Jump to content
Ghost Recon.net Forums

halo_jones

GR.net Supporter
  • Content Count

    111
  • Joined

  • Last visited

Posts posted by halo_jones

  1. PSN halojones101 beta looks good and controls are managable

    I doubt I'll get it as I rarely play FPS on my consoles, but PSN ID: WolfsongSwe

    I can't do console shooters either, but I am going to make a real effort with GR:FS, might even get one of those PS3 keyboards if it helps.

    its worth trying to get a handle on the sixaxis, i mourn no keyboard for consoles but i have persevered with sticks and its doable... see ya on the beta

  2. IT suck's from experience "i was a skill at arm instructor" ... it was fundemental flawed and all the mods in the world wont fix it .... as a ranges rifle its ok and the susat sight was pretty good but the cheap construction and the poor design flaws never gave me much confidence in it "which for a SSA instructor training recruits didnt make me a whole smiling little teddie bear...as for "babydaves", coments totaly correct, i get realy cross about the whole defence budget and thing and am happy to be out now cos its got worse since i left in 2000....

    and dont even start me on the LSW...

  3. Security vendors moved fast to integrate protection into their products. One company, Websense claims that they are tracking thousands of sites that are currently distributing exploits. Example screen capture images on the company's Web site show that at least two exploits change a user's desktop background image to an alert stating that the computer has been infected with spyware.

    A prompt then tries to coax the person into entering credit card information in order to obtain a method of removing the alleged spyware. The company also posted a video that shows a machine becoming infected.

    F-Secure warned that systems might become infected through other methods. For example, infection could occur by using a text-based Web browser or tools such as WGET and CURL, which are designed to download Web content from a DOS command shell. Infection through those methods might occur if other tools, such as file indexing engines, are active on the desktop. Some search tools, such as Google Desktop, index files in realtime, which means that when an infected file is downloaded then Google Desktop will immediately index the file, thereby launching any exploit code contained in the infected file. Your best defense in any case is to unregister the DLL or enable DEP, as recommended by Microsoft.

    Colin

    YUp its a nasty one all right i got it googling random images the other day...was hellish to get rid of as the "spy sherif" auto installed GRRRRRRL...it was only the trackback option in XP that let me get AVG on it :o=:o= hackers :o=:o=

  4. A big have a good one from "the Halo*" to all at Ghost recon.net. a big thank you to Rocky for starting this madness lol..and too everyone who has made this year fun......i wish you all a prosperous new year....XX maria :santa:;):santa:

  5. Double redundency is a good call....and yup im sure we are all gonna 'Abobe' some more stuff this weekend.

    Dannick i was ok while i was rough editing, but the first time through in iTunes, onced i finished got me weepy for sure ... her voice is quite haunting as she reading the piece though.....

×
×
  • Create New...