CobolHacker.com

Title

cobolhacker.com

Description

Excerpted from the website:

After rebooting into safe mode we notice the bad module is not there anymore. But booting back into normal mode reveals that the adware is still there, it has just changed names. My guess is that when you exit Windows and Internet Explorer is unloaded from memory it sends the unload event to it’s modules. When this bug traps the unload, its unload procedure is to recreate the .DLL file with a different name and update the registry. So the act of rebooting to clean the sucker off is exactly what it needs to evade removal.
I contemplate this for a while. I also contemplate the bottle of rum I’ve got in the cabinet above the oven. I contemplate the reasons for this adware being as persistent as it is. I contemplate what I’m going to do to the coder if I ever find him.

read more

Languages

English

Additional Information

Related Domains

External Links





Retrieved from "http://aboutus.com/index.php?title=CobolHacker.com&oldid=8340310"