Jump to content

David H. Lipman

  • Content Count

  • Joined

  • Days Won


Everything posted by David H. Lipman

  1. Firewall Protection defaults to the most common TCP/UDP ports being allowed through. There are legitimate functions and games that may use un-common TCP/UDP ports and would require a "Firewall Rule" to allow it or them through. You can stay at Low. Or... you'll have to create Rules in Medium mode that would allow a specific TCP/UDP port allowance or a range of ports to be allowed through.
  2. IPv4 Firewall Protection: Off/Low/Med/High A: Medium IPv6 Firewall Protection: On/Off A: On if IPv6 is also Enabled. Filter Proxy: Enable/Disable A: Default Filter Cookies: Enable/Disable A: Disable Block Fragmented IP Packets: Enable/Disable A: Disable Port Scan Detection: Enable/Disable A: Enable IP Flood Detection: Enable/Disable A: Disable geo:0,0?q=Skyworth%20CM5100 A: means nothing
  3. Yes. Some notes... Disable acceptance of ICMP Pings Change the Default Router password using a Strong Password Use a Strong WiFi password on WPA2 using AES encryption or Enable WPA3 if it is an option. Disable Remote Management Create separate WiFi networks for groups of devices with similar purposes to prevent an entire network of devices from being compromised if a malicious actor is able to gain unauthorized access to one device or network. Example: Keep IoT devices on one network and mobile devices on another. Change the network name (SSID). Do not
  4. Power supplies still provide some power, even when off, so a Magic Packet can be sent to a PC to turn it on called Wake on LAN.
  5. I am not seeing it available for Windows 7 any longer.
  6. From the Microsoft Catalogue: https://www.catalog.update.microsoft.com/Search.aspx?q=KB2286198
  7. @1001 These are not trojans that "infect". Let's look at what you found and let's break it down. It is a Phish. This is not an executable that infects a PC with malware. It is a Social Engineering exercise to get you, the victim, to provide credentials to some kind of account like a bank account or and email account. The !eml suffix indicates this to be an email. The .J indicates a variant where there are at least A ~ J variations of the type of Phishing content. The XML prefix indicates it is a structured text. So what you have indicated is Windows Def
  8. It is addressed by Malwarebytes only to a limited extent. It is not a case of malware to be "detected" and "removed". It is a case of an exploitable bug on Dell pre-installed software. The Malwarebytes' Anti Exploitation module will help mitigate any attempt at exploiting the now known software's vulnerability. Malwarebytes' software does not address bugs in software that create a vulnerability. The full, paid-for, version of Malwarebytes software will only mitigate attempts at its exploitation. It is up to the Dell PC owner to remove the vulnerable software or patch it.
  9. RE: DSA-2021-088: Dell Client Platform Security Update
  10. When you see scam websites, give them the spam-BOT/malspam email address. The email address will get abused, sold or traded. Responding to select spam emails may increase the value of that address to malvertisers, spammers and scammers.
  11. Looks like something from the Iranian hacker group known as Helix Kitten (aka; APT34)
  12. Supreme Court limits the FTC’s authority to return money to consumers duped by deceptive business practices Statement by FTC Acting Chairwoman Rebecca Kelly Slaughter on the U.S. Supreme Court Ruling in AMG Capital Management LLC v. FTC
  13. No, sorry. MBAM has two proactive modules; anti ransomware and anti exploitation. MBAM will use these modules to block the malicious actions that older malware may perform.
  14. What you referred to is the guidelines to malicious disk file submissions. Malwarebytes is not a historical anti malware solution and uses its signatures to only target NEW, emerging, files and not old files. The "three month old" guideline is not a hard rule. A undetected file that is 4 or 5 months may still get targeted by the creation of a signature but 3 months represents a relative threshold. Therefore old files will not be accepted for signature creation consideration. Malwarebytes does not accept malware libraries of files (aka; Zoos or Collections). Note also the guidelines i
  15. So-cooooooooooooooool ! A great milestone... in getting the drone to Mars and by building it on Earth with our atmosphere destined to operate in the very thin Mars atmosphere using a semi autonomous coaxial, counter rotating, blade lift system.
  16. Cyber Stalking should remain at the Federal level as it tends to be an interstate, International, crime. Stalking in general needs to have better State-wide legislation.
  17. If it is a Wireless Mouse, auto movement may be due to a nearby user with another Wireless Mouse on the same channel. If it is a wired mouse, it may be due to the tension on the USB cable causing the mouse to physically move.
  18. I used a Proxy with various Exit Nodes. All worked. However I could not force it into a specific Country or Region. It was worth the test...
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.