Jump to content
Welcome to InsanelyMac Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to contribute to this site by submitting your own content or replying to existing content. You'll be able to customize your profile, receive reputation points as a reward for submitting content, while also communicating with other members via your own private inbox, plus much more! This message will be removed once you have signed in.


  • Content count

  • Joined

  • Last visited

About forcrz6

  • Rank
    InsanelyMac Protégé
  1. Sometimes the solution can cause as much mischief as the problem it's trying to correct. Kaspersky Lab said Thursday that it has suspended the distribution of its tool for removing the Flashback Trojan (sometimes called "Flashfake") that spread like wildfire in Apple's Mac computers this month. The firm pointed to a bug that's causing the tool to mess with user settings in the machines it's supposed to be fixing. "Kaspersky Lab has identified an issue with its free Kaspersky Flashfake Removal Tool," the company said in a statement on its site. "In some cases it is possible that the use of the tool could result in erroneous removal of certain user settings including auto-start configurations, user configurations in browsers, and file sharing data." The antivirus vendor said the Flashfake Removal Tool would be made available again once the bug was fixed. Another Flashback tool form Kaspersky, called Flashback Checker, is still up and running, the company said. Flashback Checker doesn't remove the Flashback Trojan, which attacks Macs by way of a Java vulnerability that's been fixed in an updated version of the software. Instead, the Flashback Checker tool scans a user's Mac to see if it's infected and if not, checks if the system has the latest Java update installed to prevent an attack. Users of the Kaspersky Flashfake Removal Tool who have experienced problems on their computers were encouraged to email techsupport@kaspersky.com or to call the company's Moscow offices at +7 (495) 797-70-32 for round-the-clock assistance in English or Russian. UPDATE: Kaspersky Lab said early Friday that it has fixed its Flashfake Removal Tool. Here's a statement that a spokesman for the security company sent PCMag: Kaspersky Lab has successfully fixed its free Kaspersky Flashfake Removal Tool. A bug was identified in the original version of the tool, which was first reported at approximately 17:40 MSK (GMT+4) on April 12. The tool was taken offline for maintenance. A new version of the tool with the necessary updates was released at 3:30 MSK (GMT +4) on April 13. It is available now and fully operational. Users can visit www.flashbackcheck.com to verify if they're infected with Flashfake and use the Kaspersky Flashfake Removal Tool to disinfect their computers. Customers who previously encountered problems with the Flashfake Removal Tool are encouraged to contact Kaspersky Lab's technical support at techsupport@kaspersky.com Kaspersky Lab apologizes for any inconvenience caused by this issue. The company is focused on creating utilities to keep users safe from infection and will continue to improve its internal processes to prevent such errors from occurring in the future. Kaspersky is one of several security vendors that have released Flashback detector and removal tools in the past few days. Dr. Web, the company that originally highlighted the magnitude of the infection, offers an Anti-Flashback online checker and a Light Scanner for OS X tool to detect and remove the infection. Symantec also now has an OSX.Flashback.K Removal Tool, while F-Secure also released its own removal tool, available as a Zip file on its website. Though somewhat late to the party, Apple on Thursday released its own tool to remove the Flashback malware from compromised Macs. Apple released the fix as a Java update that detects and removes Flashback from infected computers. This is the third update released by the company this week—the first two closed the Java vulnerability that Flashback was exploiting to infect Macs in the first place. The latest update is essentially the same update closing the vulnerability, but with the removal tool bundled in.
  2. Mac Flashback Trojan

