• CYBER-DANGER Expiration WARNing #3

    From EList v4.2.L MaintBot@1:393/68 to All on Sun Apr 15 00:05:35 2018
    WARNing 3 of 4: This Echo is expiring, please Update.

    TAGname: CYBER-DANGER GROUP: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    DESCription: This echo will apply to all Computer operating systems but
    will be of keen interest to those running Microsoft Windows. This echo is
    for the discussion of the various computer viruses, worms, trojans and
    rootkits that have been known, are known or will be known to infect our
    chosen operating systems. Additionally the discussion of what are known as
    Rogue Security Applications is encouraged. Rogue Security Applications are
    programs written to pose as legitimate security programs to coerce a user
    to install them and register them but in reality these programs cripple
    the host system and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    MODerator: Andrew Leary, 1:320/219.0@fidonet
    Email: ajleary19{at}gmail.com

    ORIGin: 1:320/219

    RESTrictions: /REAL {REAL Names ONLY}

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219

    Updated on: 2/6/2017

    -=:{ End of Report }:=-

    --- Mystic BBS v1.12 A39 (Windows/32)
    * Origin: FIDONet - The Positronium Repository (1:393/68)
  • From Vincent Coen@2:250/1 to Andrew Leary on Tue Jun 2 14:35:03 2020
    To: Andrew Leary, 1:320/219@fidonet
    CC: ajleary19@gmail.com


    WARNing 3 of 4: This Echo is expiring, please Update.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems but
    will be of keen interest to those running Microsoft Windows. This echo is
    for the discussion of the various computer viruses, worms, trojans and
    rootkits that have been known, are known or will be known to infect our
    chosen operating systems. Additionally the discussion of what are known as
    Rogue Security Applications is encouraged. Rogue Security Applications are
    programs written to pose as legitimate security programs to coerce a user
    to install them and register them but in reality these programs cripple
    the host system and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19{at}gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219

    Updated on: 2018/10/26 and valid till 2019/04/30

    Produced by Elist v5.1.061c

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.7.13 (GNU/Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)