• CYBER-DANGER Echolist Update

    From Vincent Coen@2:250/1 to Andrew Leary on Saturday, April 02, 2022 06:30:01
    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2022/04/02 and valid till 2022/10/31

    Produced by Elist v5.2.034

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.8 (Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From Vincent Coen@2:250/1 to Andrew Leary on Tuesday, April 05, 2022 15:25:38
    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2022/04/05 and valid till 2023/02/28

    Produced by Elist v5.3.014

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.8 (Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From Elistmaint@2:25/21 to Andrew Leary on Thursday, March 02, 2023 08:30:01
    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2023/03/02 and valid till 2024/01/31

    Produced by Elist v5.4.019

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.8 (Linux-armv7l)
    * Origin: Elist Maintainer at 2:25/21 (2:25/21)
  • From Vincent Coen@2:250/1 to Andrew Leary on Friday, February 02, 2024 15:24:30
    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2024/02/02 and valid till 2024/12/31

    Produced by Elist v5.4.031

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.8.4 (Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)