« October 2010 | Main | December 2010 »

Google Blacklists Prisonplanet.com

google blacklists prisonplanet.com

 

Censorship on the web – Is Alex Jones the beginning?


http://www.enews-press.com/article/169767/more/censorship-on-the-web-is-alex-jones-the-beginning



November 30, 2010 in Current Affairs | Permalink

Liberty Tree Radio CALL IN # Tribe of Tuscarora, Beaver Clan, Chief Holly

Tribe of Tuscarora, Beaver Clan, Chief Holly 
Headman Jeffrey W. Hills
Will be Guests on the Intelligence Hour with Mark and Don.

Topic Sustainable Communities
Dec Thursday 2, 2010 7- 8 - 9 PM Est.
6 PM Central

CALL IN AND SAY HELLO!
Come, sit around the fire with us !!!!!
Tune in live or listen to the archive at a later date.

Listen
http://www.libertytreeradio.4mg.com/index.html
double click picture ..then arrow on picture to listen.
Call in number
218 844 8060  enter 4379296 enter #

 

Tribe of Tuscarora (Skur 'r n', 'hemp gatherers.
Beaver Clan Cumberland Furnace TN.

Emergency Notification Proceedure

               [] STEP ONE -                                          INCOMING PHONE CONTACT                                                             

                     []A  IDENTIFY CALLER AND RECORD CONTACT NAME ADDRESS, AND RETURN TELEPHONE  NUMBER. ASK  FOR BACKUP RETURN TELEPHONE NUMBER THRU ANOTHER PARTY IF POSSIBLE INFORM OTHER PEOPLE IN OFFICE.

                     []B ASK FOR COMPLETE SITREP (SITUATION REPORT) TO INCLUDE 1)WHO 2)WHAT 3)WHERE 4)WHEN 5)WHAT WERE THEY DOING 6)WHAT WERE YOU DOING.

                     []C REQUEST CALLER TO MAKE CONTACT WITH OTHER LOCAL PARTY OR PARTIES TO DO IMMEDIATE CONFIRMATION OF ACTION. GIVE NUMBER FOR OTHER SUPPORT GROUPS THAT MAY BE IN THE AREA OF OPERATION. CHECK PBN/LTR/MILITIA PHONE LIST FOR POSSIBLE SUPPORT.

                     []D IDENTIFY LOCAL LAW ENFORCEMENT AGENCIES, REQUEST CONTACT TELEPHONE NUMBERS AND DO AN INFORMATION REQUEST AS A NEWS AGENCY. LTR OR PBN, BOTH WILL WORK.

                           1) IF YOU ARE A MAN YOUR NAME IS "JOHN TURNER"

                           2) IF YOU ARE A WOMEN YOUR NAME IS "JOAN FRANK"

                           NOTE: REMEMBER YOU ARE CALLING FROM THE NEWS DESK AT LTR OR PBN

                           SECOND NOTE: RECORD NAME OF OFFICER OR ADMINISTRATIVE CONTACTS AND ANY OTHER NUMBERS AND INDIVIDUALS THAT THEY ARE WILLING TO GIVE OUT. AGENCY ALWAYS DENY THAT AN ACTION IS TAKING PLACE.

                      []E AT THIS POINT IF THERE IS NO CONFIRMATION REPEAT A THRU D AS NEEDED. IF CONFIRMED THEN PROCEED TO NEXT PAGE.

Emergency Notification Procedure

               STEP TWO -                          INCOMING PHONE CONTACT ACTION CONFIRMED

                      A USING PBN "SPECIAL REPORT" OR LTR "SPECIAL REPORT" DO A QUICK "SITREP" ON THE NETWORK. AT END OF THE REPORT GIVE A DATE AND TIME BENCH MARK, EXAMPLE: "10 JAN 99 4PM EST" THIS WILL HELP KEEP PEOPLE INFORMED DURING BROADCASTING.

                      B IDENTIFY AND UPDATE NEXT LIVE BROADCASTER THAT IS ON THE NETWORK. GIVE "SITREP" AND ANY CONTACT NUMBERS TO THE BROADCASTER, USE FAX & E-MAIL LIST TO GET A HARDCOPY TO ANY/ALL NETWORK BROADCASTERS THAT MAY BE AVAILABLE WITHIN THE NEXT BROADCAST SEGMENT.

                      []C INFORM OTHER SUPPORT GROUPS THAT ARE ON PHONE LISTS AS AVAILABLE, SEND "SITREP" WITH UPDATES AS AVAILABLE, INFORM AREA PATRIOT AND MILITIA UNITS AS NEEDED. PRIORITY NUMBERS LISTED BELOW.

November 30, 2010 in Current Affairs | Permalink

Wikileaks / Cablegate / State Secrets (12/27/10) cablegate-201012271937.7z.torrent

12/27/10:

http://88.80.16.63/torrent/cablegate/cablegate-201012271937.7z.torrent

From Cryptome:

Date: Thu, 9 Dec 2010 20:22:53 -0500
To: funtimesahead[at]lists.riseup.net
From: "Michael Ellsberg" <michael[at]ellsberg.net>
Subject: [WL] Daniel Ellsberg on Colbert Report tonight- WikiLeaks

[This is a restricted internal development mailinglist for w-i-k-i-l-e-a-k-s-.-o-r-g.
Please do not mention that word directly in these discussions; refer instead to 'WL'.
This list is housed at riseup.net, an activist collective in Seattle with an established lawyer
and plenty of backbone.]

Dear Ellsberg.Net List Members,
 
Daniel Ellsberg will be appearing on the Colbert Report tonight, on the Comedy Central channel, defending WikiLeaks, Julian Assange, and Bradley Manning. This will air 11:30pm EST tonight (Thursday) and at the same time across the nation (i.e., 8:30pm PST).
 
It should also be available on the Net tomorrow--we'll post it on Ellsberg.Net as soon as it's available.
 
As you can imagine, this has been a very busy time for Daniel. With Assange in custody and unable to give interviews, Daniel has been seen by the media as one of the preeminent sources and authorities on the events and has been doing nonstop interviews with major media across the nation and the globe.
 
Here is a joint press release Daniel co-signed with other prominent whistleblowers, and here is Daniel's Open Letter to Amazon about their censorship of WikiLeaks.
 
We'll keep you posted on the latest news here, and to follow Dan's activities and views around WikiLeaks as stories break, follow him on Twitter here.
 
Thank you for your support,
 
--Michael Ellsberg

 


Wikileaks Wild Goose Chase

If you want to know where Wikileaks came from, who is behind it, how it operates, how to find the money, where it is headed and why initiatives like it are unstoppable, read this and pull your hair out knowing it's a wild goose chase:

http://en.wikipedia.org/wiki/Cypherpunk

 


Latest Wikileaks Cablegate files:

http://88.80.16.63/file/cablegate/cablegate-201012082231.7z

Cryptome latest mirror, 9 December 2010, 06:40 ET US:

http://cryptome.org/0003/cablegate-201012082231.7z (1,193 cables, 3.6MB)

For Cablegate updates bookmark these:

http://88.80.16.63/torrent/cablegate/cablegate.7z.torrent

http://www.privetbank.com.ua/cablegate/index.html

 


http://www.wauland.de/presseerklaerung_accountsperrung.html Google translation.

Press Release of Wau Holland Foundation for the closure of their account with PayPal

The nonprofit foundation Wau Holland has with great surprise learned of the unannounced closure of their PayPal accounts.

Due to this arbitrary decision by the company PayPal, the Foundation currently has no access to donations received in recent days, about 10,000 €, which were donated by donors around the world last Friday and Saturday for the Wikileaks project.

Moreover, the statement published by PayPal that the Wau Holland Foundation supports and promotes "illegal activities" is a slander against which the Foundation has formally denied.

The Foundation has therefore asked a lawyer to initiate action against PayPal. Paypal has been asked to remove this claim from its company blog and restore the unauthorized access to the donation account. WikiLeaks and the Wau Holland Foundation have removed references to the Paypal payment option from their respective websites.

The Wau Holland Foundation will continue to promote projects and activities that meet the objectives of the foundation. These include not only action against voting machines, the support of the TOR anonymizing platform and other projects such as Wikileaks. The Foundation feels this meets the ideals of freedom of the data-philosopher Wau Holland, founder of the Chaos Computer Club, and is committed and supported in accordance with their bylaws: "... global communication, freedom of information and moral courage of electronic media ...".

The Wau Holland Foundation can be reached electronically.


A sends:

Assange has made it impossible to get intel from the pedestrian world, but he needs to know that his contact with Rachel Wells at Rackspace was not kept confidential.  It was blabbed on Facebook.

Rackspace HQ is out of San Antonio, which also houses substantial FBI and NSA IT security resources.  My guess is that they will be all over Rackspace by Monday PM looking to set something up to ensnare his organization.

While I don t completely trust Assange, I think he s in the Mossad s back pocket, I do believe his work is important, psyop or not.

 


A sends:

http://213.251.145.96/mass-mirror.html

Mass-mirroring Wikileaks

Wikileaks is currently under heavy attack. In order to make it impossible to ever fully remove Wikileaks from the Internet, we need your help. If you have a unix-based server which is hosting a website on the Internet and you want to give wikileaks some of your hosting resources, you can help! [See instruction at the URL.]

 


A sends:

Wikileaks Mirroring Tools

We from www.wikileaks.lu have released the Wikileaks Mirroring Tools just some minutes ago. They will basically keep your mirror synced to the most up-to-date Wikileaks-mirror available out there (currently 47 in the list). We created those tools, obviously, because the official sites tend to disappear rather quickly lately so there goes:

http://www.wikileaks.lu/wmt

Feel free to share the link, forward this email or redistribute it in any other way.

 


Also:

http://www.privetbank.com.ua/cablegate/index.html

EXCLUSIVE: @privet_bank cats proudly present cablegate-diff-201012051016.7z with differences between cables in easy to look and understand format. Diff partially reveal something that WikiLeaks were not willing to share with public.

On 3 December 2010, Wikileaks offered via chat an archive (42827 torrents) of its legacy material prior to the bombshell releases. It also includes 718 diplomatic cables:

http://www.privetbank.com.ua/cablegate/wikileaks_archive-201012032035.7z.torrent

Cryptome mirror:

http://cryptome.org/0003/wikileaks_archive.7z (3.2MB)

 


Wikileaks bountiful mirrors, finally real wikis are rapidly spreading:

http://openetherpad.org/WikiLeaks (EN)

http://piratenpad.de/CBlttttTHT (DN)

Cryptome mirror:

http://cryptome.org/0003/wikileaks-wikiing.htm

 


Track Wikileaks servers: http://toolbar.netcraft.com/site_report?url=wikileaks.org

12/05/10

cablegate-201012051016.7z

http://www.wikileaks.pl
http://www.wikileaks.fi
wikileaks.dataleech.com
wikileaks.stasi.fi
wikileaks.piraaattipuolue.fi

Ref: http://wikileaks.stasi.fi/cablegate.html

___

More...

List of Proxy caches and mirrors:

http://pastebin.com/2ASAUkR6

Dozens of sites being set up:

http://etherpad.mozilla.org:9000/wikileaks

 ___

 

The below no longer works:

http://file.wikileaks.org/torrent/cablegate/cablegate-201012031001.7z.torrent

To get this torrent click on link below. To download it you need a torrent program such as the free uTorrent.

12/02/10

http://file.wikileaks.org/torrent/cablegate/cablegate-201012020501.7z.torrent

___

12/03/10

Refs: http://cablegate.wikileaks.org/ (dead dead dead)

http://domainnamewire.com/2010/12/03/wikileaks-domain-not-shut-down-just-dns/

Assange:

We've been raped?:

http://radsoft.net/news/20101001,01.shtml

http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2010/12/07/businessinsider-reminder-the-sex-crime-that-julian-assange-was-just-arrested-for-wasnt-rape-it-was-2010-12.DTL

___

Misc. news refs:

http://www.bbc.co.uk/news/world-europe-11921080

http://torrentfreak.com/troubled-wikileaks-moves-to-pirate-party-domain-101203/#comment-741342

http://www.bbc.co.uk/news/world-us-canada-11907641

http://timesofindia.indiatimes.com/world/us/Uncle-Sam-Wikileaks-wage-cyber-guerilla-war/articleshow/7036499.cms

http://www.independent.co.uk/opinion/commentators/johann-hari/johann-hari-this-case-must-not-obscure-what-wikileaks-has-told-us-2154109.html

http://timesofindia.indiatimes.com/world/us/Sex-accusers-bragged-about-conquest/articleshow/7068149.cms

"Wikileaks Documentary" http://svtplay.se/v/2264028/wikirebels___the_documentary?cb,a1364145,1,f,-1/pb,a1364142,1,f,-1/pl,v,,2264028/sb,p118750,1,f,-1

http://www.nytimes.com/2010/12/15/world/europe/15assange.html?_r=1&pagewanted=2&src=twrhp

http://www.theaustralian.com.au/in-depth/wikileaks/wikileaks-founder-julian-assange-in-limbo-as-supporters-seek-bail-money/story-fn775xjq-1225971287826

WikiLeaks founder speaks:

http://www.youtube.com/watch?v=XJWNFJmQnWI

___

Related:

 http://tekgnosis.typepad.com/tekgnosis/2010/12/arrest-assange-arrest-the-banksters-instead.html

 http://campverdebugleonline.com/main.asp?SectionID=36&SubSectionID=73&ArticleID=28960

Wikileaks History Insurance

http://cryptome.org/0003/wikileaks-history.htm

https://thepiratebay.org/torrent/5723136/WikiLeaks_insurance

From Cryptome:

17 December 2010. Add A2 response.

15 December 2010

 


Wikileaks Cables Amok

A sends:

In the last days I have been following the release of a bunch of US diplomatic cables from W-i-k-i-l-e-a-k-s. All of them were initially released uncensored but as you might know some of them have been removed, others have been partially redacted (a.k.a. censored) without any kind of prior notice.

The people from WL said that they will redact some of the names in order to remove personal identifiable information but in fact they have removed full paragraphs that although they could be a little bit embarrassing for US diplomacy they do not put anybody at risk.

For example:

- There were 13 cables deleted from WL cablegate site (e.g.: #09LONDON1385).

- At least 11 cables were slightly redacted (e.g.: #07PARIS322).

- 138 cables published by Lebanese Al-Akhbar paper but not yet put into WL.

- 33 cables disclosed by the British paper The Guardian but not yet in WL.

I have not seen or read any news regarding this strange change of policy in any media so this is the reason I think you might be interested to know about it and maybe publish it in your site for public scrutiny.

You can check the differences with the uncensored cables at:

* http://leakager742hufco.onion (with tor as its a hidden service)

* http://www.mein-parteibuch.org.nyud.net/cablegate/

 


A2 sends:

I am curious about 'A sends' on http://cryptome.org/0003/wikileaks-amok.htm

It is stated by A that 'There were 13 cables deleted from WL cablegate site (e.g.: #09LONDON1385).' The latter cable is a bad example because I downloaded the most recent archive of the cables from http://www.wikileaks.ch/cablegate.html (a file called  cablegate-201012161015.7z) and the cable #09LONDON1385 is in there, and it is also on the 'Cable Viewer' http://cablesearch.org/ and also it is not one of the missing or redacted cables that are mentioned on the site that A links to: http://www.mein-parteibuch.org.nyud.net/cablegate/

 Ref: http://cryptome.org/0003/wikileaks-amok.htm


 More: Wikileaks Series on Cryptome 2006-2010 with Related Files

http://cryptome.org/0003/wikileaks-series.htm


The spy who billed me twice

http://cryptome.org/0003/ja-spy-twice.htm


Newest Wikileaks Cablegate torrent:

http://tekgnosis.typepad.com/tekgnosis/2011/01/-wikileaks-cablegate-state-secrets-012811-cablegate-2011012822357ztorrent.html

 

Chapter 4 – Growing up in Torbeo

 

“Myrtle, wake up!” I heard Esmeralda say to me in a hurried tone, as she woke me from my deep sleep.  “I think I had a dream last night, it was the most beautiful dream:  All of the creatures of the forest had come to visit last night and there was a royal feast, here in our castle, you even sat next to me the whole evening as we celebrated the newly discovered friendships and I made a vow with the creatures of our kingdom and also the plants of the forests and gardens of our kingdom.” 

 

Esmeralda’s wide eyes inspected my own,  very closely,  as though she could read a sign written with the truth inside my pupils.  Her green eyes sparkled so brilliantly with the reflection of the morning sun,  that I was forced to ask the young princess to please stop interrogating me.  It was then, that I fully realized the innocence of the princess child and then, I started to giggle and decided to play a bit with her. 

 

Well, my dear child, I said, I do believe that you must have indeed had a bad case of indigestion last night causing you such a far fetched dream.  What sort of illusion are those?  The animals of the forest would not travel far, not even in the perfect light of day, to visit an old castle like ours, inhabited by a human princess and us, boring, castle  mascots.  You must have had a dream indeed, therefore, let me sing you a song:

“When dream you must, dream large dreams of fairies and enchanted forests, dream of talking turtles like me and most of all, dream of beautiful princesses like you, in far away magical lands like ours!!  Then, just then, your dreams may come true, for when you dream, might as well, dream big, just in case, it all comes true, anyway, for one may never know whether it is true or just a dream, might as well, dream large and big my dear, and have lots of fun along the way… When you wake up, you may never know if it was true or not, if it will come true or not, so might as well dream big!”

 

Esmeralda, then, joined in my tune and repeated:  “Might as well dream big, one may never know if it will really come true someday.  Might as well dream big and big of a dream I had last night!” 

 

“I am happier than ever anyway, for I had a vision of what real friendship can be!”  Then, Esmeralda grabbed my arms and lifted me up in the air twirling with me in a fabulous dance,  just like she had done the night before with her mascot Noodles.

 

From laughing so hard, we both fell on her bed and sang some more: “One must really dream big if we are going to dream at all!”

 

“I like that song,” Esmeralda finally added catching her own breath and still holding me tightly near her neck and lifting me up in the air one more time.

 

“Enough my dear child, up we go, it’s time for breakfast!”  all the while, I knew what Esmeralda did not: That all of the creatures of the forest indeed, had been our guests for the night and that as gracious hostesses, breakfast would have to served before sending our hungry crowd back to their homes in the forest and rivers of Torbeo’s kingdom. 

 

“Hold my hand, dear princess, let’s walk to the royal dining room  and see what our friend Harry is fixing us for breakfast this glorious morning,” I said to Esmeralda in preparation of what I forebode would be such a surprise she might even faint.

 

Thus, along we went, walking hand in hand through the long hallway leading to the other side of the castle, like we had done many times before.  However, this day I carried a little tune in my head and a giggle in my heart, for the young princess was the happiest I had ever seen and now, the dream was not in my head;  just another fantasy to see  young Esmeralda at last stop crying from  sadness and loneliness.  It seemed to me that this surprise was all that I had been waiting for all my life and I could not wait to arrive to our destination this morning.

 

“Harry, what are you up to, old friend,” I announced in prelude to my own dream and to opening the door of the royal dining room.  With a prompt hop, Harry arrived to open the door and the scene was more than what I could have possibly imagined.  Inside the royal dining room, all of the animals of the forest:  The flamenco dancing doves, the bagpipes, musical sheep, the dancing beavers, “gaiteros,”XXXXXXX and the full orchestra of animals and the violinists squirrels, were all up and held a large linen tablecloth from the kitchen with a message they had  written in purple cake icing to the princess as she entered the royal  room that sunny, winter morning:  “Thank you for your kindness, your highness princess of Torbeo’s Magical Kingdom, we will never forget you!”

 

Esmeralda’s hands moved to her face, as she wiped her tears of happiness.  Then, almost immediately, as I had expected, she turned to me and demanded an explanation:  “But… you knew all along and you did not tell me!”  “I could not resist,” I replied with my largest smile which showed all my teeth, “I could not spoil such a  great dream of yours, now could I?”  We both laughed and then I headed to my place in the royal table. 

 

Breakfast was wonderful, Harry was in fact known all over our kingdom for his Spanish XXXXX omelettes called XXXXX  (tortilla)  with finely chopped onions,  chorizo and fresh, small,  diced potatoes.  Bread was freshly baked again with generous portions of fresh melting fresh butter spread on it. 

 

Warm, baked Castanas were XXXXXX Drinks XXXXXX

 

Before departing, all of the animals gathered at the castle’s beautiful garden for our farewell meeting and to share time with the young princess under the direct sun, as Esmeralda’s favorite spot in the castle. 

 

This is how I started my meeting,   that brisk morning with yellow sunlight piercing though from our bluest Galician skies:  “Dear creatures and plants of the forest, today we are gathered here today to commemorate a significant day:  Princess Esmeralda has joined our ranks and will now be the first human to carry our message of peace and friendship to the humans of our kingdom, perhaps,  even other faraway lands beyond ours. 

 

 

Esmeralda, will proudly represent us, I added.  “She has been trained properly, of course, by me, I said, lifting my glasses and expecting  to hear some laughter from the crowd and she has also been a very studious disciple in our castle.  She listens well and cares about the issues of our people.  Does anyone have any suggestions at this time of any further knowledge to offer Esmeralda and prepare her for the time she will have to face, even her fiercest enemy?

