Jump to content

David H. Lipman

Experts
  • Posts

    21,055
  • Joined

  • Days Won

    251

Everything posted by David H. Lipman

  1. No antioxidants though but - YEAH !
  2. So... Drink Tea. Even herbals with less or no Caffeine such as Ginger. I like a combo of Ginger and regular Tea or Tadin Ginger Tea Blend. Also The Republic of Tea has an organic Tumeric and Ginger tea. One of my favourites is Wissotzky Rosehips and Hibiscus. Great ways to have sugar free drinks.
  3. Yes, less mg of Caffeine per cup. Thus allowing you to enjoy more of a hot beverage with less side effects. Plus all the antioxidants of the flavonoid group of polyphenols. That's what my mother thought - It was Cocoa. NO. Mate de Coca is the chopped leaves of the Coca plant from which Cocaine HCL is derived. It is legal in Peru and several other South American countries but it is illegal in the US. To think - My parents were Drug Smugglers !
  4. LOL. Drink Tea instead. Less caffeine and its raw, not roasted. Just allowed to oxidize. My Mom brought this Tea in the US from their visit in Peru. For some oddball reason, I don't think they were allowed to do it...
  5. Freeze Brown Sugar? I've never thought about it. But, sure.
  6. Welcome to the Malwarebytes' Forum. A few notes... You'll find the Nebula sub-forum in; Malwarebytes for Business Support --> Malwarebytes Nebula and Malwarebytes Nebula Modules if you find malicious samples or suspect files or Malicious URLs or IP addresses they can be submitted in; Research Center If you have a File or a Website/IP that is Blocked and you believe it to be a False Positive, they can be submitted in; False Positives I'm sorry I do not have an Tutorial References but please don't be hesitant and ask. When I was in College I helped users in the Business Dept Computer Labs so I know what you must be going through. My experience there got me to write an article that was published in PC Magazine [Ziff Davis Publishing] and helped launch my career in IT Support, Management and the anti malware community. Curiosity is a great driver. Don't suppress it, use it and ask questions and learn.
  7. Heuristic F/P check, posted on behalf of @JG2XS https://www.drtax.ch/web/ch/de/downloads/drtax_office_3.0.aspx ===> https://update.ringler.ch/Dispatcher/FileService?product=DrTaxInstaller3&architecture=x64
  8. It is not. If you want that and other capabilities, always obtain a Windows Professional License or buy a PC with windows Professional pre-installed.
  9. @Fapnado If you are the one that produced the results in the ScreenShot in Post ID:1629372 Then maybe Browser Guard captured the information that may be helpful. Browser Guard --> Support --> Download Debug Logs
  10. What does that have to do Group Policies on Windows Home editions?
  11. Kind of moment with BBQ Ribs with home made BBQ Sauce?
  12. Well, I don't think a new Router is warranted. But I have some notes for you. Disable acceptance of ICMP Pings Change the Default Router password using a Strong Password Use a Strong WiFi password on WPA2 using AES encryption or Enable WPA3 if it is an option. Disable Remote Management Create separate WiFi networks for groups of devices with similar purposes to prevent an entire network of devices from being compromised if a malicious actor is able to gain unauthorized access to one device or network. Example: Keep IoT devices on one network and mobile devices on another. Change the network name (SSID). Do not use your; Name, Postal address or other personal information. Make it unique or whimsical and known to your family/group. Is the Router Firmware up-to-date ? Updating the firmware mitigates exploitable vulnerabilities. Specifically set Firewall rules to BLOCK; TCP and UDP ports 135 ~ 139, 445, 1234, 3389, 5555 and 9034 Many Routers support Saving and Restoring settings from a file. It is suggested to make a backup by saving your Router's settings once it has been configured. Document passwords created and store them in a safe but accessible location. Otherwsie -- Be vigilant, Be aware. What we call Situational Awareness. Just like you don't want to walk through a city street with Headphones on listening to load music. Know your surroundings. Keep and eye out and be aware of possible threats so you are on your guard against all threats. A city street is not any different the the roadways and sidewalks of the Internet. Recognize Phish and be wary. If you receive them, you will know to recognize them as a threat and not only protect yourself but have the forethought by protecting others by submitting them in the submission Forum as described in Post ID:1629001 or contact me and I will assist you in getting them submitted. Such as I have done in; Email Phish .
  13. Well it is not the original BUT.... It served the purpose. The Phish started at http://signnedininit3drsvq.com/ But was Taken Down Yesterday ! The site no longer exists. Thank you !
  14. Sorry, this is not the Full Header and Body of an email in RAW format. As you can see when Rendered as an email.
  15. What comes to mind is the Library of Alexandria.
  16. NO. A .DOC file may also interpret and modify the HTML content. A TXT file (or that format renamed to .EML) is a RAW DATA file formatted file and you are extracting RAW Header and Body contents of an email. you can NOT remove the PII or you are corrupting that RAW data. Let's keep this simple - OK?
  17. No. I'm sorry if the information I provided gave you that impression. They are completely different events. they have have no association with each other than than your Email and Password are associated with both. 1. The Trojan. As a Trojan and not a virus it does not spread from file to file or PC to PC. To get installed on a PC it needs assistance. The most common method is Social Engineering. That is the Human Exploitation of emotions, desires, fears, wants, loneliness, and other aspects of being Human. For example the desire of Gaming. Many like to play computer Games, A Social Engineering ploy would be toe exploit that gaming desire and send spam, SMS messages or have a web site that purports to be a NEW Game ! It is in Beta and they want people to try it. You do and BINGO - you are infected with a trojan such as the RedLine Stealer (a password and data stealing trojan). 2. Breaches There are services and web sites or third parties to the services and web sites we use as consumers. During our journey through life, we are told to create accounts for these services or web sites or we use services that we just provide our Personal Identifiable Information (PII) to. Such as a Doctors office or Insurer. Malicious actors probe these services for vulnerabilities and attempt to exploit them for their political or monetary gain. When these malicious actors are successful, the intended objects are "breached" of their defenses. They have broken in. Just like a Medieval Knight Breaches a Castle. When a web site or service is thusly affected they are deemed to be "Breached." If you were a party to a web site or service that had data exfiltrated, specifically including YOUR data, you become a part of that Breach.
  18. If you can Copy Raw Data that you could Paste in your reply, you should be able to paste it into a TXT file and attach that.
  19. No, sorry. It doesn't. For one it contains HTML that may be interpreted by the Forum and cause data to be altered. Additionally what is requested has Personal Information (PII) and must be hidden from regular member viewing That is why I asked asked the data be placed in an Archive and attached and not inserted in the thread. That preserves its original state and your privacy in a public Forum. I Hid that content.
  20. Do you have access to a PC ? https://sg.help.yahoo.com/kb/save-attachments-images-yahoo-mail-android-sln26472.html
  21. Thank you. One can use an email client like Mozilla Thuderbird or Yahoo webmail to access Yahoo mail. In Yahoo Webmail (https://mail.yahoo.com) Open the email and look above the email header and you'll see a Toolbar. Choose the 3 Horizontal Dots [ "..." ] Then from the Pull-Down menu, choose; View raw message Select all the text and then copy all the text and place it is a TXT file rename it to .EML and place it in a ZIP, RAR or 7zip Archive file and then attach that Archive in your Reply. ** Since I do NOT use Smart Phones, I can not provide specific Android device details.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.