Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


About David H. Lipman

  • Rank

Contact Methods

  • Website URL

Profile Information

  • Location
    Jersey Shore USA
  • Interests
    Malware Research, dSLR Photography, Numismatics & Surf Fishing

Recent Profile Visitors

105,126 profile views
  1. What software you use to scan an object would be dependent upon what the intention is. As noted the Brother MFC is a TWAIN compliant All-in-One ( AIO ) so any TWAIN compliant software can be used. If I want to scan a photo to a JPEG, I may use us PhotoShop Elements or XnView. If I am Word Processing a document I may write the document with LibreOffice Writer and then scan the object directly within the document. If I wanted to do Optical Character Recognition ( OCR ) I may use Adobe Acrobat or PaperPort. However, to do any of the above, the computer must communicate to the scanner either over TCP/IP or USB. It is the job of the MFC's TWAIN software to act as middle-ware in this function and it has no idea how the scanner is connected until it is told what IP Address the MFC is setup on or to use USB. As I noted that is performed with the Control Center program and from your Desktop ScreenShot, I see it as the icon in the System Tray labeled; CC3 ( ControlCenter3 ). https://support.brother.com/g/s/id/htmldoc/mfc/cv_mfc9120cn/encn/html/sug/chapter3.html
  2. If I understand this correctly, you have a Brother MFC-J615W AIO colour inkjet. You tried to SCAN over IP - It failed. You reconnected the Brother MFC using USB. You then tried to SCAN over USB - It failed. Often when you use third party software it is dependent upon a TWAIN driver. The Brother MFC is TWAIN compliant Usually there is a way to configure the TWAIN software to connect to its associated scanner. Specifically identify the connection with the IP Address or via USB. I don't have a Brother AIO in front of me but this is often a Utility in the Brother StartMenu and/or is performed with the Control Center icon in the Windows System Tray. EDIT: Example: Below is the Utility for Epson Scan Settings. Note the choices; Local and Network.
  3. The FavIcon shows on two different Windows 7 PCs of mine using two different Firefox versions.
  4. State Farm hit by data breach "State Farm – the largest property and casualty insurance provider in the US - has been compromised in a credential stuffing attack. The firm acknowledged the cyberattack, filing a data breach notification with the California Attorney General, and on Wednesday (August 07), it sent out “Notice of Data Breach” emails to users whose online account log-in credentials were obtained by a bad actor. The insurer’s data breach notification email read: “State Farm recently detected an information security incident in which a bad actor used a list of user IDs and passwords obtained from some other source, like the dark web, to attempt to access to State Farm online accounts. During our investigation, we determined that the bad actor possessed the user ID and password for your State Farm online account.” This type of cyberattack is called credential stuffing. Attackers will buy or take usernames and passwords that were leaked from other companies’ data breaches and they will try to use those credentials to log-in to other accounts and sites. It works well against people who use the same password for lots of different sites – something many people are in the habit of doing."
  5. You can't mix the Input Ports and the Output Ports together as that would create a Feedback Loop.
  6. I think Over Arching enmasse fraudsters rake in Millions. This action was just one action taken against one of many fraudsters who is based in the US. Unfortunately many are from "another" country.
  7. https://public.tableau.com/profile/federal.trade.commission#!/vizhome/DoNotCallComplaints/Maps
  8. FTC Sending Refunds to Victims of Tech Support Scam "The Federal Trade Commission is sending refund checks and PayPal payments totaling more than $802,000 to 12,140 consumers as part of a settlement with the operators of a St. Louis-based scam that tricked consumers into buying unnecessary technical support services. Eligible consumers paid for tech support products and services from Global Access Technical Support, which also used the names Global sMind, Global S Connect, Yubdata Tech, and Technolive. The FTC alleged the defendants worked with affiliate marketers to place pop-up ads that falsely claimed the consumer’s computer was infected with viruses or malware. The ads urged consumers to immediately call a toll-free number for help. When consumers called the number, they were connected to telemarketers who falsely claimed to be affiliated with Microsoft or Apple. The telemarketers claimed they needed remote access to consumers’ computers to diagnose the problem. Once given access, the telemarketers tricked consumers into believing that harmless directories on their computers were evidence of problems that required immediate repair. Consumers who receive a check from the FTC should deposit or cash the checks within 60 days, as indicated on the check. For the first time, the FTC is also sending refund payments via PayPal to consumers for whom the agency does not have a mailing address. Consumers will have 30 days to accept the PayPal payment. The FTC’s consumer blog post provides more details about how the refund process will work. The average refund amount is $66. The FTC never requires people to pay money or provide account information to cash a refund check. If recipients have questions about the refunds, they should contact the FTC’s refund administrator, Analytics, at 844-881-1379."
  9. Exactly. It is a OS generated file that is normal. Virus Total is a simple way to check any file. As you now see, there are 3 Virus Total Reports for three copies of "GDIPFONTCACHEV1.DAT". I think you'll find every User Profile has one.
  10. Yes, your presumptions have no basis in fact. There are 100's of files in the OS. Many are caches too. Why single this file out ? Here's the Virus Total report for my Win7 User Profile http://www.virustotal.com/file/1e4f4a4bb936381af55b3f262680a220df11da6cb24320320b6ec2c47de80512/analysis/ Here's the Virus Total report for another file from my Win7 User Profile on another PC https://www.virustotal.com/gui/file/ada06efed5d7a4d328f96c93efca893daf1cc2f3f3b879e535aa31cfa83a0b4c/detection
  11. It is an OS created data file related to your Profile and should left alone. If you have worries on a data files, send it to Virus Total. It will check it with more than 50, participating, anti malware vendors.
  12. If it is a Windows OS based server then it is a non-dedicated server. Non-dedicated servers such as Windows server is often compromised because of the Insider Threat when the role as a File Server is abused by administrators who install unapproved software and Browse the Internet. Malwarebytes' Anti-Malware ( MBAM ) does not target scripted malware files via signatures. That means MBAM will not target; JS, JSE, PS1, PY, .HTML, HTA, VBS, VBE, WSF, .CLASS, SWF, SQL, BAT, CMD, PDF, PHP, etc. It also does not target documents via signatures such as; PDF, DOC, DOCx, XLS, XLSx, PPT, PPS, ODF, RTF, etc. It also does not target media files; MP3, WMV, JPG, GIF, etc. Until MBAM, v1.75, MBAM could not access files in archives but with v1.75 came that ability so it can unarchive a Java Jar (which is a PKZip file) but it won't target the .CLASS files within. Same goes with CHM files (which is a PKZip file) but it doesn't target the HTML files within. MBAM v1.75 and later specifically will deal with; ZIP, RAR, 7z, CAB and MSI for archives. And self-Extracting; ZIP, 7z, RAR and NSIS executables (aka; SFX files). MBAM specifically targets binaries that start with the first two characters being; MZ They can be; EXE, CPL, SYS, DLL, SCR and OCX. Any of these file types can be renamed to be anything such as; TXT, JPG, CMD and BAT and they will still be targeted just as long as the binary starts with 'MZ'. This includes file names that use Unicode Right-to-Left Override to obfuscate an executable file extension.
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.