Welcome GUEST!      CREATE ACCOUNT - Forgot Password?

Create an account to share your experiences and more!

E-MAIL   PASS  

Auto Log-in Future Sessions (on this computer).
  
Forum Thread A note about the site and any replies from other users.
Porn Users Forum » MALWARE, SPYWARE, ADWARE, VIRUSES!
1-21 of 21 Posts Page 1
 
Thread Nav :  Refresh Page  |   First Post  |   Last Post  |   Porn Forum Home

05-08-17  10:08am - 2742 days Original Post - #1
Darius (0)
Suspended



Posts: 46
Registered: Aug 11, '16
MALWARE, SPYWARE, ADWARE, VIRUSES!

So, it's been a long time since I've personally been affected by malware, spyware, adware, viruses and the like from surfing porn, but I wonder if it's still a major problem for other consumers?

If you know of any specific ways to avoid such problems or better yet, if you know which specific sites and sources still begat such problems, please post below.

Thanks!!! -D

05-08-17  12:33pm - 2742 days #2
mbaya (0)
Suspended



Posts: 891
Registered: Jul 07, '08
Location: new jersey
I have never been affected by any of these when using pay sites.

05-08-17  04:05pm - 2742 days #3
rearadmiral (0)
Active User

Posts: 1,453
Registered: Jul 16, '07
Location: NB/Canada
I'm the last guy who should weigh in on this as I have no idea what I'm talking about, but... it seems to me that with software like MS Defender running things should be safer. I had a chat with a tech person who told me that getting rid of AVG and running Defender was the better choice.

And avoiding viruses is another great reason why most of us here are happy to pay for our porn on reputable sites.

05-08-17  04:15pm - 2742 days #4
LPee23 (0)
Active User



Posts: 399
Registered: Jul 14, '13
Location: USA
I have never had trouble with malware from a paysite.

I also use NoScript, AbBlock Plus, and Symantec Endpoint Protection to play it safe. Better to be pissed on, than to be pissed off.

05-08-17  06:05pm - 2742 days #5
pat362 (0)
Active User



Posts: 3,575
Registered: Jan 23, '07
Location: canada
The death of Microsoft's Operating System XP made things significantly better for me because that was probably the worst operating system when it comes to viruses and malware. It was so bad that Microsoft couldn't keep up with all the A..holes making new and more devious ways to fuck with people.

These days I use Win 7 and I have yet to be infected with anything. Long live the Brown Coats.

05-09-17  12:46pm - 2741 days #6
mbaya (0)
Suspended



Posts: 891
Registered: Jul 07, '08
Location: new jersey
I had XP for years. No malware from paysites ever.

The bottom line is that paying for porn should and does provide a decent degree of protection even before you use any protection programs.

I would never advocate not using antivirus or other methods of reducing the likelihood of malware. That is just common sense.

But,surf for free porn and who knows what can happen to your computer?

05-09-17  01:17pm - 2741 days #7
lk2fireone (0)
Active User



Posts: 3,618
Registered: Nov 14, '08
Location: CA
Originally Posted by mbaya:



But,surf for free porn and who knows what can happen to your computer?


I SOMETIMES DOWNLOAD FROM USENET SITES.
AND SOME FILES CAN BE INFECTED.
BUT SINCE I ALSO HAVE NORTON ANTI-VIRUS PROTECTION, THAT USUALLY ISOLATES AND REMOVES ANY MALWARE PROGRAMS.

I HAVEN'T USED THE USENET SITES VERY MUCH LATELY.
BUT THEY WERE A GOOD SOURCE FOR GETTING THE OLD PLAYBOY PHOTOS OF PLAYMATES.
A MUCH BETTER SOURCE THAN THE PLAYBOY SITES THEMSELVES, FOR SOME REASON.
BETTER FILES FROM THE USENET THREADS: MORE COMPLETE, AND BETTER FORMATTED JPG FILES.

