Malware, Spyware, Network Monitoring tips & tricks

Discussion in 'PC' started by jhagen, Apr 8, 2024.

  1. saccamano

    saccamano Rock Star

    Joined:
    Mar 26, 2023
    Messages:
    905
    Likes Received:
    348
    Location:
    uranus
    If you have a backend LAN (a local area ether-network that is NOT internet connected but connects your machines together for file access, printing, etc) it's actually not any imposition at all.
     
  2. Sacculus

    Sacculus Ultrasonic

    Joined:
    Oct 22, 2017
    Messages:
    151
    Likes Received:
    33
    I don't understand why people worry about malicious code especially if doing legal stuff with your audio PC?
    I mean just by looking at Anonymous guide to stay anonyme it will takes months if not years to be safe. The Hitchhiker’s Guide to Online Anonymity | The Hitchhiker’s Guide to Online Anonymity (anonymousplanet.org)

    And the first step is the analysis of the threat. Meaning what do you have to loose? How possible is it to loose it? How much can you afford to loose it?

    If someone explain what type of situations im exposed if not been over paranoid on security that is a nonsense on a non linux hardware like Tails USB but not for musicians!
    What is the threat of the malicious code because it's everywhere now...
    I mean the kind of attacks today is targeting high profile or company with Point of Payment that works with WiFi for example but not PC it's not worth it...
     
    Last edited: Apr 19, 2024
    • Interesting Interesting x 2
    • List
  3. Sacculus

    Sacculus Ultrasonic

    Joined:
    Oct 22, 2017
    Messages:
    151
    Likes Received:
    33
    I don't understand why people worry about malicious code especially if doing legal stuff with your audio PC?
    I make all standard job is you described here and there but seriously I mean just by looking at Anonymous guide to stay anonyme it will takes months if not years to be safe. The Hitchhiker’s Guide to Online Anonymity | The Hitchhiker’s Guide to Online Anonymity (anonymousplanet.org)

    And the first step is the analysis of the threat. Meaning what do you have to loose? How possible is it to loose it? How much can you afford to loose it? And who's the adversary?

    If someone explain what type of situations im exposed if not been over paranoid on security that is alost a nonsense on a non linux machine like Tails USB but not for musicians! What is the threat of the malicious code because it's everywhere now...
    I mean the kind of attacks today is targeting high profile or company with Point of Payment that works with WiFi for example but not PC it's not worth it...[/QUOTE]
     
  4. clone

    clone Audiosexual

    Joined:
    Feb 5, 2021
    Messages:
    6,187
    Likes Received:
    2,655
    a keylogger can record every key you type, including any passwords or other data. Unencrypted. They can upload files to the machine and download any files. They can remote execute any program they want. They can use your webcam and microphone to record you. They can use your machine and its IP address to scan entire ranges of the internet for more vulnerable machines and attack them using your machine.
    They can access any saved passwords which may be unencrypted. They can use man-in-the-middle attacks to capture credit card data by faking SSL connections in your browser. They can remote control any of your pets. They could encrypt attached storage devices. Disable fans and try to overclock. Disable antivirus and malware scanners. Spam using your machine. Any other bad things you can think of, they can do because they will have nearly complete control over the machine.

    No big deal, right?
     
    Last edited: Apr 19, 2024
    • Like Like x 2
    • Agree Agree x 1
    • Useful Useful x 1
    • List
  5. Garamondo Furbish

    Garamondo Furbish Rock Star

    Joined:
    Nov 13, 2023
    Messages:
    1,104
    Likes Received:
    484
    Location:
    North America
    the younger generation have never even heard of BACK ORIFICE or the Cult of the COW, how to make them understand once their computer is comprised a 3 rd party or many 3 rd parties can do whatever they want with your machine, whenever they want. Drain your bank account or drain others and make it look like it was you. use your computer for a kiddieporn server,send fanmail to madonna and make it look like you are a simp for her. it boggle the mind how little imagination dwells within the little zombies raised on smart phones and groupchat...
     
    • Like Like x 2
    • Interesting Interesting x 1
    • Love it! Love it! x 1
    • List
  6. jhagen

    jhagen Platinum Record

    Joined:
    Apr 9, 2013
    Messages:
    464
    Likes Received:
    158
    No please, this is a nightmare, nobody deserve such a punishment.
     
    • Funny Funny x 3
    • Agree Agree x 1
    • List
  7. clone

    clone Audiosexual

    Joined:
    Feb 5, 2021
    Messages:
    6,187
    Likes Received:
    2,655
    They also do not realize how little malicious code it can actually take to start. Like an avalanche. Many people do remember BO2K because of it being one of the first widely used RATs, but also because of it's silly sounding name. The user had to download a file, and run it. So the story would beging with "I got this email, and clicked this file (whoever) sent me. Then my computer went nuts." Those files were sizable and required the user to do something stupid. What was not, was a 2kb upload/execute RAT called Thing, which could be embedded as base64 encoded text in a webpage which because of bad code from Microsoft, could exploit mime/mhtml/activeX controls would be downloaded, reassembled as executable and then run with no user interaction. It was the beginning of the end for Flash websites and an entire niche of web and graphics designers.

    "it's just a flash drive I found in the parking lot. What could go wrong?"
     
