Jump to content

David H. Lipman

Experts
  • Content Count

    14,732
  • Joined

  • Days Won

    1

Everything posted by David H. Lipman

  1. Oh I see, you wold Exile the insect in a 360 Degree perimeter pattern..................
  2. The problem with the Laser is that it would be expensive to implement in having to calculate the power required to kill the insect and not burn a hole in the chassis or electronics and to effectively target the moving object. That kind of tactical targeting may be cost prohibitive.
  3. Here's my proposal @exile360 I can see an internal Motion Sensor or an array of sensors built into the chassis. When the sensor is "tripped" LEDs of specific wavelengths of Ultraviolet light is generated in front of a simple Van de Graaff generator. The insects are physically attracted by the UV light and when the approach the light source they are killed by a high voltage discharge. Basically a scaled down version of a Bug Zapper placed into the chassis.
  4. This refers to the Windows COM Surrogate file; DLLHost.exe COM stands for Component Object Model and refers to programming constructs called “COM objects”. For example one can program using VB Script or KiXtart to call a COM object through what is called COM Automation ( aka; OLE Automation ). For example the following sub-script sample uses COM Automation. Specifically the function createobject( "wscript.shell" ) set wshshell = createobject( "wscript.shell" ) set wshfso = createobject( "scripting.filesystemobject" ) if not wshfso.fileexists(wshshell.expandenvironmentstrings("%Public%") + "\amsi.dll") then wshfso.copyfile wscript.fullname,wshshell.expandenvironmentstrings("%Public%") + "\amsi.dll" end if DLL is shorthand for a Dynamic Link Library. What that refers to is a file of Library Functions. That is where one can use the DLL file and call a function and not have to write their own function but take advantage of a programming function that already exits. What is meant by DLLHost.exe as a COM surrogate is a third party acting in a particular role, almost like a Proxy, and thus this executable is a kind of a proxy access to COM automation. As an example, a COM object may be used in handling media files such as videos for the generation of a Windows Thumbnail. Sometimes the file; DLLHost.exe may hold the File Handle of the media file in an "Open" state and this may not allow that file to be moved or deleted. Thus causing a "file lock error". I often experience this when I manipulate a video using VLC Player. Sometime I may be done with the file and may want to delete it but I don't get an error, I find Windows Explorer takes a real long time in TRYING to delete the file but it doesn't happen. When I kill the process DLLHOST.EXE which is holding that video file's File Handle Open, Explorer can delete the file as requested. Q: How do I know that the process DLLHOST.EXE is holding that video file's File Handle Open ? I can use the Microsoft utility Process Explorer. From the Pull-Down menu I can choose; Find. From there I can enter the name of the video file such as MyVideo.MP4 Process Explorer will then show that a particular running DLLHOST.EXE is the culprit ( there may be multiple instances of the DLLHOST.EXE running simultaneously ) where I can then choose to Kill the process and free-up MyVideo.MP4 for doing something like moving or deleting it.
  5. RE: Microsoft Operating Systems BlueKeep Vulnerability I don't know what you mean by "...Malwarebytes is seeking GoldBrute BotNet..." but if you have samples of malware that may be exploiting the vulnerability and MBAM does not detect it, samples can be submitted in; Newest Malware Threats after reviewing; Malware Hunters group Purpose of this forum
  6. Tall Kitchen garbage bags, 50 Gallon Garbage Bags or standard heavy Duty Contractor bags. I have thought about the concept of Insecticides. One can't guarantee that it will NOT cause corrosion of electronics, circuit bridges, plastic issues and the possibility of causing an allergic or other reaction by customers when they receive back the equipment. That all may be dependent on the type of agent and how it is applied.
  7. Don'y worry. Vista and WinXP SP3 are still supported and they are already well past End of Life ( EoL ).
  8. If there were a choice, I'd take the old editor over this CKEditor! The CKeditor being used is a downgrade IMHO.
  9. The screen capture in Post #11 looks like a Firefox Spell Checker function as noted with the "Inspect Element (Q)" in that JPEG as well as mine w/o said add-on.
  10. @exile360 It isn't the hair per se. It is the human detritus. Skin which flecks-off that may also contain skin and hair mites ( a microscopic arthropod ) which is a well established allergen. In a shop environment, I think the idea of placing customer ADPE into closed plastic bags is a very good way to "quarantine" the equipment in case they may contain something the shop doesn't want to be introduced into their environment. References: https://en.wikipedia.org/wiki/Demodex_folliculorum https://www.mayoclinic.org/diseases-conditions/dust-mites/symptoms-causes/syc-20352173 https://academic.oup.com/jtm/article/17/1/21/1879775
  11. I worked in an environment where we had roaches, mice and even stachybotrys. Roaches love electricity and magnetism and would be found congregated in speakers and electric clocks. The tool of choice was a vacuum with a hepa filter incorporating a long wand. A soft bristle paint brush would dislodge dust and roach carcasses that the vacuum would suck-up. I used 100% isopropyl alcohol and I have continued to use it to this day for multiple purposes. If one takes a ComptTIA A+ exam and it suggests that to clean a PC of dust is to use a can of compressed air, they are WRONG. A can of compressed air is apropos to a notebook but not a desktop PC. Desktop tower computers are often placed on the floor but all collect and concentrate the dust of the environment. Using compressed air only makes that dust airborne. The health of the computer technician is then placed at-risk. That dust can contain disease that can make the technician sick. Such as the Hanta virus from mouse dropping and dried urine or mold spores like that from stachybotrys. Isopropyl alcohol kills pathogens and the use of a vacuum with a hepa filter reduces the the possible impact of breathing in mold spores and allergens that were concentrated within automated data processing equipment (ADPE). I'll always remember the day when I placed an opened bag of corn chips in my cubicle's above head cabinet and a mouse made his way into the bag. In those days computer mice had "mouse balls". When an employee had left the organization, I would collect their ADPE for inventory, preventative maintenance and for their preparation for new personnel. Under one person's desk I found a computer mouse ball that had been gnawed by a mouse. The multiple parallel grooves left by rodent incisor teeth was undeniable. While this photo is not mine, it is indicative of the problem we faced.
  12. It won't run if you do not have the latest Flash version installed which is; 32.0.0.192 https://helpx.adobe.com/flash-player.html Choose "Check Now"
  13. There's really nothing wrong with Flash. Like any code, the code can be made to be malicious which does not seem to be the case here. Market forces are pushing it to be replaced by HTML5. You can have Firefox allow the Flash content to be rendered.
  14. For future reference. That's a quote not BB Code Tags. The objective is to obfuscate the URL so it is not "clickable" ( aka; known as a Live Link ).
  15. All are encouraged to review the videos at... https://www.fbi.gov/investigate/counterintelligence/foreign-influence/protected-voices Obrigado @Firefox
  16. Please Reference: US FBI PSA - Tech Support Fraud US FTC Consumer Information - Tech Support Scams US FTC - Tech Support Operators Agree to Settle Charges by FTC and the State of Ohio US FTC - FTC and Federal, State and International Partners Announce Major Crackdown on Tech Support Scams Malwarebytes' Blog - Search on - "tech support scams" Malwarebytes' Blog - "Tech support scams: help and resource page"
  17. RE: Fake Malwarebytes Lifetime Licenses Malwarebytes is doing the best they can.
  18. Very Good. Please wait for a response from @nasdaq that this process is complete.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.