe file has been deleted, restart the computer.

6. Right-click the Recycle Bin icon on your desktop, and click Empty Recycle Bin.

7. Click New Search, and then go on to the next section.

 

+Find and change a file

 

1. Make sure that "Look in" is set to (C:) and that "Include subfolders" is checked.

2. Type win.ini in the Named box, and then press Enter.

3. Right-click the Win.ini file in the results pane, and click Properties.

 

NOTE: If you find more than one Win.ini file, make all changes to the one that is located in the folder in which Windows is installed; for example, C:\Windows.

4. Uncheck Read-only, and then click OK.

5. Double-click the Win.ini file to open it in Notepad.

6. Locate the entry that begins with run=. It should look similar to this:

 

run= C:\Windows\uninstallms.exe

 

NOTE: There is a large space between run= and the C:\Windows\uninstallms.exe entry. If you cannot locate the C:\Windows\uninstallms.exe entry, then click the Search menu and click Find. Type uninstallms.exe and then click Find next.

7. Place the cursor after run= , and then press Shift+End to select the rest of the line. Repeat this until the entire line is selected. You may have to press Shift+End four or five times.

8. Press Delete.

 

NOTE: A new variant of this Trojan has been found that does not add the text C:\Windows\uninstallms.exe.

9. Underneath run= , look for an entry that begins with RUNRESTORE=. It should look similar to this:

 

RUNRESTORE=C:\Windows\uninstallms.exe

 

If you find this entry, move the cursor to the beginning of the line, press Shift+End to select the entire line, and then press Delete.

10. To make sure that none of these entries remains, click the Search menu and click Find. Type uninstallms.exe and then click Find next. Remove any entries that refer to this file.

11. Click the File menu, and click Save.

12. Exit Notepad.

 

+Remove an entry from the registry

 

CAUTION: I strongly recommend that you back up the system registry before making any changes. Incorrect changes to the registry could result in permanent data loss or corrupted files. Please make sure you modify only the keys specified.

 

1. Click Start, and click Run. The Run dialog box appears.

2. Type regedit and then click OK. The Registry Editor opens.

3. Navigate to the following key:

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\

Windows\CurrentVersion\Run

4. Look for the following String value in the right pane:

 

Windows "C:\Msdos98.exe"

5. If it exists, select it, press Delete, and then click Yes to confirm the deletion.

6. Navigate to the following key:

 

NOTE: This will not exist on all systems.

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\

Windows\CurrentVersion\Run-

7. Look for the following String value in the right pane:

 

Windows "C:\Msdos98.exe"

8. Exit the Registry editor.

 

 

The Trojan is now removed from your system. Restart the computer.

 

NOTE (for Windows 98 users only): If you used the Microsoft System Configuration Utility to enable the startup menu, you can now disable. To do so, follow these steps:

 

1. Click Start, and click Run.

2. Type msconfig and then click OK. The System Configuration Utility dialog box appears.

3. Click the General tab, and click Advanced.

4. Uncheck Enable Startup Menu, click OK, and then click OK again.

5. Restart the computer.

 

--Solution 2--

To remove this Trojan, most of the steps are performed in MS-DOS mode. Please follow, in the order presented, the instructions in each section.

 

NOTES:

 

* The procedure described in this document is complex and assumes that you are familiar with basic Windows and DOS procedures. If you are not, then we suggest that you obtain the services of a qualified computer consultant.

* The following procedure instructs you to delete files, file entries, and registry values. In some cases, they may already have been removed by your antivirus software, or they were never added by the Trojan. If you do not find a particular file or entry, make sure that you followed the instructions exactly as shown. If the file or entry does not exist, then proceed to the next step or section.

 

 

Start the computer in MS-DOS mode

The first part of the removal procedure must be performed in MS-DOS mode. Please follow these steps to restart the computer in MS-DOS mode:

 

* Windows 95

1. If the computer is on, then close all programs, and if possible, shut down Windows. If the computer will not shut down normally, then proceed to the next step.

2. Turn off the computer, and then wait 30 seconds. You must turn off the computer to clear memory.

3. Restart the computer, and watch the screen. When you see "Starting Windows 95," press F8.

4. Select "Safe mode Command Prompt Only" from the startup menu, and then press Enter.

* Windows 98

1. If the computer is on, close all programs, and if possible, shut down Windows. If the computer will not shut down normally, then proceed to the next step.