BUT I AGREE WITH YOUR EXPERIENCE FROM PORN PAYSITES: I DON'T RECALL EVER GETTING ANY MALWARE FROM A PORN PAYSITE, IN ALL THE YEARS I'VE BEEN STREAMING AND DOWNLOADING.
I USED TO EXAMINE EACH FILE I DOWNLOADED FROM ANY PORN PAYSITE WITH NORTON ANTI-VIRUS.
I NEVER FOUND A SINGLE INSTANCE WHERE A FILE WAS INFECTED.
THAT'S BEEN OVER 10 YEARS, NOW. OR MORE.
BUT LATELY, I'VE STOPPED CHECKING THE FILES FROM METART.
I FIGURE:
1. THE FILE IS ALMOST CERTAINLY CLEAN.
2. IF THE FILE IS INFECTED, NORTON ANTI-VIRUS WILL ISOLATE IT, WHEN I EXPAND THE ZIP FILE.
3. GETTING LAZY IN MY OLD AGE. Edited on May 09, 2017, 01:28pm

05-09-17  01:37pm - 2741 days #8
biker (0)
Active User



Posts: 632
Registered: May 03, '08
Location: milwaukee, wi
I also have Norton and have no trouble. Norton has gotten better over the years and it has been many since any virus or malware has infected my computer. If it should happen, Norton will fix it immediately. As for porn pay-sites, I have never had any trouble with them. Warning Will Robinson

05-10-17  05:41am - 2740 days #9
jook (0)
Active User



Posts: 325
Registered: Dec 22, '13
Location: jersey city
Originally Posted by lk2fireone:


I SOMETIMES DOWNLOAD FROM USENET SITES.


I didn't know usenet still existed! What memories. Is it worthwhile or is it still like the wild west?

05-10-17  06:28am - 2740 days #10
pat362 (0)
Active User



Posts: 3,575
Registered: Jan 23, '07
Location: canada
Originally Posted by mbaya:


I had XP for years. No malware from paysites ever.


The problem for me is that you could easily get infected by visiting non-porn sites because the A..Holes who created the various viruses and malware would seed multiple sites with their brand of fuckery. I should know because I got infected visiting those non-porn sites. Long live the Brown Coats.

05-10-17  08:47am - 2740 days #11
lk2fireone (0)
Active User



Posts: 3,618
Registered: Nov 14, '08
Location: CA
Originally Posted by jook:


I didn't know usenet still existed! What memories. Is it worthwhile or is it still like the wild west?


USENET IS STILL AROUND.
IT'S VERY CHEAP TO USE (TO BUY A MONTHLY MEMBERSHIP).

BUT MY MAIN INTEREST WAS IN COLLECTING PHOTOS OF PLAYBOY PLAYMATES.
AND THOSE SITES DON'T SEEM TO BE AS ACTIVE AS THEY USED TO BE FORMERLY. SO IT'S HARDER TO COLLECT ALL THE PHOTOS OF THE PLAYBOY PLAYMATES.

YOU COULD JOIN FOR A MONTH, AND DO A SEARCH FOR THREADS THAT MIGHT INTEREST YOU.
THE COST WOULD BE VERY LOW. MAYBE $6 OR LESS.
THERE ARE ALSO FREE TRIALS AVAILABLE FOR 30 DAYS.
YOU WOULD NEED A PROGRAM TO HELP DOWNLOAD FILES, SOME OF THOSE PROGRAMS ARE FREE.
BUT THERE ARE THOUSANDS OF THREADS, MOST OF THEM NOT ACTIVE.
ON DIFFERENT TOPICS.

SO IS IT WORTHWHILE HAVING A USENET ACCOUNT?
THE PRICE IS VERY LOW.
BUT IT DEPENDS ON WHAT YOUR INTERESTS ARE.
WHETHER YOU WILL FIND THREADS THAT INTEREST YOU.
AND IF YOU HAVE THE TIME FOR THEM.
AND THERE IS A LEARNING CURVE, IF YOU HAVEN'T USED USENET IN A WHILE.

AND YES, IT'S STILL LIKE THE WILD WEST.
LOTS OF VIRUSES/MALWARE.
A LOT OF SPAM ON MOST THREADS.
YOU DEFINITELY NEED A STRONG ANTI-VIRUS PROGRAM.

IS USENET USEFUL OR WORTHWHILE FOR YOU?
THAT'S A PERSONAL DECISION. THAT YOU HAVE TO MAKE.

05-12-17  09:06am - 2738 days #12
Cybertoad (0)
Disabled User



Posts: 2,158
Registered: Jan 01, '08
Location: Wash
I think most viruses reported, had to do with also illegal downloads and that seems to have slowed way down.
So my guess is so will infections.

I can't recall ever getting a virus, got a malware once on free site but my PC stopped the infection.

WOW, usenet good times forgot about those. Since 2007

05-12-17  01:16pm - 2738 days #13
lk2fireone (0)
Active User



Posts: 3,618
Registered: Nov 14, '08
Location: CA
COMPUTER SECURITY IS A COMPLEX ISSUE.

HACKERS CAN USE INGENIOUS METHODS TO CAPTURE YOUR DATA.

READ THE ARTICLE BELOW, TO SEE HOW HACKERS INSTALLED MALWARE ON BRAND-NEW HP COMPUTERS.

============================================================
http://www.zdnet.com/article/keylogger-f...84754384421679931766


HP issues fix for 'keylogger' found on several laptop models

A security researcher says an audio driver is recording every keystroke entered, accessible to any person or malware that knows where to look.


Zack Whittaker

By Zack Whittaker for Zero Day | May 12, 2017 -- 00:30 GMT (17:30 PDT) | Topic: Security

An audio driver installed in several HP laptops contains a keylogger-type feature that records every keystroke entered into the computer into a log file, according to a security researcher.

Swiss security firm Modzero said in a security advisory posted Thursday that the keylogger activity was discovered in the Conexant HD audio driver package (version 1.0.0.46 and earlier), found on dozens of HP business and enterprise laptop models, including HP Elitebook, ProBook, and ZBook models -- including the latest Folio G1 laptop.

Anyone (or malware) with local access to the user's files on an affected computer, could obtain passwords, visited web addresses, private messages, and other sensitive information.

HP has since rolled out patches to remove the keylogger, which will also delete the log file containing the keystrokes.

A spokesperson for HP said in a brief statement: "HP is committed to the security and privacy of its customers and we are aware of the keylogger issue on select HP PCs. HP has no access to customer data as a result of this issue."

HP vice-president Mike Nash said on a call after-hours on Thursday that a fix is available on Windows Update and HP.com for newer 2016 and later affected models, with 2015 models receiving patches Friday. He added that the keylogger-type feature was mistakenly added to the driver's production code and was never meant to be rolled out to end-user devices.

Nash didn't how many models or customers were affected, but did confirm that some consumer laptops were affected.

He also confirmed that a handful of consumer models that come with Conexant drivers are affected.

The pre-installed audio driver installs a driver located in the Windows system folder, which is scheduled to start every time the user logs in. Modzero describes the application as a crude way to check to see if a hotkey was pressed by monitoring "all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkey."

The application then logs each keystroke into an unencrypted log file stored in the user's home directory. The log file is overwritten every time the user logs in.

In the case that a log file doesn't exist, Modzero says that the driver's API can allow malware to "silently capture sensitive data by capturing the user's keystrokes."

We weren't immediately able to confirm the findings, but a security researcher (who wanted to remain nameless) confirmed the findings of the advisory in a message to ZDNet.

Conexant did not respond to a request for comment at the time of writing.

Updated at 8:30pm: with commentary from HP.

05-12-17  01:23pm - 2738 days #14
jook (0)
Active User



Posts: 325
Registered: Dec 22, '13
Location: jersey city
Do you have a recommendation for software and a service?

05-12-17  01:24pm - 2738 days #15
jook (0)
Active User



Posts: 325
Registered: Dec 22, '13
Location: jersey city
Trade in your PC for a Mac. Problem solved, mostly.

05-13-17  06:56pm - 2737 days #16
lk2fireone (0)
Active User



Posts: 3,618
Registered: Nov 14, '08
Location: CA
Originally Posted by jook:


Trade in your PC for a Mac. Problem solved, mostly.


I READ THAT YEARS AGO, THAT WAS TRUE: THAT MOST MALWARE WAS FOR THE PC, INSTEAD OF THE MAC.

BUT IN RECENT YEARS, DUE TO THE GROWING POPULARITY OF MACS,
MALWARE FOR MACS ARE BECOMING MORE COMMON.

SO I WOULD GUESS THAT MACS SHOULD BE PROTECTED BY A STRONG ANTI-VIRUS PROGRAM, IN ADDITION TO PCS BEING PROTECTED BY A STRONG ANTI-VIRUS PROGRAM.

