Talk:Beast (Trojan horse)

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computing / Security  
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
 ???  This article has not yet received a rating on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computer Security.
 

Keep it, it describes how to remove the file.[edit]

While it is a little scary, I think keeping this is important because it tells users how to remove the file from Windows XP. It isn't "giving the gun to the killer," it is describing the gun so that people actually know what a gun looks like and what part of it does what. It would be a bit naive to think that the people executing such files would have to check with wikipedia first to figure out what the file did...it's more the people who don't regularly play with this stuff that would come here. Probably, today's AV programs are better than they used to be...so most of this stuff that is basic on this site, would get caught.

Radioactivemutant Comment[edit]

Is it just just me or are we giving the gun to the killer with this page? I mean, this article is probably tell many people about this Trojan and where to get it.Radioactivemutant (talk) 23:29, 23 March 2010 (UTC)

Yea. I think this is a bit stupid. 74.69.233.198 (talk) 00:08, 29 August 2010 (UTC)

Delete this crap![edit]

OK, reading reading, now the link... WHAT THE?!?! VIRUS!!!!!!! See that's why I think it should be deleted, forever. It just tells you and then you go to the link and... Damn! Ive' got virus!--Souvalou (talk) 20:11, 20 September 2010 (UTC)

moral:IT JUST TOLD YOU THAT ITS INFECTED WHY THE HECK WHOULD YOU GO THERE —Preceding unsigned comment added by 71.126.71.108 (talk) 21:57, 10 October 2010 (UTC)

Lacking Sources[edit]

This article has absolutely no sources to back up the information provided in this article. Considering the long list of features and information of ways it can exploit a system, the article could just be an elaborate bluff or filled with first hand information. Also, in earlier revisions the name of the creator was linked, possibly meaning that either someone just came here and lied about everything (more probable) or the creator of the trojan (if it even exists) came and made glory edits (less probable, but easy to picture happening). I say that until we can find solid sources of information, this article shouldn't be edited. DZGuymed (talk) 23:58, 20 October 2010 (UTC)

There's a source here (now) that does seem to suggest it's real (although it doesn't back up the rather elaborate list of things Beast can supposedly do). This refers to Beast in passing.
There's also the case of a teenager prosecuted for using Beast. See also the New York Times article. Litigation details can be seen here. According to Wired he was given a prison sentence followed by community service. Seems like it didn't deter him as he was back in the headlines again in 2009 for Stock Exchange hacking. Given Wired says he was the first person charged by the Securities and Exchange Commission for a fraud using both identity theft and hacking (the 2003 Beast conviction) and the charges laid against him again in 2009 I wonder if he might merit his own stub. Or maybe that would just encourage him. Ka Faraq Gatri (talk) 10:14, 27 November 2010 (UTC)
Looks like he pled guilty to the original charge. This also looks relevant.
There's also a reference in what looks like a peer review journal of Beast as an "infamous Trojan horse" [1]. Ka Faraq Gatri (talk) 10:42, 27 November 2010 (UTC)


This wasn't a hoax. I wrote this article almost 6 years back when i was in my teens after having used beast since one of its earliest iterations. And i only decided to write it long after it had been discontinued and turned into a "legitimate" spying application "spytector". Beast back in the days was a very impressive trojan, its set of functionalities as evident was very comprehensive. One of the reasons for writing this article was that i thought the author Tataye really did deserve recognition for this impressive piece of code. ParadoX (talk) 17:44, 23 January 2012 (UTC)

Move discussion in progress[edit]

There is a move discussion in progress which affects this page. Please participate at Talk:AIDS (trojan horse) - Requested move and not in this talk page section. Thank you. —RM bot 12:40, 14 June 2012 (UTC)

Need more information[edit]

This article need more information. Also official resources for proof. — Preceding unsigned comment added by 174.66.196.57 (talk) 18:58, 13 January 2013 (UTC)

I LOVE THIS![edit]

I can now hack my brothers computer! All these client features are awesome man! Suck that losers. I can use registry, build servers, lamer stuff, fun stuff, plugins, binder, and all sorts of fun crap that i can use. My little brother is grounded. I don't care if you guys don't like Beast, I'm in safe mode, with networking. — Preceding unsigned comment added by 2601:1:8801:B20E:20D0:D9:315C:E1E (talk) 14:19, 22 December 2014 (UTC)