Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Is there an IE Trojan?

  • 18-09-2001 6:09pm
    #1
    Registered Users, Registered Users 2 Posts: 21,264 ✭✭✭✭


    I just noticed that IE was trying to contact various IP's while it wasn't running.

    So I disabled IE and it tried a couple of more times then stopped doing it, and it's stopped totally now.

    =/


Comments

  • Closed Accounts Posts: 35 Pragmatica


    Install a good fire wall that alerts u to outgoing traffic like ZA ...

    Download a little free proggy called BHO Captor which enables you to kill all browser helper objects in IE Vx.xxx.xxx

    Get Ad Aware and clean your computer of popular spy appz ...

    If your really in need of the app that's doing the miscellanious connecting to a specific IP address ... It much more efficent to edit the "hosts" file in you windows folder and refer the connection to an IP address of 0.0.0.0 which get killed immeaditly before it tries to leave you computer ...

    # Copyright (c) 1998 Microsoft Corp.
    #
    # This is a sample HOSTS file used by Microsoft TCP/IP stack for Windows98
    #
    # This file contains the mappings of IP addresses to host names. Each
    # entry should be kept on an individual line. The IP address should
    # be placed in the first column followed by the corresponding host name.
    # The IP address and the host name should be separated by at least one
    # space.
    #
    # Additionally, comments (such as these) may be inserted on individual
    # lines or following the machine name denoted by a '#' symbol.
    #
    # For example:
    #
    # 102.54.94.97 rhino.acme.com # source server
    # 38.25.63.10 x.acme.com # x client host
    #
    # So If the connection was trying to connect to say "updates.hotbar.com" you would add the following to the list of hosts ...

    127.0.0.1 localhost
    0.0.0.0 updates.hotbar.com

    # Prendy :D


  • Registered Users, Registered Users 2 Posts: 1,842 ✭✭✭phaxx


    Pragmatica, that's an interesting way to do it, with the hosts file. I'd be more likely to block it at my firewall... would never have thought of using the hosts file. ta. :)


  • Registered Users, Registered Users 2 Posts: 1,862 ✭✭✭flamegrill


    just about http scans,

    have a look at mine here.

    http://dahomelands.net/scanner.php


  • Registered Users, Registered Users 2 Posts: 1,842 ✭✭✭phaxx


    Make the source to that available up there would you? There's a good lad.


  • Registered Users, Registered Users 2 Posts: 1,862 ✭✭✭flamegrill


    the source eh?

    get it from here Scanner.tar.gz


  • Advertisement
Advertisement