Spyware Warrior Spyware Warrior
Help with Spyware, Hijacking & Other Internet Nuisances
 
FAQ :: Search :: Memberlist :: Usergroups :: Register
Profile :: Log in to check your private messages :: Log in

Virus alerts for week of 11/15/04

 
Post new topic   Reply to topic    Spyware Warrior Forum Index -> Virus, Worm &Trojan Alerts
View previous topic :: View next topic  
Author Message
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Mon Nov 15, 2004 12:35 am    Post subject: Virus alerts for week of 11/15/04 Reply with quote

"Much learning does not teach understanding."
Heraclitus (540BC-480BC); Greek philosopher.

- Weekly report on viruses and intruders -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, November 14 - This week's report on viruses and intruders looks at
the IFRAME.BoF exploit, as well as the Mydoom.AE, Mydoom.AF and Gavir.A
worms.

IFRAME.BoF is an exploit for a buffer overrun vulnerability that occurs in
Internet Explorer v6.0 and allows an attacker to remotely execute arbitrary
code on the vulnerable computer. This vulnerability is rated as extremely
critical.

The exploit can be included in a malicious web page or in an email message
in HTML format, which contain executable code. This executable code is
automatically run when a buffer overflow occurs. The executable code can be
of any kind, which means that any kind of malicious action can be taken on
affected computers.

As no patch is yet available to resolve the problem, it is advisable to keep
antivirus software as up-to-date as possible. It is also a good idea to
disable 'Active Scripting' in the browser and change the configuration of
the email client so that messages are viewed as plain text.

In fact, the new AE and AF variants of the well-known Mydoom already use the
IFRAME.BoF exploit. Both worms -which are similar to each other- spread via
email in messages that they generate themselves. To do this they create an
HTTP server in communications port 1639.

The messages that Mydoom.AE and Mydoom.AF send include a link to files that
contain the IFRAME.BoF exploit in other computers. If the user that receives
the email clicks directly on the link and the computer is vulnerable to the
exploit, the worms will be downloaded and run automatically on the computer.

Mydoom.AE and Mydoom.AF also try to establish connection with a large number
of IRC servers via port 6667.

Finally, Gavir.A is a worm with the exclusive aim of downloading a variant
of the Legmir family of Trojans. Gavir.A spreads across shared network
resources, creating copies of itself in IPC$ and ADMIN$ resources that it
accesses.

Gavir.A also generates a script in a temporary folder in order to delete
itself once it has been run.

For further information about these and other computer threats, visit Panda
Software's Encyclopedia:
http://www.pandasoftware.com/virus_info/encyclopedia/

Additional information

- Exploit: This can be a technique or a program that takes advantage of a
vulnerability or security hole in a certain communication protocol,
operating system, or other IT utility or application.

- Script: The term script refers to files or sections of code written in
programming languages like Visual Basic Script (VBScript), JavaScript, etc.

More technical definitions at:
http://www.pandasoftware.com/virus_info/glossary/default.aspx

NOTE: The addresses above may not show up on your screen as single lines.
This would prevent you from using the links to access the web pages. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.

------------------------------------------------------------
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Mon Nov 15, 2004 3:14 pm    Post subject: Reply with quote

