We’d like to remind Forumites to please avoid political debate on the Forum.
This is to keep it a safe and useful space for MoneySaving discussions. Threads that are – or become – political in nature may be removed in line with the Forum’s rules. Thank you for your understanding.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
The Forum now has a brand new text editor, adding a bunch of handy features to use when creating posts. Read more in our how-to guide
can anyone share there last windows virus experience?
Comments
-
grumpycrab wrote: »Sorry, off topic, but friend said they want to "upgrade" (or is that downgrade?) from ME (yes, ME) to XP. Any reliable sources for XP?
Try this version Windows XP Ultimate Edition (by Johnny) .Even has Defender0 -
^^ Install a modified OS downloaded from an unknown from the internet :rotfl:
Yeah right0 -
I've never seen anybody be so wrong in all my life !!!
You need to get out more
XP has more holes than swiss cheese - and they are no longer being filled by Microsoft
Really? I didn't know that
You put that machine anywhere near an internet connection and it is open season on it.
I know at least 10 cracks that could completely own it in seconds
Without knowing how I have locked down my machine isn't that a bit of a presumption. But hey, you could be right. Try me with a few and I'll let you know if/how I have them covered. Never too old to learn.0 -
The only way you can have "locked down" your machine is if you have edited the OS code / written your own patch/ OS update to fix the many exploitable vulnerabilities that have been left unpatched by Microsoft
If you have done that then hat off to you
I suspect you haven't and that metasploit would eat you for breakfast0 -
Some years ago in XP, came down via an email from a known contact that was dodgy (although I didn't in those days realise).
Used an uninfected 95(!) machine to get an AV to remove it, and cleaned the odds and ends manually - took a couple of days.
Now use Mailwasher to check emails and have script / ad / tracker blockers on my browser plus real time and "run on demand" AV - drives the kids up the wall when they try and use my computer, so its not all bad.0 -
The only way you can have "locked down" your machine is if you have edited the OS code / written your own patch/ OS update to fix the many exploitable vulnerabilities that have been left unpatched by Microsoft.....
I suspect you haven't and that metasploit would eat you for breakfast
It’s a few years since I have been eaten for breakfast:)
Leaving aside the fact that in the real world most a/vs detect malicious attacks using Metasploit, even though it can be customised, I would be interested as to how you feel Metasploit, or any other exploit for that matter, could circumvent the combination of Shadow Defender/ Anti-logger/Sandboxie and Windows Firewall with out-bound access restrictions.0 -
Read here for a list of unpatched OS vulnerabilities.
Most of these 71 issues could be exploited regardless of any of the software you mention being installed.
https://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-739/cvssscoremin-5/cvssscoremax-5.99/Microsoft-Windows-Xp.html
You hit a snide web page exploiting one of those bad boys and there you are
And you may not even know it's happened
Yes you can roll it back, but that doesn't stop your current session being owned0 -
Read here for a list of unpatched OS vulnerabilities.
Most of these 71 issues could be exploited regardless of any of the software you mention being installed.
I've never said that XP does not have unpatched vulnerabilities, what system doesn't. What I am putting forward is that the real world risks are negligible if the system is properly protected.
I don't need to - when I hit the restart button whatever was there , if anything, is gone.You hit a snide web page exploiting one of those bad boys and there you are
And you may not even know it's happened.Yes you can roll it back, but that doesn't stop your current session being owned
Who owns it if it can't record key strokes and all outbound communications are blocked?
If you think my back-up XP system is suspect try running a pack of zero-day malware against Windows 10 with Windows Defender as your only layer of security and see how successful that is by comparison.0 -
It's like trying to talk to children !
If you understood what zero day vulns were then you would realise how silly that statement is.
If you understood some of the vulns in that list you would realise how useless your software was.
What's all this nonsense about all outbound comms blocked too - you realise how the internet works, right ?
I'm not going to argue with you over this silliness. If you want to believe that your XP machine is as safe as a windows 10 box then you crack on
What a bizarre arguement0 -
^^ Install a modified OS downloaded from an unknown from the internet :rotfl:
Yeah right
I know we've disagreed before, but you have to laugh don't you:
Take one of the most exploited and mangled OS's ever released to the public..... and install a version that's been hacked up by some kid in his bedroom and put up for BitTorrent. Oh goody.
