ClamAV Signature Publishing Notice
Datefile: daily
Version: 24242
Publisher: Alain Zidouemba
New Sigs: 239
Dropped Sigs: 0
Ignored Sigs: 508
New Detection Signatures:
* Win.Trojan.Emotet-6426819-0
* Win.Trojan.Emotet-6426820-0
* Win.Trojan.Emotet-6426821-0
* Win.Trojan.Emotet-6426822-0
* Win.Trojan.Emotet-6426823-0
* Win.Trojan.Emotet-6426824-0
* Doc.Dropper.Agent-6426825-0
* Doc.Dropper.Agent-6426826-0
* Win.Trojan.Agent-6426827-0
* Win.Trojan.Agent-6426828-0
* Win.Trojan.Agent-6426829-0
* Win.Trojan.Agent-6426830-0
* Win.Trojan.Agent-6426831-0
* Win.Trojan.Agent-6426832-0
* Win.Trojan.Agent-6426833-0
* Win.Trojan.Agent-6426834-0
* Win.Trojan.Agent-6426835-0
* Win.Trojan.Agent-6426836-0
* Win.Trojan.Agent-6426837-0
* Win.Trojan.Agent-6426838-0
* Win.Trojan.Agent-6426839-0
* Win.Trojan.Agent-6426840-0
* Win.Trojan.Agent-6426841-0
* Win.Trojan.Agent-6426842-0
* Osx.Malware.Agent-6426843-0
* Win.Malware.Agent-6426844-0
* Win.Malware.Agent-6426845-0
* Win.Trojan.Emotet-6426846-0
* Win.Trojan.Emotet-6426847-0
* Win.Trojan.Emotet-6426848-0
* Win.Trojan.Agent-6426849-0
* Win.Trojan.Agent-6426850-0
* Win.Trojan.Agent-6426851-0
* Win.Trojan.Agent-6426852-0
* Win.Trojan.Agent-6426853-0
* Win.Trojan.Agent-6426854-0
* Win.Trojan.Agent-6426855-0
* Win.Trojan.Agent-6426856-0
* Win.Trojan.Agent-6426857-0
* Win.Trojan.Agent-6426858-0
* Win.Trojan.Agent-6426859-0
* Osx.Malware.Agent-6426860-0
* Win.Trojan.Emotet-6426861-0
* Win.Trojan.Agent-6426862-0
* Win.Trojan.Agent-6426863-0
* Win.Trojan.Agent-6426864-0
* Win.Trojan.Agent-6426865-0
* Win.Trojan.Agent-6426866-0
* Win.Trojan.Agent-6426867-0
* Win.Trojan.Agent-6426868-0
* Win.Trojan.Agent-6426869-0
* Win.Trojan.Agent-6426870-0
* Win.Trojan.Agent-6426871-0
* Win.Trojan.Agent-6426872-0
* Win.Trojan.Agent-6426873-0
* Win.Trojan.Agent-6426874-0
* Win.Trojan.Agent-6426875-0
* Win.Trojan.Agent-6426876-0
* Win.Trojan.Agent-6426877-0
* Win.Trojan.Agent-6426878-0
* Win.Malware.Agent-6426879-0
* Win.Malware.Agent-6426880-0
* Win.Malware.Agent-6426881-0
* Win.Malware.Agent-6426882-0
* Win.Malware.Agent-6426883-0
* Win.Malware.Agent-6426884-0
* Win.Malware.Agent-6426885-0
* Osx.Malware.Agent-6426886-0
* Osx.Malware.Agent-6426887-0
* Osx.Malware.Agent-6426888-0
* Osx.Malware.Agent-6426889-0
* Osx.Malware.Agent-6426890-0
* Osx.Malware.Agent-6426891-0
* Osx.Malware.Agent-6426892-0
* Osx.Malware.Agent-6426893-0
* Osx.Malware.Agent-6426894-0
* Osx.Malware.Agent-6426895-0
* Osx.Malware.Agent-6426896-0
* Osx.Malware.Agent-6426897-0
* Win.Trojan.Emotet-6426898-0
* Win.Trojan.Agent-6426899-0
* Win.Trojan.Agent-6426900-0
* Win.Trojan.Agent-6426901-0
* Win.Trojan.Agent-6426902-0
* Win.Trojan.Agent-6426903-0
* Win.Trojan.Agent-6426904-0
* Win.Trojan.Agent-6426905-0
* Win.Trojan.Agent-6426906-0
* Win.Trojan.Agent-6426907-0
* Win.Trojan.Agent-6426908-0
* Win.Trojan.Agent-6426909-0
* Win.Trojan.Agent-6426910-0
* Win.Trojan.Agent-6426911-0
* Win.Trojan.Agent-6426912-0
* Win.Trojan.Agent-6426913-0
* Win.Trojan.Agent-6426914-0
* Win.Trojan.Agent-6426915-0
* Win.Trojan.Agent-6426916-0
* Win.Trojan.Agent-6426917-0
* Win.Malware.Agent-6426918-0
* Win.Malware.Agent-6426919-0
* Win.Malware.Agent-6426920-0
* Win.Malware.Agent-6426921-0
* Win.Trojan.Emotet-6426922-0
* Doc.Dropper.Agent-6426923-0
* Win.Trojan.Agent-6426924-0
* Win.Trojan.Agent-6426925-0
* Win.Trojan.Agent-6426926-0
* Win.Trojan.Agent-6426927-0
* Win.Trojan.Agent-6426928-0
* Win.Trojan.Agent-6426929-0
* Win.Trojan.Agent-6426930-0
* Win.Trojan.Agent-6426931-0
* Win.Trojan.Agent-6426932-0
* Win.Trojan.Agent-6426933-0
* Win.Trojan.Agent-6426934-0
* Win.Trojan.Agent-6426935-0
* Win.Trojan.Agent-6426936-0
* Win.Trojan.Agent-6426937-0
* Win.Malware.Agent-6426938-0
* Win.Malware.Agent-6426939-0
* Win.Malware.Agent-6426940-0
* Win.Malware.Agent-6426941-0
* Win.Malware.Agent-6426942-0
* Win.Malware.Agent-6426943-0
* Osx.Malware.Agent-6426944-0
* Win.Trojan.Emotet-6426945-0
* Win.Trojan.Emotet-6426946-0
* Win.Trojan.Emotet-6426947-0
* Win.Trojan.Emotet-6426948-0
* Win.Trojan.Emotet-6426949-0
* Win.Trojan.Emotet-6426950-0
* Win.Trojan.Emotet-6426951-0
* Win.Trojan.Emotet-6426952-0
* Win.Trojan.Emotet-6426953-0
* Win.Trojan.Emotet-6426954-0
* Win.Trojan.Emotet-6426955-0
* Win.Trojan.Emotet-6426956-0
* Win.Trojan.Emotet-6426957-0
* Win.Trojan.Emotet-6426958-0
* Win.Trojan.Emotet-6426959-0
* Win.Trojan.Emotet-6426960-0
* Win.Trojan.Emotet-6426961-0
* Win.Trojan.Emotet-6426962-0
* Win.Trojan.Emotet-6426963-0
* Win.Trojan.Emotet-6426964-0
* Win.Trojan.Emotet-6426965-0
* Win.Trojan.Emotet-6426966-0
* Win.Trojan.Emotet-6426967-0
* Win.Trojan.Emotet-6426968-0
* Win.Trojan.Agent-6426969-0
* Win.Trojan.Agent-6426970-0
* Win.Trojan.Agent-6426971-0
* Win.Trojan.Agent-6426972-0
* Win.Trojan.Agent-6426973-0
* Win.Trojan.Agent-6426974-0
* Win.Trojan.Agent-6426975-0
* Win.Trojan.Agent-6426976-0
* Win.Trojan.Agent-6426977-0
* Win.Trojan.Agent-6426978-0
* Win.Trojan.Agent-6426979-0
* Win.Trojan.Agent-6426980-0
* Win.Malware.Agent-6426981-0
* Win.Malware.Agent-6426982-0
* Win.Malware.Agent-6426983-0
* Win.Malware.Agent-6426984-0
* Win.Malware.Agent-6426985-0
* Win.Malware.Agent-6426986-0
* Win.Malware.Agent-6426987-0
* Win.Malware.Agent-6426988-0
* Win.Malware.Agent-6426989-0
* Win.Malware.Agent-6426990-0
* Win.Malware.Agent-6426991-0
* Osx.Malware.Agent-6426992-0
* Win.Trojan.Emotet-6426993-0
* Win.Trojan.Emotet-6426994-0
* Win.Trojan.Emotet-6426995-0
* Win.Trojan.Emotet-6426996-0
* Win.Trojan.Emotet-6426997-0
* Win.Trojan.Emotet-6426998-0
* Win.Trojan.Emotet-6426999-0
* Win.Trojan.Emotet-6427000-0
* Win.Trojan.Emotet-6427001-0
* Win.Trojan.Emotet-6427002-0
* Doc.Dropper.Agent-6427003-0
* Win.Trojan.Agent-6427004-0
* Win.Trojan.Agent-6427005-0
* Win.Trojan.Agent-6427006-0
* Win.Trojan.Agent-6427007-0
* Win.Trojan.Agent-6427008-0
* Win.Trojan.Agent-6427009-0
* Win.Trojan.Agent-6427010-0
* Win.Trojan.Agent-6427011-0
* Win.Trojan.Agent-6427012-0
* Win.Trojan.Agent-6427013-0
* Win.Malware.Agent-6427014-0
* Win.Malware.Agent-6427015-0
* Win.Malware.Agent-6427016-0
* Win.Malware.Agent-6427017-0
* Win.Malware.Agent-6427018-0
* Win.Malware.Agent-6427019-0
* Win.Malware.Agent-6427020-0
* Win.Malware.Agent-6427021-0
* Win.Malware.Agent-6427022-0
* Osx.Malware.Agent-6427023-0
* Win.Trojan.Emotet-6427024-0
* Win.Trojan.Emotet-6427025-0
* Win.Trojan.Emotet-6427026-0
* Win.Trojan.Emotet-6427027-0
* Win.Trojan.Emotet-6427028-0
* Win.Trojan.Agent-6427029-0
* Win.Trojan.Agent-6427030-0
* Win.Trojan.Agent-6427031-0
* Win.Trojan.Agent-6427032-0
* Win.Trojan.Agent-6427033-0
* Win.Trojan.Agent-6427034-0
* Win.Trojan.Agent-6427035-0
* Win.Trojan.Agent-6427036-0
* Win.Trojan.Agent-6427037-0
* Win.Trojan.Agent-6427038-0
* Win.Trojan.Agent-6427039-0
* Win.Trojan.Agent-6427040-0
* Win.Trojan.Agent-6427041-0
* Win.Trojan.Agent-6427042-0
* Win.Trojan.Agent-6427043-0
* Win.Trojan.Agent-6427044-0
* Win.Trojan.Agent-6427045-0
* Win.Trojan.Agent-6427046-0
* Win.Malware.Agent-6427047-0
* Win.Malware.Agent-6427048-0
* Win.Malware.Agent-6427049-0
* Win.Malware.Agent-6427050-0
* Win.Malware.Agent-6427051-0
* Win.Malware.Agent-6427052-0
* Win.Malware.Agent-6427053-0
* Win.Malware.Agent-6427054-0
* Win.Malware.Agent-6427055-0
* Win.Malware.Agent-6427056-0
* Win.Malware.Agent-6427057-0
Dropped Detection Signatures:
- Link:
- wong chee tat :)
Ads
Sunday, 21 January 2018
Saturday, 20 January 2018
NTU grad student arrested for allegedly molesting teenager
NTU grad student arrested for allegedly molesting teenager
By Kamini Devadass @KaminiCNA
20 Jan 2018 05:27PM (Updated: 20 Jan 2018 05:39PM)
SINGAPORE: A Nanyang Technological University (NTU) grad student has been arrested, after a teenager alleged that he was molested when he took part in what he thought was a research project.
The police confirmed that a report was lodged and a 25-year-old man was arrested for outrage of modesty.
Channel NewsAsia understands that the man, a Singaporean, was arrested on Saturday (Jan 20).
The incident was said to have happened last November. According to Nanyang Chronicle, the university's student-run campus newspaper, the 17-year-old victim said he responded to an online advertisement on Gumtree calling for participants to be part of a "body stimulation" research project.
Participants were promised payment of up to S$25 an hour. Those under 16 years old were promised an additional S$10 per session. A purported ad on Craigslist reportedly asked for male participants only.
The teenager told the Nanyang Chronicle that the graduate student took him to his dormitory on Nov 13 last year and instructed him to "shower and come out naked". He claimed he was then blindfolded, restrained to a bed with a cloth and molested.
The victim filed a report the following day.
According to the Nanyang Chronicle article, the teenager agreed to the man's various requests because he was afraid and that the man was "a big guy".
In a statement on Saturday, an NTU spokesperson said that there was no such research project approved by the university.
"There is no such scientific or scholarly research project that has been undertaken. Any research involving human participants must be submitted to the Institutional Review Board for review and approval," said the spokesperson, adding that NTU takes campus security and safety seriously.
“The university views academic and research misconduct as serious disciplinary offences. We are aware that the police are investigating this case and we are assisting them in their investigations."
According to the Chronicle, the graduate student denied involvement with the online ads.
Source: CNA/ng
Read more at https://www.channelnewsasia.com/news/singapore/ntu-grad-student-arrested-for-allegedly-molesting-teenager-9879778
- Link:
- wong chee tat :)
By Kamini Devadass @KaminiCNA
20 Jan 2018 05:27PM (Updated: 20 Jan 2018 05:39PM)
SINGAPORE: A Nanyang Technological University (NTU) grad student has been arrested, after a teenager alleged that he was molested when he took part in what he thought was a research project.
The police confirmed that a report was lodged and a 25-year-old man was arrested for outrage of modesty.
Channel NewsAsia understands that the man, a Singaporean, was arrested on Saturday (Jan 20).
The incident was said to have happened last November. According to Nanyang Chronicle, the university's student-run campus newspaper, the 17-year-old victim said he responded to an online advertisement on Gumtree calling for participants to be part of a "body stimulation" research project.
Participants were promised payment of up to S$25 an hour. Those under 16 years old were promised an additional S$10 per session. A purported ad on Craigslist reportedly asked for male participants only.
The teenager told the Nanyang Chronicle that the graduate student took him to his dormitory on Nov 13 last year and instructed him to "shower and come out naked". He claimed he was then blindfolded, restrained to a bed with a cloth and molested.
The victim filed a report the following day.
According to the Nanyang Chronicle article, the teenager agreed to the man's various requests because he was afraid and that the man was "a big guy".
In a statement on Saturday, an NTU spokesperson said that there was no such research project approved by the university.
"There is no such scientific or scholarly research project that has been undertaken. Any research involving human participants must be submitted to the Institutional Review Board for review and approval," said the spokesperson, adding that NTU takes campus security and safety seriously.
“The university views academic and research misconduct as serious disciplinary offences. We are aware that the police are investigating this case and we are assisting them in their investigations."
According to the Chronicle, the graduate student denied involvement with the online ads.
Source: CNA/ng
Read more at https://www.channelnewsasia.com/news/singapore/ntu-grad-student-arrested-for-allegedly-molesting-teenager-9879778
- Link:
- wong chee tat :)
Friday, 19 January 2018
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Thursday, 18 January 2018
Sutra in Forty-Two Sections
Sutra in Forty-Two Sections
Section 4
Clarifying Good and Evil
The Buddha said, "Living beings may perform Ten Good Deeds or Ten Evil Deeds. What are the ten? Three are done with the body, four are done with the mouth, and three are done with the mind. The three done with the body are killing, stealing, and lust. The four done with the mouth are duplicity, harsh speech, lies, and frivolous speech. The three done with the mind are jealousy, hatred, and stupidity. Thus these ten are not in accord with the Way of Sages and are called the Ten Evil Deeds. To put a stop to these evils is to perform the Ten Good Deeds."
- Link
- wong chee tat :)
Section 4
Clarifying Good and Evil
The Buddha said, "Living beings may perform Ten Good Deeds or Ten Evil Deeds. What are the ten? Three are done with the body, four are done with the mouth, and three are done with the mind. The three done with the body are killing, stealing, and lust. The four done with the mouth are duplicity, harsh speech, lies, and frivolous speech. The three done with the mind are jealousy, hatred, and stupidity. Thus these ten are not in accord with the Way of Sages and are called the Ten Evil Deeds. To put a stop to these evils is to perform the Ten Good Deeds."
- Link
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
Homage to the 36 trillion, 119 thousand, 500 Amitabha Buddhas
- wong chee tat :)
Telnet
Telnet
Updated: April 17, 2012
Applies To: Windows Server 2003, Windows Vista, Windows XP, Windows Server 2008, Windows 7, Windows Server 2003 R2, Windows Server 2008 R2, Windows Server 2000, Windows Server 2012, Windows 8
Communicates with a computer running the Telnet Server service. For examples of how this command can be used, see Examples.
Syntax
telnet [/a] [/e <EscapeChar>] [/f <FileName>] [/l <UserName>] [/t {vt100 | vt52 | ansi | vtnt}] [<Host> [<Port>]] [/?]
Parameters
Parameter
|
Description
|
---|---|
/a
|
Attempt automatic logon. Same as /l option except uses the currently logged on user’s name.
|
/e <EscapeChar>
|
Escape character used to enter the Telnet client prompt.
|
/f <FileName>
|
File name used for client side logging.
|
/l <UserName>
|
Specifies the user name to log on with on the remote computer.
|
/t {vt100 | vt52 | ansi | vtnt}
|
Specifies the terminal type. Supported terminal types are vt100, vt52, ansi, and vtnt.
|
<Host> [<Port>]
|
Specifies the hostname or IP address of the remote computer to connect to, and optionally the TCP port to use (default is TCP port 23).
|
/?
|
Displays Help at the command prompt. Alternatively, you can type /h.
|
Remarks
- You must install the Telnet client software before you can run this command. For more information, see Installing Telnet.
- You can run Telnet without parameters to enter the Telnet context, indicated by the Telnet prompt (Microsoft Telnet>). From the Telnet prompt, you can use Telnet commands to manage the computer running the Telnet client.
Examples
Use Telnet to connect to the computer running the Telnet Server Service at telnet.microsoft.com.
telnet telnet.microsoft.com
Use Telnet to connect to the computer running the Telnet Server Service at telnet.microsoft.com on TCP port 44 and log the session activity in a local file called telnetlog.txt
telnet /f telnetlog.txt
- Link
- wong chee tat :)
Wednesday, 17 January 2018
Double Filet Meal?
Had a double filet meal last Sunday. Should I get a meal this week? Or should I get something else?
- Pic from MacDonalds' Singapore
- wong chee tat :)
- Pic from MacDonalds' Singapore
- wong chee tat :)
Subscribe to:
Posts (Atom)