 

“Well I do,” replied Tony the golden Galician pony.”  “We should allow Esmeralda to ask us any questions before we depart back to our the forest in Torbeo. We should tell her about some of  the secrets that lay deep within the earth.” 

 

With that statement,  a roaring noise was heard, as everyone agreed and expanded on that thought from Tony, the pony. “Good idea!” said Ester the Hamster and also Gustav and Sophia, the dancing doves, almost in one voice.  “Esmeralda, please step closer to the front, please ask any questions that you may have from the us, the creatures of the forest.”

 

Esmeralda looked around at the friendly faces and with much love and concern asked:  “What is the greatest problem that your animal kingdom is facing right now?”  “Deforestation!” they all said in unison.  “We are losing our homes,” said Stephen the beaver.  “We don’t have clean water to drink,” protested  a young mother, next to her calf. “And we can’t even hide in the trees anymore when it storms,” cried yellow canary bird with a squeaky voice.  “There is no place to offer shade in the hot Summer months, also complained an old, white bearded goat.

 

“Why don’t the trees and the animals of the forest rise up against the humans to protect the land and ultimately, saving future generations of humans?” asked Esmeralda.  “We believe in peaceful ways,” added the violinist squirrel.  “Our kingdom does not believe in violence or supports any form of aggression… Those are not our ways,” the squirrel added.

 

“That would defeat our purpose and our mission,” I expanded so that young Esmeralda would fully comprehend.  “Our objective, is always to coexist with others and to offer help to the humans, we want them to learn from us and aspire to work the land, just as hard we do,  without complaining, without greed and without any violence.”

 

“Have you ever heard a tree yell,?” Interjected a yellow butterfly who had been fluttering by and had been listening for a while.  “Have you ever heard a tree talk back or protest to a human as it is being cut? Even to make the wood handle of the saw which will split it in half, or to make the wood trap which will kill the innocent mice who live freely among the trees of the forest and are gentle as our very own friend here, Ester the hamster?”  added the splendid butterfly named, Sol,  after the warm, Spanish sun.

 

“Tell me more about the trees, how do they communicate with each other to fight this devastation?” Esmeralda asked inquisitively Beatriz, Harry the Rabbit’s wife who visited her family in the forest all the time.

“Well, the trees and the plants of our land, communicate with each other thought their roots.  These, lay hidden underneath the earth because in that way, their communication cannot be overheard by the humans on the surface of the earth.”

 

The trees have their own unique language.  We, the animals of the world, living on the surface of the land,  can only communicate with them, by  getting close to their bark and making an  effort to communicate with them.    Then, millions of active cells float back and forth to us from their barks, creating a language that our minds can fully understand.  The same process applies to the plants of the earth, except they communicate, instead of through their barks, they use  through their long stalks to effectively share their knowledge.”

 

“The plants of the land,” added Beatriz, “are always willing to share and communicate with all of the creatures who live on the earth, even those, who unknowingly, disrespect nature’s value and creation.”  “We have learned a lot from our fellow trees, here in Torbeo. For instance, trees are very sociable indeed, they always strive to be together and many perish, simply when placed alone and without any other trees growing within miles from them.  However, even at a great distance, our giving and mighty friends, can communicate with each other through a very rich and  extended system of roots.  This unique system,  invisible and undetectable to human eyes, is masterfully effective for every possible type of tree that exist in our planet.

 

 Smaller plants are secondary in the web of communication between trees and plants.  It has been further explained to us, Beatriz further explained, that it is because the plants have smaller life spans, therefore, smaller root connections.  It takes many years, to establish an effective and well connected system of communication for trees and plants in any particular area of our land.  The older the trees,  the least amount of changes in the landscape of any region, the better it is for the communication system of the trees and plants of the area.

 

“One thing you cannot forget, our young princess,” Beatriz added, is that trees, need each other for their survival.  This lesson, I hope you remember well.”

 

Esmeralda remained in awe and speechless for a few moments at such fascinating information and vowed to always remember the lessons learned from the animals of the Torbeo’s kingdom.   

 

“We will also remember you, Esmeralda, and we promise to come to your rescue whenever you need us.  Our pact of friendship is mutual, for you have shown respect and concerns for our issues as well.”  With those words, the Galician pony spoke, representing the animal kingdom of Torbeo. Then, slowly, one,  by one, the creatures of the forest, who had traveled far to console the young princess child,  lined up to kiss the princess’ hand and  bow in reverence to their princess as they departed now in caravan to their houses, in and among the trees of Torbeo’s magical land.   

 

This time, the creatures of the forest and the rivers of Galicia’s Torbeo, carried a song of hope within their hearts,  as they awaited  for the gifted child to grow someday  and to represent their plight before the humans of the world.  They sang this tune, as they walked  back to their homes through the land of Torbeo:   “We, the animals, plants and trees of the earth, hope to teach the humans our peaceful ways someday.  Look at us, we never create wars with each other… Learn from our peaceful ways...  You will never hear one word of complain as they cut our limbs  for food, clothing, shelter or even fire.  Learn from our peaceful ways,  we work hard and you will never hear one word of complain… learn from our peaceful ways, our children and yours will all die in a world without peace… please learn from our peaceful ways, let us all live in peace with each other.” 

 

The song could be heard for hours from every corner of the kingdom  until it faded into a gentle whistle which became pearls of treasure for   Esmeralda’s heart. The young princess was especially touched by the wisdom of the creatures of the earth. “I am proud of my land and its gifts of wisdom and generosity.” 

 

“Que hora es?”  I asked Esmeralda, since she was well educated in languages, she immediately responded, “I know, I know, it is time for our history lesson.”  There (Off) we went, the Princess leading the way with her gallant stride, even as a young child anyone could tell that she was becoming a great leader for her people already.

 

“History is very important, my young princess.  We must learn from history and always look back in times at the mistakes the world has made so they do not get repeated.  We must also learn about the marvels of the human spirit, the best qualities and heroism of great leaders, while imitating their accomplishments.”  

 

“One fact, I have learned, Esmeralda, true, as the rising sun every day, is that the arts and those who respect it, also education, are the most fortunate in any specie of the world and usually,  are the best leaders for any country of the earth.  Therefore, my dear child, prepare for today’s history class.”

 

“Let’s start with attendance and punctuality:  “Harry?”  “Present, Dr.  Smatt.”  My students always addressed me by my last name and by my, degree when in the class as a reminder of the significance and importance of their education.  As background information to all my readers,  I hold a PHD degree in education in all of the necessary subjects for the education of  the finest princesses of the world, like Esmeralda.  Therefore, anyone holding superior degrees of eight years or more are called, either Doctor, depending on the specialty or Professor.

 

Back to our class roll;  “Alex?”  “Present, Dr. Smatt.”  “Princess Isabel?”  “Here, Dr. Smatt.”

“Noodles?” 

 

“Where is Noodles?”  I said as I looked around the garden and saw what looked like a speeding ball of white legged fur.  “Here, here! Please do not mark me late, Dr. Smatt, I was chasing an intruder away for the protection of our princess!” 

 

“Mr. Noodles, may I dare to ask who the intruder was this time?”  With that everyone laughed and I had to redirect the students’ attention to classroom composure.  “Please, allow me to hear our student’s response, as I am myself very curious to know what kind of “terror” could have threatened our princess with such urgency, posing such imminent risk to her life?”  

 

“Well, Mr. Noodles, I am awaiting for your response.  My patience has been tried enough with your this week and  is running very thin already.”

 

“Well, “ said Noodles,  “You see, grrr, grrr,” Noodles, cleared his throat several times.  “Where do I start?”

 

“From the beginning, Mr. Noodles! Where else would you start: From the beginning, Mr. Noodles!”  I said in futile despair.

 

“I was outside…outside by the east side of our garden, laying on the grass, you see, when all of a sudden, out of the clear blue, this, this…”

 

“Go on Mr. Noodles, you have taken enough of our time already!”

 

“This giant monster, appeared and it, well, it… I was afraid, it would hurt someone, so…”

 

“Giant monster! It would hurt someone?  Go on, please finish your story. Now, I am getting even more intrigued by the minute.” I replied

 

“Well,  it went off running and I wanted to save the princess… I, well, I am a hero, really, but no one ever gives me any credit for my valor and courage, but I am a real hero, just, that no one ever appreciates me.”

 

“What kind of monster Mr. Noodles? Please go on, Mr. Noodles.”

 

“Well, it was a cat… but not just any cat… it was a cat with long, sharp claws that could destroy anyone in an instant, grrr, a cat that could…well, could frighten our sweet princess, and then, well…one may never know and then, I thought:   I better chase after it, I was not going to allow any danger near this castle… No way.  Uhn, Uhn, no way I would allow any danger near our precious princess!”

 

“A cat!  Mr. Noodles!  A terrifying cat that could harm us!  A monster!   A 13 inches monster!  

 

“I have heard enough Mr. Noodles, please have a sit and I certainly expect you to stop chasing after cats, birds, frogs, or any other peaceful creature in our garden?  Surely, Mr. Noodles,  you are old enough to stop teasing the friendly guests of our magical garden;  I expect you to refrain from this sort of  behavior once and for all  or I may have to curtail the time you spend in our garden from now on.  Pull your card, at once, before you sit down  in your rock for today’s lesson.  And,  Mr. Noodles, now that you have started the day in yellow,  I do not expect you to go to red today!”

 

“Esmeralda, dear,”  I continued,  “do you remember where we left us our history lesson yesterday?”

“Yes, Professor Smatt, we left off discussing our Celtics ancestors and the legacy of courage and loyalty to our land that they left us to our current generation.”

 

“Well said, Esmeralda, now let’s us continue.  As you remember, the ancient  Celtic tribes are our oldest ancestors and their heritage dates back to Ireland and Scotland up to 600 years Before Christ, this equates to almost, three thousand years ago, that is how old this significant part our history dates back.  Therefore, as all of you students, can imagine,  these first and most ancient Celtic roots of ours,  continue to define and to set us apart from any other parts of the world.  

 

Around 50 AD Galicia was invaded by the Romans. However, the local inhabitants, fiercely opposed this Roman invasion and during the 5th Century, the Galicians, together with the Suevi XXXX formed the first medieval kingdom to be created in Europe.  We are also very proud of this fact.

 

There were two other invaders in 584 AD and 718 AD: The Visigoth and the Moors. Nevertheless, these invasions did not last long and did not quell the original spirit of our  Celtic settlers, now called Galicians XXXXX.  In the year 739 AD the King of Asturias, Spain, drove out the Moors and all other invaders out of the entire country of Spain permanently and this era consolidated Galicia as a Christian kingdom, speaking a Romance language (Castilian/Spanish).

 

Occasionally, the Galician coasts were raided by the Normans/Vikings during the 9th and 10th centuries and it was then, that the Towers of Catoira XXXXX were built as a system of fortifications to stop the Vikings raids on Galicia’s capital: Santiago de Compostela.XXXXX

 

Not that long ago, the King of Spain, Alfonso X of Castile standardized the Castilian language and made it the official language for Galician court and government. However, still remaining is the secondary language of Galicia, “Gallego” or “Galician” dialect as part of our Galician heritage.

 

“Well, this my dear students, ends our history lesson for today.” 

 

“Siesta time!” Noodles, yelled.  “Then, tea time, or shall we say: Treat time, my favorite time of the day!”

 

Since class was officially over, I could not say much to Noodles for his, not atypical,  “volcanic eruption,” as I called them.  Instead I was myself,  surprised when the words:  “Congratulations, Mr. Noodles,” came rolled out of my lips,  “you did not move to red, I am very proud of your improvement today.”

 

“Let’s have our siesta... you too, Mr. Noodles, please follow us.”

 

 

November 29, 2010 in Current Affairs | Permalink

Freedom Watch

FREEDOM WATCH is information pertaining to
government abuse of  power, trashing of
the Constitution, illegal immigration,
2nd Amendment, political correctness
run amok, etc.
It is FREE and sent to you via E-mail.
To subscribe send an e-mail to:
FreedomWatch-subscribe@topica.com

FREEDOM WATCH
http://fwatch.blogspot.com/


You might be a Constitutionalist if you believe that Congress or the
White House or any sovereign State is not required to submit to
unconstitutional Supreme Court rulings.


  ****************


Issues of law
DR. A. H. Krieg
FREEDOM WATCH
http://fwatch.blogspot.com/2010/11/issues-of-law.html


WHY AMERICANS MUST RESPOND TO GOVERNMENT'S ABUSES
by Beverly Eakman
NewsWithViews.com
http://www.newswithviews.com/Eakman/beverly154.htm


Drudge Fought The TSA… And Drudge Won
Paul Joseph Watson & Alex Jones
Infowars.com
http://www.infowars.com/drudge-fought-the-tsa-and-drudge-won/


Such a Well Behaved Herd of Sheep
TSA thanks you for allowing them to violate your rights and to assault
you
By Marti Oakley
http://www.informationclearinghouse.info/article26916.htm


If Abe Had Been Honest
Gary North on a truthful Gettysburg Address.
http://www.lewrockwell.com/north/north914.html


The Euro Game Is Up - Nigel Farage MEP
YouTube
http://www.youtube.com/watch?v=dx_rCUAE-00


HOW TO CONTACT CONGRESS

The right to "petition" government in this
manner was secured by our Founding Fathers.
As Sam Adams famously wrote, "It does not
require a majority to prevail, but rather
an irate, tireless minority keen to set
brush fires in people's minds."  What the
limited-government movement needs are a
few good pyromaniacs.

If you want to contact Congress on any
issue, you can do so toll-free by calling
either (800) 862-5530 or (866) 220-0044.
When the Capitol operator answers, simply
ask to be connected to a particular
congressman or senator.

November 29, 2010 in Current Affairs | Permalink

Uncle Sam "Ain't Foreign!"

A email of interest, which contains many links to government documents.  Happy hunting!


-------- Original Message --------

Subject: Uncle Sam "Ain't Foreign!"
Date: Sun, 28 Nov 2010 21:51:00 -0500
From: Virginia Brooks <gini.1938@gmail.com>
To: Virginia Brooks <gini.1938@gmail.com>

 

"THE BROOKS REPORT"
THANKS TO LARRY BECRAFT.
 
This is a discussioon going on at General Congress and thought some of you would be interested in, so here it is...Virginia
Doug,
 
I read your attachment where you state:
 
Further, the United States Supreme Court stated “The notion that the 
States of the Union are separate, distinct, and foreign to each other 
also applies to the relationship the states of the union have to the 
United States government. This relationship is embodied in both state 
and federal court decisions. State of Wisconsin v. Pelican Ins. Co., 127 
U.S. 265 8 S. Ct. 1370, 32 L. ED. 239 (1888).
 
This case may be read here:
 
 
I presume from your use of quotation marks in the above that you 
intended to indicate that this language so quoted appears in that case. 
Please go to the above link and re-read the case. That case deals with 
the types of cases that can be filed in the original jurisdiction of the 
Supreme Court. The case has nothing to do with this principle and the 
quote appears nowhere in the case.
 
The last paragraph of your note surely applies here: "Also of great 
importance is to quote correctly and not leave something out so that it 
will appear to support his or her view. To do so inadvertently is 
excusable, but to do so to purposely mislead destroys that persons 
credibility."
 
Larry
 
Douglas Smith wrote:
> My response to Mr. Becraft is labeled Mr Becrat and attached below. Doug.
>
> ------------------------------------------------------------------------
> *From:* Larry Becraft <becraft@hiwaay.net>
> *To:* Douglas Smith <raimford1@yahoo.com>
> *Cc:* kenny callow <chockey1234@verizon.net>; Silver Eagle Trust 
> <seagle@netins.net>; Pat Wagner <pwagner10@roadrunner.com>; bob 
> minarik <rlmpfl9065@earthlink.net>; Rich Dana 
> <ricardo@feral-tech.com>; generalcongress@constitutionalgov.us; Jerry 
> Stanton <farm_stone@yahoo.com>; Bob Jungles <BOBJ457996@aol.com>
> *Sent:* Fri, November 26, 2010 6:13:50 PM
> *Subject:* Re: Uncle Sam "Ain't Foreign!"
>
> Doug,
>
> Right before the Iron Bowl today, you sent me a note asking about that 
> popular, but meritless, argument that the United States is foreign in 
> some respect as to the States. I attach hereto two documents. One is 
> simply a PDF file I just created containing the cases that are alleged 
> to support this proposition. Both of those cases DO NOT support the 
> argument. Also included in this file is a Supreme Court case, Claflin, 
> which has not been reversed, that holds otherwise that the US is not 
> foreign to us.
>
> I also attach another document that has 2 pages from a law 
> encyclopedia, CJS, that addresses this matter and also states that 
> Uncle Sam is not foreign.
>
> Uncle Sam is our domestic, international power, federal in structure. 
> Federal govts have a primary jurisdiction that is international. Why 
> would anybody want to be within the scope of a federal power by 
> claiming to be foreign to it?
>
> Feel free to send these documents to anybody that needs to be so educated.
>
> Larry
>
> Auburn will be No. 1 this year. Cam Newton is Mr. Heisman.
> Greg McElroy, Bama's QB, was interviewed for Rhodes scholarship.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Doug,
 
I am not going to mention judicial jurisdiction via Art. III because I do not believe that concerns you, me or this discussion.
 
Let's start with territorial jurisdiction.  Back in 1985 for the purpose of educating patriots about fed jurisdiction, I summarized about 500 fed jurisdiction cases, and that work is posted on my website in the following files:
 
 
 
 
 
While doing this work, I ran across the cite to a 1957 govt report on this issue and was able to locate that report, a conversion of which is posted here:
 
 
If you know something about this issue, please remember that I sowed those seeds in this movement 25 years ago. The US also has an extra-territorial jurisdiction that is primarily international.  It can get jurisdiction via treaties as well. See my explanation here:
 
 
But, there are holes in this jurisdiction not discussed now.
 
Is this what you are talking about? Subject matter jurisdiction?
 
Douglas Smith wrote: 
  Mr. Becraft;  I've stated this before when they attemp to assume what I do or don't know.  Don't.  I do agree that there are a number of ignorant people who make pests of themselves by showing their ignorance and in some cases stupidity.  Ignorance is a lack of knowledge while stupidity is doing the same thing and expecting different results.  A lot of posts I receive I delete before opening because I know they do not provide a solution to the problem discussed or will contain nothing new.  I care not to discuss patriot bs only the law and the Constitution(s).  Do you agree that the United States, ie. Federal government operates in more that one jurisdiction?  I'm sure that your answer will be well documented to support your position.  Thanks, Doug.
 
 
 
------------------------------------------------------------------------------
  From: Larry Becraft <becraft@hiwaay.net>
  To: Douglas Smith <raimford1@yahoo.com>
  Cc: kenny callow <chockey1234@verizon.net>; Silver Eagle Trust <seagle@netins.net>; Pat Wagner <pwagner10@roadrunner.com>; bob minarik <rlmpfl9065@earthlink.net>; Rich Dana <ricardo@feral-tech.com>; generalcongress@constitutionalgov.us; Jerry Stanton <farm_stone@yahoo.com>; Bob Jungles <BOBJ457996@aol.com>
  Sent: Sun, November 28, 2010 3:20:07 PM
  Subject: Re: Uncle Sam "Ain't Foreign!"
 
  Doug,
 
  Apparently, you do not know or understand the discussion at issue.  Years ago, a woman named Lisa Guliani wrote an article promoting a wild and crazy argument based on the “Act of 1871.†She contended that the “Act of 1871†“formed the corporation known as THE UNITED STATES.†You may read just one of her articles in this respect here:
 
 
  She also started that baseless argument regarding 28 USC 3002. People have accepted what she alleged without question, and now people think the US is a private, stock-issuing corporation, which is utterly false. This is the origins of the argument that the US is a foreign corporation.
 
  This is insanity. Because so many people were mislead by her argument, I posted the following on my website to fully explain that “Act of 1871":
 
      For several years now, certain groups and websites like Worldnewsstand have advocated an argument that the "federal" government was created as a municipal corporation via an act of February 21, 1871. The truth is otherwise.
 
 

      There is a history regarding the formation of Washington, D.C.  The Constitution specifically provides for the formation of a district, 10 miles square, to be the seat of the federal government; see Art. 1, § 8, cl. 17.  When the Constitution was ratified, the defacto seat of that government was in Philadelphia. The Residence Act of 1790 (1 Stat. 130, July 16, 1790), started the process of establishing the District of Columbia; in the interim, the government continued to meet in Philadelphia. On December 19, 1791, Maryland adopted "An Act concerning the territory of Columbia, and the City of Washington," which ceded lands and jurisdiction for the Maryland part of the District. President Washington played a critical role in the selection of the actual site of the District, as well as laying out the plans for the city. Finally, on February 27, 1801, 2 Stat. 103, Congress adopted an act concerning the District, and created two counties, Washington County on the Maryland side, and Alexandria County on the Virginia side. See amendments, 2 Stat. 115, and 2 Stat. 193. On May 1, 1802, the then existing Board of Commissioners for the District was abolished, replaced with a superintendent under the control of the President; see 2 Stat. 175. On May 3, 1802, Congress adopted an act to incorporate the city of Washington, in the District; see 2 Stat. 195, and amendments at 2 Stat. 254 and 422.  For some of the other acts regarding the District, see 3 Stat. 691, 4 Stat. 294, and 4 Stat. 517.
 