    http://www.pcworld.com/businesscenter/article/253403/mac_malware_outbreak_is_bigger_than_conficker.html#tk.nl_dnx_h_crawl Mac Malware Outbreak Is Bigger than 'Conficker' An estimated 600,000 or more Macs are currently compromised and part of a massive botnet thanks to the Flashback Trojan. To put the size of the threat in some perspective, the Flashback Trojan botnet is even bigger than the massive Conficker botnet…relatively speaking. The Conficker botnet compromised an estimated seven million plus Windows PCs around the world at its peak. Seven million is obviously much larger than 600,000, but Windows also has a significantly higher number of PCs in use around the world. According to current data from Net Applications, Mac OS X is the number two desktop OS with 6.54 percent market share. Windows, on the other hand, accounts for 92.48 percent of the market. Based on market share, the Flashback Trojan botnet is equivalent to a Windows botnet of nearly 8.5 million PCs. That makes it an even larger threat than Conficker--just on a much smaller platform. The Flashback Trojan is actually a misnomer at this point. It was a Trojan horse when it was originally discovered last year. A Trojan horse—as the historical reference implies—is malware that is disguised as something benign. The original threat masqueraded as an update for Adobe Flash that compromised machines when executed. The current version, however, is more of a drive-by download threat. It doesn’t require any user interaction, or passwords. If a user visits a malicious or compromised website, the Flashback malware runs automatically and vulnerable systems are infected. A malware attack such as this has even greater odds of success on Mac OS X than it does on a Windows system. The Mac OS X system itself is not less secure or prone to infection than Windows per se, but the Mac culture is conditioned to believe the OS is virtually invulnerable. Fewer users have any security software installed to protect their Mac OS X systems, and Mac OS X users are more likely to click links and open files without thinking twice. It doesn’t help anything that Apple perpetuates the myth of invulnerability. It takes time to develop a patch, but as soon as Apple was aware that the threat existed, it should have proactively communicated to Mac OS X users to make them aware. In fact, it should have provided users with instructions to disable Java and mitigate the threat pending a patch to resolve the issue. The fact that it didn’t is probably a contributing factor to why the Flashback botnet is as large as it is. Apple isn’t to blame for the threat. The vulnerability is in Java, not Mac OS X. But, Apple needs to understand that with the success of Mac OS X comes increased attention from malware developers, and malware attacks often go for third-party low-hanging fruit like Adobe Flash or Java. Apple needs to be more proactive, and more honest with users about security concerns if it wants to contain future threats and prevent massive outbreaks such as this.
  3. Mac Flashback Trojan

    It's not about being worried. It's about letting the community know that this is now out there once again. There was never any doubt mac is safer than windows, but still this is out there. All it is is informative.
  4. http://mashable.com/2012/04/05/mac-flashback-trojan/ Apple computer users may think they have nothing to worry about when it comes to contracting viruses and malware online, but a Russian antivirus company is reporting that 600,000 Macs are currently infected with a nasty trojan horse virus called “Flashback.” Doctor Web issued a report on Wednesday that said 550,000 computers with Mac OSX have picked up the virus. An analyst at Doctor Web later sent a tweet noting that 600,000 Mac computers have actually been infected and some — about 274 — are actually based in the same city as Apple’s headquarters, Cupertino, Calif. About 57% of the infected Macs are said to be in the U.S. and 20% are based in Canada. Flashback was originally discovered in September 2011 and was designed to disguise itself as an Adobe Flash Player installer, using Flash player logos. After installing Flashback, the malware seeks out user names and passwords that are stored on your Mac. SEE ALSO: More Than 600,000 Macs Infected With Flashback Malware [REPORT] “There are no visible symptoms for this Mac virus, except for making sporadic connections to unknown servers that can be only seen in the Firewall logs, if any firewall is in place,” Boris Sharov, CEO of Doctor Web, told Mashable. “The symptoms also depend on the payload that may be downloaded upon the command from the control server.” Although Sharov said it’s difficult to prevent contracting the virus, it’s not impossible. “The bad thing about these types of infections is that it is hard to prevent them without disconnecting one’s computer from the Internet all together,” Sharov said. “We advise Mac users to strictly follow Apple’s security updates. Don’t neglect them.” To protect your computer from contracting the virus now, download Apple’s latest software update. Click the Apple logo located in the top-left section of the desktop and select Software Update. Install all of the available updates as soon as possible. “Unfortunately, the number of infected computers is still increasing,” Sharov said. “This means that users are careless about security patches, and they shouldn’t be.” Sharov also advised Mac users to install anti-virus software, even though many think it’s unnecessary to do so for Apple computers. Although symptoms are minimal, there are a few things you can do to see if you are infected. Sharov suggests the following steps (note: we posted the html code below as an image so you could read the full code): Go to the Mac’s Library folder and select LaunchAgents. There should be several files in that catalog. Search all files in the folder for the following contents: Look for the file name specified in the ProgramArguments key. This is where the file BackDoor.Flashback.39 would be located. To see if this is the trojan, scan it with anti-virus software for Mac OS or upload it to VirusTotal website. To cure the machine, delete both files. Removing the files should restore your computer. The news comes after Apple continues to position OS X as a more secure alternative to other computer makers. “A Mac isn’t susceptible to the thousands of viruses plaguing Windows-based computers,” Apples notes on its homepage. “That’s thanks to built-in defenses in Mac OS X that keep you safe, without any work on your part.” Apple has not responded to Mashable’s request for a comment.
  5. Having an issue, and i cant find it.