11/15: Trojan.Webus-D Opens Backdoor
Trojan.Webus.D is a Trojan horse program that connects to an IRC server and opens a
backdoor on the compromised system.
http://nl.internet.com/ct.html?rtr=on&s=1,18di,1,ayht,asei,9s3s,a9gz
------------------------------------------------------------
5. 11/15: Backdoor.Selka Lets Attacker In
Backdoor.Selka is a backdoor program that allows a remote attacker to obtain unauthorized
access to an infected computer.
http://nl.internet.com/ct.html?rtr=on&s=1,18di,1,e4ep,1upo,9s3s,a9gz
------------------------------------------------------------
6. 11/15: Envid-A a Mass-Mailing Worm
W32.Envid.A@mm is a mass-mailing worm that sends an email to all addresses in the
Microsoft Outlook address book.
http://nl.internet.com/ct.html?rtr=on&s=1,18di,1,f46p,gih8,9s3s,a9gz
------------------------------------------------------------
7. 11/15: Vundo.dldr Trojan Installed via HTML Page
Vundo.dldr is a Trojan that was recently installed via an HTML page that contained the
Exploit-IframBO Trojan.
http://nl.internet.com/ct.html?rtr=on&s=1,18di,1,65pq,gxgi,9s3s,a9gz
------------------------------------------------------------
8. 11/15: Downloader-SH Trojan Written in Delphi
Downloader-SH is a Trojan that is UPX packed and written in Delphi.
http://nl.internet.com/ct.html?rtr=on&s=1,18di,1,3g39,aymi,9s3s,a9gz
------------------------------------------------------------
9. 11/15: Forbot-CJ Worm Scans Machines
W32/Forbot-CJ is a network worm that spreads by scanning for vulnerable machines.
http://nl.internet.com/ct.html?rtr=on&s=1,18di,1,569,cg5u,9s3s,a9gz
------------------------------------------------------------
10. 11/15: Ssik-A a Windows Worm
W32/Ssik-A is a worm for the Windows platform.
http://nl.internet.com/ct.html?rtr=on&s=1,18di,1,jpn7,ivaj,9s3s,a9gz
------------------------------------------------------------
11. 11/15: Rbot-NK Worm Spreads to Remote Shares
W32/Rbot-NK is a worm that attempts to spread to remote network shares.
http://nl.internet.com/ct.html?rtr=on&s=1,18di,1,fag8,351b,9s3s,a9gz
------------------------------------------------------------

*********************************************************************

/-------------------------------------------------------------------\
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Tue Nov 16, 2004 3:30 pm    Post subject: Reply with quote

11/16: Beagle-AX Worm Opens Backdoor
W32.Beagle.AX@mm is a mass-mailing worm that also spreads through file-sharing networks.
The worm will open a backdoor on TCP port 2002.
http://nl.internet.com/ct.html?rtr=on&s=1,18id,1,lh5v,e1go,9s3s,a9gz
------------------------------------------------------------
6. 11/16: Vidlo-G a Downloader Trojan
Troj_Vidlo.G is a downloader Trojan that is either installed by a malicious Web site or
by other malware and adware.
http://nl.internet.com/ct.html?rtr=on&s=1,18id,1,dsei,xwk,9s3s,a9gz
------------------------------------------------------------
7. 11/16: Golten-A Worm Fakes Arafat Message
Trend Micro is reporting it has received several reports of Worm_Golten.A being
mass-mailed to specific email addresses.
http://nl.internet.com/ct.html?rtr=on&s=1,18id,1,3pol,gqdx,9s3s,a9gz
------------------------------------------------------------
8. 11/16: Mirchack-D Reads Configuration Data
Troj/Mirchack-D is a hacked version of the mIRC32 application.
http://nl.internet.com/ct.html?rtr=on&s=1,18id,1,c4j8,digo,9s3s,a9gz
------------------------------------------------------------
9. 11/16: Rbot-PU Worm Lets Hackers In
W32/Rbot-PU is a worm that attempts to spread to remote network shares.
http://nl.internet.com/ct.html?rtr=on&s=1,18id,1,bbln,eq9r,9s3s,a9gz
------------------------------------------------------------
10. 11/16: Agobot-NX an IRC Trojan & Worm
W32/Agobot-NX is an IRC backdoor Trojan and network worm.
http://nl.internet.com/ct.html?rtr=on&s=1,18id,1,8qow,8zc,9s3s,a9gz
------------------------------------------------------------
11. 11/16: Protoride-W a Windows Worm
W32/Protoride-W is a Windows worm that spreads to computers via network shares.
http://nl.internet.com/ct.html?rtr=on&s=1,18id,1,g86f,3dhn,9s3s,a9gz
------------------------------------------------------------
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Wed Nov 17, 2004 12:03 pm    Post subject: Reply with quote

