Tech Support

[ Tech Support ] [ Main Menu ]


  


2535


Date: October 31, 2012 at 19:59:10
From: Tech Support, [DNS_Address]
Subject: "enhanced" text


Having never been afflicted by such a problem as these ad links, I was nevertheless able to find the solution to your problem within 2 minutes by googling "ad links in text virus". Turns out it's not a virus, and I found a very likely answer after reading the first few results.

I was eventually led to this page:

http://botcrawl.com/how-to-remove-text-enhance/

Hopefully this will help you remove the offending piece of junk.

If that's not the actual problem/solution, you should at least have an idea of how to continue searching on your own.

Why people are prone to installing every cutsy little toolbar or browser ad-on is beyond me, but the problem is likely caused by such. It's something you installed. And it's a great way for malicious programs to get into your computer. This is known in the hacking world as "social engineering". You have been socially engineered (ie, conned, tricked, convinced, swindled, manipulated) into thinking you need to install some little piece of software that in reality has ulterior motives. And to think, you folks are supposed to be so aware of all the nefarious things going on in the world that everyone else is blind to, yet you get hoodwinked by a simple piece of junk software. Duh.

Tech Support


Responses:
[2539] [2538] [2540] [2543] [2541] [2542] [2549] [2552]


2539


Date: November 01, 2012 at 03:19:06
From: Angelica, [DNS_Address]
Subject: Re: "enhanced" text - Tech Support


Tech Support

Brilliant the way they blame other forum users and even the site admin, for what appears on their PC when it was their
fault all along.

You're more than generous in pointing the way out of their personal idiocracy, as they can''t even get out of a soggy
paperbag without adult assistance.

Sadly no mossadyreptoid conspiracy was responsible...


Responses:
None


2538


Date: November 01, 2012 at 00:16:34
From: jeffersonzuma, [DNS_Address]
Subject: Re: "enhanced" text


everything unwanted is uninstalled. what do you know? sounds like your next thing is to blame it on iranians lol so don't make assumptions..


Responses:
[2540] [2543] [2541] [2542] [2549] [2552]


2540


Date: November 01, 2012 at 12:47:14
From: Tech Support, [DNS_Address]
Subject: Re: "enhanced" text


"everything unwanted"

That's the problem. You THINK you want it. But is it really needed? The more crap you install the more ways things can go wrong. Heck, I have enough troubles with LEGIT programs causing problems. I don't need some fancy widget that doesn't do anything truly useful to add to the mix.

No computer becomes "magically" infected unless you did something to allow it. It may be inadvertent. You may not have intended the consequences. But it still happens with your help. You may have been tricked.

However, you may think you've removed everything 'unwanted'. What's causing your troubles may have been installed without your knowledge while you installed some other 'wanted' piece of junk program.

You should be wary of installing anything on your system without vetting it from a reliable source first.

Kind of reminds me of the reports warning mothers not to purchase breast milk on craigs list. Uh... DUH!?!?!?!

Computers are the same way. Don't feed them something that you got from a strange place. Stick with legitimate sources. If you want toolbars or ad-ons for your browser, get them from the browsers home page 'store'. Look for 'open source' programs, because even though YOU may not be able to read the source code, someone else can, and if there was a flaw, it would be outted.

Tech Support


Responses:
[2543] [2541] [2542] [2549] [2552]


2543


Date: November 01, 2012 at 17:12:50
From: Dona, [DNS_Address]
Subject: Re: "enhanced" text


#1. good post much of it.
#2. ZumA and I having the same problem or having the
same tool bar,hmm,ok...
#3I have been meaning to get rid of this tool bar that
I got about six mo. ago because it slowed dn the puter
and turned out I did not need it for getting free
movies at http://www.movie2k.to/ However the ad drop
just started only on this site about two wks or so ago.
I just thought it was mr bopp until links came up
highlighted thus forever sending you to an add...then
saw Jefferson post and having the same problem
sorta,posted.
#four I got the tool bar by some unwanted way to
begin with.
#5 again thank you,will go un do the bar and see if
things straighten out no need for anyone to be rude.
I will be back to let you know. I was and did a search
on Flash going out on Chrome(big bad boo on that)and
just thought maybe since this is the only site I have
the problem it was with mr bopp site.
take care
Dona


Responses:
None


2541


Date: November 01, 2012 at 13:56:57
From: jeffersonzuma, [DNS_Address]
Subject: Re: "enhanced" text


quit talking out your ass.


Responses:
[2542] [2549] [2552]


2542


Date: November 01, 2012 at 15:48:20
From: Tech Support, [DNS_Address]
Subject: Re: "enhanced" text


Awwww... poor baby.... insulted and angry that I'm pointing out how ignorant you are? Typical human behavior.

Fine. The next time you have problems with your computer because of something YOU most likely did out of your own ignorance, don't come around here bitching about it.

BTW, what my derriere says is more intelligent than anything that comes out of that foul bigoted mouth of yours.

Have a nice day.

