| View previous topic :: View next topic |
| Author |
Message |
xXxoSmxXx How do I cheat?
Reputation: 0
Joined: 09 Jun 2010 Posts: 4
|
Posted: Sun Jun 13, 2010 2:07 am Post subject: General programming->Binaries (wtf?) |
|
|
When I go to binaries, and post a new topic I get the error:
"Sorry, but you will have to wait 7752459 seconds before you can create a new topic here."
Could this possibly be that I am new to CEF?
|
|
| Back to top |
|
 |
Uzeil Moderator
Reputation: 6
Joined: 21 Oct 2006 Posts: 2411
|
Posted: Sun Jun 13, 2010 2:10 am Post subject: |
|
|
Most likely. It's probably to avoid people signing up to posts viruses (or people that have been banned signing up to post viruses / offtopic posts)
I have to ask: Why are you trying to post a binary as your first post ever?
_________________
|
|
| Back to top |
|
 |
xXxoSmxXx How do I cheat?
Reputation: 0
Joined: 09 Jun 2010 Posts: 4
|
Posted: Sun Jun 13, 2010 2:19 am Post subject: |
|
|
| Uzeil wrote: | Most likely. It's probably to avoid people signing up to posts viruses (or people that have been banned signing up to post viruses / offtopic posts)
I have to ask: Why are you trying to post a binary as your first post ever? |
Keylog Builder.
Made in VB 2010, it's most likely going to be open source.
It's not meant to be malicious in any way.
It may sound like it, but say you have more than one computer.
You create a keylogger with this program, move the "Server.exe" or whatever you choose to name it, into a hidden folder, windows folder, etc.
It will log and send to an email so you can receive logs from that computer remotely.
If this was attempted to be used maliciously, it would be a failure.
If the person who was tricked into downloading it, opened it and realized "nothing" came up, they would then try to delete the file. That wouldn't work as the file is in use, so anyone in their right mind would search their task manager for the process.
And it has a timer set for 10 minutes to send an email attached with the log.
|
|
| Back to top |
|
 |
Uzeil Moderator
Reputation: 6
Joined: 21 Oct 2006 Posts: 2411
|
Posted: Sun Jun 13, 2010 2:42 am Post subject: |
|
|
Well, technically could be used maliciously considering you could include it with a program you made then have the program you made open it, maybe even add it to /Run in registry.
etc etc.
Just saying.
Not to mention the other part where this could be, as long as it's not open source, a method that you're using to keylog many computers yourself without actually having to do the work(just post it and have other people be the ones to spread it, then send the logs to both them and yourself)
You see the issue?
Which is why members that we don't already know decently well probably aren't allowed to go straight to posting their binaries.
_________________
|
|
| Back to top |
|
 |
|