You are viewing our Forum Archives. To view or take place in current topics click here.
#41. Posted:
imagine-
  • Prospect
Status: Offline
Joined: Aug 26, 20149Year Member
Posts: 671
Reputation Power: 53
Status: Offline
Joined: Aug 26, 20149Year Member
Posts: 671
Reputation Power: 53
Aha i have pictures of my gopro.
[ Register or Signin to view external links. ]
#42. Posted:
Bru
  • Winter 2020
Status: Offline
Joined: Jul 08, 201211Year Member
Posts: 2,772
Reputation Power: 228
Status: Offline
Joined: Jul 08, 201211Year Member
Posts: 2,772
Reputation Power: 228
Mine is...

[ Register or Signin to view external links. ]
#43. Posted:
Nord
  • Resident Elite
Status: Offline
Joined: Dec 27, 201310Year Member
Posts: 289
Reputation Power: 16
Status: Offline
Joined: Dec 27, 201310Year Member
Posts: 289
Reputation Power: 16
I didn't have anything lol
#44. Posted:
Prohibit
  • TTG Undisputed
Status: Offline
Joined: Oct 24, 201211Year Member
Posts: 5,070
Reputation Power: 346
Status: Offline
Joined: Oct 24, 201211Year Member
Posts: 5,070
Reputation Power: 346
NmdEt2hP

My old password for NGU. I just changed it. I was getting all MW3 map packs free for my Jailbreak PS3.
#45. Posted:
BFF
  • Summer 2019
Status: Offline
Joined: Jan 27, 201311Year Member
Posts: 1,164
Reputation Power: 464
Status: Offline
Joined: Jan 27, 201311Year Member
Posts: 1,164
Reputation Power: 464
2eb055

I think i accodentally copied that :/
#46. Posted:
OtakuBoo
  • Rising Star
Status: Offline
Joined: Jul 08, 20149Year Member
Posts: 733
Reputation Power: 33
Status: Offline
Joined: Jul 08, 20149Year Member
Posts: 733
Reputation Power: 33
[ Register or Signin to view external links. ]

This is a great song.
#47. Posted:
Hizzy
  • Prospect
Status: Offline
Joined: Sep 20, 201013Year Member
Posts: 635
Reputation Power: 42
Status: Offline
Joined: Sep 20, 201013Year Member
Posts: 635
Reputation Power: 42
[ Register or Signin to view external links. ]


Haha its a war gif.
#48. Posted:
SprinxzDvar
  • Resident Elite
Status: Offline
Joined: May 23, 201212Year Member
Posts: 224
Reputation Power: 8
Status: Offline
Joined: May 23, 201212Year Member
Posts: 224
Reputation Power: 8
haha, just paste a new tutorial about R.A.T virusses. here it is:

What is a RAT (remote access Trojan)?
A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. Once the host system is compromised, the intruder may use it to distribute RATs to other vulnerable computers and establish a botnet.

Because a RAT enables administrative control, it makes it possible for the intruder to do just about anything on the targeted computer, including:

Monitoring user behavior through keyloggers or other spyware.
Accessing confidential information, such as credit card and social security numbers.
Activating a system's webcam and recording video.
Taking screenshots.
Distributing viruses and other malware.
Formatting drives.
Deleting, downloading or altering files and file systems.
The Back Orifice rootkit is one of the best known examples of a RAT. A hacker group known as the Cult of the Dead Cow created Back Orifice to expose the security deficiencies of Microsoft's Windows operating systems.

RATs can be difficult to detect because they usually don't show up in lists of running programs or tasks. The actions they perform can be similar to those of legitimate programs. Furthermore, an intruder will often manage the level of resource use so that a drop in performance doesn't alert the user that something's amiss.

To protect your system from RATs, follow the same procedures you use to prevent other malware infections: Keep antivirus software up to date and refrain from downloading programs or opening attachments that aren't from a trusted source. At the administrative level, it's always a good idea to block unused ports, turn off unused services and monitor outgoing traffic.


Types of RATs

The most popular RATs, such as Back Orifice or SubSeven, are all-in-one intruder toolshops that do everythingcapture screen, sound, and video content. These Trojans are key loggers, remote controllers, FTP servers, HTTP servers, Telnet servers, and password finders. Intruders can configure the IP port the RATs listen on, how the RATs execute, and whether the RATs contact the originator by using email, Internet Relay Chat (IRC), or another chat mechanism. The more malicious RATs contain rogue mechanisms that hide the Trojans from prying eyes, encrypt communications, and contain professional-looking APIs so that other intruder developers can insert additional functionality. These RATs' aggressive functionality makes them largeroften 100KB to 300KBand somewhat riskier for the intruder to install without anyone noticing.
Intruders intentionally keep limited-function Trojans small (10KB to 30KB) so that they can quickly activate the programs without being noticed. These Trojans often function as keystroke loggers, storing each keystroke the exploited user makes in a hidden file that the intruder can download remotely and analyze later. Other Trojans install themselves as FTP, Web, or chat servers and steal computing resources. Intruders use some small RATs solely to secure the hard-to-get initial remote access to a host so that they can later upload and install a larger, more powerful RAT at a time when they are less likely to get noticed.
Type the keywords Remote Access Trojan into any Internet search engine. When you do, you'll find hundreds of RATsso many that most Trojan Web sites sort them alphabetically, with dozens to more than a hundred per alphabetic letter. Let's take a brief look at two of the most popular RATs: Back Orifice and SubSeven.

How to get rid of a R.A.T?

1. First you need to ensure you have a decent antivirus (free ones are fine)
#Good free AV options (that won't slow down your PC)
BitDefender Free
Ad-Aware AntiVirus Free
Microsoft Security Essentials

[ Register or Signin to view external links. ] .
[ Register or Signin to view external links. ] .
[ Register or Signin to view external links. ] .

2. You will need a malware scanner (slightly different. Does not provide real-time protection, but has high detection rates when scanned manually)
#Hitman Pro uses 3 different top antivirus scannign engines for excellent detection rates. It will identify infections, but will not remove them unless registered.
#MalwareBytes on the other hand is totally free for home users.

[ Register or Signin to view external links. ]
[ Register or Signin to view external links. ] .

3. Run a rootkit scanner to detect malicious registry settings.
MalwareBytes Anti-Rootkit
RogueKiller

[ Register or Signin to view external links. ] .
[ Register or Signin to view external links. ] .

If it will make things easier, I would recommend using the following apps, (Links provided above)

I would recommend
BitDefender Free AV
(Install Bitdefender if you don't already have one of the following antiviruses; Emsisoft AV, F-Secure AV, BitDefender AV, GData AV or Kaspersky AV)
MalwareBytes Anti-Malware
MalwareBytes Anti-Rootkit

Once installed, install and scan using each of these apps. This should detect any infections and allow you to remove them.
#49. Posted:
-Edits
  • 2 Million
Status: Offline
Joined: May 19, 201410Year Member
Posts: 221
Reputation Power: 8
Status: Offline
Joined: May 19, 201410Year Member
Posts: 221
Reputation Power: 8
[ Register or Signin to view external links. ]

Really crappy edit i did hahaha.
#50. Posted:
TheTeamPath
  • New Member
Status: Offline
Joined: Oct 16, 20149Year Member
Posts: 21
Reputation Power: 1
Status: Offline
Joined: Oct 16, 20149Year Member
Posts: 21
Reputation Power: 1
Okay, this is a persons Skype so don't add him over my behalf.
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.