    Sorry for not being clear. When not doing -v Ill get the apple start up screen, and then the PC just reboots. When i do the -v Ill see every thing that is loading (Rather quick) and once it gets to the end it will reboot. It will not even give me the panic screen. I have tried to Pause/break but i keep missing the end. Any ideas?
  6. Need help on finding what is causing a Kernel panic. Running V7 (Leopard) iATKOS V2 Hardware IBM/Lenovo T30 (2366) Processor Pentium 4 M at 2.0GHz Memory 1GB maximum memory PC2100 at 266MHz Hard drive 40GB size Display 14.1" TFT or display Graphics 16MB 7500 ATI Mobility video chipset CD and DVD drive Ultrabay DVD Networking Integrated 802.11b wireless I belive Security Security chip Disabled in BIOS Mouse TrackPoint I have tried to boot in verbose, (-v)but that was no good. Basiclly what will happen is I will get past the Chameleon v2 screen, and i will see the Apple start up screen. then the Kernel panic seems to happen and the PC restarts. I have tried several different drivers while installing the Chameleon v1 and Chameleon v2, but i just can't seem to load. i was wondering if anyone would happen to have any ideas, how i can find what is causing the panic? Thanks ahead of time.
  7. The panic Kernel trap at 0x00443403 Is for your CPU. I would advise trying a different Kernel. try the kalyway_leo_10.5.1.iso and see if that is better. Or if the option is there, try a different Kernel.
  8. Need help on finding.

    Moving to correct forum
  9. It seems that Macs are no longer the redheaded step child for viruses. The windows communities decided that sharing their "Windows defender" virus was the nice thing to do. So now we have to look out for a fake Antivirus program named (What else but) Mac Defender. Anyone familiar with the windows version of this virus knows what a problem this little virus can be. So lets watch the sites that we go to, and the searches that we preform. Here is the article from eweek.com http://www.eweek.com/c/a/Security/Fake-AV-...h-Links-644121/ Attackers are distributing a fake antivirus specifically designed to look like a real Mac OS X application using poisoned search results. Relying on the supposed “invulnerability” of Apple’s operating system got even riskier as malware developers have launched a rogue antivirus specifically targeting Mac OS X users, according to a security firm. The bogus antivirus program, called MAC Defender downloads itself onto the user’s computer and automatically launches a scanner to “find” several viruses on the system, security firm Intego said May 2. The rogue software is taking the name of the legitimate MacDefender program in order to trick users into thinking it’s a real security software. “In the past,” the company wrote, “these types of sites—very common vectors of Windows malware—only delivered Windows .exe applications. The fact that such a site is providing a Mac rogue antivirus is new, and extremely rare. While the site itself still shows a fake Windows screen, the rogue antivirus itself is a well-designed Mac application.” Intego claimed the makers of this scareware have used black hat search engine optimization tactics to boost malware Websites to the top of Google and other search engine results for some keywords. Neither Sophos nor Intego identified the affected keywords, although some users told The Next Web they were infected while looking at images of piranhas. The professional-looking software has been seen on both Google image search and on regular search results pages. When users click on the rogue link, they are redirected to a Website containing malicious JavaScript code that displays a fake scan with a results window claiming the system has been infected. The code also analyzes whether the user is running Windows or Mac OS X and downloads a compressed ZIP file customized for the operating system. If the user has the “open safe files” option checked in Safari, or a comparable option in other browsers, then the rogue file opens on its own, according to Intego. Intego recommended turning off the option that allows files to open automatically. If a user gets this far, they can still stop the infection, as the installer will cause the system to prompt the user for a system password before installing the “MACDefender Setup” program. “This latest attack can be very convincing, as the malware pretends to be a legitimate Mac anti-virus program called MacDefender and claims to find some very important applications and functions that may have been compromised," Chester Wisniewski, Sophos senior security advisor, wrote on the NakedSecurity blog. MACDefender tries to convince users to enter credit card information to buy a one-year license for $59.95, a two-year license for $69.95 or a “lifetime” software license for $79.95 to remove the supposed infection. “What is really at risk is your credit card information if you succumb to the attack and provide your information,” Wisniewski said. The application attaches itself to the computer’s launch menu and has no dock icon, making it difficult to quit. MAC Defender also opens Web pages for adult content Websites in the user’s Web browser every few minutes; this tricks users into thinking their machines are infected by a virus, according to Intego. It’s not clear whether MAC Defender was acting as a virus or as a form of scareware designed to steal Mac users’ credit card details, but for the moment, it seems pretty low-risk because it still requires user interaction to actually install the malware. Just downloading the file won’t infect the computer, according to Intego. To remove the MACDefender application, users should go to Activity Monitor in Applications/Utilities and disable anything that relates to the file. Users should look for any references to the scareware in Startup Items, Launch Agents and LaunchDaemons and quit running processes. Finally, users should drag the MAC Defender application to the trash and trash any other MACDefender reference found under Spotlight.
  10. Ok, I was able to get my hands on a Mac Mini logic board. So I would like to overhaul my little G3 to have this nice little mac mini logicboard in it. Now I am replacing the CRT with a nice LCD That I can mount to the inside. My Question is the following. Has anyone else modded the imac G3 for a mac Mini logic board?
  11. 10.6.2 Released!

