|
Register | FAQ | The Twelve Commandments | Members List | Calendar | Arcade | Find the Best VPN | Today's Posts | Search |
General P2P Network Discussion For general discussion about peer-to-peer networks. |
Welcome To Gnutella Forums You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content, fun aspects such as the image caption contest and play in the arcade, and access many other special features after your registration and email confirmation. Registration is fast, simple and absolutely free so please, join our community today! (click here) (Note: we use Yandex mail server so make sure yandex is not on your email filter or blocklist.) Confirmation emails might be found in your Junk folder, especially for Yahoo or GMail. If you have any problems with the Gnutella Forum registration process or your Gnutella Forum account login, please contact us (this is not for program use questions.) Your email address must be legitimate and verified before becoming a full member of the forums. Please be sure to disable any spam filters you may have for our website, so that email messages can reach you. Note: Any other issue with registration, etc., send a Personal Message (PM) to one of the active Administrators: Lord of the Rings or Birdy. Once registered but before posting, members MUST READ the FORUM RULES (click here) and members should include System details - help us to help you (click on blue link) in their posts if their problem relates to using the program. Whilst forum helpers are happy to help where they can, without these system details your post might be ignored. And wise to read How to create a New Thread Thank you If you are a Spammer click here. This is not a business advertising forum, all member profiles with business advertising will be banned, all their posts removed. Spamming is illegal in many countries of the world. Guests and search engines cannot view member profiles. Deutsch? Español? Français? Nederlands? Hilfe in Deutsch, Ayuda en español, Aide en français et LimeWire en français, Hulp in het Nederlands Forum Rules Support Forums Before you post to one of the specific Client Help and Support Conferences in Gnutella Client Forums please look through other threads and Stickies that may answer your questions. Most problems are not new. The Search function is most useful. Also the red Stickies have answers to the most commonly asked questions. (over 90 percent). If your problem is not resolved by a search of the forums, please take the next step and post in the appropriate forum. There are many members who will be glad to help. If you are new to the world of file sharing please do not be shy! Everyone was ‘new’ when they first started. When posting, please include details for: Your Operating System ....... Your version of your Gnutella Client (* this is important for helping solve problems) ....... Your Internet connection (56K, Cable, DSL) ....... The exact error message, if one pops up Any other relevant information that you think may help ....... Try to make your post descriptive, specific, and clear so members can quickly and efficiently help you. To aid helpers in solving download/upload problems, LimeWire and Frostwire users must specify whether they are downloading a torrent file or a file from the Gnutella network. Members need to supply these details >>> System details - help us to help you (click on blue link) Moderators There are senior members on the forums who serve as Moderators. These volunteers keep the board organized and moving. Moderators are authorized to: (in order of increasing severity) Move posts to the correct forums. Many times, members post in the wrong forum. These off-topic posts may impede the normal operation of the forum. Edit posts. Moderators will edit posts that are offensive or break any of the House Rules. Delete posts. Posts that cannot be edited to comply with the House Rules will be deleted. Restrict members. This is one of the last punishments before a member is banned. Restrictions may include placing all new posts in a moderation queue or temporarily banning the offender. Ban members. The most severe punishment. Three or more moderators or administrators must agree to the ban for this action to occur. Banning is reserved for very severe offenses and members who, after many warnings, fail to comply with the House Rules. Banning is permanent. Bans cannot be removed by the moderators and probably won't be removed by the administration. The Rules 1. Warez, copyright violation, or any other illegal activity may NOT be linked or expressed in any form. Topics discussing techniques for violating these laws and messages containing locations of web sites or other servers hosting illegal content will be silently removed. Multiple offenses will result in consequences. File names are not required to discuss your issues. If filenames are copyright then do not belong on these forums & will be edited out or post removed. Picture sample attachments in posts must not include copyright infringement. 2. Spamming and excessive advertising will not be tolerated. Commercial advertising is not allowed in any form, including using in signatures. 3. There will be no excessive use of profanity in any forum. 4. There will be no racial, ethnic, or gender based insults, or any other personal attacks. 5. Pictures may be attached to posts and signatures if they are not sexually explicit or offensive. Picture sample attachments in posts must not include copyright infringement. 