NOD32 - neko nekoker biezzi gadaas kad NO32 vietaa jau seez viirus un grauzz visas aplikaacijas peec kaartas un sasuuta Skype lietotaajiem tavaaa vaardaa bezsakaraa linkus ko tu pats neesi suutijis
pirms 14 gadiem
Nū- nav piķa!!! moš ko na haļavu vari ieteikt? Cik zinu -var arī Kaspersky dabūt kaut kur netā, bet dzirdēts ka čakarē windauzu-maigi sakot....
"tur ir ieperinaati rootkiti" - var jau bet tādus murgus rakstīt. Kā jau reiz teicu - nožēlojamāki ir tikai tie kas tam vēl <+> var pielikt.
Palūgšu konkrētu avotu.
Kaspersky baigi noslogo procesus Dual Core 2,9 ar laiku paarveershas par 386 vai 486 kasti vai veel leenaaks un nedod dievs tur buus Vista uzlikta, nu bezmaksas vari labaak AVG free nolaadeet. http://free.avg.com/ww-en/homepage . Muusdienaas labaak tomeer labaak nopirkt un miers uz gadu
Maari nestreeso, vai tu esi jaucis vallaa kaadu no tiem exe vai dll kodiem ? Esi ieskatiijies tur iekshaa ?
Tev vispār ir arī kāda sajēga kas ir rootkit? Lai to atklātu nebūt nekas nav jājauc.
Joprojām neredzu avotu tādam apgalvojumam.
Diemzeel rootkitiem ir dazza tipa, she palasi pa doto
Kernel-level rootkits add additional code and/or replace portions of an operating system, including both the kernel and associated device drivers. Most operating systems support kernel-mode device drivers, that execute with the same privileges as the operating system itself.[18] As such, many kernel mode rootkits are developed as device drivers or loadable modules, such as loadable kernel modules in Linux or device drivers in Microsoft Windows. This class of rootkit is perceived as dangerous simply because of the unrestricted security access the code has obtained, regardless of the features the rootkit may employ. Any code operating at the kernel level may have serious impacts on entire system stability if bugs are present in the code. The first and original rootkits did not operate at the kernel level, but were simple replacements of standard programs at the user level. One of the first widely known kernel rootkit was developed for Windows NT 4.0 and released in Phrack issue 55 in the mid-1990s by Greg Hoglund.[19]
Kernel rootkits can be especially difficult to detect and remove, because they operate at the same level as the operating system itself, and are thus able to intercept or subvert any operation made by the operating system. Any software, such as antivirus software, running on the comprised system is equally easily subverted. In a situation such as this, the whole system can no longer be trusted while it is running. One response in such a case is to perform system offline analysis by booting a second known good or 'trusted' system from removable media such as a live CD. Investigation and rootkit removal actions can then be performed safely from a trusted operating system without requiring another physical computer system, as the hard drive of the infected system can be mounted as a secondary resource without executing anything on the untrusted volume. Alternatively, the volume can simply be formatted and the operating system re-installed from trusted media.
Tikai nesaki ka tu nezinaaji, Maari man ir 25 gadu staazs prograameeshanaa, kad tu biji veel pampersos es uz BK-001 rakstiiju Fortraanaa programmas, luk taa !
Patiešām ko stulbāku uzrakstīt - BK-001 vispar nav, bet uz BK-001x Fortran nav realizēts
Atkal palūgšu konkrētu atsauci, nevis pliku muldēšanu.
Es gan uz tā esmu rakstījis gan Focal, gan Forth, gan PDP assember, gan vēl pāris valodās, bet FORTRAN atmetu kopš ES-1020 laikiem.
Un jēga no tā?
MAIN, CLA CLL /Set the message pointer
TAD MESSG+16 /To the beginning of the message + the length
DCA PNTR
TAD I PNTR
LOOP, JMS POP
SNA /Stop execution if zero
HLT
JMS OUT /Otherwise, output a character
JMP LOOP
MESSG, 0
012
015
"!
"d
"l
"r
"o
"w
"
",
"o
"l
"l
"e
"H
PUSH, 0
ISZ PNTR /Increment the pointer
DCA I PNTR /Store the accumulator at the specified location
TAD I PNTR
JMP I PUSH /Return
POP, 0
DCA DATA /Save a copy of the accumulator
TAD PNTR /Decrement the pointer
TAD DECR
DCA PNTR
TAD DATA /Store the previous value of the accumulator
DCA I PNTR /in the address pointed to by PNTR
JMP I POP
DATA, 0
PNTR, 0
DECR, -1
OUT, 0 / Will be replaced by caller's updated PC
TSF / Skip if printer ready
JMP .-1 / Wait for flag
TLS / Send the character in the AC
CLA CLL / Clear AC and Link for next pass
JMP I OUT / Return to caller
Jau ceturto reizi - neredzu nevienu atsauci iepriekšarakstītajiem murgiem.
Maari var redzeet ka pats sapinies savos murgos, tagad nikns:
http://img12.nnm.ru/3/1/8/5/d/6cd4900813747ee6b84344b9b89.jpg
Tad ko tur var redzēt - "es uz BK-001 rakstiiju Fortraanaa programmas"?
Neredzu ne BK-001 ne Fortran.
Man tev te nekas nav jaapieraada, tu dziivo savaa pasaulee es savaa, taapat skaidrs ka tas biji tu kas mani centaas no shejienes izperinaat.
Kāds tam sakars ar izperināšanu?
Vienkārši neraksti muļķības par tehniskām lietām, kuras var viegli pārbaudīt.
Pats jau to beernudaarzu veido, tagad skriesi noteikti pie pajauta.lv administratora un suudzeesies ka tevi aizskaru vai ne taa?
Tad jau te visus vajag izmest un vienu Tevi atstaat! Skatos tu ar konkurentiem izrikojies izmetos tos atkritumos, fui Maari !
500
Marcis Seglinieks, pirms 14 gadiem :
Varu ieteikti tikai maksas, kuraa nekas nav ieperinaats http://www.f-secure.com