  8. Choosename

    Choosename Platinum Record

    Joined:
    Nov 24, 2023
    Messages:
    422
    Likes Received:
    164
  9. Garamondo Furbish

    Garamondo Furbish Rock Star

    Joined:
    Nov 13, 2023
    Messages:
    1,104
    Likes Received:
    484
    Location:
    North America
    and don't leave it on your main drive, usb sticks are helpful for storing passwords and other data of a private nature. just don't gloom your personal data up with a shit ton of random things you want to store. keep it managed and separated on a dedicated drive.

    also paper notebooks are handy for lyrics, and notes and journals - no need to make everything digital.
    I keep at least one in every room, handy for taking notes when working on things..
     
  10. Sacculus

    Sacculus Ultrasonic

    Joined:
    Oct 22, 2017
    Messages:
    151
    Likes Received:
    33
    What I mean is that I'm not, as you say, from the new generation, on the contrary. I've been to cybersecurity forums here and there. The people I read are either interested in money and large sums or want to undermine the economic stability of states.
    If you can pull off a Man In The Middle attack, then you're going after prime targets. Payment terminals, companies for ransom, work for FBI but not the poor musician who struggles all year to buy a microphone and can't even afford a sandwich. There aren't any hackers for hire these days on the darknet, and even if you have a dispute with a competitor, good luck finding someone competent to encrypt some poor artist's hard disk. On the contrary... they have morals and a reputation to uphold

    ... not stoling my lyrics is this a joke? The words of God? What's the cashout method you've seen about making big money with lyrics :)

    Don't forget that you're more likely to find a millon by rummaging through the local rubbish than by playing the lottery... it's mathematical!
    "The anodyne shelters the marvel": so here are some lyrics to dig into without anyone filing a complaint for idea theft
     
    Last edited: Apr 20, 2024
  11. Xupito

    Xupito Audiosexual

    Joined:
    Jan 21, 2012
    Messages:
    7,006
    Likes Received:
    3,874
    Location:
    Europe
    Your posts make sense, but there's something very important here.
    Most of us use cr*cked soft which tries to call home. So that alone justifies this thread. Along with other malware in the net: websites, etc that also would justify this thread.

    There's plenty of malware that tries to infect random computers, not only big fish (audio ?:rofl:)
     
  12. saccamano

    saccamano Rock Star

    Joined:
    Mar 26, 2023
    Messages:
    905
    Likes Received:
    348
    Location:
    uranus
    If you honestly believe this and conduct yourself according to this credo you are making yourself ripe for most kinds of identity theft, fraud, and other malicious mischief... 99% of the shit that occurs with these attacks is made on the unsuspecting or uninformed "little fish" who think that "this could never happen to me, I'm too insignificant and not a target".

    There is the business of information collection - that is the worldwide mega $ business that collects information about YOU and sells it to another group of monkeys who will use it to;
    - spam the planet
    - make purchases using your credit card numbers
    - launch robot attacks from your machine to thousands of others
    or any of a thousand other nefarious deeds. These assholes do not care that you are not suspicious of what is done to "insignificant" targets every single day. They actually count on the fact that most monkeys believe they cannot be targets because they aren't a "big fish".

    Big businesses are targets but certainly not overly popular ones because they can afford the latest & greatest anti-fraud anti-hack tech but they too even still can get bit. Looking at it from the perspective of the perpetrator where you see "big fish" who are more difficult to hack targets and will carry stiffer penalties if apprehended, but who theoretically can provide a larger profit margin. And then you have bunches of "little fish" that are easy to hack with a much less chance of being apprehended with a smaller profit margin individually, but in large numbers can be just as profitable as the "bigger fish"... Most of the "little fish" action comes from larger net's being cast and the "fish" jumping into them. EX.- a spam email outlining a too-good-to-be true financial venture, a "click this to get rich" kind of thing...

    I prefer to err on the side of caution and do as much as I can to NOT make myself a target.
     
    Last edited: Apr 20, 2024
  13. Choosename

    Choosename Platinum Record

    Joined:
    Nov 24, 2023
    Messages:
    422
    Likes Received:
    164
    What most people won't understand is that warez are the justice guys, and the sinners are others spyware, randsome attacks, phising.
    But for the common people they are so afraid, installing antivirus, that they will buy the argument that most of the "bad" actors come from installing a non legit copy of Microsoft Office, and put everyone on the same bucket.:dont:
     
  14. saccamano

    saccamano Rock Star

    Joined:
    Mar 26, 2023
    Messages:
    905
    Likes Received:
    348
    Location:
    uranus
    Agreed. :like:

    I would include in this group ALL of those who participate in the money making off warez themselves.
    - the "ffs" who force payment (or piece of shit slow DL's)
    - those who force the use of such POS "ffs" who force payment with POS slow DL's or forcing disabling of VPN
    - those who outright "sell" warez for direct profit
     
  15. Zenarcist

    Zenarcist Audiosexual

    Joined:
    Jan 1, 2012
    Messages:
    3,946
    Likes Received:
    2,517
    Location:
    Planet Earth
    I block everything except my chosen browser. All other requests are reviewed and temporary access is only granted when needed.
     
    Last edited: Apr 21, 2024
Loading...
Similar Threads - Malware Spyware Network Forum Date
Antimalware Service Executable in windows 11 pro PC Apr 14, 2024
Sdx Can sdx, crack libraries have malware? Software Dec 9, 2023
Malware? Lounge Nov 7, 2023
malware scare Mac / Hackintosh Sep 13, 2022
Mac users Attention: OSX.Birdminer Malware Alert Mac / Hackintosh Jul 18, 2022
Loading...