Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


Windows 10: If you want a highly secure device, follow these rules, says Microsoft

Microsoft has published a new standard for creating a very secure Windows 10 machine.

Windows 10: If you want a highly secure device, follow these rules, says Microsoft

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: P2P programs, cracks, keygens in FRST logs and other reports.  (Read 6354 times)

0 Members and 1 Guest are viewing this topic.

StarbuckTopic starter

  • Site Owner
  • *
  • Offline Offline
  • location: Midlands. UK
  • Posts: 3420
  • .: Leader Malware Analysis & Removal Team
  • -: Site Help Desk - Support Department
    • WWW
Our position on this issue:
We are trying to be sensible on this.... we know that most people will probably use some form of P2P program.
But we do have to state that it is our recommendation that you remove these programs from your system.

Please note that as long as you're using any form of Peer-to-Peer networking (Morpheus, Ares, Limewire, etc.) and downloading files from non-documented sources, you can expect infestations of malware to occur.
Once upon a time, P2P file sharing was fairly safe. That is no longer true.

P2P programs form a direct conduit on to your computer. Their security measures can be easily circumvented and malware writers are increasingly exploiting them to spread their wares on to your computer. Further to that, if the P2P program is not configured correctly, your computer will be sharing more files than you realise. There have been cases where people's passwords, address books and other personal, private, and financial details have been exposed to a file sharing network by a badly configured P2P program.

This article from InfoWorld illustrates the dangers of a poorly configured P2P program.
http://www.vista-xp.co.uk/forums/redire ... eft_1.html

Many P2P programs come bundled with other unwanted programs but even P2P programs free of any bundled software are not safe to use.

When you use P2P programs you are downloading software from an unknown source directly on to your computer, bypassing your firewall and antivirus software. It should come as no surprise that many of these downloads are targeted to carry infections.

Regardless of the program used, the practice of file-sharing is very unsafe for the health of your PC.
The removal of these programs for your 1st log reading are entirely up to you.... but we hope that you follow our recommendation.

This said...
If we see any evidance of illegal downloads...(keygens, crack programs etc) you will be asked to remove them or the 'Helper' may remove them with a fix before any further help is given.
Also remember that even if you do remove them.... the 'Helper' is still well within their rights to refuse to help further.
We can't be seen to help with illegal actions.... and we won't.

If you have malware cleaned from your system by one of our Malware Analysis & Removal Team/Malware Hunters and then later return with more infections....and these P2P programs are still installed, you maybe refused help.

* Permissions
You can't post new topics.
You can't post replies.
You can post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks