home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.os.linux.mint      Looks pretty on the outside, thats it!      30,566 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 30,254 of 30,566   
   Rod Speed to Paul   
   Re: Widows 11 on the nose   
   20 Jan 26 18:45:11   
   
   XPost: aus.computers   
   From: rod.speed.aaa@gmail.com   
      
   Paul  wrote   
   > Rod Speed wrote   
   >> Petzl  wrote   
      
   >>> I researched Chinese military Strategy   
   >>> Often goes missing from WIN11 note pad?   
      
   >> More of your utterly mindless bullshit   
      
   > I would think there is an active exploit of some sort   
   > on the machine.   
      
   Much more likely the pretzel has been fucking with the system, again   
      
   > It may have come in with a Chinese dictionary   
   > application, a Chinese translation application,something  along those   
   > lines.   
      
   > You could write something naughty about Bill Gates in Notepad,   
   > and nobody from Microsoft reaches in and edits that. But I understand   
   > the Chinese like to censure what people write about them.   
      
   Sure, but he isnt writing about them. just   
   saving what others have written about them   
      
   > And it doesn't have to be done "by" Notepad. The exploit code,   
   > could register to listen to the USN Journal, and any time a .txt   
   > file changes size, the exploit code could read it and make changes.   
      
   > What I sometimes do, is put the Date & Time control panel up on the   
   > screen, record video of the screen, and then later, check the date   
   > stamp on something. And compare the time recorded when I clicked   
   > Save on a document (in the recorded video), versus the time stamp   
   > recorded elsewhere. As a means to detect when a thing might have   
   > occurred or when it actually did occur. I use this approach for zeroing   
   > in on Process Monitor traces and finding the most likely portion of the   
   > trace that needs line by line analysis.   
      
   > But if an exploit is "RootKit class", it can have any number of   
   > "hiding features" that prevent casual analysis. RootKits fell out of   
   > favor with the Black Hats, but that's because it wasn't necessary   
   > for their "profit motives". But unfortunately, not all exploits   
   > on a computer are for financial gain, and there could still be   
   > the odd RootKit around for "watching" somebody. A dissident was drowned   
   > here, and he received a "warning" while being swamped in his kayak by   
   > a passing yacht. The next time he (stupidly) was back out with his   
   > kayak again (after having "received the warning"), he was next located   
   > drowned. That's the reach of your opponent, in case you might wonder   
   > would they travel to another country and "do shit".   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca