This is my understanding of what you have stated, G boy:
Quote:
Originally Posted by Goauld
Having checked my site access for the day and checking against the creation dates for the EXE & 2 DLL's this entailed I am certain that this minefield-like site is the culprit.
|
Ok, you believe you have 3 infected binaries that came from this site - not IRC.
Quote:
Originally Posted by Goauld
That is also the IRC Channel that the Codeflood.Backdoor connects to whenever an internet connection is established.
|
Ok, this thing that has infected your system also happens to make a connection to an IRC channel - which I don't see how you were able to figure out since netstat or other such tools don't decode above the IP layer. But, you were the one that stated it without support.
Quote:
Originally Posted by Goauld
Obviously the word of an administrator who runs a company LAN for a living isn't good enough for you.
|
The holier-than-thou attitude is a little annoying, but what I find really disturbing is that throughout the thread, you assumed we knew this and regarded you as such.
Is the word of an EQEMu dev not good enough for you? If not, then perhaps you can understand why the word of some random Joe Blow from the internet is not good enough for me.
Quote:
Originally Posted by Goauld
Perhaps you're not paying proper attention here.
I have quite clearly stated that I confirm that the source of this trojan was the IRC channel EQEMU, not the EQEmu source files.
|
No, you have not. You stated that the trojan was making a connection to the IRC channel. See above quote. Please pay attention and quit telling others to do it for you.
Quote:
Originally Posted by Goauld
As previously stated, these did NOT originate from the EQEMU source, but from a malicious (as yet unidentified) IRC user.
|
No, you did not state this. You stated the trojan on your computer was making a connection to IRC.
But now that you have stated this - are you saying that you connected to IRC now? How did this trojan make its way to your system? Please explain, oh mighty LAN administrator. Did you accept a DCC from someone and then run the executable you downloaded?
HOW DID THE FILES GET ONTO YOUR SYSTEM?
Given your accusations, it would seem that you have knowledge of how they got there.
Quote:
Originally Posted by Goauld
I'm getting a sense that you guys are shielding someone.
|
After reading the above quotations where I have pointed out the flaws we all see in your argument, would you care to revise this statement? I really don't like this absurb accusation. Stick to the evidence, G boy, that's the only thing that will get a verdict.
Quote:
Originally Posted by Goauld
Does that say to you that I am blaming the Ops or developers?
|
Yes, you are. See above quote. You are accusing "you guys", of which I am a part of.
Since we're making assumptions, let's make one based on your status in the professional world: Your LAN is safely behind a robust firewall, with no glaring security holes. Correct?
Goauld, you're really starting to get on my bad side, and believe me, that's quite a feat. I am only going to say this once more, and if you violate it, I will make sure you are removed from this community.
Stick to the evidence. Don't assume, it only makes an ass out of you (not me).