• CYBER-DANGER Echolist Update

    From EList v4.3.C MaintBot@1:393/68 to Andrew Leary on Friday, October 26, 2018 09:55:04
    Echo successfully ADDED.

    TAGname: CYBER-DANGER GROUP: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    DESCription: This echo will apply to all Computer operating systems but
    will be of keen interest to those running Microsoft Windows. This echo is
    for the discussion of the various computer viruses, worms, trojans and
    rootkits that have been known, are known or will be known to infect our
    chosen operating systems. Additionally the discussion of what are known as
    Rogue Security Applications is encouraged. Rogue Security Applications are
    programs written to pose as legitimate security programs to coerce a user
    to install them and register them but in reality these programs cripple
    the host system and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    MODerator: Andrew Leary, 1:320/219.0@fidonet
    Email: ajleary19{at}gmail.com

    ORIGin: 1:320/219

    RESTrictions: /REAL {REAL Names ONLY}

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219

    Updated on: 10/26/2018

    -=:{ End of Report }:=-

    --- Mystic BBS v1.12 A39 (Windows/32)
    * Origin: FIDONet - The Positronium Repository (1:393/68)
  • From Vincent Coen@2:250/1 to Andrew Leary on Saturday, March 21, 2020 21:23:25
    Echo successfully Added.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    DESCription:
    This echo will apply to all Computer operating systems but
    will be of keen interest to those running Microsoft Windows. This echo is
    for the discussion of the various computer viruses, worms, trojans and
    rootkits that have been known, are known or will be known to infect our
    chosen operating systems. Additionally the discussion of what are known as
    Rogue Security Applications is encouraged. Rogue Security Applications are
    programs written to pose as legitimate security programs to coerce a user
    to install them and register them but in reality these programs cripple
    the host system and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19{at}gmail.com

    ORIGIN: 1:320/219

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219

    Updated on: 2018/10/26 and valid till 2019/04/30

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.7.13 (GNU/Linux-x86_64)
    * Origin: Air Applewood, The Linux Gateway to the UK & Eire (2:250/1)
  • From Vincent Coen@2:250/1 to Andrew Leary on Saturday, June 13, 2020 09:30:01


    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2020/06/13 and valid till 2020/12/31

    Produced by Elist v5.1.063c

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.7.17 (GNU/Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From Vincent Coen@2:250/1 to Andrew Leary on Sunday, January 03, 2021 06:30:01
    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2021/01/03 and valid till 2021/07/31

    Produced by Elist v5.2.007

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.7.17 (GNU/Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From Vincent Coen@2:250/1 to Andrew Leary on Wednesday, September 08, 2021 09:30:01


    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2021/09/08 and valid till 2022/03/31

    Produced by Elist v5.2.028

    -=:{ End of Report }:=-
    --- MBSE BBS v1.0.7.22 (GNU/Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From elistmaint@2:250/1 to Andrew Leary on Thursday, January 02, 2025 15:48:34


    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2025/01/02 and valid till 2025/11/30

    Produced by Elist v5.4.41

    -=:{ End of Report }:=-


    --- MBSE BBS v1.1.0 (Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)