by admin
Monday, March 30th, 2009 at 7:15 pm
It is hard to identify files containing Conficker because the executable are packed and encrypted. When Conficker runs in memory it is fully unpacked. Our memory disinfector scans the memory of every running process in the system and terminates Conficker threads without touching the process it runs in. This helps to keep the system services running.
The tool itself and the source code can be downloaded here:
And here is a tool to remove the registry entries
regnfile.exe 599 K
More info can be found here
by admin
Monday, March 30th, 2009 at 5:27 am
Dan Kaminsky packaged a nice standalone .exe by the researchers with the HoneyNet Project (Tillmann Werner and Felix Leder) , that scans for infected conficker computers on the network. They recently discovered an easy way to identify infected systems remotely. Conficker attempts to patch the MS08-067 vulnerability during infection. A flaw in the patch causes the machine to respond differently than both an unpatched system and an officially patched system. Their scanner uses this knowledge to scan and identify the infected computers. McAfee, nCircle, Nmap, Qualys, and Tenable (Nessus) and most have already incorporated, or are about to incorporate, Conficker sigs for their scanners, but for now you can get
Dan’s .exe ::Here::
More info on the python script ::HERE::
by admin
Sunday, March 22nd, 2009 at 9:45 am
Ashton Kutcher got an online buzz with his sneak pic of his wife’s ass on twitter
http://twitpic.com/2bj58 I guess it’s almost as good as the ones we stole from his phone 

by admin
Tuesday, March 10th, 2009 at 4:33 pm
damn you’re getting old , we should call you petrified_wood

by admin
Sunday, March 1st, 2009 at 12:21 am
even though they made shitloads of money off their older versions before a bunch of open source alternatives finallycame, l0pht isgoing back to their roots and releasing a newer version, no word of whatupdates itcontains but check out l0phtcrack.com for more info