BlueCollarPC Passes 8 million vistors

Welcome all, our BlueCollarPC.US (formerly BlueCollarPC.Net) passes the 8 Million Visitors mark!

Our original domain, the BlueCollarPC.Net, had just passed the 6 Million Visitors mark from 2005 until we moved to our present home – the BlueCollarPC.US in 2010. Originally, we started as a spyware information and free removal Commuity Help site in 2005. As malware became even more sophisticated, trojans trojans trojans, botnet infections were increasing and becoming more sophisticated as well.

In response, we simply expanded our site to be the full blown malware information and free removal Community Help Site. The term malware means simply all the catagory threats – both antivirus and antispyware catagories. Traditionally, viruses and worms and most trojans, and then rootkits added, were detected by traditional antivirus. Adware and then various and many spyware pacakages were then in the antispyware catagory of threats and detected, blocked, and removed by same – antispyware products.

So we then transferred our domain to the now BlueCollarPC.US for the new decade with a full emphasis in removal help of botnet infections – the new worst feared infection (massive payloads) surpassing rootkits. The greatest feared malware – rootkits – were unable to run on Windows Vista, but were always a dreaded infection for Windows XP. Now with Windows 8 and the new Secure Boot technology, rootkits are not able to start up and run on Win8. So the great botnet plague is now the worst feared enemy for the community of computer users and including all from Small Business all the way through Corporates etc. These are intensive massive payloads that need much removal diagnosis and help. There is generally always several areas of damage needing repair and resetting. They can even bypass traditional antimalware products if not up on their game – they walk through in seconds like it was not even there!



Webmaster of the BlueCollarPC.US
Former webmaster of BlueCollarPC.Net / BlueCollarPC.Org and BlueCollarPC.Webs.Com. We have moved to www.BlueCollarPC.US for the new decade 2010 ongoing. Data Processor Certificate 1970  (IBM029,Univac026 – Sperry Rand Univac 9200/9300 Series COBAL). Novice to Advanced User to Amatuer Computer Forensics on Windows PC. Advanced Linux User also now.
Location: USA

Welcome to the BlueCollarPC ……    A Community Help Website

BlueCollarPC.US Launched June 14 2010 Personal Website for General Audiences with Computing Safety and Malware Removal Help and Information as main theme which includes memberships available for live help – at our Groups and Forums. Formerly Webmaster of BlueCollarPC.Net from 2005 -2009 (over 6 million Visitors) and back up BlueCollarPC.Org [closed]

Welcome to the www.BlueCollarPC.US We Thank You for choosing us as your additional Computing Security destination !

For the record….. I began the BlueCollarPC Computing Security Community Website in 2005 at the original .Net website. I believe at that time, the .Com website was actually a PC Repair Shop which I was not connected with. Towards the end of 2009, the BlueCollarPC .Net created by me had enjoyed just over 6 Million Vistors/Users! – and are proud to have helped and indeed actually had “discovery” in the security industry concerning the malware RASautodial registry entries discovered by Yours Truly. Never be afraid to ‘take a look under the hood’ of your PC ! You never know what you’ll find.


How And Where To Report Cyber Crime

Internet Crime Complaint Center (IC3)
The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). IC3′s mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 provides a central referral mechanism for complaints involving Internet related crimes. read more >>

Federal Trade Commission (USA) Complaint Input Form$.startup?Z_ORG_CODE=PU03
If you believe you have been the victim of identity theft, you may use the form below to send a complaint to the Federal Trade Commission (FTC). The information you provide is up to you. However, if you don’t provide your name or other information, it may be impossible for us to refer, respond to, or investigate your complaint or request. To learn how we use the information you provide, please read our Privacy Policy.

Federal Bureau of Investigation – Cyber Investigations – Cybercrime

Computer Crime & Intellectual Property Section

Our Cyber911 Help tipline is not intended to replace law enforcement emergency 911, 999 and other numbers worldwide. It is to help people know where to get help when they are being victimized online, and to provide help when help is needed. We work closely with law enforcement around the world, and require that when offline threats are involved that local law enforcement be notified before we can offer assistance to the victim or their local law enforcement…

ReportCybercrime.Com (Private)
Also, through our interactive forum you can get opinion of specialist attorneys and lawyers. Each lawyer in practice will give his opinion on matters, which are raised in the forum. You Can post queries view answers from experts and improve upon your knowledge base…

How to Report Cybercrime
WiredSafety’s Cyber911 Emergency tipline is not intended to replace law enforcement emergency 911, 999 and other numbers worldwide. It is to help people know where to get help when they are being victimized online, and to provide help when help is needed. We work closely with law enforcement around the world, and require that when offline threats are involved that local law enforcement be notified before we can offer assistance to the victim or their local law enforcement.

Take a Bite Out of Cyber Crime

Security product vendors
Links to developers and vendors of computer and network security products and services…

AEC (Trustport)
AVG (formerly Grisoft)
Agnitum (Outpost)
AhnLab (V3Net)
Aladdin (eSafe)
Alwil Software (avast!)
ArcaBit (ArcaVir)
Authentium (Command)
Avira (AntiVir)
BitDefender (formerly Softwin)
CA (Corporate)
CA (Home user)
Central Command (Vexira)
Check Point (ZoneAlarm)
ClamAV (open source)
Comodo (BOClean)
Cybersoft (VFind/VTSK)
Doctor Web
ESET (Nod32)
Filseclab (Twister)
Frisk Software (F-PROT)
HAURI (ViRobot)
IBM ISS (Proventia)
Intego (Mac specialist)
K7 Computing
Kaspersky Lab
Lavasoft (AdAware)
McAfee, Inc. (formerly Network Associates)
MicroWorld Software (eScan)
Microsoft (Forefront)
Microsoft (OneCare)
Moon Secure (open source AV for Windows project)
New Technology Wave Inc. (VirusChaser)
Norman Data Defense Systems
PC Tools (Spyware Doctor)
Panda Software
Per Systems
Proland Software (Protector Plus)
ProtectMac (Mac specialist)
Quick Heal Technologies
SecureMac (MacScan)
SpyBot – Search & Destroy
Sunbelt Software (CounterSpy, Vipre)
Symantec Corporation (Norton)
Trend Micro Inc.
VirusBlokAda (VBA32)
VirusBuster Ltd.
Webroot (Spy Sweeper)
eEye Digital Security (Blink)


Welcome all, archived blog installed

Welcome all, archived blog installed….. We have imported our archived blog posts from our original BlueCollarPC @ WordPress security blog. This is located at

We will keep the free version and continue to post to it, as has been linked for years. I am the original webmaster of the BlueCollarPC .Net and .Org and lastly .US . The BlueCollarPC .Net originally began about year 2005 as a help and information site dealing with spyware as main course. There were many video help tutorials for download in several formats. This became a huge site trafficking about 2,700 to 3,000 Visitors monthly, and tolled in at just over 6 million by 2009. Those kinds of numbers are usually seen at small business sites, but I had just a simple personal website !

Being able to help that many people who found our site as a primary or a main additional site for help and instruction in PC security and malware removal outweighed any personal pride or egotism in hits counters. That is what it was launched for, genuine informed help – not a personality contest. It was humbling to see those kinds of numbers though.

Push come to shove, our site was attacked and there were several behind the scenes personal attacks against myself and equipment – attempts at destroying computers and mobile computer. These attacks were sophisticated dreaded botnet payload attacks and another as attempting circumventing Vista technology and destruction. So, my site theme being “BlueCollarPC” as a spyware removal  site originally, now was upgraded to a full blown malware removal help and instruction site – all malware with heavy concentration into botnet detection and removal and restoration of damaged systems and I graduated through this all into Amateur Forensics (Computer Forensics). What did not kill us makes us stronger, and so it goes. All but the BlueCollarPC .US were closed with this new full malware removal site including information and help against all malware now as viruses, worms, trojans, rootkits, adware, spyware, botnets and bootkits. etc etc etc.

At the end of the decade (2000 to 2010) and into the new one, things seemed to be a ghost town at many help destinations as groups, forums, and lists, others. It seemed the whole “XP Generation” of  the “XP Years” (Windows XP) had graduated and learned it all or enough to carry them through. Of course I invested into a Vista PC which was the actual crown jewel of the decade in security software – unprecedented as an operating system itself being the best security software available. To this day Windows Users are unaware that viruses could not run on Vista and neither the dreaded rootkit malware. UAC User Account Control was just one of these new security technologies in Vista. First hand, no lie, two or three times I saw a virus execute to install on my Vista (drive by hit – bad website, tried to install scareware fake antivirus programs). Sure enough and word for word from Microsoft – “viruses are not able to write to the disk in Vista”. They the payloads were in Temporary Internet Files. All I had to do was close the browser with the settings I had clicked to “Delete All Temporary Internet Files” etc. I also use and ran CCleaner offering a little more clean up. That was it. The virus was gone ! I then scanned with high quality antimalware to prove it. Zero infection. The point  was, or joke, you did not even need antivirus with Vista – like “you’re kidding, you actually purchased antivirus for Vista ? What for ? ” Seeing is believing.

Windows 7 was the first time in history an operating system (Windows, Linux, Apple/Mac etc) was actually downgraded security wise. Users screamed about UAC. The security world kind of went with – what idiots, sorry to say. This did not make sense. It did not make sense worst, that Microsoft themselves accomadated them. LOL. You get what you pay for. They seemed to love no intrusion whatsoever on having a good time on the Net – utterly regardless of the dangers. It was like handing drunk teenagers the keys to the sports car. We all know how that ended. Many never made it home.

Enter Windows 8 with the new anti-rootkit / anti-bootkit technologies – the ‘secure boot’ Windows 8. Windows 8 is a gigantic leap forward from XP as blocking rootkits/bootkits from running before antimalware programs are able to boot to begin detecting malware attempting to run in the session. With XP, we all know if a rootkit was suspected it meant reinstalling Windows as the ONLY cure. The trouble was most anti-rootkit softwares were crap at detecting them and even worst at attempting to remove them. Enter Windows 8 new security technologies. THOSE DAYS are over with forever. Just before Windows 8 hit the streets there was hint at they could crack this. But as well there is new anti-malware softwares that can “cold boot” to detect this. Somewhat as being able to scan the system without even starting the computer and as it does start up. Bye bye, covered anyway.

Well back to re-launching BlueCollarPC.US – now in the WordPress format rather than the traditional website. Kind of all in one – blog and content, links. Spread the word – “We are back !” (StarTrekkies – Romulans and Enterprise Captain Picard in the Neutral Zone Confontation over Borg encroachments).

From our alternate back up website at

Welcome to the BlueCollarPC Security Helper!
SPECIAL NOTE: Our Main Domain BlueCollarPC.US is being closed June 2012.
For the record….. I began the BlueCollarPC Computing Security Community Website in 2005 at the original .Net website. I believe at that time, the .Com website was actually a PC Repair Shop which I was not connected with. Towards the end of 2009, the BlueCollarPC .Net created by me had enjoyed just over 6 Million Vistors/Users! – are proud to have been a part of it all and indeed actually had “discovery” in the security industry concerning the malware RASautodial registry entries discovered by Yours Truly. Never be afraid to ‘take a look under the hood’ of your PC ! You never know what you’ll find.

Unbelievable! – Windows 8 Boot Security Cracked already before released (Bootkit malware)

Unbelievable! – Windows 8 Boot Security Cracked already before released (Bootkit malware)

Windows 8 Boot Security Cracked
By Antone Gonsalves, CRN
An Austrian security analyst has built the first known bootkit that bypasses Windows 8’s defenses against installing malware while the operating system is booting.
Peter Kleissner, an independent programmer and recognized …;jsessionid=NZjzL4QedChUWf+VUz6Tyg**.ecappj02

We can expect Windows 8 to be launched sometime in mid-late 2012, however, it’s too early to predict the Windows 8 release date, since it is still under development. Nevertheless, the only question that haunts each and every one of us – Will Windows 8 win the battle against Apple which it had lost several years back? SOURCE

A kernel-mode rootkit variant called a bootkit is used predominantly to attack full disk encryption systems, for example as in the “Evil Maid Attack”, in which a bootkit replaces the legitimate boot loader with one controlled by an attacker; typically the malware loader persists through the transition to protected mode when the kernel has loaded.[35][36][37][38] For example, the “Stoned Bootkit” subverts the system by using a compromised boot loader to intercept encryption keys and passwords.[39] More recently, the Alureon rootkit has successfully subverted the requirement for 64-bit kernel-mode driver signing in Windows 7 by modifying the master boot record.[40]

The only known defenses against bootkit attacks are the prevention of unauthorized physical access to the system—a problem for portable computers—or the use of a Trusted Platform Module configured to protect the boot path.[41]
Windows 8 Spells Trouble for Linux, Hackintosh Users and Malware Victims
Windows 8 won’t dual-boot Linux?
Microsoft, Red Hat Spar Over Secure Boot-loading Tech
Windows 8 Dual Boot Possible If ‘Secure Boot’ Disabled
How to change the boot order of a dual-boot Linux PC
Linux Licensing in Conflict with Secure Boot Support
FSF warns of Windows 8 Secure Boot (Sign Petition)
Linux Foundation, Canonical and Red Hat Weigh In On Secure Boot
The right to dual-boot: Linux groups plead case prior to Windows 8
Linux Foundation: Secure Boot Need Not Be a Problem
Linux Community Offers Secure Boot Ideas
Leading PC makers confirm: no Windows 8 plot to lock out Linux
Linux Advocates protest ‘Designed for Windows 8’ secure boot policy
Linux Community Counters Microsoft’s Windows 8 Secure Boot Mandate

Webmaster/malware removal help
Membership/Join List:
Free Malware Removal Help / A Community Website Since 2005

Dishonest Windows Product Bashing By Linux Users Hurts Themselves, Others

Dishonest Windows Product Bashing By Linux Users Hurts Themselves, Others

The following is actually a summed up response to this type of activity that has pissed us off for years. I have finally pursued a suspected instance, a real incident actually, and gave intelligent somewhat lengthy informed repsonse to these ongoing users and their deceitful posts and portayed a main portion here as example for making Informed Decisions in Computing Security and EXPOSING dishonest Product Bashers to give that FALSE SENSE OF SECURITY to computer users everywhere. 

Help end it, compose your own in advance ! Make your own type Form Reply to save the anguishing time it takes with them (generally they are intentional and have been around for at least five years almost everywhere on the Net. Sickening. They have made soooo many sick ! SEE Vista Bashing as another prime example. These are the same using Linux, Apple/Mac, and Firefox with all the same product bashing lies and misinformation. It must be determined if they are plain ignorant of the truth or intentionally being so miserable as unfaithful to the community of computer users worldwide. Remember dishonest Product Bashing is generally always against Group Rules in any respectable group/list.




Well and back to you….. I must say either you are very uninformed in Security or either than you are an intentional “product basher”. I will not go further but to explain my statement….

Your proponent is your advice of the Linux alternative to all this and here…. (quoted)
<<<If we assist them in living in the delusion that they are in a safe environment, then we do them no favors.>>>
…. is you doing exactly that. I remind you that Linux and Firefox have both been legally listed as riskware in official legal reports not too long ago, and have corrected greatly. Windows has never been listed as riskware. Internet Explorer is rated as the safest browser worldwide since Version 8 and including newer version 9. Microsoft Internet Explorer is part of the Windows Operating System and ergo has already been rated as secure and stable so it goes as being the ONLY browser worldwide to ever achieve “Unix Certification” because Microsoft Windows has been the only Operating System to achieve “Unix Certification” and therefore Internet Explorer being a part of that has been rated that. It is not a separate part of Windows as some add on software or in any bloatware package. It is part of the Windows Operating System. In that Linux has not been able to achieve Unix Certification is just one fact and legally that it is not more safe or more secure than Microsoft Windows – and neither Apple/Mac.

Linux has never denied or disputed these FACTS though you have by offering the alternative in the light of untrue product bashing. Linux speaks for itself. It does not have to lie about other products to make a dishonest buck. I have not known persons involved in Linux to be of such ill repute as one may believe by your promotion of it. You are not promoting Linux but rather dishonesty as false advertising and doing Linux or Windows Users ANY favor at all by your dishonesty or ignorance – as you have not made clear which yet. Ask anyone at Linux in other words and they will say No Thanks we don;t use or need that kind of Product Promotion and neither would we employ such an individual to do so. Linux ezines must stand on their own merit as you must by their posts.

You are spreading a delusion in security by ‘product bashing’ and your facts are less than laughable when examined. This is what “product bashing” generally refers to – based on a foundation of mistruths and open lies. Sometimes it is disallowed at a handful of forums I have noticed and for obvious reasons.

NOT TRUE…. quoted
<<<Here is an example. Someone will find an exploit and announce it publicly so that users will know and expect MS to patch it.>>>
That is illegal. No one may post legally any such code as proof of concept or otherwise that is destructive to networks, equipment, personal or company/corporate computers, etc. on the world wide web for public or private view. My source is a friend who is employed by MalwareBytes.Org in malware research whom I reported to an exact episode of same and was immediately removed from the world web and actions taken by Agencies.

NOT TRUE…. quoted
<<<Then they admit it and say that they are working on a fix. Then they say the fix will be available next patch Tuesday which is two weeks away.>>>
You are OBVIOUSLY product bashing or have made up a COMPLETE FANTASY about Microsoft Windows or are simply completely ignorant of the truth. The vast majority of Windows Users are well aware that through the beginning to mid “XP Years” that Windows Updates were released immediately after testing. This changed a few years ago, to as well accommodate IT on corporate levels, to every Second Tuesday of the month dubbed “Patch Tuesday”. Any CRITICAL or ZERO DAY PATCH/FIX is released IMMEDIATELY as OFFICIALLY called an OUT-OF CYCLE Microsoft Windows Critical Update.

NOT TRUE…..quoted
<<<Those Russian botnets exploit XP machines and while they are doing harm they would not be able to to it as effectively if Microsoft was on the ball.>>>
I just posted correction to your mistruths. The Microsoft “Out Of Cycle” Windows Update immediately patches security holes and/or code hardens. Botnets are not known as primary culprits in these exploits. “Scareware” as term for fake, rogue, pirated rebranded faulty malware infested antimalware products are the primary attackers. The American FBI has listed this as many many many others have. In fact the infamous SpyAxe was about first to do so in the WMF Metafile zero day in Windows half a decade ago. Using ignorance or mistruths via product bashing is NOT helping Linux. You may be even HURTING new Linux users as thinking that’s the way ALL Linux people are – completely dishonest liars and product bashers, what good could the product be ? You don;t want to do that do you ? ! Then don’t !

NOT TRUE …..quoted
<<<It does not affect me and so why should I care if others persist in using an OS made of Swiss cheese.>>>
Again, if you are product bashing via number of Security Updates to Windows by calling it “swiss cheese” meaning full of security holes the nefarious can exploit then we look to Linux Updates and as well your mention of them being published…. If we use your analogy of what constitutes “swiss cheese” let’s look at how many holes Linux has as compared to Windows (which has had a handful in the last year – and I run both a XP and Vista computer…..
Fwd: [USN-1137-1] Eucalyptus vulnerability
Fwd: [USN-1138-1] DBus-GLib vulnerability
Fwd: [USN-1138-2] NetworkManager and ModemManager update
Fwd: [USN-1140-1] PAM vulnerabilities
Fwd: [USN-1139-1] Bind vulnerabilities
Fwd: [USN-1146-1] Linux kernel vulnerabilities
Fw: [USN-1147-1] GIMP vulnerability
Fwd: [USN-1151-1] Nagios vulnerabilities
Fwd: [USN-1152-1] libvirt vulnerabilities
Fwd: [USN-1153-1] libxml2 vulnerability
Fwd: [USN-1154-1] OpenJDK 6 vulnerabilities
Fwd: [USN-1155-1] NBD vulnerability

OKAY THAT IS IN ABOUT ONE MONTH’S TIME ! ! ! Quazillions of Updates. Windows has NEVER had such a caseload of Windows Updates. No need to look it up or go ahead and google it. As source, I have been on Windows with one of the very first Windows XP computers sold in Nov. 2001 to present and Vista and 7 as well – and have had two or three offers from some important security firms actually to boot (I am disabled and declined).

Now via YOUR definition of “SWISS CHEESE” – we are looking at it ! ! ! Linux would be that and NOT Windows. Neither has Linux been attacked on the level Windows has been since it all began around the beginning of this last decade…. 2000 to 2010. Frankly there security departments have not had the level of attack and defense and will NOT achieve their sophistication until the next decade after 2020 IF they were attacked like Windows was/is starting tomorrow.  Again experience is the best teacher in some cases. In security you gain a “nose” and can sniff trouble and were as, or before, it happens. These are the top employees in security.

