Anti-Spyware Forums


Reply
Thread Tools Display Modes

Clarification of a few points.

 
 
FromTheRafters
Guest
Posts: n/a

 
      09-07-2011, 12:19 PM
"~BD~" <~BD~@nomail.afraid.com> wrote in message
news:(E-Mail Removed)...
> Dustin Cook wrote:
>> "Jenn"<(E-Mail Removed)> wrote in
>> news:iv8bdg$41n$(E-Mail Removed):
>>
>>> Dustin wrote:
>>>> "Jenn"<(E-Mail Removed)> wrote in
>>>> news:iv5ig4$9qd$(E-Mail Removed):
>>>>
>>>>> ... just curious .. who's the 3rd party independent analysis done
>>>>> by?
>>>
>>>
>>>> I'm not going to play semantics. What I said stands.
>>>
>>> You said it .. I was just asking who you were talking about...
>>> don't you know?

>>
>> Yep. I know. Jenn, the Malwarebytes software is routinely tested by virus
>> scanners when people submit the executable; Like you did with David
>> Lipmans program. That is independent, 3rd party. [g] A clean bill of
>> health is always provided.

>
>
> That answer is inadequate and does not answer the original question.


It seems adequate to me, and additionally there are people out there
who tear apart security related programs just to see what weaknesses
there are in them - "Little Willy" and Tegam comes to mind.

It is not at all likely that malicious activity will go unnoticed.

A trap door is more likely, but even that is not that likely.


 
Reply With Quote
 
 
 
 
Aardvark
Guest
Posts: n/a

 
      09-07-2011, 12:31 PM
On Sat, 09 Jul 2011 08:19:50 -0400, FromTheRafters wrote:

> BD wrote:


>> That answer is inadequate and does not answer the original question.

>
> It seems adequate to me, and additionally there are people out there who
> tear apart security related programs just to see what weaknesses there
> are in them - "Little Willy" and Tegam comes to mind.
>
> It is not at all likely that malicious activity will go unnoticed.
>
> A trap door is more likely, but even that is not that likely.


No amount of logical explanation is likely to dislodge his 'hinky'. BD
and logic are anathema to one another.



--
"Those who do not make human beings the center of their concern soon
lose the capacity to make any ethical choices, for they willingly
sacrifice others in the name of the politically expedient and
practical." - Dwight Macdonald, “The Root Is Man.”
 
Reply With Quote
 
 
 
 
Aardvark
Guest
Posts: n/a

 
      09-07-2011, 01:27 PM
Totally irrelevant NG snecked.


On Sat, 09 Jul 2011 14:22:33 +0100, ~BD~ wrote:

> FromTheRafters wrote:
>
>> It seems adequate to me, and additionally there are people out there
>> who tear apart security related programs just to see what weaknesses
>> there are in them - "Little Willy" and Tegam comes to mind.
>>
>> It is not at all likely that malicious activity will go unnoticed.
>>
>> A trap door is more likely, but even that is not that likely.

>
> Forget *likely* - the question is "is it *possible*"
>
> Has anybody actually /checked/?


The ****ing possibilities become more irrelevant the lower the
likelihood, ****.



--
"Those who do not make human beings the center of their concern soon
lose the capacity to make any ethical choices, for they willingly
sacrifice others in the name of the politically expedient and
practical." - Dwight Macdonald, “The Root Is Man.”
 
Reply With Quote
 
Dustin
Guest
Posts: n/a

 
      09-07-2011, 11:08 PM
"Jenn" <(E-Mail Removed)> wrote in
news:iv8k9s$e2e$(E-Mail Removed):

> Dustin wrote:
>> "Jenn" <(E-Mail Removed)> wrote in
>> news:iv8bdg$41n$(E-Mail Removed):
>>
>>> Dustin wrote:
>>>> "Jenn" <(E-Mail Removed)> wrote in
>>>> news:iv5ig4$9qd$(E-Mail Removed):
>>>>
>>>>> ... just curious .. who's the 3rd party independent analysis
>>>>> done by?
>>>
>>>
>>>> I'm not going to play semantics. What I said stands.
>>>
>>> You said it .. I was just asking who you were talking about...
>>> don't you know?

>
>
>> Yep. I know. Jenn, the malwarebytes software is routinely tested by
>> virus scanners when people submit the executable; Like you did with
>> David Lipmans program. That is independent, 3rd party. [g] A clean
>> bill of health is always provided.

>
> I'm glad to hear that because I like using malwarebytes, myself. I
> just wonder if "The Net" scenario could actually happen.


Nope. As I said, 3rd party peer review keeps things like that on the
movie screen.




--
(Hey) I keep on thinking that it's
(Hey) all done and all over now (whoa)
You keep on thinking you can save me save me
(Hey) My ship is sinking but it's
(Hey) all good and I can go down (whoa)
You've got me thinking that the party's all over

 
Reply With Quote
 
Dustin
Guest
Posts: n/a

 
      09-07-2011, 11:09 PM
~BD~ <~BD~@nomail.afraid.com> wrote in
news:(E-Mail Removed):

> Dustin Cook wrote:
>> "Jenn"<(E-Mail Removed)> wrote in
>> news:iv8bdg$41n$(E-Mail Removed):
>>
>>> Dustin wrote:
>>>> "Jenn"<(E-Mail Removed)> wrote in
>>>> news:iv5ig4$9qd$(E-Mail Removed):
>>>>
>>>>> ... just curious .. who's the 3rd party independent analysis
>>>>> done by?
>>>
>>>
>>>> I'm not going to play semantics. What I said stands.
>>>
>>> You said it .. I was just asking who you were talking about...
>>> don't you know?

>>
>> Yep. I know. Jenn, the Malwarebytes software is routinely tested by
>> virus scanners when people submit the executable; Like you did with
>> David Lipmans program. That is independent, 3rd party. [g] A clean
>> bill of health is always provided.

>
>
> That answer is inadequate and does not answer the original question.


That answer is more than sufficient. It answers the question, 100% on
point with no slime nor innuendo.

> Do you dispute this, Dustin?
>
> So, I repeat my question. Which independent body has actually


Your question has been asked, and answered twice. I checked it before I
worked for them; so I was independent then, AV companies check it every
single time somebody sends the executable in.

> Downloaded the software onto a known clean computer and then
> forensically examined said machine.


I've done so, I already told you it's clean.


--
(Hey) I keep on thinking that it's
(Hey) all done and all over now (whoa)
You keep on thinking you can save me save me
(Hey) My ship is sinking but it's
(Hey) all good and I can go down (whoa)
You've got me thinking that the party's all over

 
Reply With Quote
 
Dustin
Guest
Posts: n/a

 
      09-07-2011, 11:10 PM
~BD~ <~BD~@nomail.afraid.com> wrote in news:AbKdnWn-
(E-Mail Removed):

> FromTheRafters wrote:
>
>> It seems adequate to me, and additionally there are people out there
>> who tear apart security related programs just to see what weaknesses
>> there are in them - "Little Willy" and Tegam comes to mind.
>>
>> It is not at all likely that malicious activity will go unnoticed.
>>
>> A trap door is more likely, but even that is not that likely.

>
> Forget *likely* - the question is "is it *possible*"
>
> Has anybody actually /checked/?


Yes, I have. Morgan lacks the required skills to check, hence is
questions related to spectorsoft. [g]




--
(Hey) I keep on thinking that it's
(Hey) all done and all over now (whoa)
You keep on thinking you can save me save me
(Hey) My ship is sinking but it's
(Hey) all good and I can go down (whoa)
You've got me thinking that the party's all over

 
Reply With Quote
 
FromTheRafters
Guest
Posts: n/a

 
      09-07-2011, 11:31 PM
"~BD~" <~BD~@nomail.afraid.com> wrote in message
news:(E-Mail Removed)...
> FromTheRafters wrote:
>
>> It seems adequate to me, and additionally there are people out there
>> who tear apart security related programs just to see what weaknesses
>> there are in them - "Little Willy" and Tegam comes to mind.
>>
>> It is not at all likely that malicious activity will go unnoticed.
>>
>> A trap door is more likely, but even that is not that likely.

>
> Forget *likely* - the question is "is it *possible*"


Of course it is, but not for long. Especially if it is doing something.

> Has anybody actually /checked/?


Yes, I'm sure somebody has.


 
Reply With Quote
 
Aardvark
Guest
Posts: n/a

 
      09-07-2011, 11:45 PM
Irrelevant NG snecked.


On Sat, 09 Jul 2011 19:31:08 -0400, FromTheRafters wrote:

> "~BD~" <~BD~@nomail.afraid.com> wrote in message
> news:(E-Mail Removed)...
>> FromTheRafters wrote:
>>
>>> It seems adequate to me, and additionally there are people out there
>>> who tear apart security related programs just to see what weaknesses
>>> there are in them - "Little Willy" and Tegam comes to mind.
>>>
>>> It is not at all likely that malicious activity will go unnoticed.
>>>
>>> A trap door is more likely, but even that is not that likely.

>>
>> Forget *likely* - the question is "is it *possible*"

>
> Of course it is, but not for long. Especially if it is doing something.
>
>> Has anybody actually /checked/?

>
> Yes, I'm sure somebody has.


BD wants their names and email addresses so he can check them out and/or
stalk them.

Hop to it!



--
"Those who do not make human beings the center of their concern soon
lose the capacity to make any ethical choices, for they willingly
sacrifice others in the name of the politically expedient and
practical." - Dwight Macdonald, “The Root Is Man.”
 
Reply With Quote
 
Dustin
Guest
Posts: n/a

 
      09-07-2011, 11:46 PM
Aardvark <(E-Mail Removed)> wrote in
news:ivap6f$er5$(E-Mail Removed):

> BD wants their names and email addresses so he can check them out
> and/or stalk them.


He should tend to his own home before he invites himself to others.



--
(Hey) I keep on thinking that it's
(Hey) all done and all over now (whoa)
You keep on thinking you can save me save me
(Hey) My ship is sinking but it's
(Hey) all good and I can go down (whoa)
You've got me thinking that the party's all over

 
Reply With Quote
 
Aardvark
Guest
Posts: n/a

 
      09-07-2011, 11:51 PM
On Sat, 09 Jul 2011 23:46:37 +0000, Dustin wrote:

> Aardvark <(E-Mail Removed)> wrote in
> news:ivap6f$er5$(E-Mail Removed):
>
>> BD wants their names and email addresses so he can check them out
>> and/or stalk them.

>
> He should tend to his own home before he invites himself to others.


LOL



--
"Those who do not make human beings the center of their concern soon
lose the capacity to make any ethical choices, for they willingly
sacrifice others in the name of the politically expedient and
practical." - Dwight Macdonald, “The Root Is Man.”
 
Reply With Quote
 
 
 
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
MS newsserver(s) - clarification requested ~BD~ Security Software 39 06-08-2009 07:05 AM
Clarification in WSUS Shanthi Security Software 6 01-01-2008 05:11 PM
Clarification Steflb Computer Security 6 24-08-2006 09:14 PM
MS04-028 Clarification needed Henrik Zawischa Security Software 5 17-09-2004 09:03 AM
Take ownership in 2003 - clarification Greg Brown Security Software 0 05-08-2003 04:45 AM


All times are GMT. The time now is 01:55 PM.