6. Remember to post in the correct forum. Take your time to look at other threads and see where your post will go. If your post is placed in the wrong forum it will be moved by a moderator. There are specific Gnutella Client sections for LimeWire, Phex, FrostWire, BearShare, Gnucleus, Morpheus, and many more. Please choose the correct section for your problem. 7. If you see a post in the wrong forum or in violation of the House Rules, please contact a moderator via Private Message or the "Report this post to a moderator" link at the bottom of every post. Please do not respond directly to the member - a moderator will do what is required. 8. Any impersonation of a forum member in any mode of communication is strictly prohibited and will result in banning. 9. Multiple copies of the same post will not be tolerated. Post your question, comment, or complaint only once. There is no need to express yourself more than once. Duplicate posts will be deleted with little or no warning. Keep in mind a forum censor may temporarily automatically hold up your post, if you do not see your post, do not post again, it will be dealt with by a moderator within a reasonable time. Authors of multiple copies of same post may be dealt with by moderators within their discrete judgment at the time which may result in warning or infraction points, depending on severity as adjudged by the moderators online. 10. Posts should have descriptive topics. Vague titles such as "Help!", "Why?", and the like may not get enough attention to the contents. 11. Do not divulge anyone's personal information in the forum, not even your own. This includes e-mail addresses, IP addresses, age, house address, and any other distinguishing information. Don´t use eMail addresses in your nick. Reiterating, do not post your email address in posts. This is for your own protection. 12. Signatures may be used as long as they are not offensive or sexually explicit or used for commercial advertising. Commercial weblinks cannot be used under any circumstances and will result in an immediate ban. 13. Dual accounts are not allowed. Cannot explain this more simply. Attempts to set up dual accounts will most likely result in a banning of all forum accounts. 14. Video links may only be posted after you have a tally of two forum posts. Video link posting with less than a 2 post tally are considered as spam. Video link posting with less than a 2 post tally are considered as spam. 15. Failure to show that you have read the forum rules may result in forum rules breach infraction points or warnings awarded against you which may later total up to an automatic temporary or permanent ban. Supplying system details is a prerequisite in most cases, particularly with connection or installation issues. Violation of any of these rules will bring consequences, determined on a case-by-case basis. Thank You! Thanks for taking the time to read these forum guidelines. We hope your visit is helpful and mutually beneficial to the entire community. |
| LinkBack | Thread Tools | Display Modes |
| |||
KathW beat me to it: Quote:
As for a virus/spyware infecting your computer through an .mp3 thats just a hoax http://www.f-secure.com/hoaxes/mp3vir.shtml If you did get spyware from anything related to mcdonalds it would be from there website wich im betting wasnt the case but I think this thread was just supposed to be a reminder to check for corrupted data and keep the networks clean. |
| |||
Quote:
email.doc _______________.exe (w/out the line of course) where the "exe" exceeds the space alloted for listing the email so is not visable as an exe? |
| ||||
Quote:
Quote:
Last edited by Morgwen; September 20th, 2004 at 12:20 AM. |
| |||
After reading the article re: Sony's depositing a rootkit on its cd's, http://www.sysinternals.com/blog/200...al-rights.html http://lists.webjunction.org/wjlists...er/039005.html doesn't it make paranoia & limiting the scope of transgressions to your own experience just a little naive? They were caught and eventually had to recall the cd's (b4 the recall, the Dave Matthews Band was posting inf on how to find it), but what happens should the next one go unfound? *applause & appreciation to Mark Russovich* . It is a blessing to have a talent which can be used to help others. |
| |||
You can of course infect your computer through any kind of file. Executable files are just the most blatant obvious way. Nonetheless the same is very often possible through pictures, audio files, videos etc. This is especially true on Microsoft Windows because it is the most widely deployed software and there are countless well-known exploits for this platform and its standard applications. Also multimedia software like audio and video players for Linux and other operating systems has frequently serious bugs - actually they are just discovered, they exist all the time - that would allow compromise of your account - and thus likely your complete computer - just by playing an infected audio or video file. Even worse, you can get your system infected by checking a file for viruses because after all the people who program this software are not really any more intelligent than any other programmer. If people only talked about things they had a clue of, this place would be very silent. |
| ||||
