[TechSpot] Google wants you to update Chrome right now - Page 2 - Overclock.net - An Overclocking Community

Forum Jump: 

[TechSpot] Google wants you to update Chrome right now

Reply
 
Thread Tools
post #11 of 50 (permalink) Old 03-08-2019, 07:13 AM
✾ ✿ ❀ ❁
 
Alex132's Avatar
 
Join Date: Dec 2009
Posts: 8,365
Rep: 342 (Unique: 274)
What about Steam, Discord and a bunch of other platforms that use Chromium/Chrome-based stuff?

| This Cannot Continue | We Are Become As Gods | This Cannot Continue |

Vehicles:
Current: None.
Ex: '07 Fiat Palio, '07 Honda Accord Type-S
Illya
(26 items)
Yuki
(23 items)
CPU
Intel i9 9900K @ 5.2Ghz
Motherboard
Gigabyte Aorus Master
GPU
EVGA 1080 Ti FTW3
RAM
G.Skill Trident Z 32GB 4000Mhz
Hard Drive
Samsung 970 Pro 512GB
Hard Drive
Samsung 850 Evo 1TB
Hard Drive
WD Red 8TB
Power Supply
Seasonic Prime Titanium 850W
Cooling
EK Velocity CPU Block
Cooling
EK 1080 Ti FTW3 GPU Block
Cooling
HardwareLabs GTX420
Cooling
HardwareLabs GTS280
Cooling
HardwareLabs GTS140
Cooling
EK D5 140 Glass Pump/res
Case
Phanteks Evolv X
Operating System
Windows 10 Pro
Monitor
Asus ROG Swift PG279Q 165Hz 1440p
Monitor
I-INC 1920x1200 TN 27"
Keyboard
Ducky One 2 Midnight
Mouse
Logitech G502
Mousepad
CoolerMaster Swift-RX XL
Audio
Sennhesier HD650
Audio
Schiit Jotunheim Amp/DAC
Audio
Samson C01U Microphone
Audio
Edifier R1700BT
Other
Oculus Rift
CPU
Intel 2500K 5Ghz
Motherboard
ASUS P8P67 Pro
GPU
EVGA 1080 Ti FTW3
RAM
G.Skill RipJaws X 2133Mhz 16GB
Hard Drive
120GB Corsair Neutron GTX
Hard Drive
Samsung 850 Evo 1TB
Hard Drive
WD Red 8TB
Power Supply
EVGA G3 850W
Cooling
Hyper 212
Cooling
EK Vardar fans
Case
Corsair 270R w/TG mod
Operating System
Windows 10
Monitor
Asus ROG Swift PG279Q
Monitor
I-Inc 1200p
Keyboard
Razer BlackWidow 2013
Mouse
Logitech G502 Proteus Spectrum
Mousepad
CoolerMaster Swift-RX XL
Audio
Sennheiser HD650
Audio
Schiit Jotunheim Balanced DAC + Amp
Audio
Edifier R1700BT Speakers
Audio
Samson C01U Microphone
Other
Oculus Rift
Other
PS4 Controller
▲ hide details ▲


Alex132 is offline  
Sponsored Links
Advertisement
 
post #12 of 50 (permalink) Old 03-08-2019, 09:16 AM
Head Dwarf
 
iamjanco's Avatar
 
Join Date: Aug 2016
Location: In a circus tent
Posts: 2,082
Rep: 102 (Unique: 57)
No matter how hard you try this day and age to protect yourself, there will always be someone trying harder to get around your latest protective measures. While it's not necessarily browser related, here's a case in point:

Over the past few weeks I've received a half dozen or so emails from someone claiming to have broached my security. Pretty much in the same vein as what's been reported here. Given my background though, I've naturally got somewhat more of an understanding of how email servers work, and how to track such bogus emails back to their source (as much as feasibly possible, that is, given email forwarder scripts).

Yesterday, I received the following message:

Click image for larger version

Name:	2019-03-08_10-29-02.jpg
Views:	39
Size:	259.5 KB
ID:	257960

Take note of where the perpetrator states (bolded for emphasis) "your browser began operating like a RDP (Remote Control) that have a keylogger that gave me permission to access your display and webcam."

That's an interesting claim since I've had a piece of tape covering my web webcam for years now (I don't use it). Still, as a precaution, the first thing I did was ftp into my server to do a quick review of the date/time stamps on all my files there (I have root access), followed by a review of my error and access logs. Next, I logged into my email via the server and checked for the bogus message in the inbox, sent mail, and junk folders. One version was found in my inbox, as well as two other slightly different versions in the junk folder. But nothing made to look like it was sent by me via my server to me was found in any of the outgoing/sent mail folders (email can be made to look like anyone sent it, if you know how to do so).

Next, I reviewed the full headers found in the email (I’ll keep them short for the purposes of this post, and cover up info that I don’t wish to share with the world). Note the items highlighted by the red arrows (the info in the red box suggests the likelihood that scripting was used to resend the message by way of a hacked account. In this case, @maya creations.co.in:

Click image for larger version

Name:	2019-03-08_10-51-55.jpg
Views:	21
Size:	101.6 KB
ID:	257974

Then I pinged mayacreations.co.in to get an IP address, blacklisted the IP, and ran a whois on the mayacreations.co.in domain to determine who the registrar is for the domain, as well as gather any additional non-private info available in the record. This was followed by the following steps:

Reported the message to the FBI, providing detailed info;
Reported the message to abuse at the domain name registrar for mayacreations.co.in;
Went on about my business.

I didn't attempt to contact the holder of the email address at mayacreations.co.in simply because of the possibilities that (a) the email address was bogus, or; (b) if not bogus, that those responsible for the traffic passed through the domain in question were either unaware their server had been co-opted (possibly via the solidhosting.pro domain, which is assigned name servers in the EU and IN), OR if actually the email address of someone stupid enough to use it in attempting to extort funds from me, I didn't want to give them a heads up.

I’ll let those I’ve reached out to take care of that instead.

All told, about 45 minutes worth of worth. A pain in the neck, mind you, because of the time lost, but I tend not to lose (much) sleep over such stuff at night.



Last edited by iamjanco; 03-08-2019 at 03:27 PM.
iamjanco is offline  
post #13 of 50 (permalink) Old 03-08-2019, 09:33 AM
New to Overclock.net
 
Helrich's Avatar
 
Join Date: Feb 2013
Location: Lancaster, PA
Posts: 119
Rep: 10 (Unique: 10)
Quote: Originally Posted by iamjanco View Post
No matter how hard you try this day and age to protect yourself, there will always be someone trying harder to get around your latest protective measures. While it's not necessarily browser related, here's a case in point:

Over the past few weeks I've received a half dozen or so emails from someone claiming to have broached my security. Pretty much in the same vein as what's been reported here. Given my background though, I've naturally got somewhat more of an understanding of how email servers work, and how to track such bogus emails back to their source (as much as feasibly possible, that is, given email forwarder scripts).

Yesterday, I received the following message:

Attachment 257960

Take note of where the perpetrator states (bolded for emphasis) "your browser began operating like a RDP (Remote Control) that have a keylogger that gave me permission to access your display and webcam."

That's an interesting claim since I've had a piece of tape covering my web webcam for years now (I don't use it). Still, as a precaution, the first thing I did was ftp into my server to do a quick review of the date/time stamps on all my files there (I have root access), followed by a review of my error and access logs. Next, I logged into my email via the server and checked for the bogus message in the inbox, sent mail, and junk folders. One version was found in my inbox, as well as two other slightly different versions in the junk folder. But nothing made to look like it was sent by me via my server to me was found in any of the outgoing/sent mail folders (email can be made to look like anyone sent it, if you know how to do so).

Next, I reviewed the full headers found in the email (I’ll keep them short for the purposes of this post, and cover up info that I don’t wish to share with the world). Note the items highlighted by the red arrows (the info in the red box suggests the likelihood that scripting was used to resend the message by way of a hacked account. In this case, @maya creations.co.in:

Attachment 257974

Then I pinged mayacreations.co.in to get an IP address, and ran a whois on the mayacreations.co.in domain to determine who the registrar is for the domain, as well as gather any additional non-private info available in the record. This was followed by the following steps:

Reported the message to the FBI, providing detailed info;
Reported the message to abuse at the domain name registrar for mayacreations.co.in;
Went on about my business.

I didn't attempt to contact the holder of the email address at mayacreations.co.in simply because of the possibilities that (a) the email address was bogus, or; (b) if not bogus, that those responsible for the traffic passed through the domain in question were either unaware their server had been co-opted, OR if actually the email address of someone stupid enough to use it in attempting to extort funds from me, I didn't want to give them a heads up.

I’ll let those I’ve reached out to take care of that instead.

All told, about 45 minutes worth of worth. A pain in the neck, mind you, because of the time lost, but I tend not to lose (much) sleep over such stuff at night.
Dude, people get spam emails all the time, you don't need to bother the FBI about it lol.
Helrich is offline  
Sponsored Links
Advertisement
 
post #14 of 50 (permalink) Old 03-08-2019, 09:50 AM
Head Dwarf
 
iamjanco's Avatar
 
Join Date: Aug 2016
Location: In a circus tent
Posts: 2,082
Rep: 102 (Unique: 57)
Quote: Originally Posted by Helrich View Post
Dude, people get spam emails all the time, you don't need to bother the FBI about it lol.
...and that's one of the reasons why people continue to get scam emails all the time. Ignorance is bliss, eh?


iamjanco is offline  
post #15 of 50 (permalink) Old 03-08-2019, 10:08 AM
Senioritis Member
 
Lady Fitzgerald's Avatar
 
Join Date: Apr 2013
Location: AZ, SSA (Squabbling States of America)
Posts: 8,232
Rep: 522 (Unique: 329)
Quote: Originally Posted by Helrich View Post
Dude, people get spam emails all the time, you don't need to bother the FBI about it lol.
Quote: Originally Posted by iamjanco View Post
...and that's one of the reasons why people continue to get scam emails all the time. Ignorance is bliss, eh?
This is actually a well known scam and it is completely bogus. The sender does not have proof of you being on a porn site nor does he have a keylogger on your computer. I got one of those and I don't have a web cam and I definitely do not go to porn sites. Just ignore any lowlifes sending you these and, if your browser didn't do it already, report it as spam and move to your spam folder. And don't bother the FBI about it. They, the FCC, and other three letter agencies are already aware of it.

Jeannie
CPU
i7-3930k
Motherboard
ASUS P9X79 WS
GPU
MSI R7850 Twin Frozr 2GD5/OC Radeon HD 7850 2GB 256-bit GDDR5 PCI Express 3.0 x16 HDCP Ready CrossFireX Support Video Card
GPU
Monoprice 1x2 powered HDMI Splitter
RAM
Kingston HyperX 32GB (8 x 4GB) 240-Pin DDR3 SDRAM DDR3 1600 (PC3 12800) Desktop Memory Model KHX1600C9D3K8/32GX
Hard Drive
128GB Samsung 840 Pro SSD
Hard Drive
4TB Samsung 850 EVO SSD
Hard Drive
4TB Samsung 850 EVO SSD
Hard Drive
4TB Samsung 850 EVO SSD
Hard Drive
4TB Samsung 850 EVO SSD
Optical Drive
LG 12X BD-ROM 16X DVD-ROM 48X CD-ROM SATA Internal Blu-ray Drive CH12LS28
Power Supply
Corsair HX750W
Cooling
COOLER MASTER GeminII S524 120mm Long Life Sleeve CPU Cooler
Case
Antec Two Hundred v2
Operating System
Windows 7 Ultimate
Monitor
3 x Asus VG248QE
Monitor
Vizio VO320E 32" TV
Keyboard
Logitech G510s
Mouse
Logitech M525 with Unifying Receiving
Audio
Corsair SP2500 2.1 Speakers
Audio
ASUS Xonar Essence STX Virtual 7.1 Channels 24-bit 192KHz PCI Express x1 Interface 124 dB SNR / Headphone AMP Card
Other
LSI 9211-8i HBA card
Other
HooToo® HT-CR001 3.5" PCI-E to USB 3.0 Multi-in-One Front Panel Internal Card Reader (6 Memory Slots, Genesys GL3220 Chipset) & SuperSpeed USB 3.0 3-Port Hub (VIA VL800 Chipset), can read & write: M2/MS Micro, High-Speed CF(UDMA), UHS-I, SD, SDHC,...
Other
StarTech HSB220SAT25B 2 Drive 2.5in Trayless Hot Swap SATA Mobile Rack Backplane
CPU
i7-5930K Haswell-e
Motherboard
Asus X99-E WS/USB 3.1
GPU
Visiontek Radeon 7870 2GB with 6 miniDisplayports
RAM
G-Skill Ripjaws 64GB (8x8GB) DDR4 2133
Hard Drive
Samsung 850 EVO 4TB SSDs
Hard Drive
Samsung 950 Pro 512GB m.2 SSD boot drive
Power Supply
Corsair AX760
Cooling
Noctua NH-D15S Cpu cooler
Case
Scratch built. Currently under construction at https://www.overclock.net/t/1602023/preparing-for-a-scratch-built-case
Operating System
Win 7 Ultimate
Mouse
Logitech M525
Mouse
El Cheapo Allsop hard plastic
▲ hide details ▲
Lady Fitzgerald is offline  
post #16 of 50 (permalink) Old 03-08-2019, 10:15 AM
Senioritis Member
 
Lady Fitzgerald's Avatar
 
Join Date: Apr 2013
Location: AZ, SSA (Squabbling States of America)
Posts: 8,232
Rep: 522 (Unique: 329)
I find it curious that only Chrome has been affected by this. Even more curious is the "fix" won't work for Win 7 users of Chrome and Google is advising Win 7 users to "upgrade" (more like, downgrade) to Win 7. Microsoft is supposedly working on a fix for Win 7 (and I trust Microsoft's "fixes" in the past 15 months as far as I can spit upwind in a Class 5 hurricane). This whole thing has a peculiar odor, akin to dead and rotten mackerel.

Jeannie
CPU
i7-3930k
Motherboard
ASUS P9X79 WS
GPU
MSI R7850 Twin Frozr 2GD5/OC Radeon HD 7850 2GB 256-bit GDDR5 PCI Express 3.0 x16 HDCP Ready CrossFireX Support Video Card
GPU
Monoprice 1x2 powered HDMI Splitter
RAM
Kingston HyperX 32GB (8 x 4GB) 240-Pin DDR3 SDRAM DDR3 1600 (PC3 12800) Desktop Memory Model KHX1600C9D3K8/32GX
Hard Drive
128GB Samsung 840 Pro SSD
Hard Drive
4TB Samsung 850 EVO SSD
Hard Drive
4TB Samsung 850 EVO SSD
Hard Drive
4TB Samsung 850 EVO SSD
Hard Drive
4TB Samsung 850 EVO SSD
Optical Drive
LG 12X BD-ROM 16X DVD-ROM 48X CD-ROM SATA Internal Blu-ray Drive CH12LS28
Power Supply
Corsair HX750W
Cooling
COOLER MASTER GeminII S524 120mm Long Life Sleeve CPU Cooler
Case
Antec Two Hundred v2
Operating System
Windows 7 Ultimate
Monitor
3 x Asus VG248QE
Monitor
Vizio VO320E 32" TV
Keyboard
Logitech G510s
Mouse
Logitech M525 with Unifying Receiving
Audio
Corsair SP2500 2.1 Speakers
Audio
ASUS Xonar Essence STX Virtual 7.1 Channels 24-bit 192KHz PCI Express x1 Interface 124 dB SNR / Headphone AMP Card
Other
LSI 9211-8i HBA card
Other
HooToo® HT-CR001 3.5" PCI-E to USB 3.0 Multi-in-One Front Panel Internal Card Reader (6 Memory Slots, Genesys GL3220 Chipset) & SuperSpeed USB 3.0 3-Port Hub (VIA VL800 Chipset), can read & write: M2/MS Micro, High-Speed CF(UDMA), UHS-I, SD, SDHC,...
Other
StarTech HSB220SAT25B 2 Drive 2.5in Trayless Hot Swap SATA Mobile Rack Backplane
CPU
i7-5930K Haswell-e
Motherboard
Asus X99-E WS/USB 3.1
GPU
Visiontek Radeon 7870 2GB with 6 miniDisplayports
RAM
G-Skill Ripjaws 64GB (8x8GB) DDR4 2133
Hard Drive
Samsung 850 EVO 4TB SSDs
Hard Drive
Samsung 950 Pro 512GB m.2 SSD boot drive
Power Supply
Corsair AX760
Cooling
Noctua NH-D15S Cpu cooler
Case
Scratch built. Currently under construction at https://www.overclock.net/t/1602023/preparing-for-a-scratch-built-case
Operating System
Win 7 Ultimate
Mouse
Logitech M525
Mouse
El Cheapo Allsop hard plastic
▲ hide details ▲
Lady Fitzgerald is offline  
post #17 of 50 (permalink) Old 03-08-2019, 10:16 AM
Head Dwarf
 