BUT THE TRUTH IS, ANY DATA ON YOUR PC OR MAC CAN BE VULNERABLE TO HACKS.
THE ARTICLE ABOVE IS ONE EXAMPLE WHERE HACKERS ADDED MALWARE TO A PROGRAM THAT WAS INSTALLED BY THE MANUFACTURER (HP) ON THEIR NEW COMPUTERS.
I'VE READ ARTICLES WHERE HACKERS INSTALLED MALWARE ON NEW HARD DRIVES (BEFORE THEY WERE INSTALLED BY THE MANUFACTURERS ON NEW PCS.

05-14-17  11:26pm - 2736 days #17
Grumpy (0)
Suspended



Posts: 4
Registered: May 14, '17
Location: Western Australia
If your on a free porn site, always run a anti virus.
Bit defender catches malware for me.

05-15-17  07:27am - 2735 days #18
iknowwazzup (0)
Active User



Posts: 132
Registered: Jan 06, '16
Location: United States
Yeah, the only times that I have ever encountered problems has involved free porn. And I don't mean downloading torrents or something, it's been when checking out tube sites.

Some are probably safe because they're actually owned and operated by the same folks that run some the larger paysite networks. However, some are really fly by night operations and so it's hard to know if they're the direct source of malware or if they simply don't secure their sites properly against hackers.

Anyway, I've found that it was a lot safer to just stick with paysites. Sure, you have to watch out for cross sales when you're signing up, but other than that, you're far less likely to have issues with your cc info being compromised or getting viruses and malware on your PC.

05-16-17  01:22pm - 2734 days #19
messmer (0)
Disabled User



Posts: 2,582
Registered: Sep 12, '07
Location: Canada
Originally Posted by pat362:


The problem for me is that you could easily get infected by visiting non-porn sites because the A..Holes who created the various viruses and malware would seed multiple sites with their brand of fuckery. I should know because I got infected visiting those non-porn sites.


I can vouch for that, Pat. I got a very serious virus last year on my old computer from a (phished?) Canada Revenue Page!

05-16-17  05:21pm - 2734 days #20
lk2fireone (0)
Active User



Posts: 3,618
Registered: Nov 14, '08
Location: CA
Originally Posted by jook:


Trade in your PC for a Mac. Problem solved, mostly.





Apple fixes dozens of security bugs for iPhones, Macs

The company released iOS 10.3.2 for iPhones and iPads. It also released macOS 10.12.5.
Zack Whittaker

By Zack Whittaker for Zero Day

May 15, 2017 -- 19:06 GMT (12:06 PDT)

Topic: Security


Apple has squashed dozens of security bugs in its latest releases of its iPhone, iPad, and Mac operating systems.

The Cupertino, Calif.-based company rolled out 23 security fixes in iOS 10.3.2 and another 30 fixes in macOS 10.12.5, both of which were released on Monday.

Among the bugs, two bugs in iBooks for iOS could allow an attacker to arbitrarily open websites and execute malicious code at the kernel level. Over a dozen flaws were found in WebKit, which renders websites and pages on iPhones and iPads, that could allow several kinds of cross-site scripting (XSS) attacks.

A separate flaw in iBooks for macOS desktops and notebooks could allow an application to escape its secure sandbox, a technology used to prevent data loss or theft in the case of an app compromise.

Almost half of the bugs found were attributed to Google's Project Zero, the search giant's in-house vulnerability-finding and security team.

One of the iOS bugs credited to Synack security researcher Patrick Wardle described a kernel flaw in which a malicious application could read restricted memory, such as passwords or hashes.

In a blog post last month, Wardle explained how he found the zero-day flaw following a supposed fix in an earlier version of macOS 10.12. He said that Apple's patch "did not fix the kernel panic" and worse, "introduced a kernel info leak, that could leak sensitive information" that could bypass the operating system's security feature that randomizes the kernel's memory address locations.

In an email, Wardle admitted he "didn't realize it affected iOS too."

Patches are available through the usual automatic update channels.


© 2017 CBS Interactive.

05-18-17  10:08am - 2732 days #21
lk2fireone (0)
Active User



Posts: 3,618
Registered: Nov 14, '08
Location: CA
THE FBI AND NSA ARE FIGHTING COMPUTER MALWARE.
BUT THEY ARE ALSO RESPONSIBLE FOR SPREADING MALWARE, BUT LEGALLY AND ILLEGALLY.

READ THE ARTICLE BELOW:
=======
=======



Ransomware has evolved to take on bigger targets, and has become more dangerous along the way.

By Steve Ranger

May 16, 2017 -- 13:18 GMT (06:18 PDT)

Topic: Cyberwar and the Future of Cybersecurity


Ransomware was already becoming a higher priority before the WannaCry epidemic of last week, but it's clear that it has now made the shift from nuisance to serious threat.


Ransomware has been an irritation for more than a decade, but only in the last few years has it become a real problem. In the early days the victims were mostly home users, who had unwisely clicked on an a bogus attachment in an email and found their PC locked and their files and family photos encrypted. In the last couple of years, however, the focus has turned to businesses, who have more PCs and more data to compromise -- and deeper pockets to pay the ransom.

But now the UK's National Cyber Security Centre has described WannaCry as a "global coordinated ransomware attack" on thousands of private and public sector organisations across dozens of countries, showing how ransomware has taken another big step -- becoming a threat to nations and not just businesses.

What makes ransomware so effective is that it targets what's really important: data, be it a family's wedding photos or a company's invoices. It might lack finesse -- the malware simply encrypts anything it can find -- but it's brutally effective.


This evolution has not gone unnoticed: both the head of the US Cyber Command Admiral Michael Rogers and US Director of National Intelligence Dan Coats mentioned the risks of ransomware in recent testimony to US senate committees. But neither will have expected such immediate confirmation as the WannaCry epidemic, which went global last week.

Rogers warned that over the last year the US has seen increased use of ransomware against individuals and businesses. While this is usually seen as a standard police issue, or for the FBI to deal with, Rogers said ransomware was something that could become a military concern.

"Criminal actors become a military concern when malicious state cyber actors pose as cyber criminals, or when cyber criminals support state efforts in cyberspace. This means that we take notice when cybercriminals employ tactics, techniques and procedures used by state adversaries," he said (PDF).

The WannaCry ransomware was so potent largely because of a software exploit stolen from the NSA -- also, ironically, headed by Rogers. This also reflects the complicated set of factors underlying WannaCry's effectiveness.

The US Intelligence worldwide threat assessment (PDF) presented by Coats to the US senate select committee on intelligence also highlighted that ransomware had become a particularly popular tool of extortion, noting that criminals employing ransomware had turned their focus to the medical sector, "disrupting patient care and undermining public confidence in some medical institutions".

There are over 50 different ransomware variants in circulation and -- as the rise of WannaCry shows -- it's relatively easy to bolt on additional features that can make the malware more powerful. In this case, what made it so effective was the ability for the malware to spread from PC to PC without user intervention.

Some police forces and cybersecurity firms have done a good job of making it easier to foil ransomware -- for example, the No More Ransom initiative hosts a number of tools that can free encrypted data without having to pay a ransom.

But the difficulty of finding and prosecuting those behind ransomware attacks, plus the ease with which they can be assembled, mean that this threat is likely to be with us for the foreseeable future.


© 2017 CBS Interactive.

1-21 of 21 Posts Page 1
 
Thread Nav :  Refresh Page  |   First Post  |   Last Post  |   Porn Forum Home


Home - Sites - Users - Reviews - Comments - Categories - Forum

Contact Us - Announcements - FAQ's - Terms & Rules - Cookies - DMCA - 2257 - Porn Review - Webmasters

Protecting Minors
We are strong supporters of RTA and ICRA, two of the most recognized self labeling organizations. Our site is properly labeled to assist in the protection of minors accessing inappopriate content. For information about filtering tools, check this site.

DISCLAIMER: ALL MODELS APPEARING ON THIS WEBSITE ARE 18 YEARS OR OLDER.

To report child pornography, go directly to ASACP!  We're proud to be a corporate sponsor.
Have concerns or questions about porn addiction?  We recommend this helpful resource.

All Rights Reserved © 2003-2024 PornUsers.com.


Loaded in 0.01 seconds.