11/17: Agobot-NZ Worm Targets Passwords
W32/Agobot-NZ is a backdoor Trojan and worm that spreads to computers protected by weak
passwords.
http://nl.internet.com/ct.html?rtr=on&s=1,18kr,1,59qm,bmtr,9s3s,a9gz
------------------------------------------------------------
6. 11/17: Rbot-PX a Worm and Backdoor Trojan
W32/Rbot-PX is a network worm and IRC backdoor Trojan for the Windows platform.
http://nl.internet.com/ct.html?rtr=on&s=1,18kr,1,3elc,huy0,9s3s,a9gz
------------------------------------------------------------
7. 11/17: Mofei-E Worm Hides Itself
W32/Mofei-E will attempt to spread to network shares protected by weak passwords.
http://nl.internet.com/ct.html?rtr=on&s=1,18kr,1,f8m9,cq05,9s3s,a9gz
------------------------------------------------------------
8. 11/7: Berbew-L Trojan Steals Passwords
Backdoor.Berbew.L is a Trojan horse program that steals passwords from an infected
computer.
http://nl.internet.com/ct.html?rtr=on&s=1,18kr,1,fqtx,5c95,9s3s,a9gz
------------------------------------------------------------
9. 11/17: Netjoe Trojan Grants Access
Backdoor.Netjoe is a backdoor Trojan horse program that allows a remote attacker to have
unauthorized access to an infected computer.
http://nl.internet.com/ct.html?rtr=on&s=1,18kr,1,inyt,2buy,9s3s,a9gz
------------------------------------------------------------
10. 11/17: Wootbot-DI Worm Exploits Many Flaws
Worm_Wootbot.DI is a memory-resident worm that arrives and propagates through network
shares.
http://nl.internet.com/ct.html?rtr=on&s=1,18kr,1,ke6j,6hb9,9s3s,a9gz
------------------------------------------------------------
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Wed Nov 17, 2004 12:58 pm    Post subject: Reply with quote

OFF-CYCLE FIX FOR IFRAME FLAW CALLED UNLIKELY | SearchSecurity.com

Despite new Mydoom variants preying on the Internet Explorer-based
vulnerability, don't expect a Microsoft patch in the short term,
security experts say.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1026452,00.html?track=NL-102&ad=496453

MORE INFO:

Read more on recent Mydoom variants.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1005371,00.html?track=NL-102&ad=496453

The cost estimates of viruses like Mydoom.
http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci956157,00.html?track=NL-102&ad=496453
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Thu Nov 18, 2004 12:21 pm    Post subject: Reply with quote

11/18: Ng.695 a DOS Virus
Ng.695 is a DOS virus that infects .COM files.
http://nl.internet.com/ct.html?rtr=on&s=1,18oh,1,bl6v,kx4b,9s3s,a9gz
------------------------------------------------------------
8. 11/18: Yanz-A Worm Spreads Via Email
Yanz.A is a worm that opens the TCP port 67 and listens to it.
http://nl.internet.com/ct.html?rtr=on&s=1,18oh,1,cr6p,3ul0,9s3s,a9gz
------------------------------------------------------------
9. 11/18: Bagle-BG Worm Opens TCP Port
Bagle.BG is a worm that opens the TCP port 2002 and listens to it, waiting for remote
connections.
http://nl.internet.com/ct.html?rtr=on&s=1,18oh,1,40ob,3y9w,9s3s,a9gz
------------------------------------------------------------
10. 11/18: Drew-A Worm Deletes Files
Drew.A is a worm that deletes all the files with a TXT and HTM extension.
http://nl.internet.com/ct.html?rtr=on&s=1,18oh,1,22s9,73mk,9s3s,a9gz
------------------------------------------------------------
11. 11/18: Rbot-PY Worm Lets Intruders In
W32/Rbot-PY is a network worm that contains IRC backdoor Trojan functionality, allowing
unauthorized remote access to the infected computer.
http://nl.internet.com/ct.html?rtr=on&s=1,18oh,1,jdw1,kiff,9s3s,a9gz
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Fri Nov 19, 2004 8:49 am    Post subject: Reply with quote

As of November 19, 2004 (GMT -8:00 Pacific Standard Time), TrendLabs has
declared a Medium Risk Virus Alert to control the spread of WORM_SOBER.I.

TrendLabs has received numerous infection reports indicating that this malware
is spreading in France, Germany, and Australia.

This mass-mailing worm arrives on a system as an email message that has German
content. It propagates by sending copies of itself to certain email addresses,
which it gathers from files on the system with specific extension names.
However, it also avoids sending email messages to certain email addresses with
certain strings. It also drops several files in the Windows system folder and
creates registry entries to enable itself to run automatically at every system
startup.


