Page 2 of 5 FirstFirst 12345 LastLast
Results 11 to 20 of 50

Thread: Mamba Black Copy and the Chinese

  1. #11
    soforene's Avatar
    soforene is offline The Troll formerly known as Herbert Von Poople-Futtocks
    Join Date
    Aug 2007
    Posts
    2,915

    Default

    You may need to translate that lot into Chinglish, Buffo old man.

  2. #12
    Join Date
    Jan 2006
    Location
    Charleston, SC
    Posts
    2,147,488,805

    Default

    Quote Originally Posted by soforene View Post
    You may need to translate that lot into Chinglish, Buffo old man.
    I learned a new word today!

    I've heard of "Engrish", but never Chinglish. Thanks for the wiki link!

    Though really, I shouldn't have had to say anything. As if it would ever be appropriate to ask if the pirated version was more stable....

    Adam

  3. #13
    mixedgas's Avatar
    mixedgas is offline Creaky Old Award Winning Bastard Technologist
    Infinitus Excellentia Ion Laser Dominatus
    Join Date
    May 2007
    Location
    A lab with some dripping water on the floor.
    Posts
    9,186

    Default

    Quote Originally Posted by bolo View Post
    I have one question:

    Chinese mamba work better from .de version?
    Only if you like viruses on your computer.

    Steve
    Qui habet Christos, habet Vitam!
    I should have rented the space under my name for advertising.
    When I still could have...

  4. #14
    Join Date
    Sep 2006
    Location
    Netherlands
    Posts
    1,411

    Default

    a trojan
    A pal of mine
    a client's facility
    purchased it off E-bay
    version 1.6 or something.
    the trojan horse software
    some up-to-date anti-virus software
    the virus checker
    the infected files on the CD.
    Far to vague!

    Somehow, this story has some kind of don't-use-illegal-software-because-it-contains-viruses-boogyman feel to it. We are here to inform each other, not to lauch another ghoststory.
    What was the exact name of the threat/trojan etc, etc.

    Don't get me wrong i hate piracy, but this claim just needs more details filled in.

  5. #15
    Join Date
    Mar 2008
    Location
    Canton, GA USA
    Posts
    384

    Default

    oh, you've done it now...

  6. #16
    Join Date
    Jul 2008
    Location
    Maryland
    Posts
    1,638

    Default

    agreed.. a Trojan does not eat processor cycles. It sits and waits for an event or trigger to activate it.. often times the payload is downloaded and installed without the user even knowing it. but the trojan itself is never that complex.

    trojans work in a few ways

    Remote Access (AKA Backdoor)
    Data Destruction (AKA crosslinked files on hard drive)
    Downloader/dropper (described above)
    Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.) (used for mass spam mailing from your computer)
    Disable security software (turn off virus protection)
    Distributed Denial-of-service attack (not relevant here)

    If the software IS infected it is most likely a downloader as that is the most current common way of infecting computer systems by way of trojan
    Quis custodiet ipsos custodies?
    Solid State Builders Group

  7. #17
    Join Date
    Apr 2007
    Location
    Toronto Canada
    Posts
    1,120

    Default

    Quote Originally Posted by -bart- View Post
    Far to vague!

    Somehow, this story has some kind of don't-use-illegal-software-because-it-contains-viruses-boogyman feel to it. We are here to inform each other, not to lauch another ghoststory.
    What was the exact name of the threat/trojan etc, etc.

    Don't get me wrong i hate piracy, but this claim just needs more details filled in.
    I totally agree. Besides craking can lead to severe memory leaks and CPU usage. I'm not advocating piracy and craking, I just want to see full picture. Name of the Trojan plz.
    I hired an Italian guy to do my wires. Now they look like spaghetti!

  8. #18
    soforene's Avatar
    soforene is offline The Troll formerly known as Herbert Von Poople-Futtocks
    Join Date
    Aug 2007
    Posts
    2,915

    Wink

    Quote Originally Posted by Dr Laser View Post
    ...craking can lead to severe memory leaks ....
    Is that the same as Cracking, eh !?

  9. #19
    Join Date
    Oct 2006
    Location
    Cleveland, Ohio
    Posts
    2,333

    Default

    I was called a craker once but I don't think it was related to software!

  10. #20
    Join Date
    Apr 2007
    Location
    Toronto Canada
    Posts
    1,120

    Default

    Ok ok. I mean cracking.
    I hired an Italian guy to do my wires. Now they look like spaghetti!

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •