Jump to content

David H. Lipman

Experts
  • Content Count

    14,106
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by David H. Lipman

  1. You posted in the Malware Removal sections which is for requesting help in such actions. As it was not about being infected and a request for malware removal assistance, your post was moved to; General Windows PC Help where the subject matter is much more apropos. Let me understand your request. Do you want the paper to be 2' 8" ( 2 ft 8 in or 32 in ) or the words “IT IS YOUR BIRTHDAY" with a height of 5" ( 5in ) ? To create a banner that is at least 32 inches long you either have to have a printer that uses rolled paper or you will have to use standard flat paper and physically join them together. For example if you use standard paper which is 8.5" x 11" you would orient the paper in Landscape such that the length is 11 inches. That would require 3 sheets to be a total combined length of 33 inches. In MS Word you would set the document to be Landscape and set the Top, Bottom, Right and Left margins to be small. Such as 0.2" The next would be to format the characters. The "text" contains 19 characters. There are two type of fonts in question here. Fixed and Proportional fonts. Fixed fonts have a fixed width so a thin letter like "I" would have the same width as a wide letter such as "M". A proportional font means the width varies with the letter's proportions so the letter 'I" would take up less horizontal space as the letter "M". If we start with the assumption that each character is 2" wide then 2 x 19 = 38" which is greater than 3 feet long and will take 4 sheets of 8.5" x 11" paper but, a two inch character will not be 5" tall unless the aspect ratio of each character was greatly exaggerated. So there is the conundrum. Do you want it to be a 1 line banner that is much longer that 32" so the characters are 5" tall a two line banner that is 32" long, etc. ? When dealing with such banners, you start to leave the capabilities of MS Word and move into the realm of MS Publisher, Adobe Illustrator or LibreOffice Impress or LibreOffice Draw ( LibreOffice is free ) where you can create a virtual banner paper and use text and fonts as needed to fit the paper.
  2. Similar to these ? I have created a 1series of videos generated from these kinds of fraud sites for the purposes of recognition and education. They are all videos from real web sites. ALL are FRAUDS. All these have one thing in common and they have nothing to do with any software on your PC. They are all nefarious web sites meant to defraud you of money. The objective is to, falsely, goad you to make the phone call and pay for some service contract for an incident that never happened. From there they may continue to charge your Credit Card for other services, remote into your computer and do real damage and/or exfiltrate your personal data and they may use the information they obtain from you to commit additional frauds. MalwareScam.wmv MalwareScam-1.wmv MalwareScam-2.wmv MalwareScam-3.wmv MalwareScam-4.wmv MalwareScam-5.wmv MalwareScam-6.wmv I have also created a PDF ScreenShow of a myriad of FakeAlert screens - FakeAlert-Screens.pdf / Flash Version Malwarebytes and Norton AV did not block the site because they did not know the site. You can help by submitting the FakeAlert web site to Malwarebytes in; Newest IP or URL Threats after reading; READ ME: Purpose of this forum This way the site can be blocked and others would not fall prey to it. Reference: US FBI PSA - Tech Support Fraud US FTC Consumer Information - Tech Support Scams US FTC - Tech Support Operators Agree to Settle Charges by FTC and the State of Ohio US FTC - FTC and Federal, State and International Partners Announce Major Crackdown on Tech Support Scams Malwarebytes' Blog - Search on - "tech support scams" Malwarebytes' Blog - "Tech support scams: help and resource page" 1. Also located at "My Online Security" - Some videos of typical tech support scams
  3. Your research brought you to a faux conclusion. While Amazon and Cloudfront may host sub-domains that have been malicious, they are not themselves malicious. The preponderance of Amazon and Cloudfront hosted sites are not malicious. Could they do better at handling malicious activity performed via their services ? DEFINITELY - Yes !!
  4. Play 'em this audio track instead FakeAlert-SoundTrack2.mp3 FakeAlert-SoundTrack2.mp3
  5. FTC Crackdown Stops Operations Responsible for Billions of Illegal Robocalls NetDotSolutions (James Christiano) Higher Goals Marketing Veterans of America Pointbreak Media
  6. Office Depot and Tech Support Firm Will Pay $35 Million to Settle FTC Allegations That They Tricked Consumers into Buying Costly Computer Repair Services
  7. You have gotten well ahead of yourself.
  8. @Amaroq_Starwind I have provided specific targeting information to you in the past. The EICAR string does not represent a PE file and thus it will not be detected by MBAM. MBAM is not a historical anti malware solution so it is not going to target 16bit COM and Win16 EXE files. Now that we have come full circle and you have recommended every suggestion that you can think of, it it high time to stop questioning what MBAM can and can't do and start your own anti malware project. Then you can incorporate all your thoughts into a tangible product and you can put your thumb print on. You can target ELF and MVS files, 16bit DOS, CP/M, Commodore 64 Apple II and even main frames. You can target the NYB and FORM and file infectors like the Jerusalem and Virut. Malwarebytes' Anti-Malware is what it is targeting Win32 and Win64 files that are infecting Today's computers and in ways not perceived of when DOS ( DR/PC/MS-DOS ) was prevalent. Malwarebytes' Anti-Malware is going to shift from static signature based detections and work on actions malware takes. The Malwarebytes' team will not concentrate on one threat or one threat actor. They will look at the overarching concepts of malicious activities and the role software plays. It is now time to stop bringing up any and every subject and for you to take the time to study and concentrate on one subject at a time until you understand that subject matter at-length and create your own product the way you'd like it to be.
  9. Dank je @pondus for posting this.
  10. Amaroq_Starwind: It is a not Phishing nor a data harvesting venture. Its a multi-point generated, mass email broadcast venture exploiting people's worries, fears and anxieties about their Internet activity. Hoping that a few scant recipients who are not well informed and don't follow current events will take the bait and pay the suggested price using crypto currencies. Its nothing more that a cheap man's get rich scheme.
  11. https://en.wikipedia.org/wiki/Patent_troll
  12. A few simple steps... Disable acceptance of ICMP Pings Change the Default Router password using a Strong Password Use a Strong WiFi password on WPA2 using AES encryption Disable Remote Management Is the Router Firmware up-to-date ? Specifically set Firewall rules to BLOCK; TCP and UDP ports 135 ~ 139 and 445
  13. I have noted the continuance of the bug as well and I will see if things have been fixed. Thank you Ron.
  14. I doubt that Malwarebytes supports the Tor network.
  15. NOTE: DNS does not slow down Internet. A slower DNS server may introduce latency in the resolution of a Domain name to an IP address but that only occurs once per Domain name to IP address occurrence. Its like a 5mph ramp to a 65mph highway where you travel 200 miles on that highway and the ramp is only 200 feet long. That 5mph for 200 feet has little overall effect on the travel time. Even if on that 200 foot ramp you did 10mph instead of 5mph the time difference would be inconsequential.
  16. Do you have so many hard disks that one is "G:" ? This is probably a Removable Drive that is not connected and while it is not connected it is "not accessible."
  17. Because 3rd Party Firewall applications are not intrinsic to the OS they have greater functionality, reporting, granularity and capability.
  18. Here's another variant with a new twist. Instead of the text of the email being in the body of the email, it is it a JPEG and embedded within the email body. This is done to thwart Bayesian and other forms of email filters which block based upon content.
  19. On a desktop behind a NAT Router with simplistic firewall capabilities or a NAT Router with a full Firewall implementation, I agree. The Windows Firewall is just fine. However... On a portable system where you jump onto other people's networks, especially public ones, then I can see replacing the built-in Windows Firewall with a 3rd Party Firewall application.
  20. I think perspective is needed on Binisoft's Windows Firewall Control now a Mawarebytes' product. " Windows Firewall Control is a powerful tool which extends the functionality of Windows Firewall and provides new extra features which makes Windows Firewall better. " It isn't a Firewall. It is a front-end to the Native OS' Firewall and adds additional constructs and adds extended functionality to what is already built-into the Windows OS.
  21. That is NOT what it says. You are inferring 25% off the Full Price. It does not state those words. Continue to the next page and it clearly states 25% off the second year.
  22. @Hyperwolf122 Are you mobile or is this a fixed location desktop ?
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.