Jump to content

David H. Lipman

Experts
  • Posts

    21,597
  • Joined

  • Days Won

    267

Everything posted by David H. Lipman

  1. http://boingboing.net/2011/12/10/cnets-download-com-secretly.html http://www.dslreports.com/forum/r26628563-CNET-s-Download.com-bundling-adware-with-popular-software http://insecure.org/news/download-com-fiasco.html
  2. Such is what happens when you are some one ELSES'S network. To get control and privacy get a broadband cellular device and use Tor.
  3. You know your IP by going to; http://www.whatismyip.com
  4. The real question is - "What is the problem if someone KNOWS your IP?"
  5. "Trojans are "maleware" but that is a different subject " Was a joke because you wrote "maleware" instead of malware and there are two kinds of trojans... * The software kind * The soft to wear kind which is "maleware" BTW: I hate the term "geek"
  6. No. The question was vague an not well defined and thus the "I don't know" shrug of the shoulders animated graphic. As in I don't know what you are asking and I don't know an answer.
  7. Trojans are "maleware" but that is a different subject Malware (which includes all forms of malicious software) is generated by individuals, organizations, nations, crime syndicates, yada, yada... It is extremely hard to source malware and thus prosecution is not easy. Add the fact that malware is Internationalized makes prosecution even MORE difficult. Malwarebytes' Anti Malware (aka; MBAM) must be fully installed into the Operating System for the greatest efficacy in malware removal and thus is not a portable application from that POV.
  8. Because I am NOT privy to that information. It is NOT my forum and I am no longer an employee of Malwarebytes' and I am only a member of the "Experts" group. ?? ??
  9. I can't tell you what members in what groups have access to a poster's IP address.
  10. My membership level does not allow me access to your posting IP. However, what difference does it make ? If you are on your University's LAN, you will post with your University's WAN address. What's the problem ?
  11. As I suggested to another not too long ago... When on the University's network you are expected to act properly on their network. If you are acting in a way you don't like to be "snooped" then simply don't do it. Otherwise get your own ISP such as from a broadband cellular card.
  12. Sorry for the misinterpretation. I am trying to get at the root of your need and I presumed wrongly. To best help you, you will have to really define what you are trying to accomplish, your need and why. If you get "Access Denied (policy_denied)" when trying to access the Tor Project then you are dealing with a situation where you are most likely on a work computer and is your employer's computer and is behind a content filter and firewall. Is that the case ? You are on a work computer and it is your employer's computer?
  13. I thought there was a language barrier so I will try to make it easier to understand. Proxy servers are used to hide your originating IP address. However that may or may not hide your "ID". A Proxy Server/Service is a like a man on top of a fence with one leg in one yard and the other leg in the other yard. When you use a Proxy the end site sees not the leg in your yard it sees the leg in the other yard. In this case the end site sees the IP address which is not in your side of the fence they see the IP address on the other side of the fence. Earlier you used the phrase "so nobody will break through computer." For that a Proxy Server/Service will not work. Use of a Proxy server/Service will not block that. Proxy servers are used to isolate who you are for privacy (and for other technical reasons). [ Unfortunately, because of the anonymous factor, they are also used for abuse ] You write "native language is Arabic" so it is possible that you are in a country that suppresses free speech and thus you want to hide or "obfuscate" who you are so you can "speak freely" without government intervention/intrusion. The Tor Project was created with that in mind. To allow people on the Internet to speak their minds without fear of their government.
  14. I don't think you understand the subject matter when you write "I need to hide my ID on I am surfing internet, so nobody will break through computer." And I don't understand "...avoid for appeareving your identify...". You must have edited your post. "If it is an impossible way to avoid for appearing your identify" isn't much better. Obfuscating your IP with that of a proxy will not block an action that would "will break through computer" whatever that is supposed to mean. I take "will break through computer" as to mean will block an outsider's ability to hack into your computer. What is your country of origin and your native language ?
  15. Are you sure this isn't "a joke" ? There is a stark difference between a random and unique instance of lets say a 10 yr old girl walking through a park and a 60 yr old man that offers the little girl a lollipop versus an organized holiday where such an event is not only normal but expected. However there have been instances of tainted candy, the so-called razor in the apple, etc. Thus Halloween Trick or Treating is not the same Today as it was say in the '70s. Personally, my feeling there is the reason for giving candy on Halloween is to provide children high calorie content before the winter.
  16. Actually, I don't see it as correct. From what I see it is; YYYY.MM.DD.## Where; YYYY = Year MM = Month DD = Day ## = Update number for 24 hour period of day DD
  17. Malware Today is deliberately bloated so you can't submit it to Virus Total and other web sites because they have a maximum size submission limitation. Thus the malicious actors make them to be greater than the maximum, max., size. Often you will find a 24MB EXE can be compressed in a RAR or ZIP file that is a few hundred kilobytes in size. However sometimes the EXE is bearing a large PDF, MOV or other legitimate data file such that the compression within an archive file is not much less than the size of the EXE file.
  18. I believe what the OP wanted was a .MSI because of the ease of pushing an application through AD as a GPO.
  19. Windows works by NetBIOS over IP and each PC must have a unique name. Each computer announces itself in the "workgroup" as a named computer with an IP address. Computers use the Universal Naming Convention (UNC) to access the shares of another computer on the network. This is in the form of \\Machine_Name\Share_Name so no matter what IP address Machine_Name is assigned, you can access the NT Share. If the IP address is static you could alternatively use \\IP_Address\Share_Name . Often that is done in a test situation under dynamically addressed computers. Alternatively one can "map" a drive letter to the share via the Command Line [ net use Drive_Letter: \\Machine_Name\Share-Name , Ex: net use P: \\Orange-PC\data ] or via the Windows GUI. No computers are forced to use only static IP addresses. If the computers are NOT Active Directory Domain participants then they are in a Workgroup environment. While each computer can use a different "workgroup name" it is easier to have computers in a workgroup use the same workgroup name. In Windows XP and above the default "workgroup name" is; workgroup. In the attached graphic you will see the computer was named "dlipman-1" and is in the workgroup "workgroup" and if I have a NT Share on the computer dlipman-1 called "data" other computers can access the data share as; \\dlipman-1\data [ of course appropriate permissions of the share have to be set to gain entry from a computer other than DLipman-1 ]
  20. When on the University's network you are expected to act properly on their network. If you are acting in a way you don't like to be "snooped" then simply don't do it. Otherwise get your own ISP such as from a broadband cellular card.
  21. no1texan: Please provide the URL of where you fond that.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.