none
Flame, Digital signature on file not trusted: 0x800B0001

    General discussion

  • Similar situation on Windows 7 Starter. Looking into the WindowsUpdate.log I can see

    4fc Setup Determining whether a new setup handler needs to be downloaded
    2012-06-18 20:10:43:006  960 4fc Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe:
    2012-06-18 20:10:43:037  960 4fc Misc  Microsoft signed: Yes
    2012-06-18 20:10:43:037  960 4fc Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe are not trusted: Error 0x800b0001
    2012-06-18 20:10:43:037  960 4fc Setup WARNING: Trust verification failed for WuSetupV.exe. It will be deleted and downloaded, error = 0x800B0001
    2012-06-18 20:10:43:037  960 4fc Setup SelfUpdate handler update required: Current version: 7.6.7600.256, required version: 7.6.7600.256
    2012-06-18 20:10:43:037  960 4fc Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256"
    2012-06-18 20:10:43:068  960 4fc Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
    2012-06-18 20:10:43:068  960 4fc Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    2012-06-18 20:10:43:240  960 4fc Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is applicable but is already staged; it will not be downloaded.
    2012-06-18 20:10:43:240  960 4fc Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256"
    2012-06-18 20:10:43:723  960 4fc Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~x86~~7.6.7600.256" is already installed.
    2012-06-18 20:10:43:723  960 4fc Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2012-06-18 20:10:45:861  960 4fc Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muv4muredir.cab:
    2012-06-18 20:10:45:907  960 4fc Misc  Microsoft signed: Yes
    2012-06-18 20:10:45:907  960 4fc Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muv4muredir.cab are not trusted: Error 0x800b0001
    2012-06-18 20:10:46:048  960 4fc Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muv4muredir.cab:
    2012-06-18 20:10:46:079  960 4fc Misc  Microsoft signed: Yes
    2012-06-18 20:10:46:079  960 4fc PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2012-06-18 20:10:46:079  960 4fc PT   + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL =https://www.update.microsoft.com/v6/ClientWebService/client.asmx
    2012-06-18 20:13:07:433  960 4fc Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muv4muredir.cab:
    2012-06-18 20:13:07:479  960 4fc Misc  Microsoft signed: Yes
    2012-06-18 20:13:07:589  960 4fc Misc Validating signature for C:\Windows\SoftwareDistribution\WuRedir\7971F918-A847-4430-9279-4A52D1EFE18D\muv4muredir.cab:
    2012-06-18 20:13:07:620  960 4fc Misc  Microsoft signed: Yes
    2012-06-18 20:13:07:635  960 4fc PT +++++++++++  PT: Synchronizing extended update info  +++++++++++
    2012-06-18 20:13:07:635  960 4fc PT   + ServiceId = {7971F918-A847-4430-9279-4A52D1EFE18D}, Server URL =https://www.update.microsoft.com/v6/ClientWebService/client.asmx
    2012-06-18 20:14:07:071  960 4fc Misc WARNING: Send failed with hr = 80072ee2.
    2012-06-18 20:14:07:071  960 4fc Misc WARNING: SendRequest failed with hr = 80072ee2. Proxy List used: <(null)> Bypass List used : <(null)> Auth Schemes used : <>
    2012-06-18 20:14:07:071  960 4fc PT   + Last proxy send request failed with hr = 0x80072EE2, HTTP status code = 0
    2012-06-18 20:14:07:071  960 4fc PT   + Caller provided credentials = No
    2012-06-18 20:14:07:071  960 4fc PT   + Impersonate flags = 0
    2012-06-18 20:14:07:071  960 4fc PT   + Possible authorization schemes used = 
    2012-06-18 20:14:07:071  960 4fc PT WARNING: GetExtendedUpdateInfo failure, error = 0x80072EE2, soap client error = 5, soap error code = 0, HTTP status code = 200
    2012-06-18 20:14:07:071  960 4fc PT WARNING: PTError: 0x80072ee2
    2012-06-18 20:14:07:071  960 4fc PT WARNING: GetExtendedUpdateInfo_WithRecovery: 0x80072ee2
    2012-06-18 20:14:08:148  960 4fc PT WARNING: Sync of Extended Info: 0x80072ee2
    2012-06-18 20:14:08:148  960 4fc PT WARNING: SyncServerUpdatesInternal failed : 0x80072ee2
    2012-06-18 20:14:08:195  960 4fc Agent   * WARNING: Exit code = 0x80072EE2
    2012-06-18 20:14:08:195  960 4fc Agent *********
    2012-06-18 20:14:08:195  960 4fc Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2012-06-18 20:14:08:195  960 4fc Agent *************
    2012-06-18 20:14:08:195  960 4fc Agent WARNING: WU client failed Searching for update with error 0x80072ee2
    2012-06-18 20:14:08:319  960 e00 AU >>##  RESUMED  ## AU: Search for updates [CallId = {8A83B3B5-055F-497E-B452-92F64D934BC9}]
    2012-06-18 20:14:08:319  960 e00 AU   # WARNING: Search callback failed, result = 0x80072EE2
    2012-06-18 20:14:08:319  960 e00 AU   # WARNING: Failed to find updates with error code 80072EE2
    2012-06-18 20:14:08:319  960 e00 AU #########
    2012-06-18 20:14:08:319  960 e00 AU ##  END  ##  AU: Search for updates [CallId = {8A83B3B5-055F-497E-B452-92F64D934BC9}]

    Maybe this problem is a result of the exploit described at

    http://www.f-secure.com/weblog/archives/00002383.html

    which, in part, states that

    Flame creates a local proxy which it uses to intercept traffic to Microsoft Update. This is used to spread Flame to other machines in a local area network.
    The fake update was signed with a certificate linking up to Microsoft root, as the attackers found a way to repurpose Microsoft Terminal Server license certificates. Even this wasn't enough to spoof newer Windows versions, so they did some cutting-edge cryptographic research and came up with a completely new way to create hash collisions, enabling them to spoof the certificate. They still needed a supercomputer though. And they've been doing this silently since 2010.


    I believe that I may have been a political target of the Flame virus. I realize that Flame is a weapon of war designed by Western and Israeli intelligence to be used against the Islamic Republic of Iran and other enemies of the Rothschild banking empire. Yesterday morning I rebooted my Windows 7 PC to find a suspicious windows update being installed during the boot sequence despite the fact I disabled automatic updates. I immediately checked the WindowsUpdate.log to see what was installed, and I came across several suspicious warnings and errors that suggest I may have been infected by a variant of Flame or similar malware that spoofs the windows update feature. Others have been reporting similar problems in the last 2-3 weeks.  This was found in my WindowsUpdate.log:

    2012-06-25 21:04:29:829 812 510 Setup Determining whether a new setup handler needs to be downloaded
    2012-06-25 21:04:29:836 812 510 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe:
    2012-06-25 21:04:29:842 812 510 Misc Microsoft signed: Yes
    2012-06-25 21:04:29:842 812 510 Misc WARNING: Digital Signatures on file C:\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupV.exe are not trusted: Error 0x800b0001
    2012-06-25 21:04:29:842 812 510 Setup WARNING: Trust verification failed for WuSetupV.exe. It will be deleted and downloaded, error = 0x800B0001
    2012-06-25 21:04:29:842 812 510 Setup SelfUpdate handler update required: Current version: 7.6.7600.256, required version: 7.6.7600.256
    2012-06-25 21:04:30:741 812 510 Setup SelfUpdate check completed. SelfUpdate is required.
    2012-06-25 21:04:30:741 812 510 Setup Downloading binaries required for SelfUpdate
    2012-06-25 21:04:30:741 812 510 Setup Downloading SelfUpdate handler WuSetupHandler.cab from http://download.windowsupdate.com/v9/1/windowsupdate/b/selfupdate/WSUS3/x64/Vista
    2012-06-25 21:04:30:752 812 510 Misc Validating signature for :\Windows\SoftwareDistribution\SelfUpdate\Handler\WuSetupHandler.cab:
    2012-06-25 21:04:30:765 812 510 Misc Microsoft signed: Yes
    2012-06-25 21:04:31:084 812 510 Setup Successfully downloaded SelfUpdate handler
    2012-06-25 21:04:31:084 812 510 Setup Download of SelfUpdate binaries succeeded
    2012-06-25 21:04:31:084 812 510 Setup Starting agent SelfUpdate
    2012-06-25 21:04:31:084 812 510 Setup Skipping installation because no critical packages are ready to install.

    On reboot Windows 7 installed the so called 'update.'

    Here is my entire WindowsUpdate.log http://www.filedropper.com/windowsupdatelogtar

    "The full mechanism isn't yet completely analyzed, but Flame has a module which appears to attempt to do a man-in-the-middle attack on the Microsoft Update or Windows Server Update Services (WSUS) system. If successful, the attack drops a file called WUSETUPV.EXE to the target computer. This file is signed by Microsoft with a certificate that is chained up to Microsoft root.
    Except it isn't signed really by Microsoft."

    Source: http://www.f-secure.com/weblog/archives/00002377.html

    "We have confirmed that Flame uses a yet unknown MD5 chosen-prefix collision attack," Marc Stevens and B.M.M. de Weger wrote in an e-mail posted to a cryptography discussion group earlier this week. "The collision attack itself is very interesting from a scientific viewpoint, and there are already some practical implications." 

    Source: http://arstechnica.com/security/2012/06/flame-crypto-breakthrough/

    "New research has shown that it can be run at a rate close to 1 million checks per second on COTS GPU hardware, which means that it is as prone to brute-force attacks as the DES based UNIX crypt was back in 1995: Any 8 character password can be found in a couple of days." 

    Source: http://phk.freebsd.dk/sagas/md5crypt_eol.html

    While my computer was exhibiting symptoms of the Flame variant, my Gigabyte GV-R485-512H-B, ATI 4850 video card P/N: 113-B5012-105 (Bios Revision 011.004.000.000.029193) was overheating (flaming hot if you prefer) and the fan was out of control,  speeding up and down... my computer crashed half a dozen times. I had to flash the bios to fix the problem.   Can variants of Flame use the GPU of infected machines to crack encryption?

    
    

    Thursday, June 28, 2012 1:54 AM

All replies

  • I have this exact same thing happening. I turned off automatic updates and just had an update happen on reboot. I had the same not trusted error on the wusetup file and am freaking out right now. Should I be formatting my computer right now or could this be something else?
    Friday, June 29, 2012 5:20 AM
  • First of all, don't panic... its not going to help :).  I recommend that you try out a linux distro like Mint 13.   You can install it along side windows and use that until Microsoft releases a reliable update. I booted up an old laptop that was clean and hadn't been updated for 3 months.  I ran an update manually, and windows update suggested to me that the windows update system itself needed to be updated... from what I could tell in the log, it downloaded an updated WUSETUPV ...  after which my windows update appears to be broken.  Was I infected once again? I don't know... what I do know is that Microsoft products are no longer reliable and it would be a very good idea getting familiar with alternatives.  Linux Mint 13 is probably the best alternative.
    Friday, June 29, 2012 5:54 AM
  • Neils: Looks like Microsoft and the US/Israeli government are testing out their new cyber warfare campaign.  

    Could US cyberspies have moles inside Microsoft? (Source)

    Microsoft
     

    By Stewart Mitchell

    Posted on 15 Jun 2012 at 09:00

    US government officials could be working under cover at Microsoft to help the country's cyber-espionage programme, according to one leading security expert.

    The warning comes in the wake of the Flame virus that targeted key computers in the Middle East, and in part used confidential Microsoft certificates in order to access machines.

    According to Mikko Hypponen, chief research officer at security firm F-Secure, the claim is a logical conclusion to a series of recent discoveries and disclosures linking the US government to 2010's Stuxnet attack on Iran and ties between Stuxnet and the recent Flame attack.

    “The announcement that links Flame to Stuxnet and the conclusive proof that Stuxnet was a US tool means that Flame is also linked to the US government,” Hypponen said.

    It's plausible that if there is an operation under way and being run by a US intelligence agency it would make perfect sense for them to plant moles inside Microsoft

    “This makes you think that this breach of Microsoft's update system was done by the Americans and most likely a US agency, someone like the NSA,” Hypponen said. “That must make Microsoft mad as hell that its most critical system, used by 900 million of its customers, was breached by fellow Americans.”

    

    



    

    Obama-FBI-Microsoft collusion: warrantless snooping on the Internet.

    (Source)

    At a gathering of the American Constitution Society for Law and Policy, Homeland Security’s Janet Napolitano said,

    The First Amendment protects radical opinions, but we need the legal tools to do things like monitor the recruitment of terrorists via the Internet."

    The fact is both the administration and Microsoft are already betraying the public.

    Back in 2008, Microsoft provided the U.S. government a technical “backdoor” to its browser, which serves the majority of users (over 60%). Backdoor access is undetectable by security software—it bypasses normal authentication (passwords, etc.), firewalls and other computer security devices. In other terms, the Department of Justice, Homeland Security, the FBI and other security agencies can already eavesdrop on anyone using Microsoft’s Internet Explorer browser.

    In its infinite greed and fierce competitiveness, Microsoft opts for advertising dollars over providing customers easy access to privacy tools--a de facto, covert compromise of our constitutional rights. Although the computer giant has an effective tool (“InPrivate Filtering”), you have to know about it and then turn it on every time you start up the Explorer browser.

    Essentially, Microsoft gives snoops, hackers, advertisers, usage trackers and terrorists the upper hand over oblivious users. In its usual self-serving interests, Microsoft claims the company tried to "synthesize" both points of view about privacy,

    

    Microsoft installs Skype without consent (source)

    Skype logo

    Apparently by mistake, Microsoft's Windows Server Update Services (WSUS) last night deployed a Skype update to Windows clients that had never had the telephony and messaging software installed. This resulted in Skype being installed on these computers.

    The issue affects all computers that automatically receive Microsoft's updates via WSUS without explicit administrator approval. After the blunder surfaced publicly, Microsoft marked the update as expired. It is now no longer being deployed by WSUS servers.

    

    Updates via WSUS are becoming increasingly popular in networks where multiple Windows systems need updating. With a WSUS server, administrators can minimise network loads and control which updates will be installed. In this case, the Skype update was deployed as a non-security update.

    




    http://www.zdnet.com/blog/btl/microsoft-certificate-used-to-sign-flame-malware-issues-warning/78980

    The cyberweapon, jointly developed by the US and Israel, with the full knowledge and complicity of the Obama administration, uses the Microsoft Windows Update mechanism, and simulated signing by the Microsoft Corp. Root Certificate, to authenticate the spread of wiretapping software on the computers of any citizen unfortunate enough to be targeted.  Flame is designed to record Skype conversations

    This is, of course, a gross violation of the principle that US government agencies my not tap US citizens at random. 

    I'm sure Microsoft Corp. appreciates colluding with the governments of the United States and Israel, and of course President Obama, and implicated in Civil Rights and other violations of US constitutional guarantees against indiscriminate home invasion (not to mention quartering troops....)





    • Edited by ravenise Friday, June 29, 2012 8:24 AM
    Friday, June 29, 2012 7:19 AM
  • 

    Jewish Protection Racket, Flame: tip of the Iceburg, Cyber Espionage on the Rise


    Now that the creators of Flame have disclosed their product in a blatant sales pitch to attract would be customers, Crowdstrike wants sell you their solution and save the whole world.  Why is CrowdStrike software already obsolete and worthless? Why should you avoid their products like the plague? Because the security industry is a racket and all they are looking to do is Jew money for their extortion products... and I will tell you why.


    When was the last time you reverse-engineered all the PCI devices on your motherboard? After all it would be trivial for Intel to build in a back-door into their processors.  Even something as simple as: "if (rax == MAGIC_1 && rcx == MAGIC_2) jmp [rbx]".  It's actually worse than you think. A CPU is too complex for a human to design on the physical level, so we have to rely on software to do the design. This software could be compromised without the knowledge of an honest engineer.  Back-doors can be installed directly into hardware components allowing root access to everything on the victims machine.  There is no software solution to these kind of back-doors.  In an ever changing dynamic digital world there is no final solution except to rely upon pencil and paper for all of your transactions. In the age of quantum entanglement even that won't get you very far.  Yes even those neurophone implants that direct electromagnetic audio signals into the brains of IDF commanders in order for them to communicate De-facto telepathically aren't gonna save ya either,  although it may cure deaf shell shock victims in the aftermath.  The only temporary solution is to only use hardware manufactured and programmed with trusted components or to implement hardware based redundancies which render all potential back-doors null and void.    Seeing that Intel is an Israeli-Jewish based company, you should assume that there are hardwired back-doors in all civilian sector and non-domestic military products.  Keeping in mind that once the Jews finally decide to activate these back-doors to send information over a network, then it is all over for them...   only during a time of war would the full extent of the damage caused by dormant unknown back-door variables become fully known.  The outcome of any global war in the 21'st century will be determined predominately by digital means and the degree in which so-called leaders care more or less about everybody except themselves.

    Even if ones personal computer hardware is technically clean off the assembly line, with a basic understanding of programmable language, a hacker could conceivably install a back-door into any piece of hardware that contains an expansion ROM, or on-board ROM boot-chip.  Malware could be conceived that locates flashable hardware, saves a copy of the BIOS or firmware, and patches or re-flashes them with malicious code hooks, giving nearly undetectable hardware level remote access to intruders.  This articleexplains in detail how by using a PCI card expansion ROM, and using only 200 bytes of code one can patch the kernel module of any Linux-distro and have complete administrator  control over the computer at the hardware level leaving absolutely no traces on the computer.  One would require hardware level anti-malware systems to detect such a back-door.

    Wireless keyboard and mice signal's are easily intercepted... (Source)


    Conceivably manufacturing companies could hide back-doors inside wireless mice and keyboards, activating the back-door 'easter egg' via sending a 'cheat code' to the wireless receiver.  Of course, the only people who would have VIP access to this kind of information are the moles programming and manufacturing the components, inserting them into the post-production line, and of course those with the motivation and money to implement these hardwired bugs in the first place.

    If you don't think that manufactures would be willing to go to such lengths, keep in mind thatmanufacturers in Taiwan were caught producing external drives with a Trojan virus pre-installed on them which transmitted any data saved on the drives to online servers.  In 2006 Apple manufactured an IPod with a Trojan virus pre-installed.  Chinese manufactures are well known to manufacture counterfeit chips that on behalf of the US military, wound up installed in critical US military equipment.

    In April of 2012 RuggedCom, a Canadian based critical communications infrastructure manufacturer recently bought up by Siemens,  in one of the most alarming revelations in the IT world, was discovered to have been manufacturing  software with a hardwired back-door easily accessible to anybody with the elementary know-how.

    "equipment running RuggedCom's Rugged Operating System has an undocumented account that can't be modified and a password that's trivial to crack. What's more, researchers say, for years the company hasn't bothered to warn the power utilities, military facilities, and municipal traffic departments using the industrial-strength gear that the account can give attackers the means to sabotage operations that affect the safety of huge populations of people."

    "It is esoteric, it is obscure, but this equipment is everywhere," he said. "I was walking down the street and they had one of the traffic control cabinets that controls stop lights open and there was a RuggedCom switch, so while you and I may not see it, this is what's used in electric substations, in train control systems, in power plants and in the military. That's why I personally care about it so much." 

    "The US Navy, the Wisconsin Department of Transportation, and Chevron are just three of the customers who rely on the gear, according to this page on RuggedCom's website."


    "The backdoor uses the login ID of "factory" and a password that's recovered by plugging the MAC, or media access control, address of the targeted device into a simple Perl script, according to this post published on Monday to the Full Disclosure security list. To make unauthorized access easy, paying customers of the Shodan computer search engine can find the IP numbers of more than 60 networks that use the vulnerable equipment. The first thing users who telnet into them see, as the picture above demonstrates, is its MAC address.
    "  (Source)

    -Ed Note, Just take a glimpse at that last link, search for a power plant, police station, or oil refinery and you will have an idea of just how vulnerable the world is thanks to corporations like Siemens.

    "Programmable logic controllers like these are used to operate machinery used in refineries and other critical infrastructure. Despite their sensitivity, manufacturers often decline to fix software flaws that could allow the devices to be remotely hijacked."

    Quote, "Other forever day vulnerabilities date back as far as six years. A plugin added to the Nessus security scanner in 2006, for example, targets an FTP server that ships with the Modicon Quantum, a programmable logic controller made by Schneider-Electric. More than six years later, the back-door accounts hard-coded into the device remain.

    Another buggy PLC that won't be fixed anytime soon is the Siemens's SIMATIC controller used in plants in the water, wastewater, oil, gas, and chemical industries. According to an advisory issued in September, "Siemens currently has no plans to patch this vulnerability," which stemmed from an overflow that could allow attackers to execute arbitrary code on the targeted human-machine interface system.

    Earlier this year, researchers discovered a series of additional vulnerabilities in the same product. Some of them, including default administrator passwords that are easy to recover, remain unfixed. Instead, "Siemens has changed the documentation to encourage users to change the password at first login." (source)

    It should come as no surprise that Siemens colluded with the US and Israel to create the Stuxnet worm which was detected in Siemens controllers of Japanese power stations months before the disaster at Fukushima.

    While the US military is searching for Chinese built kill-switches in their junkware in their quest to massacre another innocent nation that actually knows how to run a country, and are not subservient to aRothschild controlled private central bank...


    The Hunt for the Kill Switch (source)


    "Are chip makers building electronic trapdoors in key military hardware? The Pentagon is making its biggest effort yet to find out."

    (cont)...Intel's new Sandy Bridge & Ivy architecture is openly sold with a built in remote kill switch and drive wiper  that could be flipped at the discretion of the Rothschild crime syndicate even if the computer has no Internet connection or isn't even turned on.  The new lineup even has a convenient remote BIOS back-door sold as a 'feature.'

    Everything can be reverse engineered and hacked eventually... how long will it be before someone other than "Israel" gets their hands on the code to kill the CPU's? Is there any hands out there that could be worse than these people? Perhaps openly selling products with back-doors is an attempt to avoid class action lawsuits against their company when they decide to proactively disengage anti-asshole dissidents while they continue their legacy of corporate espionage.  If the general public doesn't hack the code first, the hook nosed black hats at Intel will certainly sell their secrets in due time, anything for a shekel.

    The world public should file a class action lawsuit against Siemens and RuggedCom.  The only way to prevent these problems is to hit the perpetrators where it hurts, in the pocket... even if it simply means walking away from their crapware.  Israeli's don't like chess.  It would appear that the ideal world of the Zionist banker is to have the all of humanity running everything from one centralized monolithic power grid... a kind of high stakes game of Ganga where the only direction to go is up, and if you remove even the most redundant part, the entire system comes crashing down. Israel likes to call it the Sampson option.  All the safety mechanisms that could create a worthwhile product have been thrown out the window.  Anybody who believes in good faith that Microsoft, Intel, and Crowdstrike, or any of these security racketeers will protect you are wasting their breath and flirting with the loss of everything they seek to protect.  Its a two tiered system, one for the Jew, one for the Goy.  Israel is actively seeking to ensure that every weapons targeting system in the world has an  un-hackableIFF (Identification Friend or Foe) no-friendly-fire system implemented to protect the Jewish state, even if it means self-destruction of the unit.  Can Israel be certain that their own Submarines, Aircraft, Missiles and Tanks are not riddled with ticking time-bombs and back-doors? I am betting on the unexpected.  

    While the evidence of what happened in the Gulf bubbles up from the bottom of the deep blue sea, and the evidence of what happened in Fukushima lies bleeding into the pacific, we can assume that any suspicious occurrence ranging from hardware malfunctions of stop lights at highway intersections, to aircraft crashes, to car accidents, to hardware failures, to monolithic industrial disasters like Fukushima and the Gulf oil spill are the result of greed driven corporate espionage caused by time-bombs and back-doors built into hardware components.  Planned obsolescence may be a better term in many instances... anything so the "donkey's" continue coming back for a shekel, as Rabbi Ovadia Yosef in Israel would say.  "Better buy our crapware or somethin bad gonna happen to ya."

    In 2007, when the Israeli air force invaded Syria and destroyed the al-Kibar site, Israel alleged that the site was harboring a nuclear reactor... however, subsequent inspections by the IAEA proved once again that every accusation coming from the usurping Jewish entity is a fabricated lie.  Some reports suggest that Syrian air radars malfunctioned during this period because of? You guessed it, a built in back-door within the CPU's used to power them.   Meanwhile the IDF unit involved with the development of Fuku-Stuxnetis pushing forward both offensive and defensive cyber warfare exercises, "establishing offensive capabilities and operations within Military Intelligence’s Unit 8200 and defensive operations in the C4I Directorate’s Cyber Defenders Division."


    And this brings me onto the next bit. I believe that I may have been a political target of a variant of the Flame malware... more on my experience here. I am beginning to suspect that Flame is downloaded directly from Microsoft's servers onto target specific machines as the Jewish money power increases their cyber espionage activities against civilized nations and activists around the globe.


    Could US cyberspies have moles inside Microsoft?Source 

    Microsoft
    Quote, "US government officials could be working under cover at Microsoft to help the country's cyber-espionage programme, according to one leading security expert. The warning comes in the wake of the Flame virus that targeted key computers in the Middle East, and in part used confidential Microsoft certificates in order to access machines. According to Mikko Hypponen, chief research officer at security firm F-Secure, the claim is a logical conclusion to a series of recent discoveries and disclosures linking the US government to 2010's Stuxnet attack on Iran and ties between Stuxnet and the recent Flame attack."

    “The announcement that links Flame to Stuxnet and the conclusive proof that Stuxnet was a US tool means that Flame is also linked to the US government,” Hypponen said. 
    It's plausible that if there is an operation under way and being run by a US intelligence agency it would make perfect sense for them to plant moles inside Microsoft “This makes you think that this breach of Microsoft's update system was done by the Americans and most likely a US agency, someone like the NSA,” Hypponen said.
    “That must make Microsoft mad as hell that its most critical system, used by 900 million of its customers, was breached by fellow Americans.” End Quote. 
    Keep in mind that that F-Secure and other security companies claim to have had samples of Flame for years, but  have done absolutely nothing about it, "Mikko Hypponen, the well-regarded chief research officer at Finland’s F-Secure Oyj, told the Reuters Summit his company had a sample of Flame in 2010 and classified it as cleanSource 
    make-love-not-warcraft.jpg

    Flame was detected in Hungary, Russia, and Iran only a month ago.  This suggests that major security firms were working in collusion with the US and Israeli governments to remain silent about these weapons of mass destruction. Stuxnet was detected in the Siemens controllers of nuclear power plants in Japan just prior to the Fukushima disaster in which the emergency cooling systems of the Fukushima rectors failed to activate properly.   In fact, an Israeli firm was in charge of security at the Fukushima plant during the time of the disaster.  Iran and Japan should launch a joint investigation into this matter to see if the Jewish security firm and software created by these rogue intelligence agencies were the root cause for the greatest nuclear disaster in human history.  Latest reports indicate that Cesium 137 has been detected in some ~95% of the urine samples of individuals living within 200 kilometers from the Fukushima disaster area.

    In 2011 Microsoft handed contracts to Israeli based firms to provide low level networking components in Windows 8.  Talk about your chutzpah:
    Israel's Mellanox to Drive Windows Server 8, providing InfiniBand and Ethernet components to drive core Windows Server 8 functionality. Source

    Microsoft has been colluding with the FBI and other intelligence agencies for years now.
    Quote, "Back in 2008, Microsoft provided the U.S. government a technical “backdoor” to its browser, which serves the majority of users (over 60%). Backdoor access is undetectable by security software—it bypasses normal authentication (passwords, etc.), firewalls and other computer security devices. In other terms, the Department of Justice, Homeland Security, the FBI and other security agencies can already eavesdrop on anyone using Microsoft’s Internet Explorer browser."(Source)

    Skype logo

    One module of Flame reportedly records and stores Skype conversations on victims computers and uploads the content to 'command and control' servers on the Internet.  Just days ago, Microsoft's windows update service installed Skype onto unsuspecting victims computers without their consent.  Microsoft MVP Lawrence Garvin confirmed yesterday that when leaving automatic updates enabled on your windows machine that quote "You have no control over what is installed -- right or wrong." If in fact Flame was a collaborative effort involving rouge elements within Microsoft as suspected, then we should expect that flame could very well be installed onto target specific machines directly from Microsoft's own servers. One source recently suggested that "the creators of these viruses have apparently managed to plant them on any PC they wanted to."  How do they know?

    Who is behind flame? Ever heard of Crowdstrike?

    "CrowdStrike launches in stealth-mode with $26 million Series A round led by Warburg Pincus"


    We will have a world government whether you like it or not. The only question is whether that government will be achieved by conquest or consent.

     —Jewish International Banker James Warburg on February 17, 1950, as he testified before the U.S. Senate. James was the son of Paul Warburg, who represented the Rothschilds when they created the Federal Reserve act at Jekyll Island in 1910. He also later formed the Council of Foreign Relations (CFR). Remember him the next time you wonder why the dollar is so worthless.

    CrowdStrike appears to be a Jewish financed gang of security veterans with direct ties to the Warburg crime family, J.P Morgan and other major criminal financial firms working in collusion with elements within US Government, FBI, CIA, Private, and Israeli Military Intelligence Unit 8200 and defensive operations in the C4I Directorate’s Cyber Defenders Division, Microsoft, Mcafee, Google...etc.  

    Elements of the CrowdStrike team oversaw cyber espionage directed against China in recent years.  Remember the debacle about Googles hacking allegations against China? Operation AuroraNight Dragon, and Shady RAT in which these Jewish criminals constantly cried out in pain when they strike their victims? Keep in mind that Joogle itself is a tribe enterprise, read: The Jewish hand behind Internet - Google, Facebook, Wikipedia, Yahoo!, MySpace, eBay.
    Quote "Operation Aurora was a cyber attack which began in mid-2009 and continued through December 2009. The attack was first publicly disclosed by Google on January 12, 2010, in a blog post. In the blog post, Google said the attack originated in China. The attacks were both sophisticated and well resourced and consistent with an advanced persistent threat attack." snip "As a result of the attack, Google stated in its blog that it plans to operate a completely uncensored version of its search engine in China "within the law, if at all", and acknowledged that if this is not possible it may leave China and close its Chinese offices. Official Chinese media responded stating that the incident is part of a U.S. government conspiracy." Source 

    Of course, citing a link directly from CrowdStrike's website "Google would like you to think of them as the dolphin in a vendor sea full of sharks. snip -But what they won’t do is hold your hand when you’re drowning in technical issues."

    Maimonides, Mishnah Torah, (Moznaim Publishing Corporation, Brooklyn, New York, 1990, Chapter 10, English Translation), p. 184: "Accordingly, if we see an idolater (gentile) being swept away or drowning in the river, we should not help him. If we see that his life is in danger, we should not save him." The Hebrew text of the Feldheim 1981 edition of Mishnah Torah states this as well.

    They create the problem, blame the victim, and claim to offer a viable solution, for a shekel of course... Co-Founder & CTO of CrowdStrike, Dmitri Alperovitch claims that "Some victims (China in particular) seem determined to deny they’ve been attacked, even when offered empirical proof that a smash-and-grab has taken place." ed note: Who could have proof of these so called smash and grab's but the people behind the them in the first place? China wont let these clowns near them.


    "Don't worry, there is a ray of hope, CrowdStrike vows to Save the World From Flame Malware"
     Source

    All these Talmud thumpers seem to be useful for is creating more and more problems. When there is a serious issue that needs attention, they don't care... they project their incompetence on to people who actually know how to run a nation properly.  This diseased mindset relies souly upon the acquisition of temporary profits at the expense of others and anything of any real lasting value.  Human civilization as we have known it could be living in a kind of garden of eden at this time, yet it is teetering on the brink because most people's primary concern seems to be creaming every last bit of pretty printed imaginary profits from a dieing empire.  The people behind these crimes must be stopped and brought to justice before they take the civilized world down with them.

    If you want security, I recommend checking out China's new Loongson CPU product line... hopefully Iran will start printing out their own CPU's for the general public as well.


    • Edited by ravenise Tuesday, July 03, 2012 5:51 PM
    Tuesday, July 03, 2012 5:47 PM
  • This issue / error can be cause by the wintrust.dll needing to be registered.

    Open cmd as an administrator and run regsvr32 Wintrust.dll /s

    Thursday, July 26, 2012 6:28 AM
  • This link worked for me !!!! 

    That worked really fantastic !!

    Follow it "As- Is"

    http://social.technet.microsoft.com/Forums/en-US/winserverwsus/thread/a47039d9-4d45-4a61-aa26-6100aeffc1f0

    Monday, December 03, 2012 5:15 PM