iamjanco's Avatar
 
Join Date: Aug 2016
Location: In a circus tent
Posts: 2,082
Rep: 102 (Unique: 57)
Yeah, I'm aware it's a well known scam. The point is I'm reporting information that your typical internet email user doesn't even know exists (the email headers for the message contain far more information than what I've shared here).

Reporting the instance might seem like overkill to some, but not to me.


iamjanco is offline  
post #18 of 50 (permalink) Old 03-08-2019, 10:18 AM
Overclocker in training
 
ThrashZone's Avatar
 
Join Date: Apr 2017
Posts: 8,049
Rep: 90 (Unique: 65)
Hi,
I'm sure firefox.. will release a patch if it's vulnerable..
If not just another boogieman exploit

CPU
i9-9940x With Heatkiller IV Pro and VRM Plexi-Copper water block
Motherboard
ASUS x299 Rampage VI Apex
GPU
Titan Xp with copper Water Block
RAM
Trident Z 3600C16 4x8gb's b-die default timings 16-16-16-36
Hard Drive
Samsung 970 Evo Plus 500gb M.2/ Samsung 850 Pro 256gb for os and 500gb evo for favorite games plus other wd hdd's for data and backup's
Optical Drive
LG Blu-Ray WH16NS40
Power Supply
evga 1200-P2
Cooling
2-280GTX Black Ice Nemesis rads with D5 pump-res combo and D5 top before and after rads.
Case
corsair 450D with added 2nd floor to house radiator on top
Operating System
Win-7 pro & 10 pro Win-7 Primary os.
Monitor
ASUS VG248QE 24" 144Hz
Keyboard
Logitech G910 Orion spectrum
Mouse
Redragon Perdition
Audio
Built in realtek and Insignia 2.0 soundbar HSB318
CPU
i7-5930k with Heatkiller IV Pro Plexi-Copper and koolance vrm water blocks
Motherboard
X99 Sabertooth
GPU
EVGA 1080ti FTW3 with Water block
RAM
Trident-Z 3200C14 4x8gb's b-die default timings 14-14-14-34
Hard Drive
Samsung 970 Evo 500gb M.2/ Samsung 850 Pro 256gb for os and 500gb evo for favorite games plus other wd hdd's for data and backup's
Power Supply
EVGA 1000-P2
Cooling
2-240 GTX Black Ice Nemesis rads/ D5 pump-res combo and D5 top before and after rads.
Case
Corsair 450D with added 2nd floor to house radiator on top
Operating System
Win-7 and 10 pro Win-7 Primary os.
Monitor
AOC G2460PG 24"G-Sync 144Hz
Mouse
Red Dragon Perdition
Audio
Built in realtek and Insignia 2.0 soundbar HSB318
Hard Drive
eLeaf MELO-3 4ml
Power Supply
SE US18650VTC6 3120mAh 30A 3.6V 18650 Li-ion Battery - GREENx4
Case
ANGIS Legion MOD 200w Geek Vape
Operating System
VapeWild RazzleBerry 50-50-0mg nic
▲ hide details ▲
ThrashZone is offline  
post #19 of 50 (permalink) Old 03-08-2019, 11:27 AM
H₂O Aficionado
 