2. Turn off the computer and wait 30 seconds. You must turn off the computer to clear memory.

3. Restart the computer, and immediately press and hold down the Ctrl key until the Windows 98 startup menu appears.

4. Select "Safe mode Command Prompt Only" from the startup menu, and then press Enter.

 

 

Remove infected files

At the DOS prompt, which should appear similar to C:\>, type the following commands in the sequence shown. Press Enter after each one.

 

NOTE: These instructions assume that the path to the Windows folder is C:\Windows. If you installed Windows in a different folder, such as C:\Win95, then modify the commands that refer to the Windows folder accordingly. If you press Enter and you see a message saying that the file or directory is not found, retype the command, making sure that you type it exactly as indicated, and that the path is pointing to the folder in which Windows is installed. If you still see the same message, continue on to the next line of the instructions.

 

attrib -r -s -h msdos98.exe

del msdos98.exe

cd windows

attrib -r -s -h uninst~1.exe

del uninst~1.exe

cd system

attrib -r -s -h mine.exe

del mine.exe

attrib -r -s -h readme.txt

del readme.txt

cd \windows

attrib -r -s -h win.ini

edit win.ini

 

The Win.ini file will open in the DOS Editor. Go to the next section.

 

Remove entries from the Win.ini file

You must delete an entry from the Win.ini file. Please follow these steps:

 

1. Locate the entry that begins with run=. It should look similar to this:

 

run= C:\Windows\uninstallms.exe

 

NOTE: There is a large space between run= and the C:\Windows\uninstallms.exe entry. To determine whether this entry exists, place your cursor at the beginning of run= and press the End key.

2. Backspace until the text C:\Windows\uninstallms.exe has been deleted.

3. Underneath run=, look for an entry that begins with RUNRESTORE=. It should look similar to this:

 

RUNRESTORE=C:\Windows\uninstallms.exe

 

If you find this entry, move the cursor to the beginning of the line, press Shift+End to select the entire line, then press Delete.

4. Press Alt+F, and then press X to exit. Save the changes when prompted.

5. Turn off the power to the computer, wait 30 seconds, and then go on to the next section.

 

 

Remove an entry from the registry

Restart the computer in Safe mode. To do this, follow the steps in the section titled Start the computer in MS-DOS mode except choose "Safe mode" instead of "Safe mode Command Prompt Only." When Windows starts, make sure that you do not attempt to start AOL. To remove references to the Trojan from the registry, follow these steps:

 

CAUTION: I strongly recommend that you back up the system registry before making any changes. Incorrect changes to the registry could result in permanent data loss or corrupted files. Please make sure you modify only the keys specified.

 

1. Click Start, and click Run. The Run dialog box appears.

2. Type regedit and then click OK. The Registry Editor opens.

3. Navigate to the following key:

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\

Windows\CurrentVersion\Run

4. Look for the following String value in the right pane.

 

Windows "C:\Msdos98.exe"

 

If it exists, select it, press Delete, and then click Yes to confirm.

5. Navigate to the following key:

 

NOTE: This will not exist on all systems.

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\

Windows\CurrentVersion\Run-

6. Look for the following String value in the right pane:

 

Windows "C:\Msdos98.exe"

7. Exit the Registry Editor.

 

 

The Trojan is now removed from your system. Please restart the computer.

 

---Solution 3---

This procedure will allow you to delete files which Norton anti virus(NAV) was not able to remove. Please make note of the file(s) which NAV detected as PWSteal.Trojan.

 

To remove files that cannot be deleted by NAV:

Follow the instructions for your version of Windows only if NAV could not delete files that it detected as infected with PWSteal.Trojan.

 

1. Press Ctrl+Alt+Delete one time.

2. Click Task Manager.

3. Click the Processes tab.

4. Click the "Image Name" column header two times to sort the processes alphabetically.

5. Scroll through the list and look for the name of the file which NAV detected as PWSteal.Trojan. If you find the file, click it and then click End Process.

6. Close the Task Manager.

7. Run the scan again, and delete any files detected as PWSteal.Trojan.

8. When the scan is finished, go on to the section Remove an entry from the registry.

 

Remove an entry from the registry

To remove references to the Trojan from the registry, follow these steps:

 

CAUTION: I strongly recommend that you back up the system registry before making any changes. Incorrect changes to the registry could result in permanent data loss or corrupted files. Please make sure you modify only the keys specified.

 

1. Click Start, and click Run. The Run dialog box appears.

2. Type regedit and then click OK. The Registry Editor opens.

3. Navigate to the following key:

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\

Windows\CurrentVersion\Run

4. Look for the following String value in the right pane.

 

Windows "C:\Msdos98.exe"

 

If it exists, select it, press Delete, and then click Yes to confirm.

5. Navigate to the following key:

 

NOTE: This will not exist on all systems.

 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\

Windows\CurrentVersion\Run-

6. Look for the following String value in the right pane:

 

Windows "C:\Msdos98.exe"

7. Exit the Registry Editor.

 

 

The Trojan is now removed from your system. Please restart the computer.

 

 

 

 

 

 

-W32.Alco.gen

 

W32.Alco.gen is a generic detection for W32.Alco variant worms.

 

 

These worms all have one thing in common: They use Microsoft Outlook to send email to all contacts in the Microsoft Outlook address book. Some variants also try to delete files or send themselves to IRC users. Damm i hate it!

 

 

Holy crap that was a LOOOOONGGGG write up... anyways keep me updated... i'm outta here!!!! Geeezzzzzzzzzzzzzzzzzzzz

Link to comment
Source: C:\WINDOWS\System32\RPCX1sq234.exe

Click for more information about this threat : W32.Alco.gen

 

Source: C:\WINDOWS\system32\CD_CLINT.DLL

Description: The file C:\WINDOWS\system32\CD_CLINT.DLL is a Adware threat.

Click for more information about this threat : Adware.Cydoor

 

Source: C:\WINDOWS\ipinsigt.dll

Description: The file C:\WINDOWS\ipinsigt.dll is a Adware threat.

Click for more information about this threat : Adware.Ipinsight

Link to comment
Source: C:\WINDOWS\System32\RPCX1sq234.exe

Click for more information about this threat : W32.Alco.gen

 

Source: C:\WINDOWS\system32\CD_CLINT.DLL

Description: The file C:\WINDOWS\system32\CD_CLINT.DLL is a Adware threat.

Click for more information about this threat : Adware.Cydoor

 

Source: C:\WINDOWS\ipinsigt.dll

Description: The file C:\WINDOWS\ipinsigt.dll is a Adware threat.

Click for more information about this threat : Adware.Ipinsight

 

The adwares/spyware can not be remove by a normal anti virus software. download the free adaware software and then run a full system scan.(dont forget to first update it)

 

download ad-aware HERE!

Link to comment
Source: C:\WINDOWS\System32\RPCX1sq234.exe

Click for more information about this threat : W32.Alco.gen

 

Source: C:\WINDOWS\system32\CD_CLINT.DLL

Description: The file C:\WINDOWS\system32\CD_CLINT.DLL is a Adware threat.

Click for more information about this threat : Adware.Cydoor

 

Source: C:\WINDOWS\ipinsigt.dll

Description: The file C:\WINDOWS\ipinsigt.dll is a Adware threat.

Click for more information about this threat : Adware.Ipinsight

 

The adwares/spyware can not be remove by a normal anti virus software. download the free adaware software and then run a full system scan.(dont forget to first update it)

 

download ad-aware HERE!

CyberRay, too late to read your mail...., damn, my pc won't boot (in normal mode),hang. Just in safe mode (2 colors, 640by480 resolution from the normal 32 bit, 1024/768). I've just reformated my pc this morning (damn after 2 long years :( grrrrr ). I'll continue to restore files in my backup disks this evening, waaaaaaaaaaaaa. Anyway, thank u very much for the help and advise!!!

 

 

My last scan (before the hang-up), nearly 20+ files were again infected and mostly system files. Only option available was to remove / delete these files (as per Norton AVG 2004 recommendation). If these trojans wrote entries, w/o my knowledge, in system registry, then how should I protect it? Damn trojans, nevertheless , I give credit to maker of this s**t (you have ur time, loser!!). Offhand, is svchost, system file?