OR.......... have you considered something like Lubuntu? It's a super lightweight version of Ubuntu designed for really old laptops. I run it on this old shabby Centrino laptop (that's right, not even Core 2 Duo) from about 2008 with a sticker on that proudly boasts "Designed for Windows XP/Vista Certified". It runs pretty well. Yeah you can't watch YouTube HD content and what not, but everything else works great and I've used it for all sorts..... Word Documents, E-mails, Programming, Retro Games, Wine, etc..... Works great
@Gillor, I can't be bothered to respond to every last daft point you've made.... but you're wrong and for so so many reasons. Just because you've got 40 different AV's on your PC, that can all pickup the Spiral Trojan or some other ridiculous malware doesn't mean there aren't coding flaws that still exist within Windows XP and that can be exploited. These are now not being patched.... You've also got the fact Windows XP's security is still only trivially better than Windows 98. Windows 2000 security anyone??? Forget about viruses, forget about trojans, the security on Windows XP out of the box, as I said above IS HORRIFYING. They only got the hang of it around Vista and even that's pretty awful. I'll give you a terrible analogy for how Microsoft's security came about.... we'll start from 95 as I don't see the point in mentioning 3.1.
Windows 95 - Like having a car, with the doors unlocked and the keys in the ignition. All you need to do, is turn the key.
Windows 98 - As above, except the key is in the car door rather than the ignition.
Windows 2000 - The car is locked, but the keys are on top of the doormat by the front door.
Windows XP - The car is still locked, and the keys are just slightly under the doormat by the front door.
Window Vista - The car is stilled locked and the keys are nowhere to be seen.... but stick your hand through the letterbox and they're on a table by the door.
...... and at Windows 7, they finally started to get a hold of it.
Now..... shall we move onto full drive encryption?
Let's not get started on that shall we? Another wonderful Windows omission. Oh wait, they got bitlocker in Windows Vista didn't they? No, because you had to buy the most expensive version which came pre-installed on no hardware really. So it was more like 8 and 10 then? Only about 30 years too late. Still haven't mentioned that whole Internet Explorer 6 thing yet either or IIS..... the most dangerous web browser ever released to the public coupled with the most exploited web server of all time!!
For too many years Windows was basically sold as a single user system out of the box, giving full administrator access to Joe Public. Windows didn't even get file permissions for god knows how long.....remember this old trick (worked better on 95/98, but good to know it still worked on XP):
https://www.youtube.com/watch?v=o4oiQVX3hMc
Linux distributions on the other hand have always been multi user systems by design. File permissions etc. The above is simply not possible to the average user running a fairly standard distro because unless you're running on an embedded device that does not require a multi user setup, the root account is not usually the one you'll login too. You may well set a root password, but you're unlikely to use a root shell, unless you absolutely know what you're doing, so you won't have permissions to start rm * / etc. Heck, I can prove it if you like? I'll try delete every node in my /dev/ folderjoe@joe-AMILO-Pro-V3505 ~ $ rm /dev/* rm: remove write-protected character special file '/dev/autofs'? rm: cannot remove '/dev/block': Is a directory rm: cannot remove '/dev/bsg': Is a directory rm: remove write-protected character special file '/dev/btrfs-control'? y rm: cannot remove '/dev/btrfs-control': Permission denied rm: cannot remove '/dev/bus': Is a directory rm: cannot remove '/dev/cdrom': Permission denied rm: cannot remove '/dev/cdrw': Permission denied rm: cannot remove '/dev/char': Is a directory rm: remove write-protected character special file '/dev/console'? ^C joe@joe-AMILO-Pro-V3505 ~ $ ^C
Ignore the things about folders, that's because I've not set the recursion flag.... I might be using a modern distro, but I'll bet my car that if you find an older distro from say 2000.... the same result will occur....
Everything is a file baby
Love it.
............
Oh and all of this.... was posted from a 10 year old Fujitsu Core Laptop Running Lubuntu......
0
This discussion has been closed.
Confirm your email address to Create Threads and Reply
Categories
- All Categories
- 354.2K Banking & Borrowing
- 254.4K Reduce Debt & Boost Income
- 455.3K Spending & Discounts
- 247.2K Work, Benefits & Business
- 603.8K Mortgages, Homes & Bills
- 178.4K Life & Family
- 261.4K Travel & Transport
- 1.5M Hobbies & Leisure
- 16.1K Discuss & Feedback
- 37.7K Read-Only Boards