Slaughtahouse's Avatar
 
Join Date: Jan 2013
Posts: 3,590
Rep: 117 (Unique: 94)
Quote: Originally Posted by iamjanco View Post
No matter how hard you try this day and age to protect yourself, there will always be someone trying harder to get around your latest protective measures. While it's not necessarily browser related, here's a case in point:

Over the past few weeks I've received a half dozen or so emails from someone claiming to have broached my security. Pretty much in the same vein as what's been reported here. Given my background though, I've naturally got somewhat more of an understanding of how email servers work, and how to track such bogus emails back to their source (as much as feasibly possible, that is, given email forwarder scripts).

Yesterday, I received the following message:

Attachment 257960

Take note of where the perpetrator states (bolded for emphasis) "your browser began operating like a RDP (Remote Control) that have a keylogger that gave me permission to access your display and webcam."

That's an interesting claim since I've had a piece of tape covering my web webcam for years now (I don't use it). Still, as a precaution, the first thing I did was ftp into my server to do a quick review of the date/time stamps on all my files there (I have root access), followed by a review of my error and access logs. Next, I logged into my email via the server and checked for the bogus message in the inbox, sent mail, and junk folders. One version was found in my inbox, as well as two other slightly different versions in the junk folder. But nothing made to look like it was sent by me via my server to me was found in any of the outgoing/sent mail folders (email can be made to look like anyone sent it, if you know how to do so).

Next, I reviewed the full headers found in the email (I’ll keep them short for the purposes of this post, and cover up info that I don’t wish to share with the world). Note the items highlighted by the red arrows (the info in the red box suggests the likelihood that scripting was used to resend the message by way of a hacked account. In this case, @maya creations.co.in:

Attachment 257974

Then I pinged mayacreations.co.in to get an IP address, and ran a whois on the mayacreations.co.in domain to determine who the registrar is for the domain, as well as gather any additional non-private info available in the record. This was followed by the following steps:

Reported the message to the FBI, providing detailed info;
Reported the message to abuse at the domain name registrar for mayacreations.co.in;
Went on about my business.

I didn't attempt to contact the holder of the email address at mayacreations.co.in simply because of the possibilities that (a) the email address was bogus, or; (b) if not bogus, that those responsible for the traffic passed through the domain in question were either unaware their server had been co-opted (possibly via the solidhosting.pro domain, which is assigned name servers in the EU and IN), OR if actually the email address of someone stupid enough to use it in attempting to extort funds from me, I didn't want to give them a heads up.

I’ll let those I’ve reached out to take care of that instead.

All told, about 45 minutes worth of worth. A pain in the neck, mind you, because of the time lost, but I tend not to lose (much) sleep over such stuff at night.
If it's any consolation, I have been getting the exact same emails since January.

I didn't go through the legs you have just done but it was worded the exact same way. 1000 USD or Bitcoin. It would vary from email to email.

I knew it was BS instantly...because I dont even have a Webcam.

Edit: HOWEVER, the janky message did include / list a password that I use. Which sparked the concern. Though, this password was a sacrificial generic password that I use for a sacrificial email account. The last place I remembered setting up an account and using this password was for a Bitcoin trading site (I can't recall the name, it was in 2017). So I assumed that was the cause of the leak. Possibly that account was breached and the "user" was mentioning that they knew my password.

To expand on this, it got a little crazier when similar messages began popping up in my work email account. Some would appear in my spam, however, suddenly everyone in our office was getting emails written from our employer saying

"X, I have an urgent task that I need completed, can you please meet me?

Signed - Employers Name"

Grammar was excellent and it doesn't get recognized as spam because it comes from what appears to be a normal Gmail address.

See attached screenshot; This one is from yesterday. If you're not paying attention, you would think it is legitimate as the initials show as the employer's initials. Even though the email address is bogus.
Attached Thumbnails
Click image for larger version

Name:	screenshot.PNG
Views:	5
Size:	6.6 KB
ID:	258006  


-=]░▒▓███ [Official] NVIDIA GTX 780 Owner's Club ███▓▒░[=-

Stridsfordon 90
(20 items)
M1 Abrams
(18 items)
Asus G53
(0 items)
CPU
Intel 3930K
Motherboard
Asus Sabertooth X79
GPU
GTX 780 SC
RAM
Patriot Black Viper
Hard Drive
Samsung 840 SSD
Hard Drive
WD Black 7200 RPM
Power Supply
Corsair AX 850
Cooling
XSPC EX 360 Radiator
Cooling
XSPC Raystorm CPU Block
Cooling
XSPC Titan/780 GPU Block
Cooling
EK-XRES 100 Revo D5 - Acetal
Cooling
XSPC D5 Pump
Case
Fractal Design Meshify C
Operating System
Windows 10
Monitor
QNIX 27"
Keyboard
Logitech G710+
Mouse
Razer Death Adder 2013
Mousepad
Mouse Rug
Audio
Sennheiser HD 6XX
Audio
Bose Companion III's
CPU
i7 3930K
Motherboard
Asus Sabertooth X79
GPU
Geforce GTX 780 EVGA SC 3GB + XSPC Waterblock
RAM
Patriot Viper 3 16GB (4 x 4GB) DDR3 2133
Hard Drive
SAMSUNG 840 Series 250GB
Power Supply
Corsair AX850
Cooling
XIGMATEK Dark Knight II Night Hawk Edition
Cooling
XSPC 360mm radiator, Raystorm CPU block, D5 pump
Case
Corsair Vengeance Series C70 Military Green (Custom paint)
Operating System
Windows 10
Monitor
QNIX QX2710 27" 100hz
Monitor
Samsung 2233RZ 22" 120hz
Keyboard
Logitech g710+
Mouse
Razer DeathAdder 3.5G
Mouse
Mouse Rug
Audio
Bose Companion III's Speakers
Audio
Sennheiser HD 558 Headphones
Audio
Sennheiser HD 6XX Headphones
▲ hide details ▲

Last edited by Slaughtahouse; 03-08-2019 at 11:52 AM.
Slaughtahouse is offline  
post #20 of 50 (permalink) Old 03-08-2019, 01:39 PM
Old to Overclock.net
 
Join Date: Jan 2008
Posts: 2,063
Rep: 120 (Unique: 104)
Two things, can the exploit work if the user is blocking Javascript (lol this alone seems to stop like 99% of vulnerabilities) and does it work if the user isn't root?

362436
(15 items)
CPU
AMD Ryzen 5 1600
Motherboard
Asus Prime X370-A AMD Ryzen AM4 DDR4
GPU
Gigabyte GeForce GTX 950
RAM
2x Corsair Valueselect 8GB 288 Pin DDR4 SDRAM DDR4 @ 2133
Hard Drive
Corsair Force LS 2.5" 120GB SATA III MLC SSD
Optical Drive
Lite-On 24X SATA DVD/RW Optical Drive
Power Supply
Corsair RM550x 550W 80 Plus Gold
Cooling
Noctua NH-L9A-AM4 Low-Profile
Case
Antec NSK4100 Steel ATX Mid Tower
Operating System
Mint 18.2 x64
Monitor
HP 24" LCD/LED 1920x1080
Keyboard
IBM PC-AT
Mouse
Logitech G5
Audio
Sennheiser HD650
Audio
Asus Essence STX II
▲ hide details ▲


xJumper is offline  
Reply

Quick Reply
Message:
Options

Register Now

In order to be able to post messages on the Overclock.net - An Overclocking Community forums, you must first register.
Please enter your desired user name, your email address and other required details in the form below.
User Name:
If you do not want to register, fill this field only and the name will be used as user name for your post.
Password
Please enter a password for your user account. Note that passwords are case-sensitive.
Password:
Confirm Password:
Email Address
Please enter a valid email address for yourself.
Email Address:

Log-in



Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Show Printable Version Show Printable Version
Email this Page Email this Page


Forum Jump: 

Posting Rules  
You may post new threads
You may post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off