P
P50
Guest
I ask the TMF members who are competent in this matter to view, comment, and critique this plan.
<I><B>Problem:</B> </I>Spyware sends reports out behind your back; kreeps
<I><B>Plan:</B> </I>
-1- Install the spyware in its own directory on the disk
-2- Use some sort of encryption to scramble that entire subdirectory. (Note the EXEs and DLLs are the main targets)
-3- Before using spyware, disconnect from the internet
-4- Decrypt the spyware directory
-5- Use it
-6- Destroy the files in the spyware directory
-7- Computer can now be used for internet connections
<I><B>Problem:</B> </I>Spyware sends reports out behind your back; kreeps
<I><B>Plan:</B> </I>
-1- Install the spyware in its own directory on the disk
-2- Use some sort of encryption to scramble that entire subdirectory. (Note the EXEs and DLLs are the main targets)
-3- Before using spyware, disconnect from the internet
-4- Decrypt the spyware directory
-5- Use it
-6- Destroy the files in the spyware directory
-7- Computer can now be used for internet connections