Beas wrote:crawtona wrote:ward wrote:crawtona wrote:ward wrote:The percentage of people who had problems with it and didn't ask us to help them fix it (like what was mentioned in the TPG news post) is small. The whole point of it is to enforce rules that we have in place. I can't for the life of me think of any reason to NOT use it. I did read your post, and you implied that someone could be harvesting data from your computer etc. This just isn't happening, and if you used a program like I posted, you would know.
I feel like his bigger concern is that, while the program may not necessarily be harvesting personal information currently, it might be able to be used that way in the future. Not everyone is programming savvy enough to know what is and what is not possible with these types of things, including me.
And cass, I more got the impression that lerfooled was more concerned about the fact that someone with a potential backdoor into his computer is from another country, not just because he is from Brazil. Makes legal recourse very difficult. I don't really know lerfooled personally, but I've seen his posts and community interactions since like 2004 or 05, and I have never got any impression from him other than that he seems like a level headed guy, so I'm sure he wasn't ripping on Brazilians in general. He leaves that to me. Now go back to your tiki hut, eat a banana, and yell at your sister-wife in spanish for wearing too large of a bikini.
You don't have to be programming savy to use a process monitior, god damn.
Oh oh, lemme do one more:
Hey awesome for you, ward, you posted a process monitoring tool for everyone to use that lets you know after someone has stolen all your shit that they stole all your shit. I also love the fact that about 95% of users would not be able to decipher wtf 95% of this means:
More data captured for operation input and output parameters
Non-destructive filters allow you to set filters without losing data
Capture of thread stacks for each operation make it possible in many cases to identify the root cause of an operation
Reliable capture of process details, including image path, command line, user and session ID
Configurable and moveable columns for any event property
Filters can be set for any data field, including fields not configured as columns
Advanced logging architecture scales to tens of millions of captured events and gigabytes of log data
Process tree tool shows relationship of all processes referenced in a trace
Native log format preserves all data for loading in a different Process Monitor instance
Process tooltip for easy viewing of process image information
Detail tooltip allows convenient access to formatted data that doesn't fit in the column
Boot time logging of all operations
and yet you wanted them to use it to make sure they weren't getting F'ed in the A on Sunday(s).
I'm pretty footloose and fancy free with my "'bout to get fucked" protection, tbh, so I installed and used the client without hesitation; but others aren't as stupid as me in their ignorance.
Either way, thanks for the heads up, bromontana!
http://www.youtube.com/watch?feature=pl ... mjuq3z62w8
(EMBEDDING DISABLED BY REQUEST? FUCK THEM. FUCK THEM RIGHT IN THE ASS.)
CRAWTONA if you require assistance with your computer and would like for me to help you through the use of command prompt. I can easily get your computer and secure information fully secured!
I DO NOT, BUT I APPRECIATE THE OFFER, beas.