|
Nothing one would think; pictures cannot contain links. And yes, great way to prevent your mail from being checked on keywords.
So, I'd guess that the entire picture points to the same link
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
If you pay me $3.995 I will make sure that you receive no such crap ever. Pay me before midnight EST and you will get a $1.000 refund and a free bumper sticker:
I SAY NO TO SCAMMERS !
Life is too shor
|
|
|
|
|
I am willing to do this same work for only $7,995 USD and I guarantee a larger refund of $1,500 and bumper sticker plus a small yard sign.
|
|
|
|
|
According to the email (image), they have given you at least four opportunities to have a bad day.
|
|
|
|
|
Reminds me of something about 22 years ago, on a Unix terminal at a University:
A mischievous student had written a program which looked exactly like the login screen; when someone logged in, it would capture the username and password, and store them secretly, then give a 'wrong username/password' error message, and then display the actual login screen. The student would think that he had initially entered the password wrongly.
It was heard that writing such a program on a Unix terminal really required a very good knowledge of Unix internals, and we also heard that this student was dismissed from the University, and immediately hired by a computer security company.
Faintly remember that this is termed as masquerading.
|
|
|
|
|
Overnight spAmazon sent no fewer than 3 identical emails nagging me to update the CC I am using for my single Subscribe and Save order (a program that lets me get something sent at a fixed interval in turn for a discount - presumably because it lets them use cheaper shipping) because it will expire at the end of next month. 3 emails on the same subject in <6 hours would be excessive in any case; but adding extra elephants to the fail is that the card in question is an Amazon rewards card; and the bank behind it hasn't sent me a new card yet.
Based on past experience with the bank, I expect to get the new card in a few weeks. OTOH the timing of when this card was scheduled to expire is strongly suggestive that it was motivated by the first phase deadline for switching over to a chip card; which means that any snafu in that pipeline could delay it.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Yesterday spAmazon made me walk 5 miles to receive my package, and I got two identical emails (along with promotions as usual) stating the delay.
Beauty cannot be defined by abscissas and ordinates; neither are circles and ellipses created by their geometrical formulas.
Carl von Clausewitz
Source
|
|
|
|
|
Today Amazon had the postperson hand me a brand new waterproof hat a full 3 days ahead of the expected delivery date.
|
|
|
|
|
|
Muharrem B. wrote: Do you use it? No, haven't used a scanner in 10 years. Haven't had a virus either.
Muharrem B. wrote: Does it work? If you are the type that runs code without knowing what it does, open executables, then yes, it works "most of the time".
For companies it is different; they'll need to have one. Especially large companies would come under fire if they lost all their data over an old and outdated virus. And in large companies there is always a manager that opens the executable.
Always.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Eddy Vluggen wrote: Haven't had a virus either.
As far as you know.
|
|
|
|
|
Let me rephrase; there is no process running without my knowledge, and any communication is logged (using WinPCap).
Virusses require resources and rights to spread
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Eddy Vluggen wrote: there is no process running without my knowledge As far as we know our computer has never had an undetected error!
|
|
|
|
|
Not the same;
You cannot guarantee no one is in the house if you don't know what windows are open, which doors are locked - but if you close all, then someone would have to tear down a wall to get in there.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
There's this movie, I forgot which one, but these guys are trying to rob a bank or something.
The crooks use your reasoning so their solution, make sure they're already inside when all doors and windows get locked.
The next morning, when everything opens up, they simply walk out with the loot
|
|
|
|
|
The equivalent thereof would be to have my installation medium infected; something rather uncommon.
Yes, we've had an original Win95-CD that was infected once - but the chance of an infection is kinda "low"; at that point a scanner hardly helps, there is never a 100% guarantee
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Eddy Vluggen wrote: there is never a 100% guarantee This is the life we chose, the life we lead. And there is only one guarantee: none of us will see heaven their computer completely free of unwanted sh*t
|
|
|
|
|
Spoiler alert:
"Inside Man"
|
|
|
|
|
Does the house even exist if you're not there though?
How do you know so much about swallows? Well, you have to know these things when you're a king, you know.
modified 31-Aug-21 21:01pm.
|
|
|
|
|
Eddy Vluggen wrote: And in large ALL companies there is always a manager that opens the executable.
FTFY
|
|
|
|
|
Eddy Vluggen wrote: No, haven't used a scanner in 10 years. Haven't had a virus either.
Yeah, I never crashed my car, but I will always use my seatbelt. Better safe than sorry.
To alcohol! The cause of, and solution to, all of life's problems - Homer Simpson
Our heads are round so our thoughts can change direction - Francis Picabia
|
|
|
|
|
AV is not a seatbelt, we already established that.
You wait until you are infected; your choice, your consequences. I prefer not to get infected at all.
This is where the thread ends, as it is useless to repeat the same statements
--edit
I was not paying enough attention, I assumed I was replying to the car-thread.
Go ask your doctor; is it better to check for STD's once a week, or is it safer to not have unsafe sex? Neither is a guarantee; but which would feel as "safe", and which as "sorry"?
If you are already infected, then the AV results might not be very trustworthy.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Eddy Vluggen wrote: AV is not a seatbelt, we already established that.
I never said it was, we're talking about an analogy.
Eddy Vluggen wrote: Go ask your doctor; is it better to check for STD's once a week, or is it safer to not have unsafe sex? Neither is a guarantee; but which would feel as "safe", and which as "sorry"?
Agree, but as in my analogy, it's not because you drive safe that you're free from suffering an accident, the same way as browsing safe does not free you from suffering an attack. The AV seatbelt acts like an antivirus, to save you from situations you cannot control. You can't possibly think you can control all scenarios. You can get infected even for browsing here on code project, which could have been targeted with a silent attack by hackers which explores a 0day flaw on the browser javascript engine.
As with the seatbelt, you have much better chances of survival if use an AV.
Eddy Vluggen wrote: If you are already infected, then the AV results might not be very trustworthy.
That's why it's the first thing I do when I setup an OS. And the seatbelt is the first thing I take care of when I get in my car. It's not guarantee but surely makes it safer.
To alcohol! The cause of, and solution to, all of life's problems - Homer Simpson
Our heads are round so our thoughts can change direction - Francis Picabia
modified 2-Sep-15 13:05pm.
|
|
|
|
|
Fabio Franco wrote: I never said it was, we're talking about an analogy. No, the seatbelt is not an analogy for an antivirus. The browser is merely one point of entry, and I do not consider a browser-toolbar a virus. It may be malware, but it does not replicate and infect files; it will not propagate over the network.
Fabio Franco wrote: it's not because you drive safe that you're free from suffering an accident, the
same way as browsing safe does not free you from suffering an attack. The seatbelt is protection that only helps once things have already gone wrong; you could be dead and wearing the seatbelt.
Fabio Franco wrote: As with the seatbelt, you have much better chances of survival if use an AV. Even more if you install five different products. Still, you're already in an accident. What you are proposing is damage control.
Fabio Franco wrote: You can't possibly think you can control all scenarios I never claimed I did; nor can the AV claim the same thing. To be fair, I added the claim at the end of this post.
Fabio Franco wrote: could have been targeted with a silent attack by hackers which explores a 0day
flaw Most virusses are not based on new exploits. Don't need to, most machines aren't that up to date either, and the most commonly targetted is not the system, but the user - there is your prime vulnerability. The bluddy manager that simply has to open the "Pamela.exe" attachment.
As for the AV, most of them can be killed from code. Meaning that if you need to invoke your seatbelt, you will feel the Windows. Now try running the restore-command on the infected and half-corrupted backup.
Fabio Franco wrote: with a silent attack by hackers Most virusses operate autonomous, and are not specifically designed by a hacker for a single target. Hackers and virii are different things, with different attack vectors.
Now, I said that there is never a 100% guarantee; but in all arrogance, I don't need to think of every scenario, I can prevent some scenario's altogether. Protecting a network is quite different from writing an AV and catering for every possible version of Windows out there, with different service packs and various levels of patching. If you want the 100% guarantee it will become rather expensive though; means checking a whole lotta code before we can compile a kernel, and means that all cables will be superglued to the system to prevent stuff from coming in or going out.
My first infection was BGS9, still have it on disk but I don't have any hardware that still supports it. What was yours?
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Eddy Vluggen wrote: I do not consider a browser-toolbar a virus.
Remote execution from a javascript vulnerability of your browser can infect you with a virus. The javascript attack takes advantage of the browser privileges to inject a virus into an executable, therefore infecting the target machine.
Eddy Vluggen wrote: The seatbelt is protection that only helps once things have already gone wrong; you could be dead and wearing the seatbelt.
Yes, the same as if you navigated to a site that was target of an attack (and didn't know it) the damage is done, you already got screwed. If you have an AV it may and it may not prevent your infection. If you use a seatbelt it may or may not prevent your death. Odds are... I don't need to explain.
Eddy Vluggen wrote: Most virusses are not based on new exploits. Don't need to, most machines aren't that up to date either, and the most commonly targetted is not the system, but the user - there is your prime vulnerability. The bluddy manager that simply has to open the "Pamela.exe" attachment.
Of course, but are not limited to. That's where driving safe and browsing safe comes in.
Eddy Vluggen wrote: As for the AV, most of them can be killed from code. Meaning that if you need to invoke your seatbelt, you will feel the Windows. Now try running the restore-command on the infected and half-corrupted backup.
Not really, they require elevated privileges to be killed, which most attacks don't originally have. If it's from a browser, it does not have elevated priviliges, if its from an executable, it will require your permission. In this case, the Pamela.exe fits pretty well. But still, they are caught before they get to execute code, if their signature is identified.
My point is, for us that are tech savvy, are still vulnerable to non trivial attacks and even good drivers are vulnerable to accidents. We use protection to minimize the damage. I lost a couple of friends because they fail to acknowledge of the importance of the seatbelt. And to me the AV is important to safeguard our digital property. Does it mean that all the friends I have will die for not using a seatbelt? No, bu to me it's just plain negligent to not use one. As it is not to use an AV.
Eddy Vluggen wrote: Now, I said that there is never a 100% guarantee;
Nothing is 100%
Eddy Vluggen wrote: My first infection was BGS9, still have it on disk but I don't have any hardware that still supports it. What was yours?
I can't possibly remember the virus' name, I was too young (about 10 years old). I remember the sound it played when I executed the file in a 5 1/4 floppy disk on MS DOS. It played some watery sound (yes, I had a sound card on my 33MHz x286) outputted some joke text on the screen, then everytime I would boot to DOS it would play again then return to the command line. All other executable files did the same. That was over 20 years ago.
To alcohol! The cause of, and solution to, all of life's problems - Homer Simpson
Our heads are round so our thoughts can change direction - Francis Picabia
|
|
|
|
|