Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

AP IMPACT: Framed for child porn by a PC virus (FUD with cause)
Associated Press ^ | Nov 8, 2009 | JORDAN ROBERTSON

Posted on 11/08/2009 1:59:37 PM PST by decimon

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography.

(Excerpt) Read more at tech.yahoo.com ...


TOPICS: Computers/Internet; Society
KEYWORDS: getamac; trylinux
Navigation: use the links below to view more comments.
first 1-5051-63 next last
The possibility of this nightmare has been speculated in this forum. Well here it is.
1 posted on 11/08/2009 1:59:37 PM PST by decimon
[ Post Reply | Private Reply | View Replies]

To: decimon

Whoever made this virus is a pervert.


2 posted on 11/08/2009 2:01:08 PM PST by Ptarmigan (God Hates Bunnies. God Loves Ptarmigans)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

ping


3 posted on 11/08/2009 2:01:18 PM PST by Perdogg (Sarah Palin-Jim DeMint 2012 - Liz Cheney for Sec of State - Duncan Hunter SecDef)
[ Post Reply | Private Reply | To 1 | View Replies]

To: decimon

say what??

Does it create specific files or folder names we can search for?


4 posted on 11/08/2009 2:05:05 PM PST by GeronL (http://tyrannysentinel.blogspot.com .... I am a rogue nobody. One of millions.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: decimon

How does one know it’s there? How would one get it off if it were found? Lastly how would the Feds know it was there if the computer owner didn’t know?


5 posted on 11/08/2009 2:07:38 PM PST by madison10
[ Post Reply | Private Reply | To 1 | View Replies]

To: decimon

If I was an evil kid in school these days, all I would have to do is wait for the teacher to leave his computer unattended for a moment and point his browser to a porn site (let a few pics download, then close the browser)... then make an anonymous call to the cops.


6 posted on 11/08/2009 2:08:53 PM PST by Cementjungle
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ptarmigan

>>Whoever made this virus is a pervert.<<

Virus-writers should be strung up in the public forum.

This one should be castrated slowly with a rusty butter knife — also in public — first.


7 posted on 11/08/2009 2:09:01 PM PST by freedumb2003 (Communism comes to America: 1/20/2009. Keep your powder dry, folks. Sic semper tyrannis)
[ Post Reply | Private Reply | To 2 | View Replies]

To: decimon

So that guy who claimed his cat downloaded the porn (maybe because he couldn’t think of any other explanation) might be innocent?

Wow.


8 posted on 11/08/2009 2:09:22 PM PST by autumnraine (You can't fix stupid, but you can vote it out!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GeronL
Does it create specific files or folder names we can search for?

Doubtful. In the past I've searched my PC for *.jpg and *'gif to see if there was anything untoward there. I guess now that should include *.png. But that brings up a helluva lot of images. I'm certainly open to any better method.

9 posted on 11/08/2009 2:09:52 PM PST by decimon
[ Post Reply | Private Reply | To 4 | View Replies]

To: decimon

I didn’t see the discussion but have become concerned for some time now it could inadvertently happen to anyone through a virus. It would be extremely difficult to prove your innocence.

Another possibility along those lines occurred to me, leave it at that.


10 posted on 11/08/2009 2:12:11 PM PST by Aliska
[ Post Reply | Private Reply | To 1 | View Replies]

To: madison10
Lastly how would the Feds know it was there if the computer owner didn’t know?

The virus causes searches to kiddie porn websites. If such a website is busted then so are its customers. The example in the article was for too high an internet charge on the guy's work computer.

11 posted on 11/08/2009 2:15:35 PM PST by decimon
[ Post Reply | Private Reply | To 5 | View Replies]

To: freedumb2003

It really doesn’t take a virus to put stuff on your PC. Just leave your firewall off and don’t turn WEP on. The neighborhood young’uns can put all kinds of stuff on your drive.


12 posted on 11/08/2009 2:17:47 PM PST by gitmo (FR vs DU: n4mage vs DUmage)
[ Post Reply | Private Reply | To 7 | View Replies]

To: freedumb2003

Amen to that! Computer viruses are a pain in the a**.


13 posted on 11/08/2009 2:18:15 PM PST by Ptarmigan (God Hates Bunnies. God Loves Ptarmigans)
[ Post Reply | Private Reply | To 7 | View Replies]

To: gitmo

What’s WEP?


14 posted on 11/08/2009 2:19:19 PM PST by madison10
[ Post Reply | Private Reply | To 12 | View Replies]

To: madison10

A WEP key is a security code used on a most WiFi networks. WEP keys allow a group of devices on a home network to exchange information with each other while hiding the contents from easy viewing by outsiders.

You have to enable WEP on your wireless router. And don’t forget to write down your WEP Key because some day you’re going to need to reset it on your PC.


15 posted on 11/08/2009 2:24:51 PM PST by gitmo (FR vs DU: n4mage vs DUmage)
[ Post Reply | Private Reply | To 14 | View Replies]

To: decimon
A way to protect yourself would be to only run a live cd version of some operating system, so that every time you boot up you have a clean install, and turn off your computer when you're not using it.
16 posted on 11/08/2009 2:24:57 PM PST by E. Pluribus Unum (Ask not what the Kennedys can do for you, but what you can do for the Kennedys.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: madison10

My neighbor’s network is not WEP enabled. I can browse his PC at will and could drop files on his PC if I so desired.


17 posted on 11/08/2009 2:26:18 PM PST by gitmo (FR vs DU: n4mage vs DUmage)
[ Post Reply | Private Reply | To 14 | View Replies]

To: madison10

WEP stands for Wired Equivalent Privacy. It’s for wireless connections.

Except that it’s really not at all equivalent to a wired connection. In fact it’s a pretty weak, easily crackable form of wireless protection.

Use something like WPA2 AES instead, if your router supports it (and any router worth its salt nowadays should).


18 posted on 11/08/2009 2:27:48 PM PST by RepublitarianRoger2
[ Post Reply | Private Reply | To 14 | View Replies]

To: E. Pluribus Unum
A way to protect yourself would be to only run a live cd version of some operating system, so that every time you boot up you have a clean install, and turn off your computer when you're not using it.

That's true. But you'd have nothing like bookmarks stored.

19 posted on 11/08/2009 2:29:35 PM PST by decimon
[ Post Reply | Private Reply | To 16 | View Replies]

To: E. Pluribus Unum

Hey, I tried this on my laptop with UBANTU but how do you setup your internet connection on the clean boot disk? My idea was to use this boot disk whenever I connect to my bank or financial institutions, but when I boot there is not internet connection????

If you know how, I am sure lots and lots of freepers would be gratefull in the how too!

Thanks!


20 posted on 11/08/2009 2:30:18 PM PST by VastRWCon (Drill Baby Drill - Sarah Palin 2012)
[ Post Reply | Private Reply | To 16 | View Replies]

To: VastRWCon

What operating system?

Linux?

If so, and you are connected to a broadband router through a CAT5 cable, it ought to simply work.


21 posted on 11/08/2009 2:34:01 PM PST by E. Pluribus Unum (Ask not what the Kennedys can do for you, but what you can do for the Kennedys.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: decimon

It sounds like the police are alerted to certain ISP addresses being sources of child porn, and they track down people who log into those sites and arrest them and take their computer to search, and if they find bad stuff charge the person with downloading child porn.

So if someone else used the computer to go to child porn sites or installed a program on it to go to child porn sites in the background while connected to the internet, the person who was registered / logged onto that computer would be suspected of visiting those sites.

In some cases it does look like a setup. Doesn’t anyone ever flush (clean) their Internet browser cache every time they log off, or am I the only one? (Not that I visit porn sites, but I just flush everything out so It’ll load all new pages next time so I don’t miss anything new).

This sure shows a really good reason not to leave your computer unattended when you are logged in.

It looks like pirated software sites and sites that provide “free” porn would be ones to avoid.

Also with file sharing programs (bit torrent comes to mind), I would think = it’s possible that some of those files could be child porn.


22 posted on 11/08/2009 2:35:06 PM PST by Screaming_Gerbil (The light at the end of the tunnel might be a muzzle flash...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: madison10

Security software used to detect viruses on a computer can only identify viruses that the security software ‘knows about’. So if you are using a program like Nortons or McAfee, those programs get regular updates of virus definitions. When you run those programs, they match their collection of known virus definitions to all the files on your computer looking for a match. Virus definitions may be combinations of certain registry key entries, hidden or public files, folders etc. The virus defintion is sometimes called a ‘signature’ so detection software may look for a very subtle collection of changes to your machine. So any virus program you run is only as good as its last updated virus definitions. New viruses come out every hour and definitions have not been written for them yet. If you don’t keep your virus definitions updated (keep NOrtons’, McAffee, Panda etc. updated) then you are only checking for viruses addressed prior to the last time your machine was updated.
The feds may be using software that has a virus definition for this porn virus but the home user may either not be using software that detects viruses, not aware it needs to be updated, or is using a program that does not have a definition (what to look for) for that virus yet.
I run more than one security program on my machine and they don’t detect the same collection of bugs.


23 posted on 11/08/2009 2:35:31 PM PST by ransomnote
[ Post Reply | Private Reply | To 5 | View Replies]

To: decimon
That's true. But you'd have nothing like bookmarks stored.

You could store your bookmarks on delicious.com and reconnect to your account when you booted up.

24 posted on 11/08/2009 2:36:52 PM PST by E. Pluribus Unum (Ask not what the Kennedys can do for you, but what you can do for the Kennedys.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: decimon

I think the kiddie porn pervs are intentionally loading this virus onto their machines - then they can be as ‘sick as they wanna be’ and if caught, they can exclaim ‘oh no! it must be that porn virus I read about on democraticunderground.com!’


25 posted on 11/08/2009 2:38:37 PM PST by ransomnote
[ Post Reply | Private Reply | To 1 | View Replies]

To: gitmo

I had not thought of the wireless aspect, but that would be correct. If the person with the wireless router just leaves it set to the default password, then anyone in the neighborhood could access it.


26 posted on 11/08/2009 2:40:44 PM PST by Screaming_Gerbil (The light at the end of the tunnel might be a muzzle flash...)
[ Post Reply | Private Reply | To 12 | View Replies]

To: gitmo

You can also use MAC Address filtering feature of your router. This allows only designated devices to communicate with your internet access.


27 posted on 11/08/2009 2:41:43 PM PST by UB355 (Slower traffic keep right)
[ Post Reply | Private Reply | To 15 | View Replies]

To: gitmo
Help, if you will....wifey and I are brand new to wireless; two weeks ago today got a new PC and then a laptop and router. We're all hooked up and secure here at home.

We'd never had a laptop before, and this one hasn't been out of the house yet. Can we just go to a Starbucks or hotel and fire up?

28 posted on 11/08/2009 2:44:25 PM PST by ErnBatavia (Obama is a DIC....... Ditherer-in-Chief)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Ptarmigan

Doesn’t have to be specifically for this. Any virus or Trojan that turns your computer into a zombie, and there are a lot of them, can get your PC to download anything.
From what I understand, most kiddie porn sites, stolen credit cards and most hacked software sites are loaded on zombie computers and use redirects like tinyurl to set them up as servers. Once a computer is compromised, anything can go on, including locking out the original user.
It allows the hacker to cover his tracks by using a computer with which he has no connection.


29 posted on 11/08/2009 2:47:10 PM PST by Richard Kimball (We're all criminals. They just haven't figured out what some of us have done yet.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ransomnote
I think the kiddie porn pervs are intentionally loading this virus onto their machines - then they can be as ‘sick as they wanna be’ and if caught, they can exclaim ‘oh no! it must be that porn virus I read about on democraticunderground.com!’

I was going to reply that they probably do but then thought that the virus could betray them for downloading from the kiddie porn websites.

30 posted on 11/08/2009 2:53:31 PM PST by decimon
[ Post Reply | Private Reply | To 25 | View Replies]

To: ErnBatavia
We'd never had a laptop before, and this one hasn't been out of the house yet. Can we just go to a Starbucks or hotel and fire up?

You can. But turn on your Firewall first. If you're running Vista the firewall is on by default. If you're running Windows 7 it's on as well. There are some improvements in Win 7 firewall as well.

If you're on Windows XP, you have to choose to turn on the firewall. There are variances in Win XP configurations. This Microsoft link shows you how to set it in Win XP.

31 posted on 11/08/2009 2:55:35 PM PST by gitmo (FR vs DU: n4mage vs DUmage)
[ Post Reply | Private Reply | To 28 | View Replies]

To: E. Pluribus Unum
You could store your bookmarks on delicious.com and reconnect to your account when you booted up.

I guess but I'm a bit cyber paranoid. I don't like having my information everywhere out there.

32 posted on 11/08/2009 2:57:09 PM PST by decimon
[ Post Reply | Private Reply | To 24 | View Replies]

To: gitmo

>>The neighborhood young’uns can put all kinds of stuff on your drive.<<

Malicious hackers are almost the same as virus authors. For them, we bring back the stocks.


33 posted on 11/08/2009 2:57:39 PM PST by freedumb2003 (Communism comes to America: 1/20/2009. Keep your powder dry, folks. Sic semper tyrannis)
[ Post Reply | Private Reply | To 12 | View Replies]

To: decimon

>>I guess but I’m a bit cyber paranoid. I don’t like having my information everywhere out there.<<

I have a friend that is all over me for not having a Facebook account.

But I keep my RL info in cyberspace on a very, very narrow footprint. Facebook will accomplish exactly zero for me.


34 posted on 11/08/2009 2:59:18 PM PST by freedumb2003 (Communism comes to America: 1/20/2009. Keep your powder dry, folks. Sic semper tyrannis)
[ Post Reply | Private Reply | To 32 | View Replies]

To: decimon
I guess but I'm a bit cyber paranoid. I don't like having my information everywhere out there.

In that case, you could use a live cd of incognito.

You could even configure it to store everything in a TrueCrypt volume.

35 posted on 11/08/2009 3:00:20 PM PST by E. Pluribus Unum (Ask not what the Kennedys can do for you, but what you can do for the Kennedys.)
[ Post Reply | Private Reply | To 32 | View Replies]

To: freedumb2003
I have a friend that is all over me for not having a Facebook account.

But I keep my RL info in cyberspace on a very, very narrow footprint. Facebook will accomplish exactly zero for me.

That stuff has no appeal to me. And why I would appeal to others I can't imagine.

36 posted on 11/08/2009 3:03:58 PM PST by decimon
[ Post Reply | Private Reply | To 34 | View Replies]

To: gitmo; madison10
"The neighborhood young’uns can put all kinds of stuff on your drive."

My 30ish neighbor, a network engineer, cracked my WEP in about 2 minutes to show me how unsecure it is. I took his advice and started using the TKIP and screening for MAC address. It's sage advice.

37 posted on 11/08/2009 3:11:24 PM PST by OldDeckHand (Obamacare - So bad, even Joe Lieberman isn't going to vote for it.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: gitmo
Thanks very, very much. Yes, we're on the brand new Win 7; being computer lightweights there's a learning curve, but we're getting there.

I'd done some cruising around and it does appear the firewall is on by default.

38 posted on 11/08/2009 3:12:50 PM PST by ErnBatavia (Obama is a DIC....... Ditherer-in-Chief)
[ Post Reply | Private Reply | To 31 | View Replies]

To: decimon

>>hat stuff has no appeal to me. And why I would appeal to others I can’t imagine.<<

I usually get “it helped me get in touch with old friends from HS/College/etc.”

My answer: I am already in touch with any of those people who I want to be in touch with.

Adults who still identify with their HS days strike me as very, very strange.


39 posted on 11/08/2009 3:13:42 PM PST by freedumb2003 (Communism comes to America: 1/20/2009. Keep your powder dry, folks. Sic semper tyrannis)
[ Post Reply | Private Reply | To 36 | View Replies]

To: decimon

Good point.
I was also thinking that they can ‘flood the zone’ (legal system) with false charges against innocent people and therefore make it more time consuming and costly to hunt for the real pervs.
Then again, what if someone who doesn’t want pervs looking at abused children in secret (web surfing) so they wrote a virus that actually downloads incriminating evidence? I dunno. I find it suspicious that this virus doesn’t ALSO do other damaging things (erase key software, send spam from your email, steal identity information etc. Hmmm.


40 posted on 11/08/2009 3:17:39 PM PST by ransomnote
[ Post Reply | Private Reply | To 30 | View Replies]

To: decimon
The possibility of this nightmare has been speculated in this forum. Well here it is.

Hot flash... this has been around a long time. It is particularly common in places like Yahoo Messenger, where messages can be sent to thousands of subscribers simultaneously.
Usully with bait like "Great ______" (fill in the blank.)

They are usually a zip file with 0 files.

Idiots who open these are almost sure to do it just once.

Moral of the story: if you don't know the sender, Don't open it!

41 posted on 11/08/2009 3:24:26 PM PST by Publius6961 (…he's not America, he's an employee who hasn't risen to minimal expectations.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: OldDeckHand

You’re right. WEP is minimal security.


42 posted on 11/08/2009 3:26:13 PM PST by gitmo (FR vs DU: n4mage vs DUmage)
[ Post Reply | Private Reply | To 37 | View Replies]

To: decimon; AFPhys; snugs; altura; STARWISE

more OH NO news


43 posted on 11/08/2009 3:29:31 PM PST by DollyCali (Don't tell GOD how big your storm is -- Tell the storm how B-I-G your God is!you)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Publius6961
Moral of the story: if you don't know the sender, Don't open it!

I don't. But it would take just that one lapse of thought.

44 posted on 11/08/2009 3:30:56 PM PST by decimon
[ Post Reply | Private Reply | To 41 | View Replies]

To: gitmo

Any idea what this is?

winupd64x.exe

It keeps popping up for me to run program. I don’t know enough about these thing and am afraid to do so but maybe it’s just another update.


45 posted on 11/08/2009 3:34:54 PM PST by jackv
[ Post Reply | Private Reply | To 31 | View Replies]

To: decimon

“I don’t. But it would take just that one lapse of thought. “

There’s no room for innocent mistakes in our legal system anymore.

Did you see the discussion on FR about the Grandma in Missouri who bought one too many packages of sudafed and wound up in jail? The law presumes that anyone who buys too much is automatically guilty of making meth. Even though she was a law-abiding person and they found no meth lab in her home or anything the prosecutor still prosecuted her to the fullest extent of the law. And proudly, I might add.


46 posted on 11/08/2009 3:37:56 PM PST by webstersII
[ Post Reply | Private Reply | To 44 | View Replies]

To: jackv
A quick google search says that winudp64x.exe is a virus.

Not recommending you use their clean up process, but here http://www.prevx.com/filenames/X678219248043914988-X1/WINUDP64.EXE.html is an explanation of the virus.

NOTE. You mentioned winupd64.exe which is slightly different.

47 posted on 11/08/2009 3:40:47 PM PST by Richard Kimball (We're all criminals. They just haven't figured out what some of us have done yet.)
[ Post Reply | Private Reply | To 45 | View Replies]

To: jackv
Any idea what this is?

winupd64x.exe

A web search indicates it's a virus.

48 posted on 11/08/2009 3:41:16 PM PST by decimon
[ Post Reply | Private Reply | To 45 | View Replies]

To: Richard Kimball

Wow! Thanks a million. It came up telling me there were all these viruses but I ran a scan with my system and said I was clean. Thank goodness I didn’t install it!! I wonder how I can get rid of the thing that pops on every time I turn on my pc.


49 posted on 11/08/2009 3:45:53 PM PST by jackv
[ Post Reply | Private Reply | To 47 | View Replies]

To: webstersII
There’s no room for innocent mistakes in our legal system anymore.

Did you see the discussion on FR about the Grandma in Missouri who bought one too many packages of sudafed and wound up in jail?

No, but you summed it up well. That prosecutor deserves to be in prison.

50 posted on 11/08/2009 3:46:13 PM PST by decimon
[ Post Reply | Private Reply | To 46 | View Replies]


Navigation: use the links below to view more comments.
first 1-5051-63 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson