Jump to content

David H. Lipman

Experts
  • Content Count

    17,280
  • Joined

  • Days Won

    14

Everything posted by David H. Lipman

  1. So-cooooooooooooooool ! A great milestone... in getting the drone to Mars and by building it on Earth with our atmosphere destined to operate in the very thin Mars atmosphere using a semi autonomous coaxial, counter rotating, blade lift system.
  2. Cyber Stalking should remain at the Federal level as it tends to be an interstate, International, crime. Stalking in general needs to have better State-wide legislation.
  3. If it is a Wireless Mouse, auto movement may be due to a nearby user with another Wireless Mouse on the same channel. If it is a wired mouse, it may be due to the tension on the USB cable causing the mouse to physically move.
  4. I used a Proxy with various Exit Nodes. All worked. However I could not force it into a specific Country or Region. It was worth the test...
  5. @Xauma95 Check the Firefox Proxy settings to see if it is using 127.0.0.1
  6. MBAM does not target PDF and other scripted and/or Documents. It uses its anti exploitation module to block any malicious activity that may occur whiles rendering them. Please submit the PDF in; Newest Malware Threats after reading... Malware Hunters group Purpose of this forum EDIT: This is the Malwarebytes for Windows Malware Removal sub-forum so I will request this be moved to; Mac Malware Removal Help & Support
  7. Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof ** More in the article.
  8. There are Local/Group Policies that can be set to Deny Execution to a file.
  9. @Hebbbo How did you make out when you temporarily replaced your keyboard with another ?
  10. The functionality of a BAT file is based upon the Windows Command Interpreter which is limited in its functionality. The functions implemented in a BAT file can do damage to the PC's OS, the file structure and can cause OS degradation. However it won't "infect". That is a BAT file has a greatly diminished capability to create a windows malicious process or structure that will remain performing malicious activity after one logs-off or reboots. More advanced scripting interpreters like Visual Basic, JavaScript and PowerShell scripts are not as limited and can "infect" a host.
  11. Borrow a keyboard from a friend and test to see if your problems are resolved.
  12. Something to keep an eye on. This could take at least a few years.
  13. Please contact Malwarebytes Support HERE and they can assist you in this matter.
  14. It is legitimate. Will Request the Forum Admin REMOVE that for your Privacy.
  15. It looks legitimate. However, you printed the email to PDF. That obfuscates the full Email Headers. The full Email Headers can be used to authenticate that email. https://support.google.com/mail/answer/29436?hl=en
  16. FTC Sends Nearly $50 Million in Refunds to University of Phoenix Students
  17. Software renewal scammers unmasked ** Much more in the Malwarebytes Labs report.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.