|
What's got the French Government in a lather about the theme song[^] for France in the upcoming UEFA European Championships? What do you think?
I am not a number. I am a ... no, wait!
|
|
|
|
|
Another reason not to ask for things on the internets.
I'd rather be phishing!
|
|
|
|
|
One could only hope that the French would be as repulsed by the moronic lyrics and stultified melody of this old Kiss cover, as they are revolted by the lead singer's antics, as they are disgusted by the use of a song written in Anglo-Saxon-Pig-Grunt slathered with veneers of Latin and Greek language rather than
la langue éternellement glorieuse.
«There is a spectrum, from "clearly desirable behaviour," to "possibly dodgy behavior that still makes some sense," to "clearly undesirable behavior." We try to make the latter into warnings or, better, errors. But stuff that is in the middle category you don’t want to restrict unless there is a clear way to work around it.» Eric Lippert, May 14, 2008
|
|
|
|
|
|
BillWoodruff wrote: a song written in Anglo-Saxon-Pig-Grunt slathered with veneers of Latin and Greek language rather than
la langue éternellement glorieuse That would have been my guess, because there was no way in the world that I was going to sit through the whole God-awful racket to look for another reason.
And "Kiss", of course, translates to "Baise"; but that's probably too sophisticated a reason for the kind of people we're talking about.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
BillWoodruff wrote: la langue éternellement glorieuse.
...which reminds me, of course, that Chauvin was, after all, a Frenchman.
|
|
|
|
|
I think a bad song was made worse and that the French Government should have other things to worry about
|
|
|
|
|
Is there a difference between artificial intelligence and intelligent programming?
|
|
|
|
|
No, they are both missing in QA
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
|
|
|
|
|
Are you trying to appeal to the faddish readers of the Codeproject site now? You should be a politician
|
|
|
|
|
Kenneth Haugland wrote: the faddish readers of the Codeproject site
Wouldn't that be the empty set?
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
Perhaps that is the problem
|
|
|
|
|
Neither exists, so no.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
When honey is very cold, it drips in a supremely elegant slow way off the spoon down to the waiting latte: the ants may have time to crawl all the way up you, and out on your suspended arm holding the spoon, and, if they fall while tasting that cold honey, fall into the latte, who is to say if that ant's life was fulfilled, or wasted ?
«There is a spectrum, from "clearly desirable behaviour," to "possibly dodgy behavior that still makes some sense," to "clearly undesirable behavior." We try to make the latter into warnings or, better, errors. But stuff that is in the middle category you don’t want to restrict unless there is a clear way to work around it.» Eric Lippert, May 14, 2008
|
|
|
|
|
BillWoodruff wrote: who is to say if that ant's life was fulfilled, or wasted ?
That's very zen of you.
Marc
|
|
|
|
|
Well, when you consider that we're moving towards AI doing IP, I guess the line gets rather fuzzy.
Marc
|
|
|
|
|
I and family members have seen a nasty increase in malware emails that most likely will plant a Ransom Virus if the attachment is acted upon. We now get several every week and sometimes several in one day.
One of the most insidious is an email where the sender is spoofed to be Amazon. The "Amazon" message will seem to announce a shipment having been sent. However, there are two tell tale warning signs: 1) It is sent to an email address that only my friends and family know. I use a different email address for Amazon. 2) The message is empty, except for an attached Word document. Amazon never attaches Word documents to their emails. Like I'm going to open such a Word document and run the risk of a malicious macro getting run on my machine.
The other type will be an empty email from myself to myself. It has an attached zip file that contains a Javascript file. If you look into the message header it is full of Arabic characters and is sent from a domain in Iran. Of course I am in the habit of running Javascripts from unknown sources on my machine.
Now here's the bummer: If I scan these obviously malicious messages with Defender and Malwarebytes, they come up clean! I was wondering if anyone else has had similar experiences?
Get me coffee and no one gets hurt!
modified 3-May-16 8:58am.
|
|
|
|
|
I kinda want a copy of the JS file to dissect.
i cri evry tiem
|
|
|
|
|
Next time I get one, I will see if I can get it to you. (I don't think CP will appreciate it, if I sent it to you via their servers.)
Get me coffee and no one gets hurt!
|
|
|
|
|
I could send you a few - well, could if I wasn't anon. Oh well.
Let me tell you, from what I've dissected from every single one of them, is they go thru about 1 or 2 levels of obfuscation of the code (eval'ing one segment to run another segment that eval's a third), plus a bunch of weird function calls (like calling one function to get a bit of a string, calling another that evals it and returns the result, calling a third to get another piece and multiply it by 5, then calling yet another to take all those pieces as arguments and return a concatenated string of substrings - that kind of stuff), ultimately what resolves/results is a URL that is then queried using an XMLHttpRequest object (aka, AJAX), or something similar - that goes out to some server (ident'd by IP or some domain), grabs an EXE, saves it, and executes it.
It's obvious from all the layers of obfuscation that the code is made this way - likely by some kind of "trojan generator" (which can probably be easily found on the dark web or elsewhere) - to both get by filters for trojans, as well as make it difficult for most people to decipher what is going on if they see the code. Ultimately, none of this is very interesting or unique - it's all a well known form of attack and documented.
Generally, though, that IP/domain has already been disabled, or the EXE has been deleted or wiped, at least in most of the cases I have tried. Only on a very few occasions have I been able to download the executable. In those cases, I try to alert the owner of the IP or domain if I can do a whois or reverse DNS search to know what provider I am dealing with - then I'll send an email to the admin contact or wherever.
I find it funny, though, when I get these emails - I always try to figure them out, hoping someday that what I'll download is a bash script or something similar; you see, my main workstation has been a linux box of one form or another since 1995 or so - and I keep hoping that these guys move on to doing things targeting Macs, Linux, or some other *nix platform, but it hasn't happened yet.
Even if it did run, the worst thing that will happen is that I have to re-image from a backup of my system - big whoop. The upside will be that I will know for certain that the "year of linux on the desktop" has finally arrived, and that linux has "jumped the shark", and I need to move to another obscure platform (maybe BSD? lolz) just to stay ahead of the game.
I'm not holding my breath on that, though - and for that, I am thankful!
|
|
|
|
|
For the last month I've also seen a massive increase in these emails and I now also get several a day. Most are easily seen as fakes but some are actually scarily good. Not good enough to convince me to open the attachment, but I'm sure many will be. Some emails appear to be copies of actual invoice emails sent from the alleged source company so everything checks out, the contact numbers, the "from address" and it looks legit. I also feel sorry for the companies that are being spoofed as I saw the rise of these emails on the BBC and they say that the companies being spoofed are being inundated with calls from angry people asking why they are chasing invoices for things they didn't order.
|
|
|
|
|
Oh yes, I forgot about the fake invoices. I get those too.
Get me coffee and no one gets hurt!
|
|
|
|
|
And the fake tax refunds, had one that looked very much like an HMRC mail, but they don't send attachments.
|
|
|
|
|
HMRC definitely don't send attachments with refunds, that's for sure.
I may not last forever but the mess I leave behind certainly will.
|
|
|
|
|
Usually I don't - I mean, U receive a lot of those e-mail but they are egregiusly filtered by Big G spam filter and end up in the Spam folder. I rarely receive spam or phishing between the good e-mails.
GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver
|
|
|
|