![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
When it rains, it pours
Industry Role:
Join Date: May 2003
Posts: 20,609
|
Another Microsoft exploit, newly found viruses (JAVA_BYTEVER.A/K)
my workstation is fucking slow today, tried updating my virus software and found several new viruses (JAVA_BYTEVER.A, JAVA_BYTEVER.K).
Virus name: JAVA_BYTEVER.A Malware type: Java Applet Aliases: Exploit-ByteVerify, Java.Shinwow.AB, Java/Shinwow.AJ.3592!Trojan, Trojan.ByteVerify, Trojan:Java/Classloader.E Language: English Platform: Windows 95, 98, ME, NT, 2000, XP Encrypted: No Description: This malware is a component of a malicious Java archive file (JAR) that resides in a malicious Web site. Machines infected with the malware JS_FORTNIGHT.B are redirected to this Web site. This malware calls and executes another malware, JAVA_JJBLACK.C, which results in modifications to the browser and registry settings of the infected system. This is Trend Micro's detection for JAVA classes that exploit a known vulnerability in Microsoft Virtual Machine in Windows Operating Systems and Internet Explorer. This flaw allows malicious users to execute codes of his or her choice when a user visits an infected Web site. http://www.trendmicro.com/vinfo/viru...JAVA_BYTEVER.A ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
When it rains, it pours
Industry Role:
Join Date: May 2003
Posts: 20,609
|
tried using "Malicious Software Removal Tool" at microsoft.com and i get this response:
"We are sorry, but the tool did not work properly on your computer. Please try again later, or try downloading the tool directly from the Microsoft.com Download Center. If you cannot get the tool to work, please consult your antivirus vendor for general antivirus assistance." what a fucking joke lol ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Confirmed User
Join Date: Dec 2004
Posts: 100
|
That virus is 2 years old! All because you have it on your computer also doesn't automatically mean you are infected too.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 | |
When it rains, it pours
Industry Role:
Join Date: May 2003
Posts: 20,609
|
Quote:
i wonder if its only me who got infected since I regulary update my virus def and schedule automatic update on a weekly basis. ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 |
I can change this!!!!!
Join Date: Feb 2004
Posts: 18,972
|
well that is no good
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 | |
When it rains, it pours
Industry Role:
Join Date: May 2003
Posts: 20,609
|
Quote:
i should have been protected with this virus eventhough it was 2 yrs. old since i don't miss an update from microsoft. i guess in a way it was still able to sneak into my system.. in what way? that's the big question for me. ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |