All Things Microsoft > Microsoft Software

Running Windows for 3 weeks no viruses and no anti-virus!

<< < (3/11) > >>

toadlife:

--- Quote from: ksym ---...I would need to logout/login as admin every time I need to mount another cd/dvd image with GameJack/daemon tools ... and I am kinda lazy so ah ...
--- End quote ---

Bullshit. I mount cd-images in daemon tools as a power user all the time at work.

toadlife:

--- Quote from: worker201 ---I have this firewall gui program installed in Linux called Firestarter, which is basically a front-end for iptables. It logs all the bad things that happen to my computer. Just going through this log is a sobering exercise. I get hundreds of hits per day from Windows worms and trojans. Of course none of them gets in.
--- End quote ---

I get hundreds of hits per day on my BSD router from rooted linux boxes. My ISP filters ports 135,139,445,and 1025 so I don't get hits from owned Windows boxes, but I'm sure they're out there.

toadlife:
A sample from my auth.log from today...


--- Quote ---      Aug  1 16:46:23 router sshd[1336]: Did not receive identification string from 216.127.74.131 Aug  1 17:06:50 router sshd[1354]: Failed password for root from 216.127.74.131 port 41284 ssh2 Aug  1 17:06:51 router sshd[1356]: Failed password for root from 216.127.74.131 port 41343 ssh2 Aug  1 17:06:52 router sshd[1358]: Failed password for root from 216.127.74.131 port 41394 ssh2 Aug  1 17:06:53 router sshd[1360]: Failed password for root from 216.127.74.131 port 41471 ssh2 Aug  1 17:06:54 router sshd[1362]: Failed password for root from 216.127.74.131 port 41533 ssh2 Aug  1 17:06:55 router sshd[1364]: Failed password for root from 216.127.74.131 port 41600 ssh2 Aug  1 17:06:56 router sshd[1366]: Failed password for root from 216.127.74.131 port 41669 ssh2 Aug  1 17:06:57 router sshd[1368]: Failed password for root from 216.127.74.131 port 41734 ssh2 Aug  1 17:07:03 router sshd[1370]: Failed password for root from 216.127.74.131 port 41887 ssh2 Aug  1 17:07:04 router sshd[1372]: Failed password for root from 216.127.74.131 port 41950 ssh2 Aug  1 17:07:05 router sshd[1374]: Failed password for root from 216.127.74.131 port 42006 ssh2 Aug  1 17:07:06 router sshd[1376]: Failed password for root from 216.127.74.131 port 42084 ssh2 Aug  1 17:07:07 router sshd[1378]: Failed password for root from 216.127.74.131 port 42155 ssh2 Aug  1 17:07:08 router sshd[1380]: Failed password for root from 216.127.74.131 port 42209 ssh2 Aug  1 17:07:09 router sshd[1382]: Failed password for root from 216.127.74.131 port 42279 ssh2 Aug  1 17:07:10 router sshd[1384]: Failed password for root from 216.127.74.131 port 42345 ssh2 Aug  1 17:07:11 router sshd[1386]: Failed password for root from 216.127.74.131 port 42402 ssh2 Aug  1 17:07:12 router sshd[1388]: Failed password for root from 216.127.74.131 port 42467 ssh2 Aug  1 17:07:13 router sshd[1390]: Failed password for root from 216.127.74.131 port 42543 ssh2 Aug  1 17:07:14 router sshd[1392]: Failed password for root from 216.127.74.131 port 42599 ssh2 Aug  1 17:07:15 router sshd[1394]: Failed password for root from 216.127.74.131 port 42662 ssh2 Aug  1 17:07:16 router sshd[1396]: Failed password for root from 216.127.74.131 port 42737 ssh2 Aug  1 17:07:17 router sshd[1398]: Failed password for root from 216.127.74.131 port 42797 ssh2 Aug  1 17:07:18 router sshd[1400]: Failed password for root from 216.127.74.131 port 42856 ssh2 Aug  1 17:07:19 router sshd[1402]: Failed password for root from 216.127.74.131 port 42930 ssh2 Aug  1 17:07:20 router sshd[1404]: Failed password for root from 216.127.74.131 port 42992 ssh2 Aug  1 17:07:21 router sshd[1406]: Failed password for root from 216.127.74.131 port 43052 ssh2 Aug  1 17:07:22 router sshd[1408]: Failed password for root from 216.127.74.131 port 43122 ssh2 Aug  1 17:07:23 router sshd[1410]: Failed password for root from 216.127.74.131 port 43186 ssh2 Aug  1 17:07:24 router sshd[1412]: Failed password for root from 216.127.74.131 port 43245 ssh2 Aug  1 17:07:25 router sshd[1414]: Failed password for root from 216.127.74.131 port 43305 ssh2 Aug  1 17:07:26 router sshd[1416]: Failed password for root from 216.127.74.131 port 43376 ssh2 Aug  1 17:07:27 router sshd[1418]: Failed password for root from 216.127.74.131 port 43430 ssh2 Aug  1 17:07:28 router sshd[1420]: Failed password for root from 216.127.74.131 port 43492 ssh2

--- End quote ---

That Ip hosts, http://www.solocamping.com which is a linux/apache 1.3 box.

I see this crap every single day in my logs. Of course they are pissing into the wind, since root logins are not even allowed over ssh on my router, but still the amount of owned linux boxes in the wild is enourmous.

piratePenguin:

--- Quote from: toadlife ---the amount of owned linux boxes in the wild is enourmous.
--- End quote ---
How do you know the "attacks" are coming from owned GNU/Linux boxes? Couldn't the cracker just be using their own box or some other box they have legit access to? Or even some other operating system?

toadlife:
To get back on topic, my windows partition doesn't run active AV either. I do have Avast installed, but I don't have the resident protection enabled. I only use my windows for games, so the need for resident protection is jsut not there. I do however save all of the email viruses I get to my FAT partition and collect them in my Avast virus chest when I boot into Windows.

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version