Jump to content

David H. Lipman

  • Posts

  • Joined

  • Days Won


Everything posted by David H. Lipman

  1. To me it's like a Diner. You want to have visitors that use your services. Patrons have automobiles and so do the staff. However, you need to have a parking lot for your patrons. On a periodic basis and on some occasions you have more business than usual. Like Mother's day. If the parking lot is too small, the parking lot fills up. It causes a backup of automobiles onto the thoroughfare. A mini traffic jam ensues as well as a possible increase in vehicular accidents. It causes some patron's to park elsewhere. This causes the patrons to endure additional physical time and effort to find another spot and for the patrons to walk to the establishment from further away. Instead, let's see it not as a lone Diner but as Restaurant in a strip mall. There other establishments in this strip mall and they too have their own patronage and needs for staff and patron parking. Their respective patronage patterns may coincide with the Restaurant and complement the restaurant's traffic and at other times may have super peak traffic. I want my parking lot to have plenty of space for my patronage. I don't want to lose business because the parking lot is full and I don't want them to walk a block and a half away because the lot is full. I want my patrons to be happy. For there to be good traffic flow and no, or minimal, accidents amongst the patrons.
  2. If a company sends email en masse they may get flagged as a spammer. So companies choose service providers who specialize as mass e-mailers. Companies like SendGrid. They will substitute their own Link for the URL in the mass mailing. This way if an account is compromised, or violates their Authorized Use Policy/Terms of Service (AUP/ToS), and sends out malicious emails, companies like SendGrid can disable their Link which neuters the malicious URL in the email.
  3. Scammers reportedly using fake unemployment benefits websites as phishing lures
  4. We call them - JUNK. And yes, people buy them 'cause they are cheap. Cheap JUNK.
  5. True but many others have trap-doors and desktops are the easiest.
  6. I can't disagree with the Logic of a SSD vs. a Spindle Drive. I have replaced all my Spindle Drives with Samsung and Crucial SSD. However RAM is the easiest to install and add a performance enhancement. However, 4GB is just not enough. RAM is cheap. Upgrade. Replacing a Spindle Drive with a SSD has technical challenges and a level of knowledge that most do not have. They can learn it and they can succeed and there are tools for this. For example there are specific Free OEM versions of Acronis TrueImage to clone SeaGate (which covers Samsung SSD) and Crucial drives. But, for many that are technically challenged, a Spindle Drive to SSD replacement is a bit too difficult and quite daunting.
  7. Don't use the software to show a request for the customer to perform a survey.
  8. Yes, to run the OS. However to run applications under the Win10/64 OS, the minimum suggested is 8GB RAM.
  9. That code segment has zero detections by all participating vendors at Virus Total... https://www.virustotal.com/gui/file/7ba7ad1783cb9ab6a7abb544a9ba372504aca0df257fa973410a5fa6b0342e6f/detection Malwarebytes Anti Malware (MBAM) does not target scripted malware via signatures so assuming the script snippet was malicious, MBAM would not "detect" it.
  10. The forum has the Research Center for submissions. I will request this thread be moved to; Newest Malware Threats a sub-forum of the Research Center.
  11. MBAM does not target scripted malware via signatures. Thus MBAM will not "detect" a BAT/CMD file. MBAM uses its anti exploitation module to block ill-effects a script may perform. This sub-forum is specifically for individuals who are seeking assistance with removing malware from their Windows Computer by a trained Forum Helper. Do you need such assistance ?
  12. The Intel i3 CPU is not that great. It's better than a Celeron or Pentium but not as good as an i5 or i7, etc. The Intel i5 has probably the best performance price ratio. There are two types of storage. Primary and Secondary. Primary storage is Fast RAM. Secondary Storage is slower Solid State Drives or Spindle Drives (15K RPM, 7,200 RPM and 5,200 RPM are the slowest) You need to raise the RAM ceiling so the %Memory used, shown in Task Manager, is reduced. How you can upgrade the RAM is dependent upon the Make and Model. You may have two memory module slots where one is populated with a 4GB module and the other slot is empty making the upgrade as easy as dropping in another 4GB or 8GB module. For the HP 15-dy1025nr it has two slots so you can add 4GB (Total 8GB), 8GB (Total 12GB) or 16GB (Total 20GB) for a system set with a physical maximum of 32GB. RAM at Newegg ----------------------------- 4GB ~$36USD 8GB ~$62USD 16GB ~$101USD EDIT: I just noticed all the RAM chosen at Newegg are "shipped from China" . I would then suggest using them as examples and NOT choose any online marketplace site that "ships from China".
