Jump to content

Scoop

Honorary Members
  • Posts

    111
  • Joined

  • Last visited

Posts posted by Scoop

  1. Rosalie Li

     

    I don't have the scan logs from 06/10 U.S. CDT time, sorry.  I purge those logs daily but I did look at my "Flash" Scan MBAM log when the detections were quarantine'd.  It basically contained the location of the files.

     

    The interesting thing about this for me is that MBAM didn't detect the objects a few hours earlier during the unattended "Quick" Scan at 1:30am. 

     

    I have a Windows Task that wakes my PC from Standby ("Sleep") Mode at 1:25am, just before my nightly MBAM (and AV) scans begin.  When the scans complete, my AV returns the PC to Standby Mode.

     

    I wake up my PC around 4:30am daily to begin interactive activates (IE surfing, etc).

     

    The "Flash" Scan detected the objects at about 5:11am, after the PC had been awake and in use for about 45 minutes.

     

    I usually begin my morning PC use (surfing with IE, etc) at 4:30am.  That seems to indicate that I picked up the objects between 1:30am and the time when the Flash Scan completed at 05:11am.

     

    During the time between 4:30am and 5:11am, I was visiting my usual daily 'net sites (reputable, etc) and didn't download any updates, apps, plug-in's, etc.  No e-mail attachments were opened.

     

    That's why I mentioned a possible drive-by, adware bundle, exploit path, etc.  It's just a guess since I hadn't clicked on any download/install items during that 45-minute time frame while browsing.

     

    I guess it's possible that the PC picked up the objects sometime when the MBAM and AV scans were running (the scans run sequentially, not at the same time) unattended since my 'net connection is enabled 24/7 .

     

    Thanks for your interest in the object detection relative to MBAM products and members here regarding the issue. 

  2. I have a question about the CompuClever detection.

     

    I detected this issue this morning on both of my home PC's.  I wasn't sure if this was something that has occurred with numerous MBAM users or an isolated incident with my PC's.

     

    Here's my info:

     

    Timezone: U.S. CDT (Dallas)

     

    Desktop PC: Built - Win 7x64 Home Premium OEM version

    Laptop: Toshiba L655 Win 7x64 Home Premium OEM version

     

    AV: Norton N360 Ver 21.7.0.11  (2014 ver)

    MBAM Pro 1.175.0.1300

     

    Current Database info:

    Date: 6/10/2015 4.50.25AM

    Database version: v2015.06.10.02

    Fingerprints loaded: 436239

     

    I run overnight unattended Quick Scans on both PC's at 01:30am.  Nothing was detected at that time in the logs.

     

    During an hourly Flash Scan/update at about 05:11am, the scan detected the following PUP's:

     

     

    30rp95e.jpg

     

     

    They're quarantine'd.  I left them there for now.

     

    The empty folder "CompuClever" is still located at %userprofile%\AppData\Roaming .

     

    Are these false-positives or just typical PUP detections?

     

    I had a question about this particular PUP detection due to the Registry Cleaning part of the discussion.

     

    I'm not sure when I picked up this PUP.  I don't run any Registry Cleaners (never have on either PC). 

     

    Since I haven't downloaded/updated any programs/apps, etc during the last 24 hrs, I'm not sure where I picked up this PUP.  Perhaps it was one of those drive-by things that get picked up during routine surfing.

     

    Should I treat this as a typical PUP detection (leave in in quarantine for a few days before removing) ?

  3. It appears that I was seeing the same symptoms as TheQuickFox .

     

    I was editing my post and refreshed in another tab to see that it's fixed.  That's amazing "fix" response time

     

    2416ux0.jpg

  4. needhelp1

     

    If you're running one of the Norton AV products, check out this thread over at the Norton Forum site:

     

    https://community.norton.com/en/forums/tonights-update-crashing-ie11

     

     

    Firefox and Chrome weren't affected.  I used Firefox for a couple of hours Sat morning (U.S. CT) until the issue was fixed.

     

    The problem began when Symantec issued a routine LiveUpdate definitions download, apparently sometime during the evening of Fri 02/20 U.S. time. 

     

    The update affected the main AV suites, N360, NIS, and NS, and affected most IE versions (if not all).  The symptoms appear similar to your description in your post here.

     

    For almost all users, the problem began to be fixed yesterday 02/21 ~6am U.S. CT when Symantec begin distributing a repair update.  That's when I download their update fix for the issue.

     

    There may be a few Norton customers that either haven't received (or downloaded) the repair update or perhaps the rollout hasn't yet reached their geographical locations.

  5. bru

     

    I'm still running Win 7 x64 and MBAM Ver 1.75 (Pro) and am using the Windows Task Scheduler to wake my PC up a couple of minutes before my daily overnight Quick Scan begins on my PC's.

     

    This method has been working very well since I installed MBAM Pro in Sept 2012.

     

    I haven't installed Ver 2.xx yet, waiting a while longer as I read the forum about its progress.  I'm hoping the Ver 2.xx scheduled scans will run without issues overnight after my PC's have been awakened by the Task Scheduler.

     

    Regarding your question about the "wake from sleep" option with the new Premium version, I believe that it was removed because of the numerous problems being reported by other MBAM users in the past relating to the different settings in the PC's "Power Plan/Management" setups.

     

    Since PC setup's are diverse regarding Power Option settings, "hibernate", "sleep", etc, I think that's the reason the "Wake" option was removed with the new Premium version.

     

     

    If you're interested in setting up a task in the Windows Task Scheduler to wake up the PC unattended prior to the Scheduled Scan start time, this may help.  I posted some screencaps over at the Norton Forum when another member asked about the topic.  The thread is here .  It's just one example on how to wake up the PC with Task Scheduler as there are other methods that will accomplish the same result.

     

     

    Your other question about the Ver 2 "Next Scheduled Scan" time issue is a known bug that will be fixed with a future release version.  I think this is accurate, someone here will correct if it's not accurate.

  6. I'm having one of my frequently visited sites being blocked.  Here's my info:

     

    - OS: Windows 7 x64

    - Browser: IE10

    - AV: Norton 360 (2013 ver)

    - MBAM Pro  1.75.0.1300

    - Site address: http://ctva.biz/

     

    When I un-check my "Enable malicious website blocking" protection in MBAM, I can access the site.

     

    I contacted a friend and he's able to access the site ok.  He's not an MBAM user and is running Firefox browser on Win  7x64 .  He's also running Norton AV.

     

    Screencap 1 is my MBAM Sys Tray popup notification.

     

    Screencap 2 is a Google search page capture info about the site.

     

     

    post-146232-0-35946800-1395529940_thumb.

    post-146232-0-03277800-1395530145_thumb.

  7. Now that this subject has been brought up, I am looking for a strong internet security program with a good firewall that will play nice with my MBAM Pro.

     

    I was using McAfee but don't have much faith in it anymore.

     

    I am trying Bitdefender now and so far it seems to be okay and working well with MBAM Pro but would love a little feedback as to what others have found to be good "strong" solutions that work well with MBAM Pro.

     

    Thanks

     

    Hi

     

    As Firefox mentioned, this topic is a very diverse one, where you'll often read opposite pov's about a recommendation for or against a mainline brand AV.

     

    Here's my 2¢ (or perhaps only 1¢ :lol:) take on this based on one's experience with 3 name-recognition AV's over the years.

     

    Before continuing, none of this should be construed as a "downer" about these AV products or the companies involved since we know that this topic is dependent on a host of other factors, what's the OS on the PC, what's the user's browser or "safe 'net" practice habits, etc.

     

    When I began home 'net use in 2004, I started out with Win '98 and "Trend Micro" AV.  I kept that when upgrading to XP a couple years later.

     

    My experience with Trend Micro was not too good.  I'd grade that one a "D" based on the # of malicious intrusions that it didn't block from my PC.

     

    When I bought a new PC with Win 7 x64, I bought "ESET" AV at the advice of the PC store's recommendation and after reading some info about the AV.

     

    My 1st year with Win 7 and ESET went smooth, no intrusions penetrated ESET's defenses.  During the 2nd year, I was affected by a few malicious intrusions that required cleanups or restorations.  Grade: "D".  I recall being disappointed since one of ESET's selling points was that it wasn't a resource hog. 

     

    Based on that, I read about some alternatives, and chose between MacAfee, BitDefender, or Norton.

     

    I chose Norton and have been running Norton 360 with MBAM pro for about 15 months on 2 Win 7x64 PC's with no issues seen as yet.  I was cautious about selecting Norton before asking some friends about it.  Norton also revamped their product a couple of years ago, resulting in a more streamlined scanner which uses less resources than its earlier-generation products.

     

    The deciding factor for me, to drop ESET and go with Norton was interesting.  I was at one of my daily 'net site visits, a reputable site, at the same time as a friend.  We were on the phone at the time.  He's been running Norton AV for years without experiencing any known malicious issues with his (win 7x64) PC.

     

    I was still running ESET at that time.  I got hit with one of those "FBI" variants of malicious infection while his PC was protected with Norton.

     

    - I installed MBAM Pro in Sept 2012 when I was still running ESET.

     

    One thing I've learned from personal 'net experience:  Safe 'net practices are always something that all should follow, as well as the usual things, don't open unknown e-mail attachments, keep your OS and plug-in updates current.

     

    Even doing all of that, there's no guarantee of complete protection with any AV product.  My advice is always "backups", including cloning and/or full-HDD imaging, in addition to some kind of daily backups for those frequently-edited/changed items.

     

    Every day, we read posts from members here, and at other forums (for me, the Norton Forum and "Bleepingcomputer.com") where the poster are dead in the water with their PC's, helpless to use the PC's due to malicious infections or in some cases, user errors which we all do, I know I do :D  .

     

    If they had backups available, they could save themselves considerable time and headache by recovering their PC's without spending time in the cleanup modes.

     

    This is coming from one that learned the hard way... me :D .  I had to reinstall Windows once years ago since I didn't have the expertise or full-HDD backups available.  I didn't lose the "must-have" items but after that I said "never again" and with the help of a friend and learning myself, I got up to speed with this HDD-backup scene.

     

    It's paid off twice in the last 2-3 years, pop in that spare HDD and running the PC within minutes, no seeking online cleanup help, no Win reinstalls, etc.

     

    Don't want anyone to misinterpret my opinions here; the online expert help here and over at BleepingComputer's Forum is golden for many many PC'ers seeking help. 

     

    The alternate method interests me, learning about HDD backups and cleaning infected HDD's, etc, so that's just another angle of looking at the methods of recovering one's PC from malicious incidences.

  8. Hi anecaj3   23shh55.jpg to the forum.

     

    I've read about "scorpion" at other forums and it is indeed a stubborn headache to remove and deal with on one's PC.

     

    I wish you the best in your cleanup and legal endeavors.  I'd say that this is a safe statement to make on behalf of everyone here:  If we could, we'd prosecute any and all malicious authors and their associates.

     

    My personal fantasy about this is to magically create a "boomerang" tool that would route all malicious code back to its original authors and "brick" their systems :lol:  I know, impossible, but wouldn't it be great if that could happen?

     

    As one that's been hit by a couple of malicious infections in past years that required cleanup actions, I'll give my 2¢ advice about this topic.

     

    The best way to accomplish 3 things, one of which would have helped your situation,

     

    - Fast recovery from virtually every malicious infection

    - Protection from HDD failure

    - Protection from user mistakes, ie, downloading something in error, Registry edit, or wanting to restore a HDD state to a previous status

     

     

    , is to begin and maintain a backup plan, which includes a full-HDD backup, including a daily or multi-daily specific backup which will copy the "must-have" items that we all have on our PC's, those items that are frequently edited or changed daily.

     

    By having and periodically maintaining a full-HDD backup, either by cloning or imaging, one can restore the entire HDD with a bootable spare HDD that includes all of their data and installed programs.

     

    With the daily backup plan, you can then restore those must-have items quickly to the installed spare HDD.

     

     

    Believe me, I'm no expert about this scene :) but I have recovered my PC twice in the past 3 years by installing my cloned HDD.  Just my opinion about it, but I prefer this method to cleaning up the infected PC as, for me, it was faster than the alternative which requires downloading specific malicious-cleanup tools and seeking online advice from experts. 

     

    The most important advice I'd offer, if you choose to pursue a backup plan similar to an idea that's offered here, is to test and verify your full-HDD recovery methodologies.

     

    When I clone periodically, I test the cloned HDD by booting up on the newly-cloned HDD, and giving it a fast "workout", launch the usual items, 'net browser, e-mail client, a few apps or programs, open some Office items (Word, Excel files).

     

    I also test some of my full-HDD images with my "Rescue" CD's, boot up to RAM outside of Windows, and restore the image to a spare HDD and then boot up on it and do a similar test as with a cloned HDD.

  9. How often does the average computer security expert recommend the above scan, if a person has the above product?  Too often is a pain in the neck, and too infrequent seems like it would be too unsafe.  Please advise.  Yes, I googled it, and couldn't find an answer there. 

     

    Hi,

     

    I asked this question shortly after I joined this forum and received from good advice.  I used to run overnight full scans but have changed that to quick scans. I still run a weekly full scan but from what I've read here, that's not necessary.  I guess it's one of those left-over "feel-good" things that I still do for now :) .

     

    As Firefox mentioned, I prefer to run the scans at a time when I'm not using my PC so they run unattended overnight so they will run when my PC is idle. 

     

    I also have my updates scheduled once an hour as Firefox mentioned.

  10. Be prepared for anti-virus vendors to tell you that their programs are incompatible with MBAM. Bitdefender in their forum and their support tells you to not use MBAM Pro. I pressed them for details and their response finally was "a beta tester reported slowness". Anyway, a few of us on their forum run Bitdefender and MBAM Pro with no issues. Some have excluded processes from in both packages but I've never experienced an issue.

     

    As a Norton user, I can say that you're 100% right about the AV forums maintain that position, non-compatibility.

     

    I've asked for test data at the Norton forum as well as an Admin here, and the Norton forum mods/members have not provided any test data to substantiate their recommendation.  They're certain about it too over there.

  11. I am planning to buy the acronis, I wonder if the free 5gigs cloud they give will be enough for my before software image and after. I'm more concerned with size of clone/backup after I've installed my programs as it seems, reinstalling them and gettings the keys again is always the main headache. Scoop, can I make a backup with Acronis on to DVDs? or an External Harddrive? Any feedback on this?

     

    I haven't tried my Acronis 2011 with DVD's as the target device but I do use a 4 Tb external HDD to store images from Acronis and have verified the full-HDD backup/restore process to my "C" HDD.

     

    I read some info about Acronis 2014 and it says that it's capable of backing up to DVD's.

     

    If you're planning on using a paid backup tool, in my opinion you'll like using Acronis.

     

    I'm reading the reviews on different "cloning" software all of them have some bad reviews. Doesn't make choosing easier. Thanks!

     

    Here's a handy link that offers some reviews for some cloning/imaging freeware and provides the download links at the same site:

     

    Free Backup Software

     

    I've used 2 of these, ("Macrium Reflect" and "Clonezilla") and have verified the successful results with cloning and imaging.

     

    I wouldn't recommend Clonezilla for a cloning novice though. It's geared more for command-line processing but it does have a beginners setup dialog available. The setup dialog can be a little tricky if one is cloning with identical (ie, product brand/size) HDD's.  That's the reason I always pre-format my Target HDD before booting up or launching a cloning/imaging tool.  This way, when I'm setting up the Source and Target HDD's in the tool, it's easy to select them as my Target HDD will show no data present having been formatted prior to setting up the cloning process.

     

    I burned an ISO for "Redo Backup and Recovery" and tested the bootup but haven't used it yet.  I plan on doing that when I clone or image next time.  This tool doesn't require installing the software onto the PC as it's just the ISO download for creating the bootable media for the tool.

     

    Regarding the reviews, it's always a call one has to make when deciding on a tool such as these backup programs.  I recently read a post where they had problems creating the bootable media so they gave the tool a bad review. 

     

    When I was working with "Macrium" for the first time, I ran into some difficulty in creating the bootable media but got it to work ok after a couple of attempts.

     

    I have discovered that the compressed imaging process varies with different tools and my images weren't compressed as much as I'd have expected, with the completed image being approx 2/3 the size of my HDD.  However, that may be due to my HDD being non-customized.  I have the automatic 2-partition Windows HDD, a "System Reserved" and the main partition.

     

    Regarding the size of a cloned HDD, it'll be the exact size of your Source HDD.  Cloning makes a bit to bit copy where imaging will make a file, usually compressed, of your entire HDD if you select the full-disk mode when setting up the imaging process.

     

    Each approach has it's advantages.  I like cloning since I can basically plug-and-play a complete replacement HDD in the event of problems, infections, HDD failures, user errors.  The requirement is that you need a spare HDD to clone.

     

    Full-disk Imaging will accomplish the same results but the image will need to be recovered using the same software tool that was used to create the image and it generally takes longer to perform an image recovery vs installing a cloned spare HDD, or it does for me with my setup since I have Sata hot-swap racks installed in my Desktop PC case so I can remove my Source HDD and install a cloned HDD fast.

     

    The advantage of imaging is that you can store multiple snapshots of your HDD on an external HDD so you can go back in time to a specific date if required, ie, downloaded a Windows update that caused problems, or had encountered an issue with your PC and you needed to eliminate the entire HDD as the source of the problem.

     

    I use both methods for backing up my Source HDD.

     

    For Laptops, you'd need an "Enclosure" to clone.  I have a Sata/USB (2.0) Enclosure that I've been using for a couple of years for cloning my Laptop.

     

    One example 2.5 Enclosure from Amazon

     

    The general rule for cloning Laptop's is to install the Target HDD in the Laptop and the Source HDD in the Enclosure but I've done it in reverse and have not had issues with that approach.

  12. ↑  defit.jpg, believe me, I'm an amateur compared to the experts here.

     

    Regarding cloning & imaging, It's more an issue of me being lazy :), since I don't like to re-install the OS and spend time reloading programs, retrieving keys, customizing the OS, etc.

     

    Regarding your Rescue disk, that's probably a good idea, testing it, but I was referring to Rescue media that can be created with the freeware cloning/imaging tools.

     

    I recently read a post elsewhere where someone's HDD failed and he tried to boot his system with his Macrium Rescue CD but it wouldn't boot up.  He had created the CD a year earlier but hadn't tested the boot and image-recovery process with a spare HDD.

     

    I'm not familiar with factory rescue media having not yet used those but I should have done that with my Laptop when I bought it a couple of years ago.  However, I clone it every once in a while so it's backed up in case of HDD issues.

     

    Here's a couple more freeware's that I'd recommend for a new PC:

     

    Speccy    

     

    This is a great PC tool that reports many parameters, OS info, MoBo, system Temp readings, voltages, HDD status, etc.  I've had this loaded onto my Desktop and Laptop PC for a couple of years.

     

    Process Explorer

     

    This is an enhanced "Task Manager" that is convenient for checking one's process information, your process or "system" processes, etc,  It's got a color code that I like which highlights services, your process, packed images, a lot of info in one free utility.

     

    Autoruns

     

    This is a great tool for checking your WIndows system and your own username programs that launch at startup.  I've used this one occasionally when something (a download, etc) has added an object into my startup that's not desired.

     

    Speedfan

     

    This is a handy utility which reports a lot of the same things that Speccy does but I like it since the opening dialog box provides a nice snapshot of your system temps, fan speeds and voltages.  It's also capable of e-mailing the user when a user-defined parameter is detected outside of a defined range, ie, a fan stops working in your PC case, etc.

     

    If I were in the early stages of setting up and customizing a new PC, I'd do these 2 things:

     

    - Create a clone or image shortly after initially installing the OS, before downloading your programs.

     

    - Create another clone or image after you have your PC set up and working in an everyday mode. 

     

    There are a few freeware backup tools that provide incremental and differential imaging but I haven't set up that process as I'm ok with retaining full-disk backups for my requirements.

     

    I also have "Acronis" 2011, a paid backup program that I've been using for a couple of years to run twice-daily automatic backups of specific items, like frequently-edited/modified items, such as an e-mail client data file, or excel files, etc.  That way, I have a near real-time backup for those must-have items so when I need to install my cloned HDD or perform a full-HDD image recovery, I can copy those items back onto the new HDD.

     

    Screencap of "Speedfan" info box at launch ↓

     

    post-146232-0-33741800-1386114303_thumb.

  13. How do I know if I have java "JRE" and how do I get rid of it? Note: I don't see anything that says Java in uninstall area. Thank you

     

    You probably don't have it installed since you don't see it in your "uninstall" list but here's a link that you can use to check if Java is not installed on your PC:

     

    http://www.java.com/en/       Click on the "Do I have Java" line on that page. If you don't see any Java information, version #, then you don't have it installed.

     

    I currently have 30 trial of Norton Internet Security, Norton Anti-Theft, and Malwarebytes free version with Pro trial. After they expire I was considering getting ESet security and spybot. Thank you

     

    Everyone's AV experience differs but I had ESET installed for about 2½ years with mixed results.  It didn't block all effects of malicious intrusions into my HDD.

     

    I've been using Norton 360 AV simultaneously with MBAM Pro for about a year with no issues or conflicts encountered.

     

    Regarding a new PC, one of 2 initial things that I'd recommend:

     

    - Download a freeware cloning/imaging tool and buy a spare HDD for your PC.

     

    I use "Macruim Reflect" and "Clonezilla".  I have a couple others downloaded to ISO files but haven't tested them yet.

     

    I imagine that Win 8 (or 8.1) has a built-in backup utility and that might suffice for your needs.

     

    - Create a full HDD image, or clone to your spare HDD and test it as a complete bootable spare recovery item in the event of a Source HDD failure, user error, or malware/virus infection.

     

    I like to test any "Rescue" media, bootable CD or Flash Stick, so as to test and recover an image in a "worse-case" scenario, where your original HDD can't boot into Windows.

     

    In that way I know that my spare shelf items, a cloned HDD or a stored full-disk image, is a proven bootable full-HDD spare recovery option.

  14. Maurice

     

    Good points :)   Thanks.  I've been fortunate, or maybe a little careful over the years as I've not encountered much of the PUP's, or at least I haven't seen evidence of them present on my HDD's.

     

    I had a detection earlier this past week but that was only the 2nd time this year that MBAM has detected PUP's on my Desktop PC.

     

     

    16jj4fo.jpg  

     

    daledoc1

     

    I just saw your post.  I'll remember that one.  Some forums like the "quot'ers".  I'll omit/rarely use those here.

     

    <just a polite suggestion -- no offense intended> :)

     

    None taken at all :)  Believe me, this forum's way ahead of the curve in civility and professionalism 2s8lbms.jpg

     

  15. PUPs are a broad spectrum of 'wares and utilities.  On must go back to the words that define a PUP which are Potentially Unwanted Programs.  This can be anything from software bundling packager, to a tool bar, to a password recovery tool from a reputable company.

     

    One must also realize that there are many PUPs that don't even instyall, they are just a GUI of command line utility and it is notg that they are malicious but haved the potential to be used maliciously.

     

    One can not paint them all (PUPs) with one brush and must be specific to the type of PUP at hand and limit the discussion to that type of based upon declaration.

     

    The ONLY thing PUPs have in common is that they may be "Potentially Unwanted".

     

    2hg4k10.jpg  Thanks again for the info about PUP's :)

  16. Sorry, that's not true.

     

    I went the wrong way with this one 2qjengp.jpg

     

    Thanks for the correction :)

     

     

    Thanks for that important clarification, DHL. ;)

     

    @ Not4hire:

     

    Some types of malware/adware/junkware require the use of additional specialized tools for complete removal, in addition to MBAM.

    It looks as if MrC is working with you in your topic over in the malware removal section >>here<<.

    Please stay with that topic until MrC gives you the all-clear.

     

    Cheers!

     

    daledoc1

     

    daledoc1 Thanks also :)

     

    I wonder what makes PUP's appear to behave like that happens.  I've seen that occur on my PC where subsequent scans will detect what appears to be identical-named PUP items.

     

    So far, they've always appeared to have all been deleted, or the scans that follow the next couple of days after initial detection always come up clear.

     

    Not4hire , apologies for the misinformation.

  17. Thanks for the prompt response. Obviously, I want to remove this PUP from the doghouse and then nail the door shut.

     

    The default actions above are kind of "Ignorance is bliss..." so I will avail myself of the Option 2 in "Available Assistance..." thread.

     

    Thanks!

     

    Hi and I'll add one to your 34g65jq.jpg:)

     

    PUP's have a way of replicating for a day or two after MBAM removes the initially-detected items, or I should say, that's what I appear to observe on my PC's.

     

    For example, when MBAM detects a PUP during my unattended overnight scan, I'll remove the items the next morning while making a note of the name of the item.

     

    Often, during the following night's scan, I'll see 1 or 2 of the same-named items so I'll remove those as well.

     

    Usually, by the 3rd or 4th day, I don't detect any further PUP's.

     

    I don't know the technical specifics about this topic but I'm guessing that the nature of PUP's tends to replicate like a muli-branched tree.

     

    The good news is that MBAM performs so well that it usually detects them all and in a few days or so, the PUP's are history.

     

    They have the ammo to seek out and zap lurking PUP's  2i7bpud.jpg

  18. Thanks Scoop.

     

    The annoying thing is that I held off buying a new laptop early last year knowing that Windows 8 was just around the corner.

    Makes sense to wait a few months longer to get the latest and most secure OS right ?

    Oh how I regret that decision now !!

     

    I would have been much happier with Windows 7.

     

    I just don't understand why Microsoft didn't develop a seperate product to specifically target the tablet / smartphone market rather than trying to force an 'unnatural' environment upon traditional PC users, which still number in the hundreds of millions by the way !!

    Do you hear that Microsoft ?!

     

    And really Windows 8 should have come with a built-in "classic mode" option right from the get-go.

     

    Yep, Windows 7 is looking really tempting right now. Amazon are still selling OEM copies of Windows 7. I'm thinking about buying one and having someone install it for me.

     

    My friend bought a new Win 8 Laptop for his wife recently and the first thing he did was to load Classic Shell onto it ;)

     

    I know what you mean about that Amazon item.  I might ask for a special delivery in a few weeks 330d0ud.jpg

  19. It is certainly LESS vulnerable in Sleep or Hibernation Modes.  However that can be reduced even further by not allowing a "Magic Packet" to awake the PC from sleep mode.

     

    Being behind a NAT Router or a NAT Router with a full firewall implementation will mitigate the possibility of a Wake on LAN (WoL) packet of accessing a PC on the LAN side (that is unless one specifically sets a port forwarding rule).  Disabling WoL and using a NAT Router will mitigate any Cyber Threat.

     

    The same can be said for USB devices.  You can Disable "Allow this device to wake this computer".   However if there were a threat it would be a case of the Insider Threat and there may be other things that they can do anyway.

     

    David,

     

    Thanks for the info about the Wake on LAN possibility regarding this question.

     

    I have Wake on LAN enabled on my Laptop which I use within the Windows 7 "Homegroup" network through my Router so that I can wake my Laptop from my Desktop PC.  I do that to wake the Laptop before I run a file-copy script with "Autohotkey", a freeware script tool.

     

    I'm not sure if this makes my Desktop PC more vulnerable as you mentioned in your post since I use the Magic Packet to wake the Laptop from my Desktop and not vice versa.

     

    I'm assuming that I have "Wake on Lan" enabled in my Desktop's BIOS since I'm able to run the Packet from the Desktop to my Laptop.

     

    Since my Desktop PC is my everyday workhorse PC, that's the one I'm curious about regarding the vulnerability question and how it relates to your advice on Wake on LAN being enabled in my Desktop PC.

     

    I used this link for instructions to set up my homegroup Packet from the Desktop PC to the Laptop PC;;

     

    Wake on LAN

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.