• Update - CYBER-DANGER

    From EchoList Robot@1:1/21 to All on Tue Mar 15 10:31:08 2016
    Echolist Announcement ...

    CYBER-DANGER
    Malware, Trojan, Virus and Rogue Application Discussion
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.
    Status: Active
    Origin: 1:123/500 Group: FIDO
    Distribution: ALL ZONES
    Gateways:
    Language: ENGLISH
    # Nodes: N/A Volume: N/A Rules:
    Flags: <Real Names Only>
    Notes: /REAL
    Moderators: Ross Cassell, 1:123/500, recassell@charter.net
    Last changed: 15-Mar-2016 by Ross Cassell, 1:123/500, recassell@charter.net

    --- Echobase 3.48
    * Origin: * Origin: FIDONet Backbone - EchoList HQ (1:1/21.0)
  • From EchoList Robot@1:1/21 to All on Mon Feb 6 12:08:00 2017
    Echolist Announcement ...

    CYBER-DANGER
    Malware, Trojan, Virus and Rogue Application Discussion
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.
    Status: Active
    Origin: 1:320/219 Group: FIDO
    Distribution: All Zones
    Gateways: None
    Language: English
    # Nodes: N/A Volume: N/A Rules:
    Flags: <Real Names Only>
    Notes: /REAL
    Moderators: Andrew Leary, 1:320/219@fidonet, ajleary19@gmail.com
    Last changed: 6-Feb-2017 by Andrew Leary, 1:320/219

    --- Echobase 3.48
    * Origin: * Origin: FIDONet Backbone - EchoList HQ (1:1/21.0)