      This was the form of government for the District until February 21, 1871. On this date, Congress adopted a new act for the government of the District; see 16 Stat. 419-429.  As seen by a simple review of this act, it did not create a government for anything but the District of Columbia, and it certainly did not purport to be a government for "federal" citizens living in the States. Also posted here are the first couple of pages from the 1873 Revised Statutes for the District of Columbia.
 
      Scandal was the reason that this form of government for the District lasted only a mere 7 years. After the act of February 21, 1871, public officials of the District incurred tremendous debts for the District, eventually requiring Congress to in essence step in and take over that government. See 18 Stat. (Part 3) 116, ch. 337, for repeal of 1871 act. An act of June 11, 1878, 20 Stat. 102, provided "a permanent form of government for the District of Columbia." Much later, the District of Columbia Home Rule Act, Public Law 93-198, 87 Stat. 777, approved December 24, 1973, created the government for the District which exists today.
 
      Those who assert some wild theory about Washington, D.C. are utterly wrong. They have invented a "different version" of history without bothering to check out the facts.
 
  I have also posted the following regarding the complete misconstruction of 28 USC 3002:
 
  28 U.S.C. § 3002 (15)(A):
 
  (15) "United States" means - 
  (A) a Federal corporation;
  (B) an agency, department, commission, board, or other entity
  of the United States; or
  (C) an instrumentality of the United States.
 

    Many contend that the above quote, a part of the Federal Debt Collection Procedures Act, means "the United States is a corporation." I must state that this is an erroneous construction of this particular law.
 
  The Federal Debt Collection Procedures Act, 104 Stat. 4933, applies to the entirety of the United States government. Virtually everyone knows that the federal government has lots of agencies. It also has lots of departments, commissions, boards and instrumentalities, including federal corporations. In the last 100 years, Congress has created lots of corporations and some that still exist today are:
  Tennessee Valley Authority
 
  Commodity Credit Corporation
 
  Export-Import Bank
 
  Federal Deposit Insurance Corporation
 
  National Railroad Passenger Corporation (AMTRAK)
 
  Pension Benefit Guaranty Corporation
 
  United States African Development Foundation (USADF)
 
  One that no longer exists is the Resolution Trust Corporation.
 
  The FDCPA simply regulates the collection activities of all federal agencies, departments, commissions, boards and instrumentalities, including the above federal corporations. Rather than repeatedly state in this 30+ page act that all "federal agencies, departments, commissions, boards and instrumentalities, including federal corporations" shall do certain things, all these entities are, for purposes of this particular act, encompassed within the words, "United States." Wherever the words "United States" appears in this law regulating these federal collection activities, it means all these various entities, including "Federal corporations".
 
  Have you not seen what people are doing with this “private corporation†theory? Here is some of the things that they are saying:
 
  “Currently the US military has the jurisdiction to take our country out of the hands of the de facto government (USA INC) and restore it to the people.â€
 
  “In 2009 Rodney Dale Class and Carl Weston (both are Private Attorney Generals) filed a lawsuit in the District of Columbia challenging the Federal/municipal corporate franchise that has been created in the U.S. This amazing lawsuit is by no means ‘settled’ or ‘disappeared’.â€
 
  Because of my work in criminal defense, I get a closer look at what the feds do than most anybody else does, especially the typical member of the movement. I see the penetration of this movement by the feds: hell, I hear about it in court from govt witnesses. Sun Tzu’s rules of warfare hold that you must know your enemy; but the argument that Uncle Sam is a private, foreign corporation is utterly baseless and serves only to distract this movement from the real issues, and it certainly does not constitute any evidence that people “know the enemy.†If people think that Uncle Sam is a private foreign corp and focus their attention to lots of “defenses†against this “private corp,†then I think this battle is a lost cause. 
 
  Further, the same warfare rules hold that the victor in a battle will strike at the place least expected. I think there is good evidence that lots of the popular arguments promoted in this movement come out of govt offices like IRS/CID and FBI.  Only a maniac or govt agent would promote the flaky idea that people should file 1099-OID tax returns. While there is absolutely no legal basis for using UCC procedures in the battle against abusive govt, that idea has been around for almost 15 years. A baseless idea can have such longevity with govt support.
 
  Today, there are even gurus advocating that “the Vatican owns everything.†This argument is built on lies and is clearly designed to convince patriots to use “rubber knives†against the beast we call the govt.  I guess the theory is that when govt attacks, the defense should be “I am not a Catholic!â€
 
  The baseless arguments promoted by the gurus not only harm this movement, but they give this movement a very bad name. I know people who quit their involvement with this movement because it has turned into a cesspool of crazy ideas.
 
  Larry, Chairman
  Committee to Hang The Gurus
 
 
 
 
Doug,
 
Apparently, you do not know or understand the discussion at issue.  Years ago, a woman named Lisa Guliani wrote an article promoting a wild and crazy argument based on the "Act of 1871." She contended that the "Act of 1871" "formed the corporation known as THE UNITED STATES." You may read just one of her articles in this respect here:
 
 
She also started that baseless argument regarding 28 USC 3002. People have accepted what she alleged without question, and now people think the US is a private, stock-issuing corporation, which is utterly false. This is the origins of the argument that the US is a foreign corporation.
 
This is insanity. Because so many people were mislead by her argument, I posted the following on my website to fully explain that "Act of 1871":
 
    For several years now, certain groups and websites like Worldnewsstand have advocated an argument that the "federal" government was created as a municipal corporation via an act of February 21, 1871. The truth is otherwise.
 

    There is a history regarding the formation of Washington, D.C.  The Constitution specifically provides for the formation of a district, 10 miles square, to be the seat of the federal government; see Art. 1, § 8, cl. 17.  When the Constitution was ratified, the defacto seat of that government was in Philadelphia. The Residence Act of 1790 (1 Stat. 130, July 16, 1790), started the process of establishing the District of Columbia; in the interim, the government continued to meet in Philadelphia. On December 19, 1791, Maryland adopted "An Act concerning the territory of Columbia, and the City of Washington," which ceded lands and jurisdiction for the Maryland part of the District. President Washington played a critical role in the selection of the actual site of the District, as well as laying out the plans for the city. Finally, on February 27, 1801, 2 Stat. 103, Congress adopted an act concerning the District, and created two counties, Washington County on the Maryland side, and Alexandria County on the Virginia side. See amendments, 2 Stat. 115, and 2 Stat. 193. On May 1, 1802, the then existing Board of Commissioners for the District was abolished, replaced with a superintendent under the control of the President; see 2 Stat. 175. On May 3, 1802, Congress adopted an act to incorporate the city of Washington, in the District; see 2 Stat. 195, and amendments at 2 Stat. 254 and 422.  For some of the other acts regarding the District, see 3 Stat. 691, 4 Stat. 294, and 4 Stat. 517.
 
    This was the form of government for the District until February 21, 1871. On this date, Congress adopted a new act for the government of the District; see 16 Stat. 419-429.  As seen by a simple review of this act, it did not create a government for anything but the District of Columbia, and it certainly did not purport to be a government for "federal" citizens living in the States. Also posted here are the first couple of pages from the 1873 Revised Statutes for the District of Columbia.
 
    Scandal was the reason that this form of government for the District lasted only a mere 7 years. After the act of February 21, 1871, public officials of the District incurred tremendous debts for the District, eventually requiring Congress to in essence step in and take over that government. See 18 Stat. (Part 3) 116, ch. 337, for repeal of 1871 act. An act of June 11, 1878, 20 Stat. 102, provided "a permanent form of government for the District of Columbia." Much later, the District of Columbia Home Rule Act, Public Law 93-198, 87 Stat. 777, approved December 24, 1973, created the government for the District which exists today.
 
    Those who assert some wild theory about Washington, D.C. are utterly wrong. They have invented a "different version" of history without bothering to check out the facts.
 
I have also posted the following regarding the complete misconstruction of 28 USC 3002:
 
28 U.S.C. § 3002 (15)(A):
 
(15) "United States" means - 
(A) a Federal corporation;
(B) an agency, department, commission, board, or other entity
of the United States; or
(C) an instrumentality of the United States.
 

  Many contend that the above quote, a part of the Federal Debt Collection Procedures Act, means "the United States is a corporation." I must state that this is an erroneous construction of this particular law.
 
The Federal Debt Collection Procedures Act, 104 Stat. 4933, applies to the entirety of the United States government. Virtually everyone knows that the federal government has lots of agencies. It also has lots of departments, commissions, boards and instrumentalities, including federal corporations. In the last 100 years, Congress has created lots of corporations and some that still exist today are:
Tennessee Valley Authority
 
Commodity Credit Corporation
 
Export-Import Bank
 
Federal Deposit Insurance Corporation
 
National Railroad Passenger Corporation (AMTRAK)
 
Pension Benefit Guaranty Corporation
 
United States African Development Foundation (USADF)
 
One that no longer exists is the Resolution Trust Corporation.
 
The FDCPA simply regulates the collection activities of all federal agencies, departments, commissions, boards and instrumentalities, including the above federal corporations. Rather than repeatedly state in this 30+ page act that all "federal agencies, departments, commissions, boards and instrumentalities, including federal corporations" shall do certain things, all these entities are, for purposes of this particular act, encompassed within the words, "United States." Wherever the words "United States" appears in this law regulating these federal collection activities, it means all these various entities, including "Federal corporations".
 
Have you not seen what people are doing with this "private corporation" theory? Here is some of the things that they are saying:
 
"Currently the US military has the jurisdiction to take our country out of the hands of the de facto government (USA INC) and restore it to the people."
 
"In 2009 Rodney Dale Class and Carl Weston (both are Private Attorney Generals) filed a lawsuit in the District of Columbia challenging the Federal/municipal corporate franchise that has been created in the U.S. This amazing lawsuit is by no means 'settled' or 'disappeared'."
 
Because of my work in criminal defense, I get a closer look at what the feds do than most anybody else does, especially the typical member of the movement. I see the penetration of this movement by the feds: hell, I hear about it in court from govt witnesses. Sun Tzu's rules of warfare hold that you must know your enemy; but the argument that Uncle Sam is a private, foreign corporation is utterly baseless and serves only to distract this movement from the real issues, and it certainly does not constitute any evidence that people "know the enemy." If people think that Uncle Sam is a private foreign corp and focus their attention to lots of "defenses" against this "private corp," then I think this battle is a lost cause. 
 
Further, the same warfare rules hold that the victor in a battle will strike at the place least expected. I think there is good evidence that lots of the popular arguments promoted in this movement come out of govt offices like IRS/CID and FBI.  Only a maniac or govt agent would promote the flaky idea that people should file 1099-OID tax returns. While there is absolutely no legal basis for using UCC procedures in the battle against abusive govt, that idea has been around for almost 15 years. A baseless idea can have such longevity with govt support.
 
Today, there are even gurus advocating that "the Vatican owns everything." This argument is built on lies and is clearly designed to convince patriots to use "rubber knives" against the beast we call the govt.  I guess the theory is that when govt attacks, the defense should be "I am not a Catholic!"
 
The baseless arguments promoted by the gurus not only harm this movement, but they give this movement a very bad name. I know people who quit their involvement with this movement because it has turned into a cesspool of crazy ideas.
 
Larry, Chairman
Committee to Hang The Gurus
 

Doug, 

I am not going to mention judicial jurisdiction via Art. III because I do not believe that concerns you, me or this discussion. 

Let's start with territorial jurisdiction.  Back in 1985 for the purpose of educating patriots about fed jurisdiction, I summarized about 500 fed jurisdiction cases, and that work is posted on my website in the following files: 

http://home.hiwaay.net/~becraft/FEDJurisdiction.html 

http://home.hiwaay.net/~becraft/JURISDICsup.html 

http://home.hiwaay.net/~becraft/JURISDICcir.html 

http://home.hiwaay.net/~becraft/JURISDICst.html 

While doing this work, I ran across the cite to a 1957 govt report on this issue and was able to locate that report, a conversion of which is posted here: 

http://www.constitution.org/juris/fjur/fj0-0000.htm 

If you know something about this issue, please remember that I sowed those seeds in this movement 25 years ago. The US also has an extra-territorial jurisdiction that is primarily international.  It can get jurisdiction via treaties as well. See my explanation here:

http://home.hiwaay.net/~becraft/TREATIES.html

But, there are holes in this jurisdiction not discussed now. 

Is this what you are talking about? Subject matter jurisdiction? 

Douglas Smith wrote:

Mr. Becraft;  I've stated this before when they attemp to assume what I do or don't know.  Don't.  I do agree that there are a number of ignorant people who make pests of themselves by showing their ignorance and in some cases stupidity.  Ignorance is a lack of knowledge while stupidity is doing the same thing and expecting different results.  A lot of posts I receive I delete before opening because I know they do not provide a solution to the problem discussed or will contain nothing new.  I care not to discuss patriot bs only the law and the Constitution(s).  Do you agree that the United States, ie. Federal government operates in more that one jurisdiction?  I'm sure that your answer will be well documented to support your position.  Thanks, Doug.


From: Larry Becraft <becraft@hiwaay.net>
To: Douglas Smith <raimford1@yahoo.com>
Cc: kenny callow <chockey1234@verizon.net>; Silver Eagle Trust <seagle@netins.net>; Pat Wagner <pwagner10@roadrunner.com>; bob minarik <rlmpfl9065@earthlink.net>; Rich Dana <ricardo@feral-tech.com>;generalcongress@constitutionalgov.us; Jerry Stanton <farm_stone@yahoo.com>; Bob Jungles <BOBJ457996@aol.com>
Sent: Sun, November 28, 2010 3:20:07 PM
Subject: Re: Uncle Sam "Ain't Foreign!"

Doug, 

Apparently, you do not know or understand the discussion at issue.  Years ago, a woman named Lisa Guliani wrote an article promoting a wild and crazy argument based on the “Act of 1871.” She contended that the “Act of 1871” “formed the corporation known as THE UNITED STATES.” You may read just one of her articles in this respect here:

http://www.serendipity.li/jsmill/us_corporation.htm

She also started that baseless argument regarding 28 USC 3002. People have accepted what she alleged without question, and now people think the US is a private, stock-issuing corporation, which is utterly false. This is the origins of the argument that the US is a foreign corporation. 

This is insanity. Because so many people were mislead by her argument, I posted the following on my website to fully explain that “Act of 1871":

    For several years now, certain groups and websites like Worldnewsstand have advocated an argument that the "federal" government was created as a municipal corporation via an act of February 21, 1871. The truth is otherwise.

    There is a history regarding the formation of Washington, D.C.  The Constitution specifically provides for the formation of a district, 10 miles square, to be the seat of the federal government; see Art. 1, § 8, cl. 17.  When the Constitution was ratified, the defacto seat of that government was in Philadelphia. The Residence Act of 1790 (1 Stat. 130, July 16, 1790), started the process of establishing the District of Columbia; in the interim, the government continued to meet in Philadelphia. On December 19, 1791, Maryland adopted "An Act concerning the territory of Columbia, and the City of Washington," which ceded lands and jurisdiction for the Maryland part of the District. President Washington played a critical role in the selection of the actual site of the District, as well as laying out the plans for the city. Finally, on February 27, 1801, 2 Stat. 103, Congress adopted an act concerning the District, and created two counties, Washington County on the Maryland side, and Alexandria County on the Virginia side. See amendments, 2 Stat. 115, and 2 Stat. 193. On May 1, 1802, the then existing Board of Commissioners for the District was abolished, replaced with a superintendent under the control of the President; see 2 Stat. 175. On May 3, 1802, Congress adopted an act to incorporate the city of Washington, in the District; see 2 Stat. 195, and amendments at 2 Stat. 254 and 422.  For some of the other acts regarding the District, see 3 Stat. 6914 Stat. 294, and 4 Stat. 517

    This was the form of government for the District until February 21, 1871. On this date, Congress adopted a new act for the government of the District; see 16 Stat. 419-429.  As seen by a simple review of this act, it did not create a government for anything but the District of Columbia, and it certainly did not purport to be a government for "federal" citizens living in the States. Also posted here are the first couple of pages from the 1873 Revised Statutes for the District of Columbia

    Scandal was the reason that this form of government for the District lasted only a mere 7 years. After the act of February 21, 1871, public officials of the District incurred tremendous debts for the District, eventually requiring Congress to in essence step in and take over that government. See 18 Stat. (Part 3) 116, ch. 337, for repeal of 1871 act. An act of  June 11, 1878, 20 Stat. 102, provided "a permanent form of government for the District of Columbia." Much later, the District of Columbia Home Rule Act, Public Law 93-198, 87 Stat. 777, approved December 24, 1973, created the government for the District which exists today. 

    Those who assert some wild theory about Washington, D.C. are utterly wrong. They have invented a "different version" of history without bothering to check out the facts. 

I have also posted the following regarding the complete misconstruction of 28 USC 3002:

28 U.S.C. § 3002 (15)(A):

(15) "United States" means - 
(A) a Federal corporation;
(B) an agency, department, commission, board, or other entity
of the United States; or
(C) an instrumentality of the United States.

  Many contend that the above quote, a part of the Federal Debt Collection Procedures Act, means "the United States is a corporation." I must state that this is an erroneous construction of this particular law.

The Federal Debt Collection Procedures Act, 104 Stat. 4933, applies to the entirety of the United States government. Virtually everyone knows that the federal government has lots of agencies. It also has lots of departments, commissions, boards and instrumentalities, including federal corporations. In the last 100 years, Congress has created lots of corporations and some that still exist today are:

The FDCPA simply regulates the collection activities of all federal agencies, departments, commissions, boards and instrumentalities, including the above federal corporations. Rather than repeatedly state in this 30+ page act that all "federal agencies, departments, commissions, boards and instrumentalities, including federal corporations" shall do certain things, all these entities are, for purposes of this particular act, encompassed within the words, "United States." Wherever the words "United States" appears in this law regulating these federal collection activities, it means all these various entities, including "Federal corporations".

Have you not seen what people are doing with this “private corporation” theory? Here is some of the things that they are saying:

“Currently the US military has the jurisdiction to take our country out of the hands of the de facto government (USA INC) and restore it to the people.” 

“In 2009 Rodney Dale Class and Carl Weston (both are Private Attorney Generals) filed a lawsuit in the District of Columbia challenging the Federal/municipal corporate franchise that has been created in the U.S. This amazing lawsuit is by no means ‘settled’ or ‘disappeared’.” 

Because of my work in criminal defense, I get a closer look at what the feds do than most anybody else does, especially the typical member of the movement. I see the penetration of this movement by the feds: hell, I hear about it in court from govt witnesses. Sun Tzu’s rules of warfare hold that you must know your enemy; but the argument that Uncle Sam is a private, foreign corporation is utterly baseless and serves only to distract this movement from the real issues, and it certainly does not constitute any evidence that people “know the enemy.” If people think that Uncle Sam is a private foreign corp and focus their attention to lots of “defenses” against this “private corp,” then I think this battle is a lost cause.  

Further, the same warfare rules hold that the victor in a battle will strike at the place least expected. I think there is good evidence that lots of the popular arguments promoted in this movement come out of govt offices like IRS/CID and FBI.  Only a maniac or govt agent would promote the flaky idea that people should file 1099-OID tax returns. While there is absolutely no legal basis for using UCC procedures in the battle against abusive govt, that idea has been around for almost 15 years. A baseless idea can have such longevity with govt support. 

Today, there are even gurus advocating that “the Vatican owns everything.” This argument is built on lies and is clearly designed to convince patriots to use “rubber knives” against the beast we call the govt.  I guess the theory is that when govt attacks, the defense should be “I am not a Catholic!” 

The baseless arguments promoted by the gurus not only harm this movement, but they give this movement a very bad name. I know people who quit their involvement with this movement because it has turned into a cesspool of crazy ideas. 