This call is terminated.

Tech Support


Responses:
[2549] [2552]


2549


Date: November 09, 2012 at 13:24:54
From: jeffersonzuma, [DNS_Address]
Subject: Chevron false flag attack by zio-virus

URL: http://rt.com/usa/news/stuxnet-chevron-cyber-virus-348/


{blamed on Iran, etc, of course}

Stuxnet goes out of control: Chevron infected by anti-Iranian virus, others could be next
Get short URL
Link copied to clipboardemail story to a friend print version Published: 09 November, 2012, 20:49

TAGS:
Nuclear, Iran, USA, Resources, Hacking

TRENDS:
Israel vs Iran
(AFP Photo / Justin Sullivan)
America’s cyberwar is already seeing collateral damage, and it’s hitting the country’s own billion-dollar companies. Oil giants Chevron say the Stuxnet computer virus made by the US to target Iran infected their systems as well.
California-based Chevron, a Fortune 500 company that’s among the biggest corporations in the world, admits this week that they discovered the Stuxnet worm on their systems back in 2010. Up until now, Chevron managed to make their finding a well-kept secret, and their disclosure published by the Wall Street Journal on Thursday marks the first time a US company has come clean about being infected by the virus intended for Iran’s nuclear enrichment program. Mark Koelmel of the company’s earth sciences department says that they are likely to not be the last, though.
“We’re finding it in our systems and so are other companies,” says Koelmel. “So now we have to deal with this.”
Koelmel claims that the virus did not have any adverse effects on his company, which generated a quarter of a trillion dollars in revenue during 2011. As soon as Chevron identified the infection, it was taken care of immediately, he says. Other accidental targets might not be so lucky though, and the computer worm’s complex coding means it might be a while before anyone else becomes aware of the damage.
“I don’t think the US government even realized how far it had spread,” Koelmel adds.
Discovered in 2010, the Stuxnet worm was reported with all but certainty to be the creation of the United States, perhaps with the assistance of Israel, to set back Iran’s nuclear enrichment program as a preemptive measure against an eventual war. Only as recently as this June, however, American officials with direct knowledge of the worm went public with Uncle Sam’s involvement.
In a June 2012 article published by The New York Times, government agents with direct knowledge of Stuxnet claimed that first President George W. Bush, then Barack Obama, oversaw the deployment of the worm as part of a well-crafted cyberassault on Iran. Coupled with another malicious program named Flame and perhaps many more, Stuxnet was waged against Iran as part of an initiative given the codename “Olympic Games.” Rather than solely stealing intelligence through use of computer coding, the endeavor was believed to be the first cyberattack that intended to cause actual hard damage.
“Previous cyberattacks had effects limited to other computers,” Michael Hayden, the former chief of the CIA, explained to the Times earlier this year. “This is the first attack of a major nature in which a cyberattack was used to effect physical destruction.”
On the record, the federal government maintains ignorance on the subject of Stuxnet. With American companies perhaps soon coming out of the woodwork to discuss how they were hit, though, the White House may have to finally admit that they’ve had direct involvement.
After the Times published their expose in June, Senator Dianne Feinstein, chairwoman of Intelligence Committee, called for an investigation to track down how the media was first made aware of America’s involvement in Olympic Games.
"I am deeply disturbed by the continuing leaks of classified information to the media, most recently regarding alleged cyber efforts targeting Iran's nuclear program,” Feinstein said through a statement at the time. “I made it clear that disclosures of this type endanger American lives and undermine America's national security."
When Feinstein spoke to DC’s The Hill newspaper, she said, "the leak about the attack on Iran's nuclear program could 'to some extent' provide justification for copycat attacks against the United States." According to the chairwoman, "This is like an avalanche. It is very detrimental and, candidly, I found it very concerning. There's no question that this kind of thing hurts our country."
Just last month, a shadowy Iranian-based hacking group called The Qassam Cyber Fighters took credit for launching a cyberattack on the servers of Capital One Financial Corp. and BB&T Corp., two of the biggest names in the American banking industry. Days earlier, Google informed some of its American users that they may be targeted in a state-sponsored cyberattack from abroad, and computer experts insist that these assaults will only intensify over time.
“We absolutely have seen more activity from the Middle East, and in particular Iran has been increasingly active as they build up their cyber capabilities,” CrowdStrike Security President George Kurtz told the Times.
Speaking of the accidental impact Stuxnet could soon have in the US, Chevron’s Koelmel tells the Journal, "I think the downside of what they did is going to be far worse than what they actually accomplished.”


Responses:
[2552]


2552


Date: November 09, 2012 at 13:54:04
From: jeffersonzuma, [DNS_Address]
Subject: Chevron can't even remove a tool bar after watching porn! ha ha! (NT)


(NT)


Responses:
None


[ Tech Support ] [ Main Menu ]

Generated by: TalkRec 1.17
    Last Updated: 30-Aug-2013 14:32:46, 80837 Bytes
    Author: Brian Steele