Aiga infected with virus, Zenawi’s Chinese Doctors working on cleansing it. – Solomon Tekaligne

January 11th, 2009 Print Print Email Email

Don’t let my name scare you away! Unfortunately, I happened to bear the same first and last name as the woyanne singer, “Solomon Tekaligne”.

(more…)

Don’t let my name scare you away! Unfortunately, I happened to bear the same first and last name as the woyanne singer, “Solomon Tekaligne”.

I am a regular visitor of Aiga Forum. I visit aiga, not because I sympathize with what is being preached there but out of curiosity of what zenawi has to say.

I visit very limited Ethiopian and other English websites. However, my computer has been regularly infected with viruses, mostly with Trojan horses.

I did a little research of my own and found aiga forum to be the culprit.

If you are a regular aigaforum visitor, out of curiosity in what Meles has to say or out of plain stupidity of being a staunch woyanne supporter, I have two words for you – “TAKE PRECAUTION”

You don’t have to take my word for it, read below the advisory provided by Google.

Advisory by Google on aigaforum.com

Aiga has 1013 exploits and one Trojan horse. Exploits are like land mines and they are waiting for you to step on them.

According to wiki, An exploit (from the same word in the French language, meaning “achievement”, or “accomplishment”) is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). This frequently includes such things as violently gaining control of a computer system or allowing privilege escalation or a denial of service attack.

Facts about Trojan horse Virus:

1) A Trojan Horse Virus is a common yet difficult to remove computer threat. This is a type of virus that attempts to make the user think that it is a beneficial application.

2) A Trojan horse virus works by hiding within a set of seemingly useful software programs. Once executed or installed in the system, this type of virus will start infecting other files in the computer.

3) A Trojan Horse Virus is also usually capable of stealing important information from the user’s computer. It will then send this information to Internet servers designated by the developer of the virus. The developer will then be able to gain a level of control over the computer through this Trojan virus. While these things take place, the user will notice that the infected computer has become very slow or unexpected windows pop up without any activity from the user. Later on, this will result to a computer crash.

Next time you want to visit aiga, take extra precaution!!

Comments are closed.