 

 

 

 

BTW, I turned off the system restore long time ago, my mistake was not to do full scan on "safe mode". Would it make a difference? BTW, I'm just wondering why my 2 antivirus detected and reported differently (AVG detected some virus that NOrton 2004 didn't, and vice-versa).

 

 

Now, that I'm pissed with the virus thing, I more likely want to know pro-active defense against this. Is there a firewall blocking these addware/spyware, s**t? How do I protect my registry against software hackers? Are these spywares including mostly on network softwares (yahoo messenger, grokster, kazaa, or other peer 2 peer softwares)?

 

Thanks again for the tip on Norton AVG and spyware, I'll use them once i've finished restoring my files....

Link to comment
Silverchariot

Dude..the files you can't remove are most likely locked by the Windows.

They are treated as system process.

 

There are Trojan system cleaners out there.

 

http://www.trendmicro.com/ftp/products/tsc/sysclean.com

extract the file and also download the latest pattern file from Trend as well.

http://www.trendmicro.com/download/pattern.asp

thanks matsutsu, I'm not sure about trendmicro , is it better than Norton /AVG? In what way?

Link to comment
If the files cant be removed they are protected by windows, so you need to disable system restore first and do full scan again.

I turned off the system restore long time ago, worst thing, I think they're dlls currently used by Windows. Option would probably scan on "safe mode" or in DOS mode. Problem is only option available (as for AVG / Norton 2004, using latest updated virus files) is to delete/remove the files (they're system dlls, why remove/delete???).

Link to comment

If you want a very user friendly firewall I recommend zone alarm, it blocks any kind of access to your pc depends on your setting, then use ad -aware, and the cleaner to clean any spyware, use norton or avg whichever you prefer to block virus, and also use norton anti-spam for your email securities.. then use tune-Up utilities to optimise your windows/internet access...

Link to comment
Ignorance of the law is no excuse. I want to ask these hypothetical questions for my information only.

 

Suppose if i have sex with a girl who misrepresents herself to be 18 years old. Will i be guilty of child abuse if the girl's age later turn out to be lets say 16.

 

If during the time of sexual encounter she is below 18 years old, can she file charges later when she is already 18 years old.

My 10 cents worth of advise though.

 

1) Misrepresentation by the victim of her age is a very shaky defense even if she looks older than she really is. This is because, if she denies (which in most cases she will) the misrepresentation, it would only be your word against hers. And in cases of abuse of minor, most doubts are resolved in the victim's favor due to her age. Circumstantial advantage yan ng victime. Similar to rape victims, when they say they were forced and the offender says "she seduced me" the court tends to give more credence to the victim even if she was a prostitute.

 

2) Yes. A child below 18 years can file an action when she reaches 18, even if the event took place when she was 12. The period of prescription does not begin to run until she reaches 18.

 

Moral of the story, if you can't be good, be careful. And I mean very, very careful!

Link to comment
My 10 cents worth of advise though.

 

1) Misrepresentation by the victim of her age is a very shaky defense even if she looks older than she really is. This is because, if she denies (which in most cases she will) the misrepresentation, it would only be your word against hers. And in cases of abuse of minor, most doubts are resolved in the victim's favor due to her age. Circumstantial advantage yan ng victime. Similar to rape victims, when they say they were forced and the offender says "she seduced me" the court tends to give more credence to the victim even if she was a prostitute.

 

2) Yes. A child below 18 years can file an action when she reaches 18, even if the event took place when she was 12. The period of prescription does not begin to run until she reaches 18.

 

Moral of the story, if you can't be good, be careful. And I mean very, very careful!

I AGREE.

 

know your partner first. especially kung hindi sya prostitute.

 

but dont worry, if she is 16 years old, and looks to be of age, that i till a defense you can use. pagalingan nalang ng ebidensya yan.

 

just dont f*ck a minor 12 and below. autmoatic yan, whether or not with consent. thats statutory rape. something that jaloslos is paying for now.

Link to comment
If you want a very user friendly firewall I recommend zone alarm, it blocks any kind of access to your pc depends on your setting, then use ad -aware, and the cleaner to clean any spyware, use norton or avg whichever you prefer to block virus, and also use norton anti-spam for your email securities.. then use tune-Up utilities to optimise your windows/internet access...

thanks dude, I'll consider this advise :)

Link to comment
thanks matsutsu, I'm not sure about trendmicro , is it better than Norton /AVG? In what way?

I have friends working in trend micro. nasa libis yung AV dept nila.

gawang pinoy yung virus pattern files. :cool:

 

AV companies usually share virus info amongst them.

Pero sometimes may nang-iipit ng virus sample para sila kunwari yung una maka-detect. ;)

 

Have ur pick. Norton is US, AVG is somewhere in Russia ata and Trend is PH.

 

When you suspect ur system is infected with virus. Run in SAFE MODE para essential services and tasks will run only. Then run a total virus scan (must be update yung scan engine at pattern file) on all of ur system.

Link to comment

Waaah!!!!! In that case I really advise you to reformat your PC... huhuhuhu... I thought it is just 3-6 files that have been altered/infected by those virus/spyware/adwares/whateverwares… anyways, since you just reformatted your pc here are some good tips (A MUST!) to protect your pc. (A new start)

 

Follow the following steps one by one and MUST be in order:

 

First after installing your operating system,

1> Set up your internet connection first, (DSL, Cable, Dial-Up) Then connect to Windows Update A.S.A.P and update ALL of the security patches, program updates/upgrades etc. for your Windows Operating System!

 

This is A MUST! Never ever start to use your pc unless you have all of this installed! Remember the Blaster and Sobig virus that went into outbreak mid-last year? They are programmed to target a windows exploit that has been discovered a few weeks before the virus outbreak. And the only ones that are affected are those who did NOT download and update the security patches/updates!

 

Also few weeks ago, first week of the current month a new windows exploit found in all of the version of windows and not just “exploit” it is called M.O.A.W.E “Mother of All Windows Exploit” A security hole found in windows that may allow an attacker to FLASH your MOBO and leave it useless. Lol! Sounds cool! Heheh! So before a virus that has been program to attack this new exploit gets in to the wild, download and update your windows OS NOW!

To start windows update click START-All Programs-Windows Update or go to the Windows Update site HERE!

 

2> Download and use ONLY 1 and I mean 1 not 2 not 3 not 4! Period! Anti-Virus software as your main resident Anti-Virus scanner.

There are lots of trusted AV’s out there, Ex: Norton, McAfee, E-Trust Etc etc! I usually recommend Symantec’s Norton Anti-Virus coz it has more virus definitions updates, and real time protection (catch a virus before it gets downloaded to your PC), in depth compressed file scanning and nice script blocking than any other AV software.

 

However. NO AV software out there is perfect so I advise you to use an online virus scanner as your back-up scanner and run a full system scan at least once a week!

 

Remember! NEVER EVER USE 2 or more Anti-Virus software in one single PC. It will make more harm than good to your PC. The two programs can conflict with each other and thus reduce the program’s affectivity by as nearly 200% or worst it can cause your system to lock up and crash.

 

Turning off the other AV’s real time protection is NOT an excuse,

Conflict is not based on how many AV’s are there running simultaneously but the conflicts do happen inside the system registry and the .dll files of the two AV’s software. Take it from me and nobody else!

 

Available Online Anti-Virus/Security Scanners:

 

Symantec

TrendMicro Housecall

R.A.V Scanner

Panda Online Scanner

 

 

3> Download and install a FIREWALL!

Remember a good firewall is always your FIRST line of defense against Hackers, System Intrusions And some Trojans worms.

A firewall also blocks any outbound connection of all the programs in your PC unless you allow it. For Example you got a Trojan inside your pc and is trying to call back home to it’s creator to send them information of your pc, (password, personal infos etc.) The firewall will notify you and block its internet connection.

Also the firewall will prevent any incoming suspicious connections to your pc and hide all unused ports so that it will be invincible to hackers who are trying to access your PC.

 

You can download a FREE copy of firewall made by the following trusted vendors:

 

ZoneAlarm

 

SYGATE

 

REMEMBER: Like the Anti-Virus software’s NEVER EVER use 2 or more Firewall software in your PC. Oh come on… don’t let me explain again on why you shouldn’t use 2 firewalls right? Geezzz…

 

 

4> Download Spyware Blaster, Ad-Aware, and Spybot Search and Destroy!

The Spyware Blaster is like a Firewall for Adwares and Spywares.

This software doesn’t clean out adwares and spywares, but it prevents those malwares from getting installed in your pc.

 

But when those Adware/Spyware gets past Spyware Blaster, This is the time when Ad-Aware and Spybot Search and Destroy comes in to action.

 

The Ad-Aware and Spybot acts like an AV and scans your system for adwares or spywares. But unlike the Anti-Virus it is possible for you to install these two softwares at the same time without them conflicting with each other and some adware/spyware can be detected by Ad-Aware which Spybot could not detect and vice versa.

 

Download Spyware Blaster HERE!

Download Ad-Aware HERE!

Download Spybot Search & Destroy HERE!

 

All of the programs mentioned above have program updates! You must download all the program/definitions/signature updates before you start to use them!

 

Hope this help you to have a more secure and safe way of using your computer! Have a nice day! Pheewww……

 

 

 

:mtc: :cool: :mtc: :cool: :mtc: :cool: :mtc: :cool: :mtc: :cool: :mtc:

Link to comment

RE: Kazaa, Yahoo Messenger, AOL Instant Messenger!

 

KaZaA is NOT a place where you wanna end your ass up if you don't have any Anti-Virus and Firewall installed.

 

The "Regular" KaZaA program you get from www.kazaa.com COMES with Adwares and spyware which you really don’t wanna have inside your computer system!

 

Solution??!

 

Use KaZaA Lite Resurrection!

This baby right here is burning HOT and it comes with a bunch of tools which can make you smile when comes to free mp3s and movies!

This is a FREE hacked version of KaZaA WITHOUT those freaking Spywares! This means tons of FREE mp3s and movies without compromising your privacy and security!

Did i also mention that you also get a full 1000 Participation Level?

 

Oh one more thing! ONLY use kazaa to download music and movie files! EG: .mp3, .wma, .wmv, .avi, .mpeg files!

 

Never ever download .exe executable files at Kazaa! Those are f*ckin Viruses, Trojans, etc etc!

Example: File Name (Fake): Norton Anti Virus

File Size: 24 Kb

 

Duh! an Anti-Virus software??! But the file size is only 24 Kilobytes?!!! Damm a very low bit rate full song mp3 is much bigger than that huh? Use your common sense!

Also scan EVERY file you downloaded from the internet before opening them!

 

“9 out of 10 .exe Executable and Zip Files downloaded from KaZaA contains Viruses” – From a top leading cyber security company press release.

 

Visit The official website of KaZaA Lite Resurrection

HERE!

 

Latest Version Is KaZaA Lite Resurrection 006 2.4.9

 

 

For the Yahoo, AOL, Window Messengers and ICQ, They also have some security flaws which may allow some hackers to use them as a gateway to attack or steal personal infos from your PC and/or read your instant chat messages!

 

Solution??!

You can also get the program updates for the said messengers and programs by visiting their creator’s respected sites for program updates.

 

OR

 

Use the Trillian all in one messenger. (MSN, Yahoo!, ICQ, IRC, and aim)

 

Visit the homepage of Trillian HERE!

Link to comment
Ignorance of the law is no excuse. I want to ask these hypothetical questions for my information only.

 

Suppose if i have sex with a girl who misrepresents herself to be 18 years old. Will i be guilty of child abuse if the girl's age later turn out to be lets say 16.

 

If during the time of sexual encounter she is below 18 years old, can she file charges later when she is already 18 years old.

There are two crimes under the Revised Penal Code with regard to having sex with girls between the ages of 12 and 18, with consent of course (no consent is rape, no matter what age).

 

Qualified seduction - she had be a virgin; penalty - up to 2 years and 4 months

 

Simple seduction - up to six months.

 

The defense of misrepresentation maybe allowed depending on your age. The judge is human too you know. If you are a 30+ year old man having sex with a teenager, misrepresentation would be hardly believed. If you are married, it will be worse. The case would be different if the offender would be only 18 or slightly older.

 

On filing charges two years after the deed, the offended may because the prescription period for qualified seduction is 10 years, while simple seduction is 5 years.

 

Tip - It's not worth the risk! If you go to jail, you will be seduced!

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...