David H. Lipman

  • Content count

  • Joined

  • Last visited

  • Days Won


About David H. Lipman

  • Rank

Contact Methods

  • Website URL

Profile Information

  • Location
    Jersey Shore USA
  • Interests
    Malware Research, dSLR Photography, Numismatics & Surf Fishing

Recent Profile Visitors

97,029 profile views
  1. There is a number and it is automatic. However that number is not readily made available because that number then becomes a goal to meet. It will then give a small percentage of new members an impetus to reach that goal through posting what may amount to be an array of various kinds of Junk Posts.
  2. bios

    There 'ya go and like my ASUS, you have access to the " Fan Xpert 2+ advanced fan controls ". Spend 15 minutes and boot each of the three options. Choose you favourite default POST boot mode.
  3. bios

    Different BIOS software vendors ( Award, Phoenix, etc ) use different verbiage and menu options but all BIOS have have numerous aspects in common. In your case you have 3 POST diagnostic level options. There should be a PDF that came with the motherboard that provides version related data about all the options and will delineate what each does or doesn't do ( to speed things up ). BTW: What is the make and model of the motherboard ?
  4. bios

    It takes... As long as it takes to go through the Power On Self Test ( POST ) procedures. This is not a "BIOS time". This is a period of diagnostic routines that has implementation roots going back to the first computers. It is the function of the Basic Input/Output System ( BIOS ) to act as Middleware between the hardware and chip-sets of the Motherboard and the OS that will run under that platform. It is a function of the Complimentary Metal-Oxide Semiconductor ( CMOS ) scratch-pad RAM to hold configuration settings. When you boot the PC it will run the POST diagnostic routines to make sure everything from the ability to read and write to the hard disks can be performed to making sure the CPU is stable when over-clocked. On my ASUS based, home-built, system not only must I go through POST from the motherboard BIOS but I also have a PCI/x peripheral card that also has its own BIOS which adds its own diagnostic routines combined with a period where a specific Hot-Key combination will allow the end_user to go into that Peripheral's configuration mode. Therefore adding to the overall POST period delay. At best, the BIOS may have two POST modes. A Quick mode and a more comprehensive mode. The only way to reduce the time period of the POST routines is to choose the quicker POST mode. I keep my desktop PC running 24x7.
  5. As a fan's speed increases, it can move more air but as the speed increases, so does its inherent noise generation. BTW: The air flow rating is usually measured in the US as Cubic Feet per Minute ( CFM ) So instead of using 1 x 4" chassis fan running at high speed, run 2 x 4" chassis fans at a lower speed. Again, it is all about moving the heat within the chassis out and bringing in cooler ambient air. Getting a new CPU cooler won't help. The CPU is fine. It is the combination of removing heat from the CPU and any/all GPUs and that makes the interior temperature higher. I understand what you are doing, I built my desktop around an ASUS motherboard with a Thermaltake chassis. I designed this system to drive 4 monitors. The AMD GPU has its own GPU fan at a fixed speed. However, using the ASUS fan control utility, I can set each other system fan's speed ( CPU and all chassis fans ) and thus I can "tweak" each fan for the best speed vs. noise settings. In the summer, I tend to run the chassis fans at a higher speed. As an additional note, my system uses XMP RAM modules and thus also have their own heat sinks. So in my chassis, I need to remove the heat generated by the CPU, all GPUs and the RAM modules.
  6. Like Porthos, I image all my drives monthly, only I use Symantic Ghost. I also use a KixTart Script that uses the Robust Copy Command line Utility ( Robocopy.exe ). Then I can choose the backup media ( external HDD or Flash Drive or Compact Flash card ) and based upon the size of the media would choose to "Mirror" a subset of my data or the full data set. Using this scripted process I can backup data sets much more often. I do raw data backups. That is the copy of the data is in normal format and not in some compressed format like an ISO or ZIP file. In terms of Ransomware, that means that the backup media must be normally Offline Media. Thus an external hard disk has its own power switch so the OS will only see the drive when the drive power is on. Thus protecting the data IFF a ransomware encrypts the live system. I have created a script thar uses the Robust Copy Utility that I provide to other people. It goes one step further in that it expects a large external drive ( spindle or SSD ) and creates a "Monday" ~ "Sunday" ( or Monday ~ Friday ) folder structure where the routine only mirrors the days' backup to is corresponding named sub-folder. This way if you perform a backup on a Tuesday, it will be stored on the external hard disk's Tuesday sub-folder. This way the end_user not only has an offline backup but be able to have revision variations backups.
  7. The Human eye sees motion at 30~32 fps. A person will not see any real difference above that. Only if the video was recorded and played back in slow motion will there be a benefit. 45 Deg C is ~113 Deg F. That is well within a safe heat generation margin. Just make sure the chassis has sufficient airflow so that heat is removed from the interior of the chassis.
  8. Please realize that this free malware removal sub-forum service is provided for home users for home computers. Based upon your statement you "have 23 vpn connections from our stores and other locations" you have identified a corporate WAN interconnected environment. If you are a Malwarebytes' Business customer, you should use the Malwarebytes Anti-Malware for Business sub-forum. If you are not a Malwarebytes' Business customer, then I suggest you contract a professional to work with your company and your ISP. That professional can then determine what traffic the ISP is seeing that makes them believe malware is the cause of said traffic. The professional can source its origination via ISP provided logs that can be used to source the communications they are seeing. To use Wireshark would mean using it on a node with a promiscuous NIC and inserting it on an Ethernet hub ( not a Ethernet switch ) that congregates all traffic going from the LAN to the WAN and filtering packets based upon specified criteria noted by the ISP that they say they believe is malware related.
  9. Nothing about better spam protection ?
  10. Please remove that ludicrous addition of Invision's privacy policy from this Forum forthwith. They are a contractor and they fall within, and are bound by, Malwarebytes' set of policies.
  11. What Chrome downloads is dependent upon what site is pushing the content. That content needs context as well as other associated details like what was actually in the file as well as where the file was downloaded to. There is just not enough information to draw conclusions. Browsers download files all the time. They can download graphic files such as PNG and GIF and scripts such as JavaScript and HTML. The Browser needs those files to render the material to be viewed. Only a small percentage of this material will request authorization. Most will be downloaded simply because that's needed by the Browser to function. However that material will be downloaded to the Browser's cache.
  12. I can't state 'cause "...something like this..." isn't well defined. I can only state that a prima facie review of the Virus Total Reports, indicates the files were of no concern.
  13. From the VT Report URLS " Magic literal ASCII text" From what I see a non-incident.
  14. There are a few HP printers that may do this. However it is stored on the printer like firmware. To update the drivers stored on the printer you have to update that firmware. That software can then be downloaded to the computer and be installed. The vast majority do not have that capability or facility. Due to the limited scope of these printers, and the proprietary nature of HP's software, it isn't something that has been known to be compromised. The majority use plain old Plug n' Play. There are multiple types of Printer Drivers but most will fit in three categories; Stock, Extended Stock and Vendor Supplied. Stock - These are the Printer Drivers that are included with the MS Windows OS Extended Stock - These are the Printer Drivers that are not included with the MS Windows OS but are in a Hardware Device Library at Microsoft and may be downloaded to extend the number of available stock OS Printer Drivers. Vendor Supplied - As the name implies, you have to obtain these Printer Drivers form the manufacturer and/or vendor because they are not provided with the the Windows OS nor are they available at the MS Windows Printer Driver's Library supplied by Microsoft to extend the stock Printer Drivers. So when you install a Printer, it will Plug n' Play the port that connects a printer to the OS ( Examples: USB, Parallel, Serial and Network ) and then the OS will attempt to install Printer Drivers by first looking at the MS Windows Stock Printer Drivers. If it isn't available, depending on how the OS was setup and if its connected to the Internet, the OS will attempt to download the drivers via Windows Update device driver sub-service. If it still isn't available you have to provide them by inserting a CDROM or by running some installation utility. The article was about Signed Drivers and not using a Signed Driver can be exploited. That is a Printer Driver that has been published with a Public Key certificate from the vendor and the reliance on the OS to either "trust" unsigned drivers or adhere to a Security Policy to only allow digitally signed drivers that can be verified through a Certificate Authority via the OCSP Protocol. The article is showing that there is a vulnerability, that has existed in the Windows OS since Windows 95, where untrusted and unsigned drivers can be used to compromise the system. Specifically because of the way the Windows OS "doesn't properly authenticate print drivers when installing them". RE: https://arstechnica.com/security/2016/07/20-year-old-windows-bug-lets-printers-install-malware-patch-now/
  15. Yes pondus but it is not the Printer, it is the OS Print Spooler and Service and associated Printer Drivers. The physical printer does not infect the computer.