TrendLabs will be releasing the following EPS deliverables:

TMCM Outbreak Prevention Policy 134
Official Pattern Release 2.255.00
Damage Cleanup Template 457

For more information on WORM_SOBER.I, you can visit our Web site at:
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SOBER.I

You can modify subscription settings for Trend Micro newsletters at:

http://www.trendmicro.com/subscriptions/default.asp


----------------------------------------------o0o----
IMPORTANT NOTE!
TrendLabs will also be releasing a 3-digit pattern file 984 that corresponds
with the pattern indicated in this email. This 3-digit pattern is a special
release for users running non-NPF compliant products (i.e., old 3-digit pattern
format) and is designed to provide protection against the most current malware
threats. Users running non-NPF compliant products are still urged to apply the
NPF solution <http://www.trendmicro.com/en/support/npf/overview.htm>. These
users may also upgrade to the latest product version. Only NPF-compliant
products will be able to update with regular pattern releases.


______________________________________________________________________
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Fri Nov 19, 2004 3:12 pm    Post subject: Reply with quote

11/19: Alert Goes Out for Sober-I Worm
Several security vendors have issued an alert for Sober.I, a worm that does not have any
destructive effects.
http://nl.internet.com/ct.html?rtr=on&s=1,18rr,1,f105,eowi,9s3s,a9gz
------------------------------------------------------------
4. 11/19: Sober-J Another Mass-Mailer Worm
W32/Sober.j@MM is a new variant of this mass-mailer, compressed with UPX, which sends
itself to harvested mail addresses found on an infected machine.
http://nl.internet.com/ct.html?rtr=on&s=1,18rr,1,jmfo,5kyz,9s3s,a9gz
------------------------------------------------------------
5. 11/19: Forbot-CP Worm Opens Remote Access
W32/Forbot-CP is a worm that attempts to spread to remote network shares.
http://nl.internet.com/ct.html?rtr=on&s=1,18rr,1,hx74,klhu,9s3s,a9gz
------------------------------------------------------------
6. 11/19: Backdoor.Sdbot-AF Spreads Via Shares
Backdoor.Sdbot.AF is a backdoor Trojan horse program that spreads via network shares and
allows a remote attacker to gain unauthorized access to the compromised system.
http://nl.internet.com/ct.html?rtr=on&s=1,18rr,1,3m7z,l1ob,9s3s,a9gz
------------------------------------------------------------
7. 11/19: Sdbot-AG Trojan Lets Hacker In
Backdoor.Sdbot.AG is a network-aware worm with backdoor capabilities that spreads via
network shares and allows a remote attacker to gain unauthorized access to the infected
computer.
http://nl.internet.com/ct.html?rtr=on&s=1,18rr,1,4ku7,h8f1,9s3s,a9gz
------------------------------------------------------------
8. 11/19: Rbot-QE Worm Spreads Via Shares
W32/Rbot-QE is a network worm that attempts to spread via network shares.
http://nl.internet.com/ct.html?rtr=on&s=1,18rr,1,do4l,2wdf,9s3s,a9gz
------------------------------------------------------------
9. 11/19: Agobot-OC a Trojan and Worm
W32/Agobot-OC is an IRC backdoor Trojan and network worm.
http://nl.internet.com/ct.html?rtr=on&s=1,18rr,1,esx9,e8t6,9s3s,a9gz
------------------------------------------------------------
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Sat Nov 20, 2004 2:33 pm    Post subject: Reply with quote

Weekly report on viruses and intruders -
Virus Alerts, by Panda Software (http://www.pandasoftware.com)

Madrid, November 19 2004 - This week's virus report looks at five worms
-Sober.I, Bagle.BG, Yanz.A, Drew.A and Aler.A-, and a Trojan called
Msnsoug.A.

Sober.I is sent by email using its own SMTP engine, in a message either in
German or English depending on the recipient. It gets email addresses from
the infected computer and stores them in files. In order to ensure it is run
whenever the computer is started up, it creates several entries in the
Windows registry.

Bagle.BG sends itself out in emails with variable characteristics. The
action it takes includes opening and listening on TCP port 2002. It acts as
a backdoor allowing access to the infected computer. Bagle.BG also
terminates processes belonging to certain applications that update antivirus
solutions, leaving the computer vulnerable to future attack.

Yanz.A is an email worm that spreads in messages with highly variable
characteristics and which displays false sender addresses. It can also use
P2P file-sharing programs to spread creating files, with variable names,
with copies of itself in folders whose name contains the letters 'shar'.
Both the messages and the shared files it creates, make reference to the
Chinese singer Sun Yan Zi.