  13. That's too little. If you are running Windows 10 64bit, you want at least 8GB RAM.
  14. PCRisk is giving very poor quality information and its not new. It is so generic and vanilla. Its made to capture the eye of someone who just doesn't know much about malware. The site is all about supplying insufficient information such that you choose I see other "guides" as well also indicate Maybe for affiliate revenue of some kind. Malwarebytes software is best downloaded directly from Malwarebytes itself and not from PCRisk. In any case Malwarebytes will handle any form of malware that topic covers.
  15. What is a "Complaint Letter Virus" ? Viruses are a distinct type of malware that are able to Self Replicate. That is they are able to autonomously spread on their own. From file to file. File to computer or computer to file or from computer to computer. Viruses are now a very, very, small component of the malware arena. When it comes to malicious software the terminology "virus" is widely abused and misused. The terminology "Complaint Letter Virus" sounds more like a colloquial term than a real computer virus name like; Jerusalem, Form, Nimda, Parite, WannaCry and Virut. As @Porthos has noted, MBAM does not target Documents 1as a letter would be. MBAM would block the malicious actions rendering a document may cause by the MBAM anti exploitation module. Computer Documents would not be viruses themselves. Malicious documents are mainly classed as Trojans as the propensity Today are documents that drop malware or download malware and do not autonomously spread. There were malicious documents in the past that did have this ability. That is the VB Macro language was used to create a Macro Virus that would infect MS Office and would subsequently infect any clean documents that were opened. These documents were then able to spread the Macro Virus to other systems. Today's documents do not contain Macro Viruses. Instead, the VB Macro Language is used to download and or drop malware and the vast majority of the payload malware are Trojans and not viruses. 1. Assuming a computer letter. One could have a US Postal "Complaint Letter" that contains something like Anthrax spores and thus could be a "Complaint Letter Virus".
  16. Newest Malware Threats is where one submits malware or suspicious files. You had posted a "text of experience" and I posted... Instead of following the directions in; I'm infected - What do I do now? you posted a sample submission. In any case, from the Virus Total Report URL, the software was first submitted to Virus Total on 2021-02-01 and it is now March 8th. The file has been known to Virus Total, and its participating vendors, for over a month with zero detections. The file is digitally signed and is not malicious.
  17. In the Malwarebytes for Windows Support Forum there is a thread that has a sequential series of Staff posts for each update whose body has information of what has been included, fixed or enhanced. There are also other good "sticky" threads to read by Staff. Malwarebytes 4.3
  18. No new high level modules have been added in a while. The core of the application went to version 4.3 not long ago. Periodically there are Component Package updates and version 1.0.1173 was the latest.
  19. What a bloody character. Fugitive John McAfee’s location revealed by photo meta-data screw-up Sure enough, the image of John McAfee with Vice’s editor-in-chief Rocco Castoro contains EXIF data that reveals, amongst other things, the GPS latitude and longitude co-ordinates of where it was taken. http://news-sophos.go-vip.net/wp-content/uploads/sites/2/2012/12/mcafee-exif.jpg Presumably whoever took the photo on their iPhone 4S had forgotten to turn off location services. http://news-sophos.go-vip.net/wp-content/uploads/sites/2/2012/12/exif-data.jpg Those co-ordinates suggest that John McAfee was photographed in Guatemala, having crossed the Belize border. http://news-sophos.go-vip.net/wp-content/uploads/sites/2/2012/12/google-maps.jpg Of course, John McAfee is a “person of interest” in a police investigation, and has not been officially accused of any crime. But it would be ironic indeed if John McAfee, a man who was a leading light in the anti-virus industry 20-25 years ago, was located by the authorities because of sloppy IT security. The lesson that all of us should learn is to be very careful about what information a photograph might be secretly carrying within it regarding the when and where a picture was taken. This wasn’t an easy article to write, as it involves someone who – although I never met him – I feel was an important element in the early years of my career in computer security. Just as I was about to post this article, I saw that in his latest blog post John McAfee claims he faked the EXIF data in the photograph to create a “fake emergency”. That sounds questionable to me. But in the strange ongoing story of John McAfee, it’s becoming increasingly hard to know what to believe.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.