    Yea this was a nasty update. Taken from Hackintosh Killer? On Monday Apple released an update to its Snow Leopard operating system (10.6.2 ) that fixes flaws, including one that wipes out a users' personal data. But along with fixes, Apple's update also kills support for Intel Atom processors, in a bid to stop users from hacking their netbooks and creating "hackintosh" systems. The Snow Leopard 10.6.2 update addresses over 100 general fixes, 43 being security related. One of those fixes addresses the highly publicized bug that wipes a users' home folders when logging in with a guest account. This is the second update since Snow Leopard was released at the end of August. owever, the 10.6.2 Snow Leopard update was highly debated since before public launch, as developers reported the update did not support Intel's Atom processor, which powers many of today's netbooks. This made it difficult for users who installed OSX Snow Leopard on regular netbook computers to update to 10.6.2, as their processor was not supported anymore. Reports then emerged last week that Apple is not actually removing Intel Atom processor support from the 10.6.2 update, and hackintosh netbook users sighed with relief. But it was a short lived moment, as the public Snow Leopard 10.6.2 release of the OS on Monday is reported to have indeed removed support for Intel's low-power processors. Several sources are now confirming the lack of Intel Atom support from the 10.6.2 update. Although this will make it more difficult than before to install Mac OSX on regular non-Apple hardware, modders say someone will eventually come with a workaround. A hackintosh is basically a regular PC, not manufactured by Apple, which runs the OSX operating system after several hacks in the OS's code. This sort of hacking is unsupported by Apple but many run it on a personal basis. Apple has previously taken a legal stance on hardware manufacturers such as PsyStar that sell regular computers with Apple OSX preinstalled. OSX Snow Leopard has also become in recent months a favourite for hackintosh netbook modders, as the OS gives them better performance and battery life on their unsupported hardware.
  12. Another nvidia 8400 issue

    So again I tried the NVkush, and again I could not get it to run due to panics. Here are som Picturs of the Panic. Can anyone help?
  13. MAC Address of network card.

    I'm a bit confused as to what you are asking here. Are you asking how can you find your MAC ID to insert it in to the system? Or are you asking you know the MAC ID but can not get the MAC ID to show up on the system?
  14. 10.5.8

    This is a Marvell 88E8056 network card. Have you tried Chun-Nan's/Eureka's IOPCIFamily.kext I would also go to http://www.insanelymac.com/forum/index.php?showtopic=135368 This may help out more.
  15. Another nvidia 8400 issue

    Would you think changing from voodoo 9.7.0 to 9.5.0 may work?