And the truth is, as I said Linux speaks for itself, here we see how busy they are and produce their equivalent of Windows Critical Security Updates through Update Manager. The ORIGINAL security argument came (and from many people as you speak here) about 2006 to 2008 that Linux, Apple/Mac, and Firefox were virtually malware immune and make Windows look like a joke. This lying and unfaithful and mistruths have been shown as the basis of dishonest or uninformed and sometimes even called “newbie hype” – basis or foundation and platform for “product bashing” and why this is frowned upon and most times actually disallowed by all honest users in the Community of computer operators on the worldwide web.

The truth in the above argument was based upon that 90 percent of all world computer ran Windows and was “were the money” is for those committing cyber theft via cyber crimewares such as password stealing viruses that also ran through Firefox via Java exploits, spyware installations, other crimewares as ransomware. It is too risky and costly for the cyber criminal underground to go “social engineering” hunting in tiny ponds where there is little internet financial transaction occurring – the other 10 percent of operating systems including Linux and Apple/Mac. THIS was and still is the truth about Windows being attacked so heavily and we have not even touched on Botnets via Botherders, Botlords, Botmasters committing corporate cyber crime via their botnet attacks in the form of Denial of Service Distribution Attacks (DDoS) holding corporations worldwide for illegal extortion ! Windows computers.

When the level of attacks happen to Linux and Apple/Mac that have occurred to Windows we will see how they fair. They will either do as good a job or a horrible one being way behind the patch/fix/updates immediately necessary. From what I have seen I would say their first incidents will be as awkward as it was for Windows.

Remember that just very recently both Linux Kernel Org and the Linux Software Repository have been hacked. This has NEVER occurred with Windows save the one incident of the Windows Updates website itself blocked by hackers temporarily during a zero day keeping slothful users from getting the Critical Update/Patch to block them out. These slothful users either by apathy or bad directions from bad or uninformed user helpers or simple ignorance of not knowing did not have Windows Updates set to Automatic Install as instructed and recommended to by Microsoft and the vast majority of responsible informed Windows users as we are and know to be.

NOW I do not wish to take back some compliments I made towards you but I think I SHOULD as I now suspect in your several answers together as I very slightly suspected that you are doing NOTHING but your little PRODUCT BASHING of Windows skit for all Linux Users. I feel the Owner/Moderator of this group should take action for same. I have made the case I feel for that.

The discussion here was not Linux or Windows – but SECURITY – which is what you have dishonestly or ignorantly given  what you called…. (quoted)
<<<If we assist them in living in the delusion that they are in a safe environment, then we do them no favours.>>>
You have given such delusion as to condemn yourself as dishonest in your product bashing portrayal of your position as being security correct with and for Linux to at least all the users in this group and all RSS Visitors to the group worldwide via RSS Readers of Public messages.

I will NOT post again and will maintain my position – and well spelled out – that I feel you have been dishonest and are nothing more than a Windows Product Basher as dishonest mistruths. In security we teach truth to the public so that they are enabled and EMPOWERED to make INFORMED DECISIONS as to computer security and their own security solutions for the same. Product Bashers do their best to misguide this most times as self aggrandizing but are very hurtful to uninformed followers. This is the main reason product bashers in security are immediately disallowed to continue further.

The only way I could not believe you are performing Windows Product Bashing is perhaps for you to read some, and study some, and verify some, and come back with some reply to admit you were ignorantly wrong in your statements. (I am a group owner and would have banned you already ! )

Otherwise I need NOT reply further. My reply of information to you is quite sufficient as just a little more than ‘surface’.

gerald philly pa usa
Amateur Forensics (computer)


–a concerned, VERY concerned Linux User and contributor !
On 11/1/2011 6:58 AM, R———- wrote:
> I meant in a broader context. Windows users will only know that Windows
> sucks and that it is part of the problem, if they experience it for what it
> is. If we assist them in living in the delusion that they are in a
> safe environment, then we do them no favours. Aside from that I have become
> a bit jaded about it all. It does not affect me and so why should I care if
> others persist in using an OS made of Swiss cheese.Those Russian botnets
> exploit XP machines and while they are doing harm they would not be able to
> to it as effectively if Microsoft was on the ball.
> Here is an example. Someone will find an exploit and announce it publicly
> so that users will know and expect MS to patch it. So, MS goes all quiet
> first. Then they deny it when asked directly. Then they say they are
> looking into it. Then they admit it and say that they are working on a fix.
> Then they say the fix will be available next patch Tuesday which is two
> weeks away. A month has passed and those botnets have been busy and the
> problem has travelled aroud the world affecting millions of MS customers.
> That would be bad if it happened just once, but it is the script.
> So, little old me, using Linux thinks, if MS does not care, why should I?
> MS has denied that the said botnets use Windows or exploit Windows, but
> they also say that the world will be safer when XP is closed down. We live
> in  a world of contradictions. My contradiction is that using Linux to help
> Windows users is like peeing on a forest fire when the forest ranger is
> asleep and the arsonists know it. As I said, I have been around the block a
> few times and have lost my enthusiasm for helping those who do not want it.
> So I handle the contradiction of not seeming to care, by using something
> that is far safer and trying to spread the word that it does not have to be
> this way, rather than saving people who do not know they are in trouble and
> are not asking for my help.
> Using an AV for me is not a good use of my time. I would rather be typing
> long messages to you.
> R———–
> Using Kubuntu 11.10, 64-bit
> On 31 October 2011 23:11, G.LinuxDucks<>  wrote:
>> **
————-cut—————-cut———————– /

Question was: Is anyone using antivirus software on Linux ?

Question was…. Is anyone using antivirus software? (On Linux, at a different group)

List of Linux computer viruses
From Wikipedia, the free encyclopedia

KlamAV has included directory of threats built in.

My answer is yes absolutely. If you can’t seem to get Clam for Linux working, go to System>  Synaptics and type in Clam as search word. Mark for installation ALL that apply and click Apply to install them. The
simple Clam download is basically an empty shell. You need like the fresh clam etc to get the definitions and as well you need to open Preferences and set Updates to every hour all the way up to once a day.
Once a day is generally sufficient. They will install silently in the back ground on log in session daily. If you simply click HOME – this is much like a quick scan of all the usual targets.

Yes, getting hit with malware is rare on Linux but not so much anymore. Companies do not spend zillions of dollars making a Linux antimalware solution with Real Time Protection – YES – Real Time Protection such as
ESET Announces ESET NOD32 Antivirus for Linux 
EON: Enhanced Online News (press release)
“Given the importance of consumer and business usage of Linux, it is
essential to equip users with advanced security software to protect
against cyber-attacks,” said Richard Marko, CEO of ESET. “With ESET
NOD32 Antivirus for Linux, ESET’s protection is …

ESET File Security for Linux receives VB100 award [perfect scores
against malware]
BRATISLAVA – ESET File Security 3.0.20 for Linux has received a “VB100”,
the award from Virus Bulletin, UK’s independent testing antivirus
authority. …
Simple or average users sometimes have the attitude of “your not going to drag that windows crap into here – Linux users – are you ? “…. but they do not realize you may be performing financial transactions or are
a webmaster and even using FTP to websites etc. These type users WELCOME such products for confidence and peace of mind in Safe Computing for like $30 to $40 USD yearly. I myself have tried the 30 day evaluation of ESET (best windows at over 59 VB100 Awards, labs can’t lie) for Linux and am seriously impressed and will be using it permanently on my Linux Netbook. I have tried free AVG – as Clam has only a very fair as opposed to excellent detection rating. It completely bogged down the system so bad I could not navigate the computer system. Fighting fighting fighting just to get rid of it ! Finally !

Again, the average user is not even aware of the great botnet plague of the which the Linux operating system has been used as well as windooooze. Freely in Linux there is pipelining and torrents and so on
that are weapons in botnet payloads. There is the infamous IRC Chat Relay used for botmasters and botherders to communicate clandestinely beyond legal authorities in too many cases. In fact as a windows die
hard user switching over to Linux – it was like duhh—- where do you think it all came from. They have no compunction about decompiling software to reengineer it for malware strikes and payload deliveries.
The Open Source community needs to be protected by us as they many times do not have the resources for legalities as do the billionare windows security firms. Read about tunneling to circumvent firewall policies.
This is another area of pipelining. Originally, IPv4 allocation was running out as Windows Vista was released with IPv6 native. All these type communications by malware writers into new Vista users over IPv6
tunneling and pipelining was sticking out like a sore thumb and actually only the stupid would attempt it and like at a softer target such as some unpatched software in the system. That was about the last hope of
fresh air in a malware free internet since about the day the first virus went public. Gone.