Should the file containing the worm be executed, Yanz.A displays a small
window with the text "Kernel Hatasi". It also opens and listens on TCP port
67. Through this port it will try to download all shorts of malware which
Yanz.A will immediately execute.

Drew.A spreads both via email and P2P applications. In the first case it
uses its own SMTP engine to send messages with a highly variable format.
Both the message subject and text, along with the name of the attachment are
chosen at random from a list of options. To spread via P2P applications,
Drew.A searches all folders with the text 'share' and copies itself to these
folders using names aimed at enticing users such as "Cameron Dias.scr",
"Delphi 8 keygen.com" and "DrWeb 4.32 Key.com".

If a user runs one of the attachments with Drew.A, this worm creates two
files on the affected computer with copies of itself. At the same time, it
sends itself to all entries in the users address book and deletes all files
with HTM or TXT extension that it finds on the computer.

The last worm we'll look at today is Aler.A which, although it first
appeared a few days ago, has been distributed massively over the last week
in email messages. The messages have the subject "Latest News about Arafat
!!!", and include two attachments. One of them is an image file with a
picture of the funeral of the Palestinian politician. The other however,
contains code designed to exploit a vulnerability in Internet Explorer.
Through this flaw, it automatically installs the Aler.A worm which is
designed to spread across inadequately protected networks.

Today's report ends with Msnsoug.A, a Trojan that does not spread under its
own steam. Once it has infected a computer, it waits for a user to start a
MSN Messenger session and sends -to all contacts active at that moment- a
text message in Portuguese.

For further information about these and other computer threats, visit Panda
Software's Encyclopedia:
http://www.pandasoftware.com/virus_info/encyclopedia/

NOTE: The addresses above may not show up on your screen as single lines.
This would prevent you from using the links to access the web pages. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.

------------------------------------------------------------
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
wawadave
Warrior Obsessed


Joined: 25 Jan 2004
Last Visit: 24 Jul 2009
Posts: 3448
Location: Illegitimus non carborundum

PostPosted: Sat Nov 20, 2004 2:35 pm    Post subject: Reply with quote

- Panda Software reports the appearance of Sober.I -
Virus Alerts, by Panda Software (http://www.pandasoftware.com)

MADRID, November 19, 2004 - PandaLabs has detected the appearance of a new
worm called Sober.I. This malicious code is designed to spread rapidly via
email in a message that can be written in English or German. According to
data gathered by Panda Software's international tech support network,
Sober.I is starting to spread across German-speaking countries, such as
Germany and Austria, causing incidents in users' computers.

The messages carrying Sober.I have extremely variable characteristics, as
the subject, message body and name of the attachment are all selected at
random. If the user runs the file containing Sober.I, it creates a large
number of files on the computer, such as clsobern.isc and nonzipsr.noz,
which are copies of the worm, or logsys.exe and syssmss32.exe, which are
files used by the worm to carry out its actions.

When it has been run, Sober.I looks for email addresses on the affected
computer, which it then sends itself out to using its own SMTP engine. If
the domain of the email address belongs to Switzerland (.ch), Germany (.de),
Austria (.at) or Liechtenstein (.li), the worm inserts German texts in the
email message. If the domain is any other than those mentioned above the
email will be sent in English.

Finally, Sober.I inserts several entries in the Windows Registry in order to
ensure that it is run whenever the computer is started.

Due to the high possibility of being infected by Sober.I, Panda Software
advises users to take precautions and update their antivirus software. Panda
Software has made the corresponding updates available to its clients to
detect and disinfect this new malicious code.

In addition, users can scan their computers online for free with the Panda
ActiveScan, available at http://www.pandasoftware.com/

For further information about Sober.I visit Panda Software's Virus
Encyclopedia at: http://www.pandasoftware.com/virus_info/encyclopedia/

NOTE: The addresses above may not show up on your screen as single lines.
This would prevent you from using the links to access the web pages. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.
_________________
RFID tags! SPYWARE
Tired of proprietary Cor-pirationware?
http://www.openoffice.org/
Installing Vista http://tinyurl.com/2l9qyd
Back to top
View user's profile Send private message Send e-mail Visit poster's website
Display posts from previous:   
Post new topic   Reply to topic    Spyware Warrior Forum Index -> Virus, Worm &Trojan Alerts All times are GMT - 8 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum



smartBlue Style © 2002 Smartor
Powered by phpBB © 2001, 2002 phpBB Group