Talk:Beast (Trojan horse)/Archive 1

Keep it, it describes how to remove the file.
While it is a little scary, I think keeping this is important because it tells users how to remove the file from Windows XP. It isn't "giving the gun to the killer," it is describing the gun so that people actually know what a gun looks like and what part of it does what. It would be a bit naive to think that the people executing such files would have to check with wikipedia first to figure out what the file did...it's more the people who don't regularly play with this stuff that would come here. Probably, today's AV programs are better than they used to be...so most of this stuff that is basic on this site, would get caught.

Radioactivemutant Comment
Is it just just me or are we giving the gun to the killer with this page? I mean, this article is probably tell many people about this Trojan and where to get it.Radioactivemutant (talk) 23:29, 23 March 2010 (UTC)

Yea. I think this is a bit stupid. 74.69.233.198 (talk) 00:08, 29 August 2010 (UTC)

Lacking Sources
This article has absolutely no sources to back up the information provided in this article. Considering the long list of features and information of ways it can exploit a system, the article could just be an elaborate bluff or filled with first hand information. Also, in earlier revisions the name of the creator was linked, possibly meaning that either someone just came here and lied about everything (more probable) or the creator of the trojan (if it even exists) came and made glory edits (less probable, but easy to picture happening). I say that until we can find solid sources of information, this article shouldn't be edited. DZGuymed (talk) 23:58, 20 October 2010 (UTC)


 * There's a source here (now) that does seem to suggest it's real (although it doesn't back up the rather elaborate list of things Beast can supposedly do). This refers to Beast in passing.


 * There's also the case of a teenager prosecuted for using Beast. See also the New York Times article.  Litigation details can be seen here.  According to Wired he was given a prison sentence followed by community service.  Seems like it didn't deter him as he was back in the headlines again in 2009 for Stock Exchange hacking.  Given Wired says he was the first person charged by the Securities and Exchange Commission for a fraud using both identity theft and hacking (the 2003 Beast conviction) and the charges laid against him again in 2009 I wonder if he might merit his own stub.  Or maybe that would just encourage him.  Ka Faraq Gatri (talk) 10:14, 27 November 2010 (UTC)
 * Looks like he pled guilty to the original charge. This also looks relevant.
 * There's also a reference in what looks like a peer review journal of Beast as an "infamous Trojan horse" . Ka Faraq Gatri (talk) 10:42, 27 November 2010 (UTC)


 * This wasn't a hoax. I wrote this article almost 6 years back when i was in my teens after having used beast since one of its earliest iterations. And i only decided to write it long after it had been discontinued and turned into a "legitimate" spying application "spytector". Beast back in the days was a very impressive trojan, its set of functionalities as evident was very comprehensive. One of the reasons for writing this article was that i thought the author Tataye really did deserve recognition for this impressive piece of code. ParadoX (talk) 17:44, 23 January 2012 (UTC)

Move discussion in progress
There is a move discussion in progress which affects this page. Please participate at Talk:AIDS (trojan horse) - Requested move and not in this talk page section. Thank you. —RM bot 12:40, 14 June 2012 (UTC)

Need more information
This article need more information. Also official resources for proof. — Preceding unsigned comment added by 174.66.196.57 (talk) 18:58, 13 January 2013 (UTC)

Removed the website URL
As much as I believe this article should be detailed, it should not contain the exact website you can go to to download it. I removed the link for now. Anarchyte (talk) 01:23, 21 April 2015 (UTC)

Beast 2.07
This is a trojan that has been known since I was born. What a biggy, it's able to hack and take people's identity and to take full control over a computer. Shocker. — Preceding unsigned comment added by 24.9.192.252 (talk) 16:26, 20 December 2015 (UTC)