From owner-freebsd-security@FreeBSD.ORG Wed Feb 25 22:10:41 2015 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 570CF803 for ; Wed, 25 Feb 2015 22:10:41 +0000 (UTC) Received: from outgoing.tristatelogic.com (segfault.tristatelogic.com [69.62.255.118]) by mx1.freebsd.org (Postfix) with ESMTP id 2F454DB for ; Wed, 25 Feb 2015 22:10:40 +0000 (UTC) Received: from segfault-nmh-helo.tristatelogic.com (localhost [127.0.0.1]) by segfault.tristatelogic.com (Postfix) with ESMTP id 08C0D3AEF8 for ; Wed, 25 Feb 2015 14:05:04 -0800 (PST) From: "Ronald F. Guilmette" To: "freebsd-security@freebsd.org" Subject: Re: has my 10.1-RELEASE system been compromised In-Reply-To: <30A97E9B-5719-4DA3-ADFB-24A3FADF6D3C@schulte.org> Date: Wed, 25 Feb 2015 14:05:04 -0800 Message-ID: <7808.1424901904@server1.tristatelogic.com> X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 25 Feb 2015 22:10:41 -0000 Note: 95.215.44.195 == rkcheck.org The web site certainly smells like a total scam... no indication whatsoever of who might be behind this allegedly helpful project. But they'd like me to just trust them and download their checker tool. Yea. Right. No thanks. But I give them an `E' for effort.