So, do I use antivirus on Linux… are you kidding me ? You NEVER operate ANY computer without antivirus as minimum security defense. Anyone who tells you different is either security ignorant (newbie novice user) or is intentionally socially engineering you to circumvention of your personal computing security solution (add suite) to make you their mark (IDTheft etc). There is no in between. This is black and white. This is the “cyber ghetto” that used to be called that wonderful information super highway known as the world wide web – WWW …. The more Linux gets used, the more it will look like all the Mac attacks going on and getting worst by the day.

For the average user – If you practice Safe Practices (don’t go to shady places on net, don’t do shady downloads, etc) and you use Clam or Klam and at least scan weekly or monthly you are fairly safe. NO argument
there. Fairly safe. Notice that does not say you are protected. You need a Linux antimalware product with Real Time Protection (heuristics) to be protected.

It depends on what you have to loose and was my reason for this reply. I don’t say “Shut Up” to all those that want to call this “snake oil” and hey dude you are an unwelcomed alarmist spreading FUD  <,_uncertainty_and_doubt>  ==== I say “Wake Up” and history reveals you are a fool who’s money is soon parted. Ask the victims.

I qualify my answer as advancing to IT Security Home/Small Business and Amatuer Forensics (Computer)…. (webmaster). The former are generally those the Microsoft threatened to sue for damages during their last “Vista Bashing” episodes of entire proven lies about Computing Security and Vista itself.

Simple answer… hey guy get Clam AV at Software Repositiory (in System >  Ubuntu Software) built into Linux and use it once and a while and your good to go for now. Try the more advanced stuff when you are ready
or feel the need to. Simple. Understand no malware written for windows or others works on Linux and vice versa – different operating system code.

gerald philly pa usa
On 5/25/2011 5:12 PM, xxxx wrote:
>  Here’s an Ubuntu-specific list of every known (to them) virus/worm.
>  Read the comments on each; you’re pretty immune to all of them

Bad Opinion) Windows Vista for Better [than Linux] Security? I Don’t Think So

Bad Opinion) Windows Vista for Better [than Linux] Security? I Don’t Think So.
The National Security Agency (NSA) recently published a report, “Best Practices for Keeping Your Home Network Secure” (PDF) in which it makes numerous recommendations designed to help home computer users avoid malware and other common problems……
Perhaps and probably Linux is safer than Windows XP would have been a better truthful article here. Linux has been listed at least once as one of the most vurnable systems, and that not by opinion.
The simplest cut to the chase as showing this article as uninformed and not correct are the two following information links. These deal with malware called rootkits which, if infected on Windows, is one of only a couple reasons for ever re-installing Windows – wiping the disk. In fact, a rootkit infection is the only time Microsoft ever offered reinstalling Windows after wiping the disk as only solution aside from Windows 7 users loosing their administrator password.
So the message is that rootkits can run on Linux and can NOT run on Vista (safer)…
What You Need to Know About Linux Rootkits Rootkits are a way attackers hide their tracks and keep access to the machines they control. The good rootkits are very hard to detect and remove. They can be running on ones computer and no one can even know they have been running. Read more to learn how to detect them on your system.
3/25/2011 2:49 PM
Read more | Open in browser
Linux under attack: Compromised SSH keys lead to rootkit
Aug 26, 2008 ….. The U.S. Computer Emergency Readiness Team (CERT) has issued a warning for what it calls “active attacks” against Linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access to a system, and then uses local kernel exploits to gain root access……
ROOTKITS UNABLE TO RUN ON VISTA… – Vista’s UAC spots rootkits, tests find
Our Government (USA) made a correct decision.
Another point in real world to consider, however, is how many “zero days” has a system had. There has been a handful over ten years in Windows. Linux has had a few…
Red Gecko: New Linux Zero-Day Flaw
Jul 20, 2009 … New Linux Zero-Day Flaw. For all you Linux users who thumb your noses at Microsoft’s history of vulnerability and large attack surface, …
US-CERT Current Activity – Linux Root Access Vulnerabilities
Home: Linux Ducks
Main Domain: (Windows Help)

Posted in BlueCollarPC WordPress Blog. Tags: , , , , , , , . Comments Off on Bad Opinion) Windows Vista for Better [than Linux] Security? I Don’t Think So
%d bloggers like this: