Dragon Age Wiki is a cesspool of computer viruses. I have been attacked almost every time I log into it. But it’s also the one of the best sources of Dragon Age information and it will come in handy when Awakening comes out. I was recently attacked by a very complicated Trojan Horse virus; proper measures were taken but suffice to say it was a close call.
I have installed Super Anti-Spyware, Malwarebytes’ Anti-Malware after the attack and already had Microsoft Security, but I don’t know if it will be enough for the wiki. Does anyone know any programs or measures I can take to eliminate the virus threat on Dragon Age wiki?
Dragon Age Wiki Virus Problems
Débuté par
Venatio
, févr. 22 2010 03:58
#1
Posté 22 février 2010 - 03:58
#2
Posté 22 février 2010 - 04:06
Install Linux.
#3
Posté 22 février 2010 - 04:17
mousestalker wrote...
Install Linux.
How helpfull.
To tell you the truth this is news to me. I never had any problems with the wiki. What browser are you using? I'm using Firefox with a slew of addons to prevent just that sort of thing, maybe that could help you out?
#4
Posté 22 février 2010 - 05:49
charlottenoyen wrote...
mousestalker wrote...
Install Linux.
How helpfull.
To tell you the truth this is news to me. I never had any problems with the wiki. What browser are you using? I'm using Firefox with a slew of addons to prevent just that sort of thing, maybe that could help you out?
I was being helpful.
The problem with a bug ridden website is that the viewer has no control over the bugs. You can avoid the issue, by using an operating system that the bugs will not work on, ie Linux. You can use prophylactic measures such as anti-virals and anti malware add-ons such as what you indicate you use. If the malware exploits flaws in the browser (IE or firefox) you might try switching to a less common browser (Safari, Opera or Chrome).
In my case, I use Ubuntu (version of Linux that is very user friendly) and use a less common browser. I have never had any malware since switching from Windows, see improved performance overall and am more productive at work. For game, I boot over to a streamlined version of Windows. I do not surf the web using Windows.
Mac users can be equally smug about the same issues. I understand this game runs a treat in Bootcamp. The Mac-native version less so.
#5
Posté 22 février 2010 - 06:05
Yes, I know it is technically helpful and it could solve the problem, but have you ever heard of anyone completely switching OS for such a minor problem? In every thread asking for help, there's always some clown that tells them to just go through the major hassle of learning how to use Linux when all they want is a little fix.
Sure, switching to Linux (which takes quite some time and dedication) could solve half the problems anyone has, but... you know, overkill much?
Sure, switching to Linux (which takes quite some time and dedication) could solve half the problems anyone has, but... you know, overkill much?
Modifié par charlottenoyen, 22 février 2010 - 06:06 .
#6
Posté 22 février 2010 - 07:28
I do computer security work in my day job. I've never seen any virus warnings on Wikia (which BTW has no official connection to or support from Bioware) but I also use Firefox+ "a slew of addons".
Using a less-common browser just changes the malware/vulnerability profile, but doesn't address the underlying issues. Anyone browsing the general Internet today with Internet Explorer needs to ensure that they have both installed all applicable hotfixes, and have also ensure that security for the "Internet Zone" is usefully set within IE. If you have a default install of IE6 on XP SP2 but haven't kept up to date on subsequent hotfixes, you *are* vulnerable today.
Most importantly, though, the fault is likely not with wikia.com itself but rather a "transitive trust" problem. The sequence that has happened to other websites, and may have happened here:
- Site wants to pay for itself with advertising revenue.
- Site begins accepting advertisements, either vetting the ads themselves or using a second-party ad service
- A malware author/scammer buys a banner ad that points to an image they serve. The initial image/script/iframe/whatever is innocuous.
- Once the ad has been accepted and is in "rotation" on the website, the malware author/scammer changes out the image/script/iframe/whatever to point to something new, such as a malware infection vector.
- ???
- PROFIT (for the bad guys)
From looking at
http://community.wik...rnings_on_Wikia
after writing the info above, it would appear both that I guessed right, and that Wikia hasn't been effective in fixing or addressing the issue. My apologies to anyone who's encountered problems, but I'll continue to surf Wikia (and other sites I don't fully trust including Bioware.com) using Firefox+noscript+adblockplus+"other stuff".
(OS: XP SP3, well locked down, etc.; yes I also use Linux, Solaris, OpenBSD but am constrained to spend most of my time on Windows due to simple reality, and wouldn't tell anyone to switch OS just to avoid web-based malware.)
Using a less-common browser just changes the malware/vulnerability profile, but doesn't address the underlying issues. Anyone browsing the general Internet today with Internet Explorer needs to ensure that they have both installed all applicable hotfixes, and have also ensure that security for the "Internet Zone" is usefully set within IE. If you have a default install of IE6 on XP SP2 but haven't kept up to date on subsequent hotfixes, you *are* vulnerable today.
Most importantly, though, the fault is likely not with wikia.com itself but rather a "transitive trust" problem. The sequence that has happened to other websites, and may have happened here:
- Site wants to pay for itself with advertising revenue.
- Site begins accepting advertisements, either vetting the ads themselves or using a second-party ad service
- A malware author/scammer buys a banner ad that points to an image they serve. The initial image/script/iframe/whatever is innocuous.
- Once the ad has been accepted and is in "rotation" on the website, the malware author/scammer changes out the image/script/iframe/whatever to point to something new, such as a malware infection vector.
- ???
- PROFIT (for the bad guys)
From looking at
http://community.wik...rnings_on_Wikia
after writing the info above, it would appear both that I guessed right, and that Wikia hasn't been effective in fixing or addressing the issue. My apologies to anyone who's encountered problems, but I'll continue to surf Wikia (and other sites I don't fully trust including Bioware.com) using Firefox+noscript+adblockplus+"other stuff".
(OS: XP SP3, well locked down, etc.; yes I also use Linux, Solaris, OpenBSD but am constrained to spend most of my time on Windows due to simple reality, and wouldn't tell anyone to switch OS just to avoid web-based malware.)
#7
Posté 22 février 2010 - 08:27
Firefox+noscript+adblockplus+"other stuff"
That's what I use too, keeps me out of trouble mostly. Thanks for the help!
That's what I use too, keeps me out of trouble mostly. Thanks for the help!
#8
Posté 22 février 2010 - 09:57
Thanks for your help everyone, I'll be sure to look into all my options. Just a shame that the Tome of Knowledge that is suppose to function as the "Official" Wiki is a joke.
Beggars cant be choosers I suppose...
Beggars cant be choosers I suppose...
#9
Posté 22 février 2010 - 11:32
I use Windows and I use IE. Never had a problem with the DA wiki. All it takes is due diligence in having the right options installed and keeping things up to date.





Retour en haut