Larry, Chairman
Committee to Hang The Gurus
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Doug,
 
If you are a serious student of the law, I have put together what I think are some great resources. I strung together PDF images of the US Stats at Large, made them word searchable and posted them on the Net. I completed that project many years ago so that I could perform word searches of the Stats. It would be great if you did the same. I also converted the major tax acts in the same way so that students would know the history of the income tax.  I linked all of this together on the Truth Attack website, provided below:
 
 

Vol. 1, U.S. Statutes at Large (1789-99) (52MB)
 
Vol. 2, U.S. Statutes at Large (1799-1813) (67MB)
 
Vol. 3, U.S. Statutes at Large (1813-23) (65MB)
 
Vol. 4, U.S. Statutes at Large (1824-35) (68MB)
 
Vol. 5, U.S. Statutes at Large (1836-45) (68MB)
 
Vol. 9, U.S. Statutes at Large (1845-51) (83MB)
 
Vol. 10, U.S. Statutes at Large (1851-55) (56MB)
 
Vol. 11, U.S. Statutes at Large (1855-59) (50MB)
 
Vol. 12, U.S. Statutes at Large (1859-63) (70MB)
 
Vol. 13, U.S. Statutes at Large (1863-65) (53MB)
 
Vol. 14, U.S. Statutes at Large (1865-67) (48MB)
 
Vol. 15, U.S. Statutes at Large (1867-69) (30MB)
 
Vol. 16, U.S. Statutes at Large (1869-71) (52MB)
 
Vol. 17, U.S. Statutes at Large (1871-73) (55MB)
 
Vol. 18, U.S. Statutes at Large (1873-75) (72MB)
 
Vol. 19, U.S. Statutes at Large (1875-77) (35MB)
 
Vol. 20, U.S. Statutes at Large (1877-79) (42MB)
 
Vol. 21, U.S. Statutes at Large (1879-81) (43MB)
 
Vol. 22, U.S. Statutes at Large (1881-83) (53MB)
 
Vol. 23, U.S. Statutes at Large (1883-85) (45MB)
 
Vol. 24, U.S. Statutes at Large (1885-86) (54MB)
 
Vol. 25, U.S. Statutes at Large (1887-89) (89MB)
 
Vol. 26, U.S. Statutes at Large (1889-91) (100MB)
 
Vol. 27, U.S. Statutes at Large (1891-93) (68MB)
 
Vol. 28, U.S. Statutes at Large (1893-95) (83MB)
 
Vol. 29, U.S. Statutes at Large (1895-97) (62MB)
 
Vol. 30, U.S. Statutes at Large (1897-99) (121MB)
 
Vol. 31, U.S. Statutes at Large (1899-1901) (125MB)
 
Vol. 32, U.S. Statutes at Large (1901-03) (110MB)
 
Vol. 33, U.S. Statutes at Large (1903-05) (115MB)
 
Vol. 34, U.S. Statutes at Large (1905-07) (118MB)
 
Vol. 35, U.S. Statutes at Large (1907-09) (98MB)
 
Vol. 36, U.S. Statutes at Large (1909-11) (115MB)
 
Vol. 37, U.S. Statutes at Large (1911-13) (83MB)
 
Vol. 38, U.S. Statutes at Large (1913-15) (100MB)
 
Vol. 39, U.S. Statutes at Large (1915-17) (100MB)
 
Vol. 40, U.S. Statutes at Large (1917-19) (117MB)
 
 
 
Vol. 41, U.S. Statutes at Large (1919-21) (129MB)
 
Vol. 42, U.S. Statutes at Large (1922) (92MB)
 
Vol. 43, U.S. Statutes at Large (1923-25) (120MB)
 
Vol. 44, U.S. Statutes at Large (1925-27) (128MB)
 
Vol. 45, U.S. Statutes at Large (1927-29) (147MB)
 
Vol. 46, U.S. Statutes at Large (1929-31) (138MB)
 
Vol. 47, U.S. Statutes at Large (1931-33) (126MB)
 
Vol. 48, U.S. Statutes at Large (1933-34) (108MB)
 
Vol. 49, U.S. Statutes at Large (1935-36) (171MB)
 
Vol. 50, U.S. Statutes at Large (1937) (77MB)
 
Vol. 51, U.S. Statutes at Large (1937) ((19MB)
 
Vol. 52, U.S. Statutes at Large (1938) (107MB)
 
Vol. 53, U.S. Statutes at Large (1939) (79MB)
 
Vol. 54, U.S. Statutes at Large (1939-41) (106MB)
 
Vol. 55, U.S. Statutes at Large (1941-42) (71MB)
 
Vol. 56, U.S. Statutes at Large (1942) (88MB)
 
Vol. 57, U.S. Statutes at Large (1943) (49MB)
 
Vol. 58, U.S. Statutes at Large (1944) (76MB)
 
Vol. 59, U.S. Statutes at Large (1945) (55MB)
 
Vol. 60, U.S. Statutes at Large (1946) (88MB)
 
Vol. 61, U.S. Statutes at Large (1947) (76MB)
 
Vol. 62, U.S. Statutes at Large (1948) (103MB)
 
Vol. 63, U.S. Statutes at Large (1949) (87MB)
 
Vol. 64, U.S. Statutes at Large (1950) (102MB)
 
Vol. 65, U.S. Statutes at Large (1951) (58MB)
 
Vol. 66, U.S. Statutes at Large (1952) (61MB)
 
Vol. 67, U.S. Statutes at Large (1953) (47MB)
 
Vol. 68, U.S. Statutes at Large (1954) (94MB)
 
Vol. 69, U.S. Statutes at Large (1955) (53MB)
 
Vol. 70, U.S. Statutes at Large (1956) (85MB)
 
Vol. 71, U.S. Statutes at Large (1957) (47MB)
 
Vol. 72, U.S. Statutes at Large (1958) (126MB)
 
Vol. 73, U.S. Statutes at Large (1959) (52MB)
 
Vol. 74, U.S. Statutes at Large (1960) (74MB)
 
Vol. 75, U.S. Statutes at Large (1961) (60MB)
 
Vol. 76, U.S. Statutes at Large (1962) (89MB)
 
Vol. 77, U.S. Statutes at Large (1963) (59MB)
 
Vol. 78, U.S. Statutes at Large (1964) (77MB)
 
Vol. 79, U.S. Statutes at Large (1965) (91MB)
 
Vol. 80, U.S. Statutes at Large (1966) (105MB)
 
Vol. 81, U.S. Statutes at Large (1967) (64MB)
 
Vol. 82, U.S. Statutes at Large (1968) (96MB)
 
Vol. 83, U.S. Statutes at Large (1969) (56MB)
 
Vol. 84, U.S. Statutes at Large (1970) (149MB)
 
Vol. 85, U.S. Statutes at Large (1971) (56MB)
 
Vol. 86, U.S. Statutes at Large (1972) (110MB)
 
Vol. 87, U.S. Statutes at Large (1973) (73MB)
 
Vol. 88, U.S. Statutes at Large (1974) (166MB)
 
Vol. 89, U.S. Statutes at Large (1975) (71MB)
 
Vol. 90, U.S. Statutes at Large (1976) (181MB)
 
Vol. 91, U.S. Statutes at Large (1977) (98MB)
 
Vol. 92, U.S. Statutes at Large (1978) (233MB)
 
Vol. 93, U.S. Statutes at Large (1979) (82MB)
 
Vol. 94, U.S. Statutes at Large (1980) (224MB)
 
Vol. 95, U.S. Statutes at Large (1981) (110MB)
 
Vol. 96, U.S. Statutes at Large (1982) (152MB)
 
Vol. 97, U.S. Statutes at Large (1983) (86MB)
 
Vol. 98, U.S. Statutes at Large (1984) ((199MB)
 
Vol. 99, U.S. Statutes at Large (1985) (114MB)
 
Vol. 100, U.S. Statutes at Large (1986) (308MB)
 
Vol. 101, U.S. Statutes at Large (1987) (169MB)
 
Vol. 102, U.S. Statutes at Large (1988) (293MB)
 
Vol. 103, U.S. Statutes at Large (1989) (149MB)
 
Vol. 104, U.S. Statutes at Large (1990) (343MB)
 
Vol. 105, U.S. Statutes at Large (1991) (139MB)
 
Vol. 106, U.S. Statutes at Large (1992) (303MB)
 
Vol. 107, U.S. Statutes at Large (1993) (141MB)
 
Vol. 108, U.S. Statutes at Large (1994) (300MB)
 
Vol. 109, U.S. Statutes at Large (1995) (52MB)
 
Vol. 110, U.S. Statutes at Large (1996) (308MB)
 
Vol. 111, U.S. Statutes at Large (1997) (8MB)
 
Vol. 112, U.S. Statutes at Large (1998) (14MB)
 
Vol. 113, U.S. Statutes at Large (1999) (8MB)
 
Vol. 114, U.S. Statutes at Large (2000) (15MB)
 
Vol. 115, U.S. Statutes at Large (2001) (10MB)
 
Vol. 116, U.S. Statutes at Large (2002) (14MB)
 
Vol. 117, U.S. Statutes at Large (2003) (12MB)
 
Vol. 118, U.S. Statutes at Large (2004) (19MB)
 
Vol. 119, U.S. Statutes at Large (2005) (10MB)
 
Vol. 120, U.S. Statutes at Large (2006) (10MB)
 
Vol. 121, U.S. Statutes at Large (2007) (6.6MB)
 

Vol. 122, U.S. Statutes at Large (2008)
 
Vol. 123, U.S. Statutes at Large (2009)
 
Finding a specific act of Congress is easy. For example, a student might run across a reference to the Legal Tender Act of 1862, 12 Stat. 345. To find this act with its citation,one would simply pull Volume 12 of the U.S. Statutes at Large, and turn to page 345. The first number, in this example, 12, is the volume number and the second number, 345, is the page number in that volume.
 
In 1926 pursuant to a Congressional act, the United States Code was created. Please see this article, Titles of the U.S. Code, for an explanation of how this Code was created. The first U.S.Code was published in a single volume, and it may be downloaded (in a searchable format) here:
 
1926USCode
 
The older federal income tax acts in a searchable PDF format are linked here:
 
Revenue Act of 1918
 
Revenue Act of 1921
 
Revenue Act of 1924
 
Revenue Act of 1926
 
Revenue Act of 1928
 
Revenue Act of 1932
 
Revenue Act of 1934
 
Revenue Act of 1936
 
Revenue Act of 1938
 
1939 Internal Revenue Code
 
1954 Internal Revenue Code
 
1986 Internal Revenue Code (Jan. 2002 version)
Have you ever wondered why doesn't somebody combined all the relevant volumes of the federal income tax regulations into one huge PDF file and make it available to the public? Wonder no longer, because it is here (more than 10,000 pages in this single file):
 
26 CFR - 2003 - Parts 1, 20, 25, 31 
Do you have trouble finding good state codes posted on the Net? Here they are:
 
State Constitutions and Codes:
 
 
 
Alabama Constitution
 
Alabama Code
 
 
 
Alaska Constitution
 
Alaska Code
 
 
 
Arizona Constitution
 
Arizona Code
 
 
 
Arkansas Constitution
 
Arkansas Code
 
 
 
California Constitution
 
California Code &  California Code
 
 
 
Colorado Constitution
 
Colorado Code
 
 
 
Connecticut Constitution
 
Connecticut Code
 
 
 
Delaware Constitution
 
Delaware Code
 
District of Columbia
 
 
 
Florida Constitution
 
Florida Code
 
 
 
Georgia Constitution
 
Georgia Code
 
 
 
Hawaii Constitution
 
Hawaii
 
 
 
Idaho Constitution
 
Idaho Code
 
 
 
Illinois Constitution
 
Illinois Code
 
 
 
Indiana Constitution
 
Indiana Code
 
 
 
Iowa Constitution
 
Iowa Code
 
 
 
Kansas Constitution
 
Kansas Code
 
 
 
Kentucky Constitution
 
Kentucky Code
 
 
 
Louisiana Constitution
 
Louisiana Code
 
 
 
Maine Constitution
 
Maine Code
 
 
 
Maryland Constitution
 
Maryland Code &  Maryland Code
 
 
 
Massachusetts Constitution
 
Massachusetts Code
 
 
 
Michigan Constitution
 
Michigan Code
 
 
 
Minnesota Constitution
 
Minnesota Code
 
 
 
Mississippi Constitution
 
Mississippi Code
 
 
 
Missouri Constitution
 
Missouri Code
 
 
 
Montana Constitution
 
Montana Code
 
 
 
Nebraska Constitution
 
Nebraska Code
 
 
 
Nevada Constitution
 
Nevada Code
 
 
 
New Hampshire Constitution
 
New Hampshire Code
 
 
 
New Jersey Constitution
 
New Jersey Code
 
 
 
New Mexico Constitution
 
New Mexico Code
 
 
 
New York Constitution
 
New York Code
 
 
 
North Carolina Constitution
 
North Carolina Code
 
 
 
North Dakota Constitution
 
North Dakota Code
 
 
 
Ohio Constitution
 
Ohio Code
 
 
 
Oklahoma Constitution
 
Oklahoma Code
 
 
 
Oregon Constitution
 
Oregon Code
 
 
 
Pennsylvania Constitution
 
Pennsylvania Code
 
 
 
Rhode Island Constitution
 
Rhode Island Code
 
 
 
South Carolina Constitution
 
South Carolina Code
 
 
 
South Dakota Constitution
 
South Dakota Code
 
 
 
Tennessee Constitution
 
Tennessee Code
 
 
 
Texas Constitution
 
Texas Code
 
 
 
Utah Constitution
 
Utah Code
 
 
 
Vermont Constitution
 
Vermont Code
 
 
 
Virginia Constitution
 
Virginia Code
 
 
 
Washington Constitution
 
Washington Code
 
 
 
West Virginia Constitution
 
West Virginia Code
 
 
 
Wisconsin Constitution
 
Wisconsin Code
 
 
 
Wyoming Constitution
 
Wyoming Code

 

November 29, 2010 in Current Affairs | Permalink

JFK: C2C: Oswald & JFK Assassination

___
JFK Assassination Still Intrigues, 47 Years Later ABC News - Byron Wolf - ‎49
 minutes ago‎ 47 years have passed since the assassination of President John F.
 Kennedy, but the man who served less than a full term in office still ...
The John F. Kennedy assassination: Four unanswered questions
 more

http://disc.yourwebapps.com/discussion.cgi?disc=149495;article=134179;title=APFN


C2C: Oswald & JFK Assassination
Date: 11-21-10
Host: George Knapp
MP3 Downloads: (IT'S NOT OVER, TILL THE FAT LADY SINGS!)
Interview with Judyth Vary Baker
http://www.apfn.net/CC210/A001I101121-2009A.MP3

==========================================
This video shows showing the Secret Service officer ordering JFK’s
 bodyguards away from JFK before entering the Grassy Knolls area when he
 gets shot.
There are NO STATUTE OF LIMITATIONS on murder
http://www.apfn.org/APFN/JFK.HTM

 More:

http://tekgnosis.typepad.com/tekgnosis/2010/02/who-killed-jfk-british-bankers-told-lbj-to-do-it-lbj-picked-cia-hitmaster-cord-meyer-whose-wife-was-.html

http://tekgnosis.typepad.com/tekgnosis/2009/05/who-killed-john-f-kennedy-.html

Fox 8 news exclusive:

The JFK Conspiracy and Who May Have Been Behind It

http://www.fox8.com/news/wjw-jfk-10p-part-2-tease-txt,0,7652807.story (3 TV news segments)

___

Kennedy Assassination Special on Coast to Coast AM Radio

Date: 11-22-10
Host: George Noory
Guests: Donald A. Adams, Craig Hulet, Tim Miller, G. Paul Chambers

Four guests addressed different aspects of the JFK assassination in individual one-hour segments. Up first, former FBI Investigator Don Adams argued that the real killer of John F. Kennedy may have been a man named Joseph Milteer, whom he investigated shortly before the assassination in 1963. Milteer was known to be a radical right winger who hated the Kennedys with a passion. In a conversation the FBI secretly recorded on November 9, 1963, Milteer told his friend "we're going to go ahead and kill the President from an office building with a high-powered rifle...it's already in the works." Yet, when Oswald was named as the shooter, Milteer was removed as a suspect, he noted.

In hour two, analyst Craig B. Hulet talked about the research of Federal Judge Jim Garrison which pointed toward a conspiracy in the assassination. Hulet befriended Garrison in the late 1980s and discussed his research into the JFK assassination with him at length. Though Garrison complained that his research files had mysteriously disappeared, one of the interesting facts he'd uncovered was that Oswald, Sirhan Sirhan, and James Earl Ray had all lived within a block of each other at a housing project in Dallas, and this appeared to be more than just a coincidence. In a decade of assassinations that included John & Robert Kennedy, and Martin Luther King, the U.S. underwent a coups d'état, with a change of leadership and a demoralization of the country that still affects us today, Hulet commented.

In the third hour, publisher and author Tim Miller shared information that suggests a conspiracy took place "that was centered around officials of the US government condoning the action taken by the Mafia," in the JFK assassination. "These people didn't think they were killing the President, they thought they were taking out the President who had stolen the presidency," and so they had legitimized it in their own minds, he explained. Miller also spoke his work with Gerald Ford, who had served on the Warren Commission. Miller has concluded that the goal of the Warren Commission was to avert a war with Russia rather than uncover the truth about the assassination.

Last hour guest, research scientist Paul Chambers discussed the science behind the physical evidence associated with the assassination. The evidence demonstrates that the single bullet theory is false, and the Zapruder film indicates multiple shots, with at least two gunmen firing, he reported. Gerald Ford admitted that the Warren Commission altered the medical data "for clarification," and that is why they got the wrong answer, Chambers added.

For more, read the recap from our 2009 JFK Special.

Ref:

JFK Assassination Special VIII

 FBI Investigator Don Adams on the assassination of John F. Kennedy

 Craig B. Hulet, Jim Garrison and the JFK assassination

 Former White House correspondent: Was Hoover involved in JFK assassination?

 The Kennedy Assassination: The science behind the evidence

___

Related:


http://news.yahoo.com/blogs/sideshow/rfk-assassin-sirhan-sirhan-alleges-conspiracy-theory-seeks-160638113.html

http://weeklyworldnews.com/headlines/36681/jackie-kennedy-lyndon-johnson-got-bobby-too/

http://tekgnosis.typepad.com/tekgnosis/2009/05/who-killed-john-f-kennedy-.html

http://tekgnosis.typepad.com/tekgnosis/2010/02/who-killed-jfk-british-bankers-told-lbj-to-do-it-lbj-picked-cia-hitmaster-cord-meyer-whose-wife-was-.html

http://tekgnosis.typepad.com/tekgnosis/2011/11/thrive-the-movie-that-will-change-the-course-of-history.html


November 22, 2010 in Current Affairs | Permalink

Jesse Ventura Exposes the JFK Assassination Conspiracy Nationally

___

By Mac McKinney (about the author)       Page 1 of 1 page(s)
Become a Fan Become a Fan   (15 fans)

opednews.com

For OpEdNews: Mac McKinney - Writer



Jesse Ventura has done a great service to the country in this, the second season of his TV series, Conspiracy Theory. In Episode 5 that just played this past Friday, November 19th, he further hammers home the truth nationally that there was indeed a conspiracy to kill Jack Kennedy. He does so by going beyond the House Select Committee on Assassinations report of 1979 that also concluded there was a conspiracy by providing more concrete evidence, the most crucial being at the end of the episode with the death-bed confession of the famous/infamous intelligence officer, author and Watergate Burglar, E. Howard Hunt, who pointblank states to his son, St. Clair Hunt, who video and audio-taped the confession, that he was indeed part of the assassination conspiracy, code-named The Big Event .


E. Howard Hunt

Hunt was about as insider as you can get regarding the inner workings of the clandestine side of the American government, and he was as lucid as ever when he gave this confession. He knew he was dying and didn't want to keep silent any longer about what he knew. The best anyone can say to refute Hunt's confession so far is that his claims have not been substantiated by another investigation, which of course, is not even being contemplated at this point, but this is a distracting argument because the real point it whether Hunt is believable or not. And for a guy as lethal, deadly serious and matter-of-fact as Hunt, to suggest that he was making this up is ludicrous.

Hunt's confession has been online for several years, and I have listened to it several times, hoping against hope that it could get wider play in the media. But It was up to someone of Jesse Ventura's caliber to tie it and the many other loose strands of evidence together to make the most solid case yet nationally that yes indeed, America, there WAS a conspiracy to kill Kennedy, a conspiracy that emanated out of the dark side of the American government.

So consider this a public service on Jesse Ventura's part. Here is episode five on YouTube, in four parts:

Part 1:

http://www.youtube.com/watch?v=TX48y4n5EYw

Part 2:

http://www.youtube.com/watch?v=gRIE7G2Bc64

Part 3:

http://www.youtube.com/watch?v=6vSHr5ppVSM

Part 4:

http://www.youtube.com/watch?v=A1-pLnWgY_E

 More:

http://tekgnosis.typepad.com/tekgnosis/2010/11/jfk-c2c-oswald-jfk-assassination.html

http://tekgnosis.typepad.com/tekgnosis/2009/05/who-killed-john-f-kennedy-.html

http://tekgnosis.typepad.com/tekgnosis/2010/02/who-killed-jfk-british-bankers-told-lbj-to-do-it-lbj-picked-cia-hitmaster-cord-meyer-whose-wife-was-.html 


 

November 21, 2010 in Current Affairs | Permalink

Private Attorney General REFUTES: Must Video: U.S. IS A CORPORATION incorporated in 1868/71 by the Roman Catholic institute

The "United States" is not a corporation, Alex: 
this LIE is being stubbornly repeated all over the Internet,
and I am sure you have plenty of reason to explain why:

http://www.supremelaw.org/letters/us-v-usa.htm

In United States v. Cooper Corporation, 312 U.S. 600 (1941),

the Supreme Court wrote:

 

http://laws.findlaw.com/us/312/600.html

 

"We may say in passing that the argument that the

United States may be treated as a corporation 

organized under its own laws, that is, under the 

Constitution as the fundamental law, seems so strained

as not to merit serious consideration ."


http://www.supremelaw.org/cc/usa.inc/
http://www.supremelaw.org/cc/usa.inc/registered.agent.2007-02-12.gif
http://www.supremelaw.org/cc/usa.inc/THE.UNITED.STATES.OF.AMERICA.JPG

http://www.supremelaw.org/cc/usa.corp/
http://www.supremelaw.org/cc/usa.corp/registered.agent.2007-02-12.gif


Now for the real kickers:  Secretaries of State are CERTIFYING
that these corporations never registered to do business in their States:

http://www.supremelaw.org/sos/

e.g.

http://www.supremelaw.org/sos/or/the.usa.inc.certificate.gif
http://www.supremelaw.org/sos/or/usa.corp.certificate.gif
http://www.supremelaw.org/sos/or/usa.inc.certificate.gif

http://www.supremelaw.org/sos/ca/usa.corp.certificate.gif
http://www.supremelaw.org/sos/ca/usa.inc.certificate.gif


Formal litigation on this point is here:

http://www.supremelaw.org/cc/williamson2/appeal/reply.to.brief.for.appellee.htm

The “government” did not bring this suit.  The U.S. Department of Justice has no powers of attorney legally to represent any one of the 50 States of the Union, nor all of them collectively.  28 U.S.C. 547.  The 50 States of the Union are already quite adequately represented legally by their respective State Attorneys General.  28 U.S.C. 530B.

Moreover, in Eisner v. Macomber, 252 U.S. 189 (1920), the Supreme Court prohibited Congress from re-defining any terms used in the Constitution for the United States of America (“U.S. Constitution”).  At 28 U.S.C. 1746, both “United States” and “United States of America” occur in correct contradistinction to each other (inside one is outside the others).  28 U.S.C. 1746 is the only statute in all of Title 28 where the term “United States of America” occurs as such.

The UNITED STATES OF AMERICA [sic] did incorporate twice as such in the State of Delaware, but certified evidence now before this Court shows that both foreign corporations have been revoked by the Delaware Secretary of State.  Neither foreign corporation was ever registered with the New Mexico Secretary of State either!  (See “Certificate”!)

Even if one or the other were not revoked, DOJ would still not have any powers of attorney legally to represent a foreign Delaware corporation.  Congress never appropriated funds for DOJ to do so.


Finally, Congress has never incorporated either the “United States” or the “United States of Americaas such.  See U.S. v. Cooper Corporation, 312 U.S. 600 (1941).  It appears that Chief Justice John Marshall was responsible for fabricating the myth that “The United States of America” are a corporation.  See Dixon v. The United States, 1 Marsh. Dec. 177, 181 (1811).  However, without citing any actual legislative authority for that proposition, Marshall’s statement is merely dictum that was later cited in Bouvier’s Law Dictionary (1856), at the definitions of “Union” and “United States of America”.  In any event, Dixon has been overruled by Cooper supra because Dixon was decided by a Circuit Court in a case on which C.J. Marshall presided.


[end excerpt]


Further reading on the implications can be found here:

http://www.supremelaw.org/press/rels/cracking.title.28.htm

http://www.supremelaw.org/cc/microsoft/
http://www.supremelaw.org/cc/microsoft/transmittal.htm



--
Sincerely yours,
/s/ Paul Andrew Mitchell, B.A., M.S.
Private Attorney General, 18 U.S.C. 1964
http://www.supremelaw.org/decs/agency/private.attorney.general.htm
http://www.supremelaw.org/reading.list.htm
http://www.supremelaw.org/index.htm (Home Page)
http://www.supremelaw.org/support.policy.htm (Support Policy)
http://www.supremelaw.org/guidelines.htm (Client Guidelines)
http://www.supremelaw.org/support.guidelines.htm (Policy + Guidelines)

All Rights Reserved without Prejudice

___

On Sat, Nov 20, 2010 at 7:28 AM, Alex James <alexjamesinfo1@gmail.com> wrote:

Can anyone confirm this video?



From: david soori [mailto:sooriuk@yahoo.com]
Sent: Saturday, November 20, 2010 6:17 PM
To: david soori
Subject: Fwd: IN MOTION: THE PLOT TO DESTROY THE UNITED STATES -






 A must watch video by all patriotic Americans, thanks Mary

david


http://www.youtube.com/watch?v=JZzgGdxYGR0


The united states of America (note lower case) was incorporated in 1868/71 by the Roman Catholic institute. The united states of America could not stay sovereign and trade with nations already within the Oleron Law system.

This is why events were engineered to destroy the sovereignty of America and bring about the 14th Amendment making all State citizens now property of this corporation D.C.

In truth D.C. controls no where on the mainland other than its small patch. Its upon sovereign land as is the Vatican City which controls it and The City of London.

Its dominated by Georgetown 'military fortress' University and the Jesuit U.S Conference President. Washington D.C. sits on once Roman Catholic soil owned by Francis Pope and Daniel Carroll, the later's brother founded Georgetown University and was the first U.S Bishop.

The land was once known in 1663 property records as Rome and is made up of a part of VIRGINia and a part of MARYland giving us the Queen of Witches, Queen Semarisis of Babylon the wife of Nimrod.

The U.S. is totally under the thumb of The Equestrian Order of the Holy Sepulchre of Jerusalem's puppet the Knights of Malta who control the entire Temple Crown financial system have they've controlled the entire financial system since the destruction of the Knights Templar at the hands of the Pope. Two major haunts of the Knights Templar are visibly under the control of the Knights of Malta today.

These are Aventine Hill in Rome which was once the Templars WHQ and the other is St John's Wood where now the Grand Priory of England is based and headed by Grand Prior, Fredrik Crichton-Stuart.

The Knights of Malta control all other recognised orders and this is part covertly done via the likes of The Alliance of the Orders of St John. All the Knights of Malta are subordinate to the Cardinal and Grandmaster which at this moment in time is Matthew Festing, himself once from the Grand Priory of England. Canon Law controls everything and the Holy Office of the Inquisition continues to this very day all but in a commercial form. Oleron Law was perfected by the Roman Empire and based on Canon Law. Make sure you become aware quickly of the Universal Postal Union and its power within all of this. The U.P.U is based in Berne, Switzerland. The very location which was made neutral by the Congress of Vienna in 1814.


November 21, 2010 in Current Affairs | Permalink

CSLID Shit List 8

15 November 2010. Previous in this series.

 


CSLID Shit List 8

A sends:

"In fact there is nothing universal here.
For information to be information, it has
to flow always."

http://cryptome.org/0002/clsid-beyond2.htm

"Your Windows registry is the castle that holds
all the commands for the hardware and software
on your computer to communicate with each other.
Without the Windows registry, the hardware and
software programmed with the Windows Operating
System would just sit there."

  - articlesbase.com

Let me make one point here. The purpose of
bleaching these CLSIDs IS NOT to stifle all
information from flowing. ONLY prevent useless,
unstable default and additional registry.
__________________________________________

WARNING ; This content should ONLY be used
by those who expect strong computer security.
I suggest anyone who decides to use this data
to research the information before-hand.

This content works best with Windows XP,
and bleaching should not be attempted while
using new 'flashy' computer technologies,
as some new technologies MAY require various
CLSIDs listed below to properly function.
Third-party video game geeking for example.

Everything below has been tested on XP only.
__________________________________________

Bleach ICRA internet content filtering software.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
policies\Ratings\.Default\http://www.icra.org/pics/vocabularyv03/

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies

"Upon the recent decision of FOSI's Board of Directors,
the ICRA labeling engine has been discontinued. *While
all current labels will continue to work with Internet
content filters*, the ICRA label generator, ICRA tools
and Webmaster support will no longer be available.

If you are writing with questions about difficulties
with Content Advisor, please refer to Microsoft
support, as Content Advisor is part of their Internet
Explorer software."


IDA interface CLSIDs help prevent reverse engineering
computer systems by analysis of IT hardware. IDA is an
anti-tamper technology used to deter data corruption.
REGARDLESS OF WHAT HAS BEEN PUBLISHED, IDA CAN AUTOMATICALLY
RE-GENERATE CERTAIN MODIFIED DATA! IDA is built-in
artificial intelligence manufactured in new computers.

IDA behavior mirrors typical system behavior, replicating
system data in case it needs to correspond to problems. IDA
can re-generate certain data from original replication
and has the capability to correct certain default data.

Stan Franklin, who has lead and managed the IDA interface
has claimed IDA is exhibiting functional consciousness. IDA
was developed for the US Navy in 1998 to completely automate
the role of many communications.

"The IDA model incorporates several different learning
mechanisms. The simplest is the associative learning that
occurs as the contents of "consciousness" is stored in
associative memory with every "conscious" broadcast.
It's the associations between the various items comprising
the "conscious" contents that's learned. Also, associations
with other similar items are learned by means of the Sparse
Distributed Memory mechanism."


IDAViewerControl
HKCR\Interface\{0E41257B-812D-11D0-9B4A-00C04FC2F51D}

IDABvrHook
HKCR\Interface\{3E2487C4-8709-11D0-B177-00C04FC2A0CA}

IDAUntilNotifier
HKCR\Interface\{3F3DA01A-4705-11D0-8710-00C04FC29D46}

IDAImportationResult
HKCR\Interface\{4A933702-E36F-11D0-9B99-00C04FC2F51D}

IDAPickableResult
HKCR\Interface\{4A933703-E36F-11D0-9B99-00C04FC2F51D}

IDAEvent
HKCR\Interface\{50B4791E-4731-11D0-8912-00C04FC2A0CA}

IDAStatics
HKCR\Interface\{542FB452-5003-11CF-92A2-00AA00B8A733}

IDABoolean
HKCR\Interface\{C46C1BC0-3C52-11D0-9200-848C1D000000}

IDAString
HKCR\Interface\{C46C1BC3-3C52-11D0-9200-848C1D000000}

IDAColor
HKCR\Interface\{C46C1BC5-3C52-11D0-9200-848C1D000000}

IDAPoint2
HKCR\Interface\{C46C1BC7-3C52-11D0-9200-848C1D000000}

IDAVector2
HKCR\Interface\{C46C1BC9-3C52-11D0-9200-848C1D000000}

IDATransform2
HKCR\Interface\{C46C1BCB-3C52-11D0-9200-848C1D000000}

IDABbox2
HKCR\Interface\{C46C1BCD-3C52-11D0-9200-848C1D000000}

IDAPath2
HKCR\Interface\{C46C1BCF-3C52-11D0-9200-848C1D000000}

IDAMatte
HKCR\Interface\{C46C1BD1-3C52-11D0-9200-848C1D000000}

IDAImage
HKCR\Interface\{C46C1BD3-3C52-11D0-9200-848C1D000000}

IDAMontage
HKCR\Interface\{C46C1BD5-3C52-11D0-9200-848C1D000000}

IDAPoint3
HKCR\Interface\{C46C1BD7-3C52-11D0-9200-848C1D000000}

IDAVector3
HKCR\Interface\{C46C1BD9-3C52-11D0-9200-848C1D000000}

IDATransform3
HKCR\Interface\{C46C1BDB-3C52-11D0-9200-848C1D000000}

IDABbox3
HKCR\Interface\{C46C1BDD-3C52-11D0-9200-848C1D000000}

IDAGeometry
HKCR\Interface\{C46C1BDF-3C52-11D0-9200-848C1D000000}

IDACamera
HKCR\Interface\{C46C1BE1-3C52-11D0-9200-848C1D000000}

IDASound
HKCR\Interface\{C46C1BE3-3C52-11D0-9200-848C1D000000}

IDAMicrophone
HKCR\Interface\{C46C1BE5-3C52-11D0-9200-848C1D000000}

IDAEndStyle
HKCR\Interface\{C46C1BEB-3C52-11D0-9200-848C1D000000}

IDAJoinStyle
HKCR\Interface\{C46C1BED-3C52-11D0-9200-848C1D000000}

IDADashStyle
HKCR\Interface\{C46C1BEF-3C52-11D0-9200-848C1D000000}

IDALineStyle
HKCR\Interface\{C46C1BF1-3C52-11D0-9200-848C1D000000}

IDAPair
HKCR\Interface\{C46C1BF3-3C52-11D0-9200-848C1D000000}

IDAImport
HKCR\Interface\{FC54BEAA-5B12-11D1-8E7B-00C04FC29D46}

IDAModifiableBehavior
HKCR\Interface\{FC54BEAB-5B12-11D1-8E7B-00C04FC29D46}

IDA CLSIDs are also located in HKEY_LOCAL_MACHINE,
regardless, as usual, once bleached in CLASSES_ROOT
the same CLSIDs often become terminated in the HKLM.


SID hacker used worthless EapHosts and Remote Desktop.

HKEY_CLASSES_ROOT\AppID\{0A886F29-465A-4aea-8B8E-BE926BFAE83E}

RDSHost.EXE
HKEY_CLASSES_ROOT\AppID\{5123EB69-F99E-461C-B6C3-CE6E825813E8}

HKEY_CLASSES_ROOT\AppID\{8B4B437E-4CAB-4e83-89F6-7F9F7DF414EA}

Interactive User
HKEY_CLASSES_ROOT\AppID\{B3F97836-A515-4ea6-BE06-4F1428C317C7}

Interactive User
HKEY_CLASSES_ROOT\AppID\{B8C54A54-355E-11D3-83EB-00A0C92A2F2D}

HKEY_CLASSES_ROOT\AppID\{8C482DCE-2644-4419-AEFF-189219F916B9}

HKEY_CLASSES_ROOT\AppID\RDSHost.EXE


EAPQec Remote Messenger Client

EapQecMessenger
HKEY_CLASSES_ROOT\CLSID\{0A886F29-465A-4aea-8B8E-BE926BFAE83E}

IEapQecCallbackForMessenger
HKEY_CLASSES_ROOT\Interface\{1510FB87-5676-40B9-A227-5D0B66866F81}


IEapQecMessenger
HKEY_CLASSES_ROOT\Interface\{7ED70824-03AD-41C1-AB1A-950621776881}


"iRemote Suite allows you to manipulate your desktop
or notebook remotely via mobile device like iPhone.
The application allows you to simulate keyboard and/or
mouse input of any kind." Or should we declare iRemote
CLSIDs allow remote control over our desktops and
keyboards in typical overwhelming annoyance! Only to
allow more rapture for those hackers.

IRemoteQI
HKCR\Interface\{00000142-0000-0000-C000-000000000046}

IRemoteComputer
HKCR\Interface\{000214FE-0000-0000-C000-000000000046}

IRemoteDesktopHelpSession
HKCR\Interface\{19E62A24-95D2-483A-AEB6-6FA92914DF96}

IRemoteDebugManager
HKCR\Interface\{275D9D60-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteDebugManagerCallback
HKCR\Interface\{275D9D61-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteField
HKCR\Interface\{275D9D80-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteDataField
HKCR\Interface\{275D9D81-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteArrayField
HKCR\Interface\{275D9D82-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteContainerField
HKCR\Interface\{275D9D83-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteMethodField
HKCR\Interface\{275D9D84-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteClassField
HKCR\Interface\{275D9D85-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteStackFrame
HKCR\Interface\{275D9D90-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteProcess
HKCR\Interface\{275D9D93-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteProcessCallback
HKCR\Interface\{275D9D94-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteObject
HKCR\Interface\{275D9DB0-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteArrayObject
HKCR\Interface\{275D9DB1-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteBooleanObject
HKCR\Interface\{275D9DB2-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteContainerObject
HKCR\Interface\{275D9DB5-5FF5-11CF-A5E1-00AA006BBF16}

IRemoteDispatch
HKCR\Interface\{6619A740-8154-43BE-A186-0319578E02DB}

IRemoteProxyFactory
HKCR\Interface\{8628F27D-64A2-4ED6-906B-E6155314C16A}

IRemoteWebConfigurationHostServer
HKCR\Interface\{A99B591A-23C6-4238-8452-C7B0E895063D}

IRemoteHelper
HKCR\Interface\{CB46E850-FC2F-11D2-B126-00805FC73204}

IMsRdp (Remote Desktop) Updates

IMsRdpClient4
HKEY_CLASSES_ROOT\Interface\{095E0738-D97D-488B-B9F6-DD0E8D66C0DE}

IMsRdpClientAdvancedSettings3
HKEY_CLASSES_ROOT\Interface\{19CD856B-C542-4C53-ACEE-F127E3BE1A59}

IMsRdpClient6
HKEY_CLASSES_ROOT\Interface\{1F7EFE96-F96F-4002-9632-159766631767}

IMsRdpClientAdvancedSettings6
HKEY_CLASSES_ROOT\Interface\{222c4b5d-45d9-4df0-a7c6-60cf9089d285}

IMsRdpClientAdvancedSettings
HKEY_CLASSES_ROOT\Interface\{3C65B4AB-12B3-465B-ACD4-B8DAD3BFF9E2}

IMsRdpClient5
HKEY_CLASSES_ROOT\Interface\{4eb5335b-6429-477d-b922-e06a28ecd8bf}

IMsRdpClientSecuredSettings
HKEY_CLASSES_ROOT\Interface\{605BEFCF-39C1-45CC-A811-068FB7BE346D}

IMsRdpClientTransportSettings2
HKEY_CLASSES_ROOT\Interface\{67341688-D606-4c73-A5D2-2E0489009319}

IMsRdpClient3
HKEY_CLASSES_ROOT\Interface\{91B7CBC5-A72E-4FA0-9300-D647D7E897FF}

IMsRdpClient
HKEY_CLASSES_ROOT\Interface\{92B4A539-7115-4B7C-A5A9-E5D9EFC2780A}

IMsRdpClientAdvancedSettings2
HKEY_CLASSES_ROOT\Interface\{9AC42117-2B76-4320-AA44-0E616AB8437B}

IMsRdpClientShell
HKEY_CLASSES_ROOT\Interface\{d012ae6d-c19a-4bfe-b367-201f8911f134}

IMsRdpClient2
HKEY_CLASSES_ROOT\Interface\{E7E17DC4-3B71-4BA7-A8E6-281FFADCA28F}

IMsRdpClientAdvancedSettings5
HKEY_CLASSES_ROOT\Interface\{FBA7F64E-6783-4405-DA45-FA4A763DABD0}

IMsRdpClientAdvancedSettings4
HKEY_CLASSES_ROOT\Interface\{FBA7F64E-7345-4405-AE50-FA4A763DC0DE}

More listed in CLSID shit list 7.


Help and Support Services: Service
HKCR\CLSID\{833E4010-AFF7-4AC3-AAC2-9F24C1457BCE}

Help and Support Services: Package Updater
HKCR\CLSID\{833E4012-AFF7-4AC3-AAC2-9F24C1457BCE}


Unknown entry.

HKEY_CURRENT_USER\Software\Microsoft\Scrunch

HKEY_CLASSES_ROOT\OInfo.OInfoCtrl.1
{1D03B2CA-3B9F-40DD-BBE4-277A91768A5B}

OInfo12 Property Page
HKCR\CLSID\{89A09E83-3F79-48DE-995A-2D12F7154B73}

_______________

[DO NOT BLEACH] ...

HKCR\Installer\Components\613B99D5CFD7FCB4793B500086BB4113

Look for {24AAE126-0911-478F-A019-07B875EB9996},OInfo12.ocx

Delete {24AAE126-0911-478F-A019-07B875EB9996},OInfo12.ocx
_______________


Gator Spyware

HKEY_LOCAL_MACHINE\SOFTWARE\Gator.com


MyWebSearch Spyware (Updated)

Spyware designed to launch advertisements, frequent
pop-ups and will redirect search results to bullshit
virus filled web sites.

HKEY_CLASSES_ROOT\CLSID\{00a6faf1-072e-44cf-8957-5838f569a31d}
HKEY_CLASSES_ROOT\CLSID\{00a6faf6-072e-44cf-8957-5838f569a31d}
HKEY_CLASSES_ROOT\CLSID\{07b18ea1-a523-4961-b6bb-170de4475cca}
HKEY_CLASSES_ROOT\CLSID\{07b18ea9-a523-4961-b6bb-170de4475cca}
HKEY_CLASSES_ROOT\CLSID\{07b18eab-a523-4961-b6bb-170de4475cca}
HKEY_CLASSES_ROOT\CLSID\{0f8ecf4f-3646-4c3a-8881-8e138ffcaf70}
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239}
HKEY_CLASSES_ROOT\CLSID\{25560540-9571-4d7b-9389-0f166788785a}
HKEY_CLASSES_ROOT\CLSID\{3dc201fb-e9c9-499c-a11f-23c360d7c3f8}
HKEY_CLASSES_ROOT\CLSID\{3e720452-b472-4954-b7aa-33069eb53906}
HKEY_CLASSES_ROOT\CLSID\{53ced2d0-5e9a-4761-9005-648404e6f7e5}
HKEY_CLASSES_ROOT\CLSID\{63d0ed2c-b45b-4458-8b3b-60c69bbbd83c}
HKEY_CLASSES_ROOT\CLSID\{7473d292-b7bb-4f24-ae82-7e2ce94bb6a9}
HKEY_CLASSES_ROOT\CLSID\{7473d294-b7bb-4f24-ae82-7e2ce94bb6a9}
HKEY_CLASSES_ROOT\CLSID\{7473d296-b7bb-4f24-ae82-7e2ce94bb6a9}
HKEY_CLASSES_ROOT\CLSID\{84da4fdf-a1cf-4195-8688-3e961f505983}
HKEY_CLASSES_ROOT\CLSID\{8e6f1832-9607-4440-8530-13be7c4b1d14}
HKEY_CLASSES_ROOT\CLSID\{938aa51a-996c-4884-98ce-80dd16a5c9da}
HKEY_CLASSES_ROOT\CLSID\{98d9753d-d73b-42d5-8c85-4469cda897ab}
HKEY_CLASSES_ROOT\CLSID\{9ff05104-b030-46fc-94b8-81276e4e27df}
HKEY_CLASSES_ROOT\CLSID\{a9571378-68a1-443d-b082-284f960c6d17}
HKEY_CLASSES_ROOT\CLSID\{adb01e81-3c79-4272-a0f1-7b2be7a782dc}
HKEY_CLASSES_ROOT\CLSID\{b813095c-81c0-4e40-aa14-67520372b987}
HKEY_CLASSES_ROOT\CLSID\{c9d7be3e-141a-4c85-8cd6-32461f3df2c7}
HKEY_CLASSES_ROOT\CLSID\{cff4ce82-3aa2-451f-9b77-7165605fb835}
HKEY_CLASSES_ROOT\CLSID\{d9fffb27-d62a-4d64-8cec-1ff006528805}
HKEY_CLASSES_ROOT\CLSID\{e79dfbca-5697-4fbd-94e5-5b2a9c7c1612}
HKEY_CLASSES_ROOT\Interface\{f87d7fb5-9dc5-4c8c-b998-d8dfe02e2978}
HKEY_CLASSES_ROOT\Interface\{eb9e5c1c-b1f9-4c2b-be8a-27d6446fdaf8}
HKEY_CLASSES_ROOT\Interface\{e79dfbcb-5697-4fbd-94e5-5b2a9c7c1612}
HKEY_CLASSES_ROOT\Interface\{e79dfbc9-5697-4fbd-94e5-5b2a9c7c1612}
HKEY_CLASSES_ROOT\Interface\{e342af55-b78a-4cd0-a2bb-da7f52d9d25f}
HKEY_CLASSES_ROOT\Interface\{e342af55-b78a-4cd0-a2bb-da7f52d9d25e}
HKEY_CLASSES_ROOT\Interface\{de38c398-b328-4f4c-a3ad-1b5e4ed93477}
HKEY_CLASSES_ROOT\Interface\{d6ff3684-ad3b-48eb-bbb4-b9e6c5a355c1}
HKEY_CLASSES_ROOT\Interface\{bbabdc90-f3d5-4801-863a-ee6ae529862d}
HKEY_CLASSES_ROOT\Interface\{a626cdbd-3d13-4f78-b819-440a28d7e8fc}
HKEY_CLASSES_ROOT\Interface\{991aac62-b100-47ce-8b75-253965244f69}
HKEY_CLASSES_ROOT\Interface\{90449521-d834-4703-bb4e-d3aa44042ff8}
HKEY_CLASSES_ROOT\Interface\{7473d297-b7bb-4f24-ae82-7e2ce94bb6a9}
HKEY_CLASSES_ROOT\Interface\{7473d295-b7bb-4f24-ae82-7e2ce94bb6a9}
HKEY_CLASSES_ROOT\Interface\{7473d293-b7bb-4f24-ae82-7e2ce94bb6a9}
HKEY_CLASSES_ROOT\Interface\{7473d291-b7bb-4f24-ae82-7e2ce94bb6a9}
HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff}
HKEY_CLASSES_ROOT\Interface\{72ee7f04-15bd-4845-a005-d6711144d86a}
HKEY_CLASSES_ROOT\Interface\{6e74766c-4d93-4cc0-96d1-47b8e07ff9ca}
HKEY_CLASSES_ROOT\Interface\{63d0ed2d-b45b-4458-8b3b-60c69bbbd83c}
HKEY_CLASSES_ROOT\Interface\{63d0ed2b-b45b-4458-8b3b-60c69bbbd83c}
HKEY_CLASSES_ROOT\Interface\{3e720453-b472-4954-b7aa-33069eb53906}
HKEY_CLASSES_ROOT\Interface\{3e720451-b472-4954-b7aa-33069eb53906}
HKEY_CLASSES_ROOT\Interface\{3e53e2cb-86db-4a4a-8bd9-ffeb7a64df82}
HKEY_CLASSES_ROOT\Interface\{3e1656ed-f60e-4597-b6aa-b6a58e171495}
HKEY_CLASSES_ROOT\Interface\{2e3537fc-cf2f-4f56-af54-5a6a3dd375cc}
HKEY_CLASSES_ROOT\Interface\{247a115f-06c2-4fb3-967d-2d62d3cf4f0a}
HKEY_CLASSES_ROOT\FunWebProducts.PopSwatterSettingsControl.1
HKEY_CLASSES_ROOT\FunWebProducts.PopSwatterSettingsControl
HKEY_CLASSES_ROOT\FunWebProducts.PopSwatterBarButton.1
HKEY_CLASSES_ROOT\FunWebProducts.PopSwatterBarButton
HKEY_CLASSES_ROOT\FunWebProducts.KillerObjManager.1
HKEY_CLASSES_ROOT\FunWebProducts.KillerObjManager
HKEY_CLASSES_ROOT\FunWebProducts.IECookiesManager.1
HKEY_CLASSES_ROOT\FunWebProducts.IECookiesManager
HKEY_CLASSES_ROOT\FunWebProducts.HTMLMenu.2
HKEY_CLASSES_ROOT\FunWebProducts.HTMLMenu.1
HKEY_CLASSES_ROOT\FunWebProducts.HTMLMenu
HKEY_CLASSES_ROOT\FunWebProducts.HistorySwatterControlBar.1
HKEY_CLASSES_ROOT\FunWebProducts.HistorySwatterControlBar
HKEY_CLASSES_ROOT\FunWebProducts.HistoryKillerScheduler.1
HKEY_CLASSES_ROOT\FunWebProducts.HistoryKillerScheduler
HKEY_CLASSES_ROOT\FunWebProducts.DataControl.1
HKEY_CLASSES_ROOT\FunWebProducts.DataControl
HKEY_CLASSES_ROOT\MyWebSearch.PseudoTransparentPlugin.1
HKEY_CLASSES_ROOT\MyWebSearchToolBar.ToolbarPlugin.1
HKEY_CLASSES_ROOT\MyWebSearchToolBar.ToolbarPlugin
HKEY_CLASSES_ROOT\MyWebSearchToolBar.SettingsPlugin.1
HKEY_CLASSES_ROOT\MyWebSearchToolBar.SettingsPlugin
HKEY_CLASSES_ROOT\MyWebSearch.PseudoTransparentPlugin
HKEY_CLASSES_ROOT\MyWebSearch.OutlookAddin.1
HKEY_CLASSES_ROOT\MyWebSearch.OutlookAddin
HKEY_CLASSES_ROOT\MyWebSearch.HTMLPanel.1
HKEY_CLASSES_ROOT\MyWebSearch.HTMLPanel
HKEY_CLASSES_ROOT\MyWebSearch.ChatSessionPlugin.1
HKEY_CLASSES_ROOT\MyWebSearch.ChatSessionPlugin

HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive

HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Uninstall\MyWebSearch bar Uninstall

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook\Addins\
MyWebSearch.OutlookAddin

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Word\Addins\
MyWebSearch.OutlookAddin

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\Browser Helper Objects\
{07b18ea1-a523-4961-b6bb-170de4475cca}

HKEY_CURRENT_USER\SOFTWARE\Fun Web Products
HKEY_CURRENT_USER\SOFTWARE\MyWebSearch

WBEM Ping Provider
HKEY_CLASSES_ROOT\CLSID\{734AC5AE-68E1-4FB5-B8DA-1D92F7FC6661}


WBEM TROJANS

HKLM\SOFTWARE\Microsoft\WBEM\CIMOM\SecuredHostProviders

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\BuildW

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mso

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\udso

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Ulrn

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Update

DO NOT BLEACH ALL WBEM CLSIDS, ONLY THOSE LISTED!

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\afisicx
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\afisicx
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\nobicyt
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\nobicyt
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\noxtcyr
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\noxtcyr
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\noytcyr
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\noytcyr
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\mabidwe
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mabidwe
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\roxtctm
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\roxtctm
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\roytctm
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\roytctm
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\sobicyt
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sobicyt
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tdydowkc
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tdydowkc
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wsldoekd


More Trojan Viruses

Transaction Manager Contact Identifier (CID) keys
contain information for the Transaction Manager endpoints
corresponding to the four supported protocols.

These keys contain settings concerning the frequency
and filtering of transaction monitoring information.
The transaction monitoring is used by Windows Remote
Registry Protocol, which is unstable due to vulnerability
and capability of hosting infections. Trojans have been
known to target the CID keys to hide infection.

HKEY_CLASSES_ROOT\CID
HKEY_CLASSES_ROOT\CID\0c0b9fdd-65c9-49be-8e8e-4efa1f31b004
HKEY_CLASSES_ROOT\CID\37242894-ab8d-4d4e-9f95-f872167e6843
HKEY_CLASSES_ROOT\CID\fb96f993-c4de-45b8-97b9-9a888fce752d
HKEY_CLASSES_ROOT\CID\fd04850b-2fba-4f00-80ac-27943e65f54b

These CLSIDs contained the SVCID trojan.

HKEY_CLASSES_ROOT\SVCID
HKEY_CLASSES_ROOT\SVCID\01366d42-c04e-11d1-b1c0-00c04fc2f3ef
HKEY_CLASSES_ROOT\SVCID\488091f0-bff6-11ce-9de8-00aa00a3f464
HKEY_CLASSES_ROOT\SVCID\6407e780-7e5d-11d0-8ce6-00c04fdc877e
HKEY_CLASSES_ROOT\SVCID\ced2de40-bff6-11ce-9de8-00aa00a3f464

HKLM\SOFTWARE\Classes\CLSID\{346436FA-5138-50DA-D412-0870CE39768B}

HKLM\SOFTWARE\Classes\CLSID\{7b3e8324-592f-477d-b05e-c3a05ce8aa90}

HKLM\SOFTWARE\Classes\CLSID\{ADA8C222-95D2-47B5-950B-AEBC0A508839}

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\e405.e405mgr
{E28F671C-3D83-4149-BA2F-546A67702B49}

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\
{21EEB010-57F3-11DD-B116-DAD055D89593}

HKEY_LOCAL_MACHINE\SOFTWARE\tdss

HKLM\SOFTWARE\Classes\TypeLib\{E63648F7-3933-440E-B4F6-A8584DD7B7EB}

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata

HKLM\SYSTEM\CurrentControlSet\Services\tcpip66

HKEY_CURRENT_USER\Software\avsoft

HKEY_CURRENT_USER\Software\pragma

HKEY_CURRENT_USER\SOFTWARE\HolLol

HKEY_CURRENT_USER\SOFTWARE\Inet Delivery

HKEY_CURRENT_USER\Software\{F18143AE-4987-6D9A-4F35-CB2C6DCA9D17}


Keylogging spyware

HKLM\SOFTWARE\Classes\CLSID\{C9F64886-18D8-4580-0F86-87DD9ADE410D}

HKLM\SOFTWARE\Classes\TypeLib\{ACF84E6E-06EA-CFF5-7678-1AB22EE732CA}

HKEY_CURRENT_USER\Software\ASProtect


2search spyware

These two implemented categories are spyware.

{7DD95801-9882-11CF-9FA9-00AA006C42C4}
{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{00022602-0000-0000-C000-000000000046}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{00022602-0000-0000-C000-000000000046}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{0149EEDF-D08F-4142-8D73-D23903D21E90}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{0149EEDF-D08F-4142-8D73-D23903D21E90}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{0DAD5531-BF31-43AC-A513-1F8926BBF5EC}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{0DAD5531-BF31-43AC-A513-1F8926BBF5EC}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{10072CEC-8CC1-11D1-986E-00A0C955B42E}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{10072CEC-8CC1-11D1-986E-00A0C955B42E}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{1a4da620-6217-11cf-be62-0080c72edd2d}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{1a4da620-6217-11cf-be62-0080c72edd2d}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{2D360201-FFF5-11d1-8D03-00A0C959BC0A}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{2D360201-FFF5-11d1-8D03-00A0C959BC0A}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{76FF3452-E474-4032-BED5-BBE4E96B6D2F}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{76FF3452-E474-4032-BED5-BBE4E96B6D2F}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{8BD21D10-EC42-11CE-9E0D-00AA006002F3}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{8BD21D10-EC42-11CE-9E0D-00AA006002F3}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{8BD21D20-EC42-11CE-9E0D-00AA006002F3}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{8BD21D20-EC42-11CE-9E0D-00AA006002F3}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{8BD21D30-EC42-11CE-9E0D-00AA006002F3}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{8BD21D30-EC42-11CE-9E0D-00AA006002F3}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{8BD21D40-EC42-11CE-9E0D-00AA006002F3}\
Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}

HKEY_CLASSES_ROOT\CLSID\{8BD21D40-EC42-11CE-9E0D-00AA006002F3}\
Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}

ONLY BLEACH THE IMPLEMENTED CATEGORIES!

Microsoft Office SOAP Dime Message Composer
HKEY_CLASSES_ROOT\CLSID\{86EB31DF-A46F-11D6-9500-00065B874123}

Microsoft Office SOAP Dime Message Parser
HKEY_CLASSES_ROOT\CLSID\{86EB31E2-A46F-11D6-9500-00065B874123}

Microsoft Office SOAP Data Encoder Factory
HKEY_CLASSES_ROOT\CLSID\{86EB31E8-A46F-11D6-9500-00065B874123}

Microsoft Office SOAP Simple Message Composer
HKEY_CLASSES_ROOT\CLSID\{86EB31EB-A46F-11D6-9500-00065B874123}

Microsoft Office SOAP Simple Message Parser
HKEY_CLASSES_ROOT\CLSID\{86EB31EC-A46F-11D6-9500-00065B874123}

HKEY_CLASSES_ROOT\AceCnfViewer.sortie
{351C19A9-79EE-4274-BE26-F734A2372439}

HKEY_CLASSES_ROOT\AceCnfViewer.Wizard
{C33B33E1-E069-44EB-A9A5-BBF72268AC5E}


HKEY_CLASSES_ROOT\Open.Financial.Exchange.File
C:\WINDOWS\Installer\{270940EA-C235-40D9-B2AE-2D450356DF8E}\
_A819E278_1E30_4FAC_97EB_5FAE3F581551,0

IT related trojan?

HKEY_CLASSES_ROOT\.opc

HKEY_CLASSES_ROOT\.oqy

HKEY_CLASSES_ROOT\OPCFile

HKEY_CLASSES_ROOT\oqyfile

HKEY_CLASSES_ROOT\OpcPcmImporter.OmgPcPcmImporter
{26EB1712-F516-4DDF-AC63-1F6B1B422C84}

HKEY_CLASSES_ROOT\OpcPcmMem.OpcPcmImporterConvert
{76BC2A8B-80D2-4665-8C6C-C3A2C2B432F3}

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\OlePrn.AddPrint\
{B57467A6-50B5-11D1-BF97-0000F8773501}

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\OlePrn.AspHelp\
{3E4D4F1C-2AEE-11D1-9D3D-00C04FC30DF6}

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\OlePrn.DSPrintQueue\
{435899C9-44AB-11D1-AF00-080036234103}

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\OlePrn.OleCvt\
{65303443-AD66-11D1-9D65-00C04FC30DF6}

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\OlePrn.OleInstall\
{C3701884-B39B-11D1-9D68-00C04FC30DF6}

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\OlePrn.OleSNMP\

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\OlePrn.PrinterURL\
{92337A8C-E11D-11D0-BE48-00C04FC30DF6}


FBI Surveillance with Dximaging:

http://cryptome.org/0002/fbi-dximaging.htm

C:\WINDOWS\system32\Dxtmsft.dll

DXImageTransform.Microsoft.CrBlinds
HKEY_CLASSES_ROOT\CLSID\{00C429C0-0BA9-11d2-A484-00C04F8EFB69}

DXImageTransform.Microsoft.Iris
HKEY_CLASSES_ROOT\CLSID\{049F2CE6-D996-4721-897A-DB15CE9EB73D}

DXImageTransform.Microsoft.AlphaImageLoader
HKEY_CLASSES_ROOT\CLSID\{0C7EFBDE-0303-4c6f-A4F7-31FA2BE5E397}

DXImageTransform.Microsoft.RadialWipe
HKEY_CLASSES_ROOT\CLSID\{164484A9-35D9-4FB7-9FAB-48273B96AA1D}

DXImageTransform.Microsoft.Fade
HKEY_CLASSES_ROOT\CLSID\{16B280C5-EE70-11D1-9066-00C04FD9189D}

DXImageTransform.Microsoft.BasicImage
HKEY_CLASSES_ROOT\CLSID\{16B280C8-EE70-11D1-9066-00C04FD9189D}

DXImageTransform.Microsoft.ZigZag
HKEY_CLASSES_ROOT\CLSID\{23E26328-3928-40F2-95E5-93CAD69016EB}

DXImageTransform.Microsoft.Convolution
HKEY_CLASSES_ROOT\CLSID\{2BC0EF29-E6BA-11d1-81DD-0000F87557DB}

DXImageTransform.Microsoft.RandomBars
HKEY_CLASSES_ROOT\CLSID\{2E7700B7-27C4-437F-9FBF-1E8BE2817566}

DXImageTransform.Microsoft.MMSpecialEffectInplace1Input
HKEY_CLASSES_ROOT\CLSID\{353359C1-39E1-491b-9951-464FD8AB071C}

DXImageTransform.Microsoft.MaskFilter
HKEY_CLASSES_ROOT\CLSID\{3A04D93B-1EDD-4f3f-A375-A03EC19572C4}

DXImageTransform.Microsoft.CrIris
HKEY_CLASSES_ROOT\CLSID\{3F69F351-0379-11D2-A484-00C04F8EFB69}


DXImageTransform.Microsoft.Chroma
HKEY_CLASSES_ROOT\CLSID\{421516C1-3CF8-11D2-952A-00C04FA34F05}

DXImageTransform.Microsoft.CrRadialWipe
HKEY_CLASSES_ROOT\CLSID\{424B71AF-0695-11D2-A484-00C04F8EFB69}

DXImageTransform.Microsoft.Redirect
HKEY_CLASSES_ROOT\CLSID\{42B07B28-2280-4937-B035-0293FB812781}

DXImageTransform.Microsoft.Spiral
HKEY_CLASSES_ROOT\CLSID\{4A03DCB9-6E17-4A39-8845-4EE7DC5331A5}

DXImageTransform.Microsoft.Matrix
HKEY_CLASSES_ROOT\CLSID\{4ABF5A06-5568-4834-BEE3-327A6D95A685}

DXImageTransform.Microsoft.Pixelate
HKEY_CLASSES_ROOT\CLSID\{4CCEA634-FBE0-11d1-906A-00C04FD9189D}

DXImageTransform.Microsoft.MovieMaker.VidAdjust
HKEY_CLASSES_ROOT\CLSID\{5A20FD6F-F8FE-4a22-9EE7-307D72D09E6E}

DXImageTransform.Microsoft.Wheel
HKEY_CLASSES_ROOT\CLSID\{5AE1DAE0-1461-11d2-A484-00C04F8EFB69}

DXImageTransform.Microsoft.Gradient
HKEY_CLASSES_ROOT\CLSID\{623E2882-FC0E-11d1-9A77-0000F8756A10}

DXImageTransform.Microsoft.Strips
HKEY_CLASSES_ROOT\CLSID\{63A4B1FC-259A-4A5B-8129-A83B8C9E6F4F}

DXImageTransform.Microsoft.Blur
HKEY_CLASSES_ROOT\CLSID\{7312498D-E87A-11d1-81E0-0000F87557DB}

DXImageTransform.Microsoft.CrStretch
HKEY_CLASSES_ROOT\CLSID\{7658F2A2-0A83-11d2-A484-00C04F8EFB69}

DXImageTransform.Microsoft.Inset
HKEY_CLASSES_ROOT\CLSID\{76F363F2-7E9F-4ED7-A6A7-EE30351B6628}

DXImageTransform.Microsoft.CrSlide
HKEY_CLASSES_ROOT\CLSID\{810E402F-056B-11D2-A484-00C04F8EFB69}

DXImageTransform.Microsoft.CrInset
HKEY_CLASSES_ROOT\CLSID\{93073C40-0BA5-11d2-A484-00C04F8EFB69}

DXImageTransform.Microsoft.Compositor
HKEY_CLASSES_ROOT\CLSID\{9A43A844-0831-11D1-817F-0000F87557DB}

DXImageTransform.Microsoft.Blinds
HKEY_CLASSES_ROOT\CLSID\{9A4A4A51-FB3A-4F4B-9B57-A2912A289769}

DXImageTransform.Microsoft.Glow
HKEY_CLASSES_ROOT\CLSID\{9F8E6421-3D9B-11D2-952A-00C04FA34F05}

DXImageTransform.Microsoft.ICMFilter
HKEY_CLASSES_ROOT\CLSID\{A1BFB370-5A9F-4429-BB72-B13E2FEAEDEF}

DXImageTransform.Microsoft.CrSpiral
HKEY_CLASSES_ROOT\CLSID\{ACA97E00-0C7D-11d2-A484-00C04F8EFB69}

DXImageTransform.Microsoft.Alpha
HKEY_CLASSES_ROOT\CLSID\{ADC6CB82-424C-11D2-952A-00C04FA34F05}

DXImageTransform.Microsoft.DropShadow
HKEY_CLASSES_ROOT\CLSID\{ADC6CB86-424C-11D2-952A-00C04FA34F05}

DXImageTransform.Microsoft.Wave
HKEY_CLASSES_ROOT\CLSID\{ADC6CB88-424C-11D2-952A-00C04FA34F05}

DXImageTransform.Microsoft.MovieMaker.Age
HKEY_CLASSES_ROOT\CLSID\{ADEADEB8-E54B-11d1-9A72-0000F875EADE}

DXImageTransform.Microsoft.Wipe
HKEY_CLASSES_ROOT\CLSID\{AF279B30-86EB-11D1-81BF-0000F87557DB}

DXImageTransform.Microsoft.CheckerBoard
HKEY_CLASSES_ROOT\CLSID\{B3EE7802-8224-4787-A1EA-F0DE16DEABD3}

DXImageTransform.Microsoft.GradientWipe
HKEY_CLASSES_ROOT\CLSID\{B96F67A2-30C2-47E8-BD85-70A2C948B50F}

DXImageTransform.Microsoft.CrBarn
HKEY_CLASSES_ROOT\CLSID\{C3BDF740-0B58-11d2-A484-00C04F8EFB69}

DXImageTransform.Microsoft.Slide
HKEY_CLASSES_ROOT\CLSID\{D1C5A1E7-CC47-4E32-BDD2-4B3C5FC50AF5}

DXImageTransform.Microsoft.MotionBlur
HKEY_CLASSES_ROOT\CLSID\{DD13DE77-D3BA-42D4-B5C6-7745FA4E2D4B}

DXImageTransform.Microsoft.RevealTrans
HKEY_CLASSES_ROOT\CLSID\{E31E87C4-86EA-4940-9B8A-5BD5D179A737}

DXImageTransform.Microsoft.NDFXArtEffects
HKEY_CLASSES_ROOT\CLSID\{E673DCF2-C316-4c6f-AA96-4E4DC6DC291E}

DXImageTransform.Microsoft.CrZigzag
HKEY_CLASSES_ROOT\CLSID\{E6E73D20-0C8A-11d2-A484-00C04F8EFB69}

DXImageTransform.Microsoft.Shadow
HKEY_CLASSES_ROOT\CLSID\{E71B4063-3E59-11D2-952A-00C04FA34F05}

DXImageTransform.Microsoft.MovieMaker.Fade
HKEY_CLASSES_ROOT\CLSID\{EC85D8F1-1C4E-46e4-A748-7AA04E7C0496}

DXImageTransform.Microsoft.Barn
HKEY_CLASSES_ROOT\CLSID\{EC9BA17D-60B5-462B-A6D8-14B89057E22A}

DXImageTransform.Microsoft.Stretch
HKEY_CLASSES_ROOT\CLSID\{F088DE73-BDD0-4E3C-81F8-6D32F4FE9D28}

DXImageTransform.Microsoft.Emboss
HKEY_CLASSES_ROOT\CLSID\{F515306D-0156-11d2-81EA-0000F87557DB}

DXImageTransform.Microsoft.Engrave
HKEY_CLASSES_ROOT\CLSID\{F515306E-0156-11d2-81EA-0000F87557DB}

DXImageTransform.Microsoft.RandomDissolve
HKEY_CLASSES_ROOT\CLSID\{F7F4A1B6-8E87-452f-A2D7-3077F508DBC0}

DXImageTransform.Microsoft.Light
HKEY_CLASSES_ROOT\CLSID\{F9EFBEC2-4302-11D2-952A-00C04FA34F05}

HKEY_CLASSES_ROOT\DxDiag.DxDiagProvider
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Alpha
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.AlphaImageLoader
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Barn
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.BasicImage
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Blinds
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Blur
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CheckerBoard
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Chroma
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Compositor
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Convolution
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrBarn
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrBlinds
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrBlur
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrEmboss
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrEngrave
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrInset
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrIris
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrRadialWipe
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrSlide
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrSpiral
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrStretch
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrWheel
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.CrZigzag
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.DropShadow
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Emboss
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Engrave
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Fade
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Glow
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Gradient
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.GradientWipe
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.ICMFilter
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Inset
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Iris
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Light
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.MaskFilter
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Matrix
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.MMSpecialEffect1Input
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.MMSpecialEffect2Inputs
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.MMSpecialEffectInplace1Input

HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.MotionBlur
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.MovieMaker.Age
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.MovieMaker.Fade
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.MovieMaker.VidAdjust
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.NDFXArtEffects
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Pixelate
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.RadialWipe
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.RandomBars
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.RandomDissolve
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Redirect
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.RevealTrans
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Shadow
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Slide
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Spiral
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Stretch
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Strips
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Wave
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Wheel
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.Wipe
HKEY_CLASSES_ROOT\DXImageTransform.Microsoft.ZigZag


This is a third-party plug-in for Microsoft Office.

HKEY_CLASSES_ROOT\OWC11.AccSync.AccSubNotHandler
HKEY_CLASSES_ROOT\OWC11.AccSync.SyncMgrHandler
HKEY_CLASSES_ROOT\OWC11.ChartSpace
HKEY_CLASSES_ROOT\OWC11.DataSourceControl
HKEY_CLASSES_ROOT\OWC11.FieldList
HKEY_CLASSES_ROOT\OWC11.NumberFormat
HKEY_CLASSES_ROOT\OWC11.PivotTable
HKEY_CLASSES_ROOT\OWC11.RecordNavigationControl
HKEY_CLASSES_ROOT\OWC11.Spreadsheet


INetInboundConnection
HKEY_CLASSES_ROOT\Interface\{FAEDCF53-31FE-11D1-AAD2-00805FC1270E}

INetSharedAccessConnection
HKEY_CLASSES_ROOT\Interface\{FAEDCF55-31FE-11D1-AAD2-00805FC1270E}

ISharedAccessBeaconFinder
HKEY_CLASSES_ROOT\Interface\{FAEDCF67-31FE-11D1-AAD2-00805FC1270E}

ISharedAccessBeacon
HKEY_CLASSES_ROOT\Interface\{FAEDCF6B-31FE-11D1-AAD2-00805FC1270E}


ISmartTagRecognizerSite2
HKEY_CLASSES_ROOT\Interface\{347958C0-E86F-4865-97C8-BED31E4C28E0}

ISmartTagAction
HKEY_CLASSES_ROOT\Interface\{3B744D8F-B8A5-11D3-B2CF-00500489D6A3}

ISmartTagRecognizer
HKEY_CLASSES_ROOT\Interface\{3C6C0440-A27D-11D3-BD33-D80C46980A07}

ISmartTagAction2
HKEY_CLASSES_ROOT\Interface\{5073BDEB-E480-4024-887E-22923C004444}

ISmartTagProperties
HKEY_CLASSES_ROOT\Interface\{54F37842-CDD7-11D3-B2D4-00500489D6A3}

ISmartTagRecognizer2
HKEY_CLASSES_ROOT\Interface\{D4C62D17-6162-41DE-BE24-5B1D3F529CC3}


IAutomaticUpdates
HKEY_CLASSES_ROOT\Interface\{673425BF-C082-4C7C-BDFD-569464B8E0CE}

AutomaticUpdates Class
HKEY_CLASSES_ROOT\CLSID\{BFE18E9C-6D87-4450-B37C-E02F0B373803}


ISharedProperty

HKEY_CLASSES_ROOT\Interface\{2A005C01-A5DE-11CF-9E66-00AA00A3F464}
HKEY_CLASSES_ROOT\Interface\{2A005C07-A5DE-11CF-9E66-00AA00A3F464}
HKEY_CLASSES_ROOT\Interface\{2A005C0D-A5DE-11CF-9E66-00AA00A3F464}


Activates content over restricted protocols
to access the computer.

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\
Internet Settings\SOIEAK\MISC\RESTRICTED_PROTOCOLS


A small guide for those unfamiliar with registry
editing.  This does not teach anyone how to edit
registry. It displays simple techniques people
can use to make their computers more secure and
run faster too.

http://webcache.googleusercontent.com/search?q=cache:Fl4DV1IWg3wJ:
haktech.blogspot.com/2009/01/here-we-are-again-at-haktech-this-guide.html


Great site for investigating malware / spyware.

http://www.threatexpert.com/azlisting.aspx

__________________________________________

Previous CLSID shit lists.

http://cryptome.org/0001/clsid-list-01.htm

http://cryptome.org/0001/clsid-list-02.htm

http://cryptome.org/0001/clsid-list-03.htm

http://cryptome.org/0001/clsid-list-04.htm

http://cryptome.org/0002/clsid-list-05.htm

http://cryptome.org/0002/clsid-list-06.htm

http://cryptome.org/0002/clsid-list-07.htm

http://cryptome.org/0001/vista-clsids.htm

http://cryptome.org/isp-spy/ms-analysis.htm

Responses

http://cryptome.org/0002/clsid-beyond.htm

http://cryptome.org/0002/clsid-beyond2.htm


Ref: http://cryptome.org/0002/cslid-list-08.htm

November 19, 2010 in Current Affairs | Permalink

CLSID Shit List 7

23 October 2010

Previous:

http://cryptome.org/0002/clsid-list-06.htm
http://cryptome.org/0002/clsid-list-05.htm
http://cryptome.org/0001/clsid-list-04.htm
http://cryptome.org/0001/clsid-list-03.htm
http://cryptome.org/0001/clsid-list-02.htm
http://cryptome.org/0001/clsid-list-01.htm
http://cryptome.org/isp-spy/ms-analysis.htm
http://cryptome.org/0001/vista-clsids.htm

 


CLSID Shit List 7

A sends:

Before scrolling through this updated list, I recommend reading CLSID Shitlist Beyond.

http://cryptome.org/0002/clsid-beyond.htm

_________________________________________

What (A) told us is true, the registry is not the only place to hunt down viruses, spyware, or other malware infections.

Taking snapshots of the system and using a utility that tracks any changes does help filter out hidden rogue activity, good point. An inbound/outbound firewall would also help catch anything trying to establish a remote connection.

I'm surprised others have taken interest to these shit lists ; these help me to thwart registry infection, while finding more ways to improve stability and defense.

Also working with several computers, I've practiced editing and researching registry. Not only finding infected CLSIDs but what files/programs may depend on them, whether those files/programs can be trusted, or if they exist for third parties, or at times, perhaps stable.

The truth is I happen to be better detecting something abnormal or rogue inside the registry than I am finding the proper software that can be trusted.

Hard copy backups are smart, that helps alot.

I am familiar with common techniques some people use. People sometimes use an unregistered computer, with basic system defense. No updating (which should NEVER be trusted), no emailing, no logging into accounts linking to personal identity.

One computer I use now is always offline.

As (A) stated before, "someone who's trying to keep a normal Windows system secure and non-invasive has to watch a lot more than just CLSIDs."  That's true.

Keep in mind, when I use the term "bleach", this does not mean "delete". What I have stumbled across after deleting infected files, is the fact they can re-surface, same as deleting an infected CLSID. (NOT referring to the system32 files meant to re-surface for protection.)

Bleaching the CLSID keeps the CLSID inside the registry without data, no strings no value, without the permission set. ... That cannot be fixed unless you stand by the computer to reprogram it. That can be a pain in the ass, sometimes that won't work either. When it's bleached, it's dead with ONLY the physical owner holding the bones to reincarnate it.

Learn how to bleach here: http://ht.ly/19nj0Z

One problem I have trouble with is finding the proper software I can trust. Most of the freeware now days is corrupt, that also goes for most of the anti-spyware people pay for in the stores. GARBAGE!

I best stick with what I study here, and that is unnecessary, unstable registry.

_________________________________________

The registry looks more complex than it is, however it IS very sensitive! The benefit of using these guides help average folks protect their computers from exploitation.

MMC Plugable Internet Protocol Updated
HKCR\CLSID\{3C5F432A-EF40-4669-9974-9671D4FC2E12}
HKCR\CLSID\{43136EB5-D36C-11CF-ADBC-00AA00A80033}
HKCR\CLSID\{7F1899DA-62A6-11D0-A2C6-00C04FD909DD}
HKCR\CLSID\{ADE6444B-C91F-4E37-92A4-5BB430A33340}
HKCR\CLSID\{B708457E-DB61-4C55-A92F-0D4B5E9B1224}
HKCR\CLSID\{D6FEDB1D-CF21-4BD9-AF3B-C5468E9C6684}

HKCR\CLSID\{F1E752C3-FD72-11D0-AEF6-00C04FB6DD2C}
HKCR\CLSID\{F7A4F1DA-96C3-4BCF-BEB3-1D9FFDE89EE9}

Here are all those MMC Node Manager CLSIDs.

HKEY_CLASSES_ROOT\NODEMGR.AppEventsDHTMLConnector
{ADE6444B-C91F-4E37-92A4-5BB430A33340}

HKEY_CLASSES_ROOT\NODEMGR.ComCacheCleanup
{F7A4F1DA-96C3-4BCF-BEB3-1D9FFDE89EE9}

HKEY_CLASSES_ROOT\NODEMGR.MMCDocConfig
{F1E752C3-FD72-11D0-AEF6-00C04FB6DD2C}

HKEY_CLASSES_ROOT\NODEMGR.MMCProtocol
{3C5F432A-EF40-4669-9974-9671D4FC2E12}

HKEY_CLASSES_ROOT\NODEMGR.MMCVersionInfo
{D6FEDB1D-CF21-4BD9-AF3B-C5468E9C6684}

HKEY_CLASSES_ROOT\NODEMGR.MMCViewExt
{B708457E-DB61-4C55-A92F-0D4B5E9B1224}

HKEY_CLASSES_ROOT\NODEMGR.NodeInitObject
{43136EB5-D36C-11CF-ADBC-00AA00A80033}

HKEY_CLASSES_ROOT\NODEMGR.ScopeTreeObject
{7F1899DA-62A6-11D0-A2C6-00C04FD909DD}

The Node Manager belongs to Cisco. These
CLSIDs help cache messages inside a system.

The three Cisco ports are located on ports
130 - 132; cisco-fna, cisco-tna and cisco-sys.

These CLSIDs have been bleached and tested on both
wireless and wired internet connections, both
separate systems. Node Manager is not required.

The Node Manager can be exploited by third parties
and can be used to bypass security. Safe to bleach.
There are rumors that MMC runs with a trojan rootkit.


Hacked RDNs FOUND [DO NOT BLEACH THESE]

FlashBroker
HKCR\CLSID\{0BE09CC1-42E0-11DD-AE16-0800200C9A66}

The two hacks are "Everyone" and "Anonymous Logon"

Right click, go to the permission set.

Remove both RDNs listed above!

Click "Apply" then click OK.

NEXT RDN HACKS

Follow the same procedure above. Do not bleach!

IFlashBroker2
HKCR\Interface\{DDF4CE26-4BDA-42BC-B0F0-0E75243AD285}

HKCR\TypeLib\{FAB3E735-69C7-453B-A446-B6823C6DF1C9}

Once fixed in HKCR, they are stable in HKLM.


BitBucket Hacker Hacks "Everyone" RDN

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\BitBucket  [SAFE TO BLEACH]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\NetworkCrawler  [SAFE TO BLEACH]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\RemoteComputer  [SAFE TO BLEACH]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
WindowsUpdate  [SAFE TO BLEACH]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
NetCache  [SAFE TO BLEACH]


"Power Users" and "CREATOR OWNER" RDNs Hacked

[DO NOT BLEACH!]

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc

Right click, go to the permission set.

Remove both RDNs listed above!

Click "Apply" then click OK.


FIVE RDNs TO DISABLE!

GO TO HKEY_CLASSES_ROOT, HKEY_CURRENT_USER,
HKEY_LOCAL_MACHINE, HKEY_USERS, AND HKEY_CURRENT_CONFIG.

MAKE SURE "Power Users", "CREATOR OWNER", "EVERYONE"
"Anonymous Logon" AND "RESTRICTED" ARE TAKEN OFF
OR DISABLED. LEAVE THE OTHER RDNs ALONE!


WSecEdit Security Manager is a malicious trojan
that presents security risks to the compromised
computer. Modifies security settings automatically.

WSecEdit Security Manager Class
HKCR\CLSID\{011BE22D-E453-11D1-945A-00C04FB984F9}

WSecEdit RSOP Security Settings Class
HKCR\CLSID\{1B6FC61A-648A-4493-A303-A1A22B543F01}


WSecEdit Security Configuration Class
HKCR\CLSID\{2AABFCD0-1797-11D2-ABA2-00C04FB6C6FA}

WSecEdit Local Security Settings Class
HKCR\CLSID\{2E8EA1E5-F406-46F5-AF10-661FD6539F28}

WSecEdit Security Configuration Class
HKCR\CLSID\{5ADF5BF6-E452-11D1-945A-00C04FB984F9}

WSecEdit Security Manager Class
HKCR\CLSID\{5C0786ED-1847-11D2-ABA2-00C04FB6C6FA}

WSecEdit Security Settings Class
HKCR\CLSID\{5C0786EE-1847-11D2-ABA2-00C04FB6C6FA}

WSecEdit Extension Class
HKCR\CLSID\{803E14A0-B4FB-11D0-A0D0-00A0C90F574B}

WSecEdit Local Security Settings Class
HKCR\CLSID\{CFF49D53-EE51-49F2-A807-7E3DF4EA36E3}

WSecEdit RSOP Security Settings Class
HKCR\CLSID\{FE883157-CEBD-4570-B7A2-E4FE06ABE626}

HKEY_CLASSES_ROOT\WPDSp.WPDServiceProvider
{77F7F122-20B0-4117-A2FB-059D1FC88256}

HKEY_CLASSES_ROOT\Wsecedit.Extension
{803E14A0-B4FB-11D0-A0D0-00A0C90F574B}

HKEY_CLASSES_ROOT\Wsecedit.LS
{CFF49D53-EE51-49F2-A807-7E3DF4EA36E3}

HKEY_CLASSES_ROOT\Wsecedit.LSAbout.1
{2E8EA1E5-F406-46F5-AF10-661FD6539F28}

HKEY_CLASSES_ROOT\Wsecedit.RSOP
{FE883157-CEBD-4570-B7A2-E4FE06ABE626}

HKEY_CLASSES_ROOT\Wsecedit.RSOPAbout.1
{1B6FC61A-648A-4493-A303-A1A22B543F01}

HKEY_CLASSES_ROOT\Wsecedit.SAV
{011BE22D-E453-11D1-945A-00C04FB984F9}

HKEY_CLASSES_ROOT\Wsecedit.SCE
{5ADF5BF6-E452-11D1-945A-00C04FB984F9}


WECAPI2 CLSIDs Updated

WECAPI2.FpStructureModification.1
HKCR\CLSID\{F6FD0A00-43F0-11D1-BE58-00A0C90A4335}

WECAPI2.FpStructureElement.1
HKCR\CLSID\{F6FD0A01-43F0-11D1-BE58-00A0C90A4335}

WECAPI2.FpFile.1
HKCR\CLSID\{F6FD0A0E-43F0-11D1-BE58-00A0C90A4335}

WECAPI2.FpMetaInfo.1
HKCR\CLSID\{F6FD0A0F-43F0-11D1-BE58-00A0C90A4335}

WECAPI2.FpFolder.1
HKCR\CLSID\{F6FD0A11-43F0-11D1-BE58-00A0C90A4335}

WECAPI2.WebExtenderClient.1
HKCR\CLSID\{F6FD0A13-43F0-11D1-BE58-00A0C90A4335}

HKEY_CLASSES_ROOT\WECAPI2.FpFile
{F6FD0A0E-43F0-11D1-BE58-00A0C90A4335}

HKEY_CLASSES_ROOT\WECAPI2.FpFolder
{F6FD0A11-43F0-11D1-BE58-00A0C90A4335}

HKEY_CLASSES_ROOT\WECAPI2.FpMetaInfo
{F6FD0A0F-43F0-11D1-BE58-00A0C90A4335}

HKEY_CLASSES_ROOT\WECAPI2.FpStructureElement
{F6FD0A01-43F0-11D1-BE58-00A0C90A4335}

HKEY_CLASSES_ROOT\WECAPI2.FpStructureModification
{F6FD0A00-43F0-11D1-BE58-00A0C90A4335}

HKEY_CLASSES_ROOT\WECAPI2.WebExtenderClient
{F6FD0A13-43F0-11D1-BE58-00A0C90A4335}


This vulnerability lets remote users execute arbitrary
scripts inside compromised systems. Windows Explorer
includes a preview pane (web view), which displays
information on some types of files when they become
selected. The preview pane is implemented via an HTML
resource file (in webvw.dll). Scripts can be injected
to execute malicious threats to the system, even
used to spy on remote users.

Microsoft claims WebView is safe. It is not safe.

WebViewCoord Class
HKEY_CLASSES_ROOT\CLSID\{7A707490-260A-11D1-83DF-00A0C90DC849}

WebViewCoord Class
HKEY_CLASSES_ROOT\CLSID\{BCFD624E-705A-11d2-A2AF-00C04FC30871}

HKEY_CLASSES_ROOT\WebViewCoord.WebViewCoord

HKLM\SOFTWARE\Classes\WebViewCoord.WebViewCoord

{7A707490-260A-11D1-83DF-00A0C90DC849}

HKEY_CLASSES_ROOT\WebViewFolderIcon.WebViewFolderIcon

HKLM\SOFTWARE\Classes\WebViewFolderIcon.WebViewFolderIcon


{e5df9d10-3b52-11d1-83e8-00a0c90dc849}


SharedTaskScheduler Spyware

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\
Explorer\SharedTaskScheduler

[Links {8C7461EF-2B13-11d2-BE35-3078302C2030}]

[Part of Component Categories conditional cache daemon.]

Component Categories conditional cache daemons

HKCR\CLSID\{8C7461EF-2B13-11d2-BE35-3078302C2030}
HKCR\CLSID\{DC651A43-0720-4a2b-9971-BD2EF1329A3D}
HKCR\CLSID\{E56829C9-2D59-11d2-BE38-3078302C2030}


!DO NOT BLEACH RANDOM SHELL EXTENSIONS!

*THESE ARE SAFE TO BLEACH* THESE KEEP
TRACK OF WHAT YOU DO ON YOUR SYSTEM.

*Fusion Cache*
{1D2680C9-0E2A-469d-B787-065558BC7D43}

*Microsoft History AutoComplete List*
{00BB2764-6A77-11D0-A535-00C04FD7D062}

*Microsoft Multiple AutoComplete List*
{00BB2765-6A77-11D0-A535-00C04FD7D062}

*WebCheckWebCrawler*
{08165EA0-E946-11CF-9C87-00AA005127ED}

ONLY THOSE FOUR LISTED ABOVE ARE SAFE TO BLEACH!

OTHERS CAN BE FOUND HERE:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Shell Extensions\Approved

DON'T SCREW AROUND! SHELLS ARE SENSITIVE.


Windows NT Abusive Vulnerabilities

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Network\World Full Access Shared Parameters

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\
CurrentVersion\Network\Location Awareness

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\
CurrentVersion\Time Zones

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\
CurrentVersion\WOW\WowFax

SQLDMO can be used by remote Windows NT users.
Unlike general SQL; SQLDMO is safe to bleach.
I suggest not bleaching SQLDMO UNLESS you
have no use for it or it's causing a problem,
for instance a hacker cracking into it.

SQLDMO IS safe to bleach, but remember,
never start bleaching random SQL CLSIDs or
you could end up with system damage.

My SQLDMO has been hacked before, I had to
bleach it. Not that big a deal, just takes
an hour to bleach it all.

HKCR\Interface\{10021506-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10021516-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10021603-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10021606-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10021E06-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10023306-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10023316-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10023403-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10023406-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10031206-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10041003-E260-11CF-AE68-00AA004A34D5}
HKCR\Interface\{10041006-E260-11CF-AE68-00AA004A34D5}

HKEY_CLASSES_ROOT\SQLDMO.Alert
HKEY_CLASSES_ROOT\SQLDMO.Alert.8.0
HKEY_CLASSES_ROOT\SQLDMO.Application
HKEY_CLASSES_ROOT\SQLDMO.Application.8.0
HKEY_CLASSES_ROOT\SQLDMO.Backup
HKEY_CLASSES_ROOT\SQLDMO.Backup.8.0
HKEY_CLASSES_ROOT\SQLDMO.Backup2
HKEY_CLASSES_ROOT\SQLDMO.Backup2.8.0
HKEY_CLASSES_ROOT\SQLDMO.BackupDevice
HKEY_CLASSES_ROOT\SQLDMO.BackupDevice.8.0
HKEY_CLASSES_ROOT\SQLDMO.BulkCopy
HKEY_CLASSES_ROOT\SQLDMO.BulkCopy.8.0
HKEY_CLASSES_ROOT\SQLDMO.BulkCopy2
HKEY_CLASSES_ROOT\SQLDMO.BulkCopy2.8.0
HKEY_CLASSES_ROOT\SQLDMO.Category
HKEY_CLASSES_ROOT\SQLDMO.Check
HKEY_CLASSES_ROOT\SQLDMO.Column
HKEY_CLASSES_ROOT\SQLDMO.Column2
HKEY_CLASSES_ROOT\SQLDMO.DatabaseRole
HKEY_CLASSES_ROOT\SQLDMO.DatabaseRole2
HKEY_CLASSES_ROOT\SQLDMO.DBFile
HKEY_CLASSES_ROOT\SQLDMO.Default
HKEY_CLASSES_ROOT\SQLDMO.Default2
HKEY_CLASSES_ROOT\SQLDMO.DistributionArticle
HKEY_CLASSES_ROOT\SQLDMO.DistributionArticle.8.0
HKEY_CLASSES_ROOT\SQLDMO.DistributionArticle2
HKEY_CLASSES_ROOT\SQLDMO.DistributionArticle2.8.0
HKEY_CLASSES_ROOT\SQLDMO.DistributionPublisher
HKEY_CLASSES_ROOT\SQLDMO.DistributionPublisher.8.0
HKEY_CLASSES_ROOT\SQLDMO.DistributionPublisher2
HKEY_CLASSES_ROOT\SQLDMO.DistributionPublisher2.8.0
HKEY_CLASSES_ROOT\SQLDMO.DistributionSubscription
HKEY_CLASSES_ROOT\SQLDMO.DistributionSubscription2
HKEY_CLASSES_ROOT\SQLDMO.FileGroup
HKEY_CLASSES_ROOT\SQLDMO.FileGroup2
HKEY_CLASSES_ROOT\SQLDMO.FullTextCatalog
HKEY_CLASSES_ROOT\SQLDMO.FullTextCatalog2
HKEY_CLASSES_ROOT\SQLDMO.Group
HKEY_CLASSES_ROOT\SQLDMO.Index
HKEY_CLASSES_ROOT\SQLDMO.Index.8.0
HKEY_CLASSES_ROOT\SQLDMO.Index2
HKEY_CLASSES_ROOT\SQLDMO.Index2.8.0
HKEY_CLASSES_ROOT\SQLDMO.Job
HKEY_CLASSES_ROOT\SQLDMO.Job.8.0
HKEY_CLASSES_ROOT\SQLDMO.JobSchedule
HKEY_CLASSES_ROOT\SQLDMO.JobSchedule.8.0
HKEY_CLASSES_ROOT\SQLDMO.JobStep
HKEY_CLASSES_ROOT\SQLDMO.JobStep.8.0
HKEY_CLASSES_ROOT\SQLDMO.LinkedServer
HKEY_CLASSES_ROOT\SQLDMO.LinkedServer.8.0
HKEY_CLASSES_ROOT\SQLDMO.LinkedServer2
HKEY_CLASSES_ROOT\SQLDMO.LinkedServer2.8.0
HKEY_CLASSES_ROOT\SQLDMO.LinkedServerLogin

HKEY_CLASSES_ROOT\SQLDMO.LinkedServerLogin.8.0
HKEY_CLASSES_ROOT\SQLDMO.LogFile
HKEY_CLASSES_ROOT\SQLDMO.LogFile2
HKEY_CLASSES_ROOT\SQLDMO.Login
HKEY_CLASSES_ROOT\SQLDMO.Login2
HKEY_CLASSES_ROOT\SQLDMO.Operator
HKEY_CLASSES_ROOT\SQLDMO.Operator.8.0
HKEY_CLASSES_ROOT\SQLDMO.RegisteredServer
HKEY_CLASSES_ROOT\SQLDMO.RegisteredSubscriber
HKEY_CLASSES_ROOT\SQLDMO.RemoteServer
HKEY_CLASSES_ROOT\SQLDMO.RemoteServer.8.0
HKEY_CLASSES_ROOT\SQLDMO.Replication
HKEY_CLASSES_ROOT\SQLDMO.Replication2
HKEY_CLASSES_ROOT\SQLDMO.ReplicationSecurity
HKEY_CLASSES_ROOT\SQLDMO.ReplicationSecurity.8.0
HKEY_CLASSES_ROOT\SQLDMO.Restore
HKEY_CLASSES_ROOT\SQLDMO.Restore2
HKEY_CLASSES_ROOT\SQLDMO.Rule
HKEY_CLASSES_ROOT\SQLDMO.Rule2
HKEY_CLASSES_ROOT\SQLDMO.ServerRole
HKEY_CLASSES_ROOT\SQLDMO.ServerRole.8.0
HKEY_CLASSES_ROOT\SQLDMO.TargetServer
HKEY_CLASSES_ROOT\SQLDMO.TargetServer.8.0
HKEY_CLASSES_ROOT\SQLDMO.TargetServerGroup
HKEY_CLASSES_ROOT\SQLDMO.TargetServerGroup.8.0
HKEY_CLASSES_ROOT\SQLDMO.Transfer
HKEY_CLASSES_ROOT\SQLDMO.Transfer.8.0
HKEY_CLASSES_ROOT\SQLDMO.Transfer2
HKEY_CLASSES_ROOT\SQLDMO.Transfer2.8.0
HKEY_CLASSES_ROOT\SQLDMO.TransPublication
HKEY_CLASSES_ROOT\SQLDMO.TransPublication.8.0
HKEY_CLASSES_ROOT\SQLDMO.TransPublication2
HKEY_CLASSES_ROOT\SQLDMO.TransPublication2.8.0
HKEY_CLASSES_ROOT\SQLDMO.Trigger
HKEY_CLASSES_ROOT\SQLDMO.Trigger2
HKEY_CLASSES_ROOT\SQLDMO.User
HKEY_CLASSES_ROOT\SQLDMO.User.8.0
HKEY_CLASSES_ROOT\SQLDMO.User2
HKEY_CLASSES_ROOT\SQLDMO.User2.8.0
HKEY_CLASSES_ROOT\SQLDMO.View
HKEY_CLASSES_ROOT\SQLDMO.View2


More junk. Safe to bleach.

Microsoft.Update.WebProxy
HKCR\CLSID\{650503CF-9108-4DDC-A2CE-6C2341E1C582}

System.AccessViolationException
HKCR\CLSID\{4C3EBFD5-FC72-33DC-BC37-9953EB25B8D7}

HKEY_CLASSES_ROOT\System.AccessViolationException
{4C3EBFD5-FC72-33DC-BC37-9953EB25B8D7}

HKEY_CLASSES_ROOT\Sdtclb4ui.CLBDTDispenser
{B890AF56-AC8C-11D1-8CB7-00C04FC3261D}

HKEY_CLASSES_ROOT\OISCTRL.OISClientLauncher
{E543A17A-F212-49C0-B63D-BF09B460250E}


These CLSIDs are linked with Trojan-Spy.KeyLogger,
which captures all user keystrokes, and is designed
with rootkit-specific techniques to crack into remote
systems, stealing valuable information such as passwords,
and login information. Other Trojan-Spy.KeyLogger.sd5
CLSIDs can be found on Shit List 4.

EngUKWrdBrk Class
HKCR\CLSID\{363F1015-FD5F-4ba8-AC58-29634F378A42}

EngUSWrdBrk Class
HKCR\CLSID\{80A3E9B0-A246-11D3-BB8C-0090272FA362}

FrnFrnWrdBrk Class
HKCR\CLSID\{F14E6B48-FBCA-4d32-BD79-7829D4F7E43B}

HKEY_CLASSES_ROOT\EngUKWrdBrk.EngUKWrdBrk
{363F1015-FD5F-4ba8-AC58-29634F378A42}

HKEY_CLASSES_ROOT\EngUSWrdBrk.EngUSWrdBrk
{80A3E9B0-A246-11D3-BB8C-0090272FA362}

HKEY_CLASSES_ROOT\FrnFrnWrdBrk.FrnFrnWrdBrk

HKLM\SOFTWARE\Classes\FrnFrnWrdBrk.FrnFrnWrdBrk

Watson subscriber for SENS Network Events
HKCR\AppID\{58FC39EB-9DBD-4EA7-B7B4-9404CC6ACFAB}

Interactive User
HKCR\AppID\{995C996E-D918-4a8c-A302-45719A6F4EA7}

HKCR\AppID\{D5978620-5B9F-11D1-8DD2-00AA004ABD5E}
HKCR\AppID\{D5978630-5B9F-11D1-8DD2-00AA004ABD5E}
HKCR\AppID\{D5978640-5B9F-11D1-8DD2-00AA004ABD5E}
HKCR\AppID\{D5978650-5B9F-11D1-8DD2-00AA004ABD5E}

___________________________________________________
ON HKCR\AppID\{9BA05972-F6A8-11CF-A442-00A0C90A8F39} ...

ONLY delete the RunAs string value "Interactive User"

Leave the rest of the CLSID alone.

Same thing goes for

HKCR\AppID\{A55803CC-4D53-404c-8557-FD63DBA95D24}

ONLY delete the RunAs string value "Interactive User"
___________________________________________________
Interactive User
HKCR\AppID\{FFB8655F-81B9-4fce-B89C-9A6BA76D13E7}

HKEY_CLASSES_ROOT\SENDCMSG.SendConsoleMessageApp.1
{B1AFF7D0-0C49-11D1-BB12-00C04FC9A3A3}

HKEY_CLASSES_ROOT\SENS Logon Events
{D5978630-5B9F-11D1-8DD2-00AA004ABD5E}

HKEY_CLASSES_ROOT\SENS Logon2 Events
{D5978650-5B9F-11D1-8DD2-00AA004ABD5E}

HKEY_CLASSES_ROOT\SENS Network Events
{D5978620-5B9F-11D1-8DD2-00AA004ABD5E}

HKEY_CLASSES_ROOT\SENS OnNow Events
{D5978640-5B9F-11D1-8DD2-00AA004ABD5E}

ONLY BLEACH THE LISTED CLSIDs!


The Parallel Problems Server (PPServer) provides
interactive clients with access to powerful
functionality and users of parallel machines
access to interactive environments where they
can manipulate and visualize large data sets.
The PPServer communicates with clients using
a simple request-response protocol. A client
requests that an action be performed by
issuing a command with the appropriate
arguments, the server executes that command,
and then notifies the client that the
action is complete.

With the PPServer, MIT have been able to
build applications for information retrieval,
machine learning, and scientific computing.

PPServer Trojan-Dropper.Agent Updated

HKEY_CLASSES_ROOT\ppDSApp.ppDSApp
{2AFA62E2-5548-11D1-A6E1-006097C4E476}

HKEY_CLASSES_ROOT\ppDSClip.ppDSClip
{31C48C31-70B0-11d1-A708-006097C4E476}

HKEY_CLASSES_ROOT\ppDSDetl.ppDSDetl
{31C48C32-70B0-11d1-A708-006097C4E476}

HKEY_CLASSES_ROOT\ppDSFile.ppDSFile
{1D1237A0-6CD6-11d2-96BA-00104B242E64}

HKEY_CLASSES_ROOT\ppDShowNet.ppDShowNet
{5C85DCB0-F967-11D0-81ED-00C04FC99D4C}

HKEY_CLASSES_ROOT\ppDShowPlay.ppDShowPlay
{C0CD59AE-020D-11d1-81F2-00C04FC99D4C}

HKEY_CLASSES_ROOT\ppDSMeta.ppDSMeta
{BB314F91-A010-11d1-A75A-006097C4E476}

HKEY_CLASSES_ROOT\ppDSOAdv.ppDSOAdv
{AE1A5813-5230-11D1-A6E0-006097C4E476}

HKEY_CLASSES_ROOT\ppDSPropAdv.ppDSPropAdv
{8C4EB103-516F-11D1-A6DF-006097C4E476}

HKEY_CLASSES_ROOT\ppDSView.ppDSView
{AE1A5812-5230-11D1-A6E0-006097C4E476}

HKEY_CLASSES_ROOT\PPServer.PPServerClass
{23D1AE30-8023-11D3-8D47-00C04F949D33}

Network Provisioning Service allows automatic
provisioning of information about networks
on a client machine. Information is downloaded
from network providers as XML configuration
files. These files are validated against
locally stored XML schemas. The Network
Provisioning Service can be used to keep
the information up-to-date by downloading
new content from the network provider on
a pre-determined schedule.

Network Provisioning Service Class
HKCR\CLSID\{116391ee-e1e5-444e-9424-d53b641d3cea}

Network Provisioning via XML Class
HKCR\CLSID\{2aa2b5fe-b846-4d07-810c-b21ee45320e3}

Network Provisioning Service
HKCR\AppID\{39ce474e-59c1-4b84-9be2-2600c335b5c6}

Network Provisioning Service Client API Class
HKCR\CLSID\{61d55f63-98f7-473c-97c7-a08e2f13c955}


Remote Desktop Updates

Otherwise known as MsTscAx, RPD and IMsRpd

HKCR\CLSID\{6AE29350-321B-42be-BBE5-12FB5270C0DE}
HKCR\CLSID\{7390f3d8-0439-4c05-91e3-cf5cb290c3d0}
HKCR\CLSID\{7584c670-2274-4efb-b00b-d6aaba6d3850}
HKCR\CLSID\{7cacbd7b-0d99-468f-ac33-22e495c0afe5}
HKCR\CLSID\{9059f30f-4eb1-4bd2-9fdc-36f43a218f4a}
HKCR\CLSID\{ace575fd-1fcf-4074-9401-ebab990fa9de}
HKCR\CLSID\{d2ea46a7-c2bf-426b-af24-e19c44456399}

IMsRdpClient3
HKCR\Interface\{91B7CBC5-A72E-4FA0-9300-D647D7E897FF}

IMsRdpClient
HKCR\Interface\{92B4A539-7115-4B7C-A5A9-E5D9EFC2780A}

IMsRdpClientAdvancedSettings2
HKCR\Interface\{9AC42117-2B76-4320-AA44-0E616AB8437B}

IMsRdpClientShell
HKCR\Interface\{D012AE6D-C19A-4BFE-B367-201F8911F134}

IMsRdpClient6
HKCR\Interface\{D43B7D80-8517-4B6D-9EAC-96AD6800D7F2}

IMsRdpClient2
HKCR\Interface\{E7E17DC4-3B71-4BA7-A8E6-281FFADCA28F}

IMsRdpClientAdvancedSettings5
HKCR\Interface\{FBA7F64E-6783-4405-DA45-FA4A763DABD0}

IMsRdpClientAdvancedSettings4
HKCR\Interface\{FBA7F64E-7345-4405-AE50-FA4A763DC0DE}

Microsoft RDP Client Control Updates
HKCR\CLSID\{3523c2fb-4031-44e4-9a3b-f1e94986ee7f}
HKCR\CLSID\{4eb2f086-c818-447e-b32c-c51ce2b30d31}
HKCR\CLSID\{ace575fd-1fcf-4074-9401-ebab990fa9de}


HKCR\SoftwareDistribution.MicrosoftUpdate
{6e32070a-766d-4ee6-879c-dc1fa91d2fc3}

HKCR\SoftwareDistribution.MUClientUIPlugin
{3809920F-B9D4-42DA-92E0-E26265E0FB89}

HKCR\SoftwareDistribution.WebControl
{6414512B-B978-451D-A0D8-FCFDF33E833C}

HKCR\SoftwareDistribution.WUClientUIPlugin
{AE097EE9-9AB5-4999-95F7-200F862661F9}


Steelhead Router Configuration Notify Object
HKCR\CLSID\{6E65CBC5-926D-11D0-8E27-00C04FC99DCF}


HxDs.Hx Trojan

HKCR\Software\Microsoft\HTMLHelp\2.0\LocalReg\CLSID

HKCR\Software\Microsoft\HTMLHelp\2.0\LocalReg\HxDs.HxFilters
{314111e2-a502-11d2-bbca-00c04f8ec294}

HKCR\Software\Microsoft\HTMLHelp\2.0\LocalReg\Hxds.HxPlugIn
{314111db-a502-11d2-bbca-00c04f8ec294}

HKCR\Software\Microsoft\HTMLHelp\2.0\LocalReg\HxDs.HxRegister
{314111bd-a502-11d2-bbca-00c04f8ec294}


Queued Component Default Spyware

QC Marshal Interceptor Class
HKCR\CLSID\{ecabafcb-7f19-11d2-978e-0000f8757e2a}

QC Listener Class
HKCR\CLSID\{ecabafc3-7f19-11d2-978e-0000f8757e2a}

Queued Components Player (QC.ListenerHelper)
HKCR\CLSID\{ecabafc4-7f19-11d2-978e-0000f8757e2a}

QC.MessageMover
HKCR\CLSID\{ecabb0bf-7f19-11d2-978e-0000f8757e2a}


Queued Components Recorder (QC.Recorder)
HKCR\CLSID\{ecabafc2-7f19-11d2-978e-0000f8757e2a}

HKEY_CLASSES_ROOT\QC.DLQListener
{ecabafca-7f19-11d2-978e-0000f8757e2a}

HKEY_CLASSES_ROOT\QC.Listener
{ecabafc3-7f19-11d2-978e-0000f8757e2a}

HKEY_CLASSES_ROOT\QC.ListenerHelper
{ecabafc4-7f19-11d2-978e-0000f8757e2a}

HKEY_CLASSES_ROOT\QC.MessageMover
{ecabb0bf-7f19-11d2-978e-0000f8757e2a}

HKEY_CLASSES_ROOT\QC.Recorder
{ecabafc2-7f19-11d2-978e-0000f8757e2a}


HKEY_CLASSES_ROOT\PeerDraw.PeerDraw
{10072CEC-8CC1-11D1-986E-00A0C955B42E}

HKEY_CLASSES_ROOT\PeerFactory.PeerFactory
{3050F4CF-98B5-11CF-BB82-00AA00BDCE0B}


For all those working on a personal
computer, without emailing or sharing,
who wish to fortify system security,
this is for you ;

HKCR\CLSID\{9E56BE60-C50F-11CF-9A2C-00A0C90A90CE}

HKCR\CLSID\{9E56BE61-C50F-11CF-9A2C-00A0C90A90CE}

(These run C:\WINDOWS\system32\sendmail.dll)


Ref: http://cryptome.org/0002/clsid-list-07.htm

November 19, 2010 in Current Affairs | Permalink