• CYBER-DANGER Echolist Update

    From EList v4.3.C MaintBot@1:393/68 to Andrew Leary on Fri Oct 26 09:55:04 2018
    Echo successfully ADDED.

    TAGname: CYBER-DANGER GROUP: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    DESCription: This echo will apply to all Computer operating systems but
    will be of keen interest to those running Microsoft Windows. This echo is
    for the discussion of the various computer viruses, worms, trojans and
    rootkits that have been known, are known or will be known to infect our
    chosen operating systems. Additionally the discussion of what are known as
    Rogue Security Applications is encouraged. Rogue Security Applications are
    programs written to pose as legitimate security programs to coerce a user
    to install them and register them but in reality these programs cripple
    the host system and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    MODerator: Andrew Leary, 1:320/219.0@fidonet
    Email: ajleary19{at}gmail.com

    ORIGin: 1:320/219

    RESTrictions: /REAL {REAL Names ONLY}

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219

    Updated on: 10/26/2018

    -=:{ End of Report }:=-

    --- Mystic BBS v1.12 A39 (Windows/32)
    * Origin: FIDONet - The Positronium Repository (1:393/68)
  • From Vincent Coen@2:250/1 to Andrew Leary on Sat Mar 21 21:23:25 2020
    Echo successfully Added.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    DESCription:
    This echo will apply to all Computer operating systems but
    will be of keen interest to those running Microsoft Windows. This echo is
    for the discussion of the various computer viruses, worms, trojans and
    rootkits that have been known, are known or will be known to infect our
    chosen operating systems. Additionally the discussion of what are known as
    Rogue Security Applications is encouraged. Rogue Security Applications are
    programs written to pose as legitimate security programs to coerce a user
    to install them and register them but in reality these programs cripple
    the host system and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19{at}gmail.com

    ORIGIN: 1:320/219

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219

    Updated on: 2018/10/26 and valid till 2019/04/30

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.7.13 (GNU/Linux-x86_64)
    * Origin: Air Applewood, The Linux Gateway to the UK & Eire (2:250/1)
  • From Vincent Coen@2:250/1 to Andrew Leary on Sat Jun 13 09:30:01 2020
    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2020/06/13 and valid till 2020/12/31

    Produced by Elist v5.1.063c

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.7.17 (GNU/Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From Vincent Coen@2:250/1 to Andrew Leary on Sun Jan 3 06:30:01 2021
    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2021/01/03 and valid till 2021/07/31

    Produced by Elist v5.2.007

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.7.17 (GNU/Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From Vincent Coen@2:250/1 to Andrew Leary on Wed Sep 8 09:30:01 2021


    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2021/09/08 and valid till 2022/03/31

    Produced by Elist v5.2.028

    -=:{ End of Report }:=-
    --- MBSE BBS v1.0.7.22 (GNU/Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From Vincent Coen@2:250/1 to Andrew Leary on Sat Apr 2 06:30:01 2022


    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2022/04/02 and valid till 2022/10/31

    Produced by Elist v5.2.034

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.8 (Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From Vincent Coen@2:250/1 to Andrew Leary on Tue Apr 5 15:25:38 2022
    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    RULEs: {Not Found}

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2022/04/05 and valid till 2023/02/28

    Produced by Elist v5.3.014

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.8 (Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)
  • From Elistmaint@2:25/21 to Andrew Leary on Thu Mar 2 08:30:01 2023


    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2023/03/02 and valid till 2024/01/31

    Produced by Elist v5.4.019

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.8 (Linux-armv7l)
    * Origin: Elist Maintainer at 2:25/21 (2:25/21)
  • From Vincent Coen@2:250/1 to Andrew Leary on Fri Feb 2 15:24:30 2024


    Echo Successfully Updated.

    TAGname: CYBER-DANGER Group: FIDO

    TITLe: Malware, Trojan, Virus and Rogue Application Discussion

    Language: ENGLISH

    DESCription:
    This echo will apply to all Computer operating systems
    but will be of keen interest to those running Microsoft
    Windows. This echo is for the discussion of the various
    computer viruses, worms, trojans and rootkits that have
    been known, are known or will be known to infect our chosen
    operating systems. Additionally the discussion of what are
    known as Rogue Security Applications is encouraged. Rogue
    Security Applications are programs written to pose as legitimate
    security programs to coerce a user to install them and register
    them but in reality these programs cripple the host system
    and often download more malware. The discussion on how to
    identify, avoid or remove these cyber-dangers is most welcome.

    MODerator: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    ORIGIN: 1:320/219

    RESTrictions: /REAL

    DISTribution: All Zones

    GATEway: None

    From: Andrew Leary, 1:320/219@fidonet
    Email: ajleary19@gmail.com

    Updated on: 2024/02/02 and valid till 2024/12/31

    Produced by Elist v5.4.031

    -=:{ End of Report }:=-


    --- MBSE BBS v1.0.8.4 (Linux-x86_64)
    * Origin: The Elist Maintainer (2:250/1)