Guest kvp1192 Posted September 5, 2008 Report Share Posted September 5, 2008 i just installed wm6.1, and i try to put my programs back on it, and when i look for the .cab on me memory card, they dont show up on my phone, but then when i go back into teh computer, they show up, plus a new file called encfiltlog.menc ... what do i do? Link to comment Share on other sites More sharing options...
Guest dtphantom Posted September 5, 2008 Report Share Posted September 5, 2008 i just installed wm6.1, and i try to put my programs back on it, and when i look for the .cab on me memory card, they dont show up on my phone, but then when i go back into teh computer, they show up, plus a new file called encfiltlog.menc ... what do i do? which file explorer on the phone are you using? the one in the root of the start menu called "My Stuff" won't show .cabs, however the one called "File Explorer" inside the "Applications" folder will show .cabs Link to comment Share on other sites More sharing options...
Guest kvp1192 Posted September 5, 2008 Report Share Posted September 5, 2008 which file explorer on the phone are you using? the one in the root of the start menu called "My Stuff" won't show .cabs, however the one called "File Explorer" inside the "Applications" folder will show .cabs okay, thanks, that worked :D Link to comment Share on other sites More sharing options...
Guest JM444 Posted March 20, 2010 Report Share Posted March 20, 2010 i just installed wm6.1, and i try to put my programs back on it, and when i look for the .cab on me memory card, they dont show up on my phone, but then when i go back into teh computer, they show up, plus a new file called encfiltlog.menc ... what do i do? To remove EncFiltLog.menc This file appears to be write protected, but it can be removed with a linux OS and the shred command. Go to linuxcd.org. Order a copy of Backtrack3 live CD. (About $7.00) Remove the HD so you don't get confused. Make sure the bios setting will boot from a CD. Start BT3. Open terminal window (bottom tray left side) Type without quotes, the command "cd /mnt" List the contents of the mount directory, Code- "ls" If you use a USB adapter for the SD card it should mount as sda5. In the mount directory you should see floppy/ live/ sda5/sr0 Change to the sda5 directory, Code- "cd sda5" You should see the files on the microSD. Use the shred command to remove the EncFiltLog.menc, Code- "shred -fuvz EncFiltLog.menc" The first time it stops with an error message, repeat the command and it will overwrite 26 times. Now create a dummy file with the same name. Code- "vi EncFiltLog.menc" This will create an empty file with the same name. Push the escape key twice to put vi into command mode, you should hear a beep. Now put it into insert mode by pushing the i key. Type a few letters. Now write it to the file Code-":w" and quit the editor, Code ":q" Now make the file executable, Code- "chmod u=x EncFiltLog.menc" Remove all other access permissions Code- "chmod g-rwx EncFiltLog.menc" Then Code- "chmod o-rwx EncFiltLog.menc" You can also do this with the Graphical interface. What you want is an "excutable" file that looks like the original but does nothing . If you try to look at the original with vi Code- "vi EncFiltLog.menc" you get an error message saying this is a binary file (executable program) . But it claims to be a plain text file. I noticed something was wrong when my phone started connecting to the internet by itself. When I removed the sd card it stopped. When I put the card back in it did it again. This is probably a R.A.T or backdoor the govt uses to spy on us. For the shred manual return to the root directory Code- "cd" Then, Code-"man shred" also "man chmod" Do not remove the SD card while it is mounted. Shut the computer off or unmount the sd card Code- "cd /mnt" Then "umount sda5" I noticed other problems. I install Compusec encryption . The next day my password doesn't work. I install windows xp on a dell laptop. The next day the password doesn't work. I install Vista on a lenovo laptop . The next day the password doesn't work . I install Ubuntu Linux on a external HD. The next day the password doesn't work. 4 different pieces of hardware and the same problem. 3 different OS and same problem. Not a hardware or software problem. I remove the wi-fi card and there is no bluetooth card - same problem . One of the programs Zone Alarm is monitoring is Remote Registry Service, which allows the govt working with microsoft to shut down your firewall. The only program that can start Remote Registry Service is a remote computer. The fact that Zone Alarm was monitoring that program means it was started. How was Remote Registry Service started when I haven't installed the modem, there is no wi-fi card or bluetooth card? A whole bunch of programs start acting as servers. The firewall gets shut down. Acronis Try and Decide program shows 300MB of information added to my computer in 10 minutes. How, when I haven't connected to the internet yet? When the laptop is covered with RFI shielding (twpinc.com) and grounded to create a faraday cage the programs do not all become servers, the password doesn't get changed, the firewall doesn't get shutdown. Conclusion, there is a receiver in your computer that allows the govt to hack into your computer even when you are offline. If you think I am making this up dl Wireshark and see where your computer is connecting to. Asia Pacific Network Information Center 121.0.0.0-121.255.255.255 221.0.0.0-221.255.255.255 61.0.0.0-61.255.255.255 202.0.0.0-203.255.255.255 210.0.0.0-211.255.255.255 218.0.0.0-218.255.255.255 220.0.0.0-220.255.255.255 60.0.0.0-60.255.255.255 125.0.0.0-125.255.255.255 189.0.0.0-189.255.255.255 200.0.0.0-200.255.255.255 Level 3 communications 8.0.0.0-8.255.255.255 64.152.0.0-64.159.255.255.255 67.24.0.0-67.31.255.255 4.0.0.0-4.255.255.255 69.192.0.0-69.192.255.255 RIPE 94.0.0.0-94.255.255.255 217.0.0.0-217.255.255.255 81.0.0.0-81.255.255.255 84.0.0.0-84.255.255.255 85.0.0.0-85.255.255.255 62.0.0.0-62.255.255.255 88.0.0.0-88.255.255.255 212.0.0.0-212.255.255.255 Go to a library and look at your spam mail. Go to the bottom and click on "show full headers" get the originating ip address and go to arin.net and do a reverse DNS lookup. You will see that most are coming from RIPE. Probably containing malicious code. "Google EncFiltLog.menc" Click on the link for "Files Tube" This is a password cracker ! Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now