McDonald offers = download through Sony software I've seen these McDonald offers in France too. It was clearly stated that this was a free offer to promote the Sony's online music shop. So what you won was a ticket number, with which you coulddownloadthe music fromthe Sony's online music store. But to activate this number, you first needed to accept the EULA for the Sony's downloader kit, and register it with your email address and true name (verified by sending back a confirmation number through your email) which was needed to validate your number. The kit also permanently assigns you a UUID alsoassociated to a personal cookie used in your browser. So, you could download free MP3's, but these MP3s contain watermarked fingerprints with your personal registration number or Sony transaction number encrypted in it. If you later share these MP3s on the net, your digital fingerprint is visible in it.Sony assumes that such a file present on the net is a proof that you have violated their EULA, because such fingerprint uses a strong enough cryptographic algorithm which should be impossible to generate randomly by someone else. But Sony ignores the fact that fingerprinted files may be stolen on user's harddisks by hidden softwares using the same technics that Sony used to install their rootkits. Until it is proven that Windows is reliable for its storage, I don't think that any DRM fingerprint found in a downloaded MP3 file can be used as proof of any EULA violation by users. It can only be used within investigations to detect which users may beviolating EULA, but then the act of counterfeighting still requires other proofs, notably the correlation of other fingerprints and Internet access logs collected by ISPs. But the bad thing is that fingerprints are also inserted within all the legitimate MP3 you create yourself with addons implemented in your player (WMP, RealOne Player, QuickTime/iTunes, WinAmp), and as well in your photos and video made by your camera, or documents created with your favorite office application. These fingerprints, are also correlated externally within undeclared databases each time you send orshare these files legally. Today, third party databases are so powerful things that they can really spy on your whole life: just ask yourself why you start receiving personal adds in your snailmail letterbox just afewdaysafter you have moved to a new location, from merchants you evendid not know before, and you'll seethat new database recordsadded by your bank or post office or phone company or travel agency or cable TV provider (or even public services like health care, tax services) are sold to advertizers. With so much information about you, it's not difficult to correlate many things about new contents on the net. But the dangerous way is now to use these data,often collected without your knowledge or control (whichmay contain errors or incorrect correlations) as evidences for alleged illegal activities. Media companies consider that this type of proof is insufficidently strong to create proofs, sothey want to justify this with even more spying on your daily activities, as if we were not already too much spied often illegally.
__________________ LimeWire is international. Help translate LimeWire to your own language. Visit: http://www.limewire.org/translate.shtml |
| ||||
Quote:
|
| ||||
Quote:
Don't forget that this code may also use data or code embedded within valid image file fragments (even if this part produces some "garbage" on screen if that part of the image was effectively rendered). In addition, you can put this image on amaliciouswebsite whereit is downloaded along with multiple images containing other parts of the exploit code. This code could also be used to remove security restriction settings, that will be used immediately after by an active viral component downloaded from the same malicious page (this active viral component beingnormally blocked by security restrictions). One common target you could perform within 1KB would be to set a domain into the "safe" security zone instead of the internet zone. You can also control the sequencing order for these downloaded component, for example by using delayed HTTP redirects or delayed javascript redirects. With thosetypesofredirect, you have a content bodyto downloadthe first component, and later you'll goto the next page that performs the following action. In all modern attacks, the first steps to viral infection is first to disable the security restrictions that will allow a virus or rootkit to be "trusted" by the host and then install itself without notice.
__________________ LimeWire is international. Help translate LimeWire to your own language. Visit: http://www.limewire.org/translate.shtml Last edited by verdyp; February 12th, 2006 at 05:16 AM. |
| |
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
download music but rather than the song, a link to other "free" dl programs came up | dibennett | Download/Upload Problems | 4 | June 13th, 2006 08:55 AM |
Free 16 song sampler not syncing to iPod | thefoodguy | Open Discussion topics | 1 | February 16th, 2005 03:41 PM |
free amazon gift certificate and free desktop pc from gratis (the free ipod people) | ehd | Open Discussion topics | 1 | September 2nd, 2004 01:21 PM |
Kernel Trap | Lennie | Download/Upload Problems | 0 | December 20th, 2003 09:15 AM |
Is this a trap? | J Hayes | Open Discussion topics | 1 | March 17th, 2003 12:28 PM |