Jump to content

lmacri

Honorary Members
  • Content Count

    272
  • Joined

  • Last visited

About lmacri

  • Rank
    True Member

Contact Methods

  • Website URL
    http://
  • ICQ
    0

Profile Information

  • Location
    Canada

Recent Profile Visitors

6,600 profile views
  1. I should also mention that a recent Win 10 update has a bug that could affect "always on" VPN services that require the Remote Access Connection Manager (RASMAN) to run in the background. See the 07-Jul-2019 Digital Technology article at https://www.digitaltrends.com/computing/windows-10-vpn-bug/ for more info. Kudos to bjm_ for posting about this bug <here> in the Norton Tech Outpost. Many Windows users permanently disabled any service related to Remote Desktop / Terminal Services in May/June 2019 after the Remote Desktop Protocol (RDP) vulnerability CVE-2019-0708 being discussed in this thread was announced. I posted a question today <here> in the Norton forum asking if those users might have inadvertently created a problem with Norton Secure VPN and/or other VPN services by disabling those services but haven't received an answer yet. ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Free v3.5.1-1.0.365
  2. Hi AdvancedSetup: I purchased a lifetime Malwarebytes license (with 5-digit ID code / 16-digit product key) in 2009. I still have the confirmation email and reference # from Cleverbridge but my old email address is no longer valid. If I create a new My Account profile with the email address I currently use to log in the Malwarebytes forum can I still register this lifetime license in My Account? ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Premium v3.5.1-1.0.365
  3. ... and further to Dave-H's comment, the system requirements for the Malwarebytes Extension for FF at https://addons.mozilla.org/en-US/firefox/addon/malwarebytes/versions/ need to be changed ASAP if any current and/or past versions of this extension are not compatible with FF ESR v52.9.0. There's currently nothing to prevent users with older versions of FF from installing this add-on and no obvious indication that this add-on, once installed, does nothing to protect your browser. The latest uBlock Origin v1.20.0, for example, correctly prevents installation from the AMO home page at https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ when viewed with an incompatible FF ESR v52.9.0 browser... ... and the uBlock Origin version history at https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/versions/ also displays: ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Adblock Plus v3.5.2
  4. Is this expected behaviour or a bug? The system requirements at https://addons.mozilla.org/en-US/firefox/addon/malwarebytes/versions/ state " Works with firefox 48.0 and later, android 48.0 and later" and imply the MB for Firefox browser extension should work in a Firefox ESR v52.9.0 browser (the legacy version for XP/Vista). I installed Malwarebytes for Firefox v1.0.44 in my Firefox ESR v52.9.0 browser on 13-Apr-2019 assuming it would function correctly but, as OP Dave-H observed, this add-on seems to be non-functional on my Vista SP2 machine - at least for ad/tracker blocking. For example, ads are blocked on the FileHippo site at https://filehippo.com/latest/ with the latest Adblock Plus v3.5.2 for FF (tested with the ABP option to "Allow Acceptable Ads" enabled and the Malwarebytes for Firefox add-on disabled) ... ...but no ads are blocked on that site with the latest Malwarebytes Browser Extension for FF v1.0.44 when Adblock Plus is disabled: ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Extension for FF v1.0.44 * Adblock Plus v3.5.2
  5. Hi BrianInWA: Just a thought, but do you have Settings | Application | Beta Application Updates turned ON? Your image shows you have Malwarebytes v3.8.1, but the download link at https://www.malwarebytes.com/mwb-download/ is still offering me a v3.7.1 installer and the v3.8 Beta version for beta testers was just posted yesterday in the Malwarebytes 3.x Beta board. Your dashboard also shows you have 94 scan detections. Are those all recent scan detections? It might be worthwhile to run the Malwarebytes Support Tool (under Technical Issues) as instructed in post # 2 of this thread and attach the mbst-grab-results.zip in your next post so the Malwarebytes employees can see details about your installation. ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Free v3.5.1-1.0.365
  6. Hi anthonydbarnes: The latest versions of FF v67.0.x / FF ESR v60.7.x are not compatible with Win XP and Vista. Mozilla ended support for the legacy version of Firefox v52.9.0 on my Vista SP2 machine in September 2018 and Mozilla had no process in place to automatically deliver the new security certificate that would fix my older version of Firefox. This issue is now resolved. The Mozilla blog Add-ons Disabled or Failing to Install in Firefox was revised on 14-May-2019 and now includes links to browser add-ons that are posted on the official Mozilla AMO store that will "resolve the expired security certificate issue and re-enable extensions and themes". As noted in Bugzilla bug report # 1550793, the bug fix was delayed for older versions of Firefox because Mozilla had to develop three separate extensions that would add the updated security certificate: FF 47 to 56: https://addons.mozilla.org/en-US/firefox/addon/disabled-add-on-fix-52-56/ FF 57 to 60: https://addons.mozilla.org/firefox/addon/disabled-add-on-fix-57-60/ FF 61 to 65: https://addons.mozilla.org/firefox/addon/disabled-add-on-fix-61-65/ I already followed the instructions in post # 20 of this thread to manually install the updated certificate in my FF ESR v52.9.0 browser so I don't plan to install the new FF 47 to FF 52 extension posted on the Mozilla AMO unless I hear there's a good reason to do so (e.g., that the certificate delivered by the extension posted on the AMO is actually newer than the one I manually imported on 07-May-2109). ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Free v3.5.1-1.0.365
  7. Hi exile360: Could you please clarify the statement that "Exploit Protection does actually still guard Chrome/Chromium based browsers"? The 29-Aug-2018 release notes <here> for the Component Package v1.0.441 state in part: While reading this thread I was surprised to learn that Malwarebytes Premium''s Exploit Protection module can be enabled for other Chromium-based browsers like Brave. Has something changed in Exploit Prevention since Component Package v1.0.441 was released in Aug 2018 that gives Google Chrome (and not a custom fork like Brave) some sort of partial protection from exploit (e.g., everything but DLL injection)? ---------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * MB v3.5.1.2522-1.0.365
  8. Hi AlexYanes: I've noticed the following issues running Norton Security v22.x and Malwarebytes Premium v3.x together in realtime protection mode, even after adding mutual scan exclusions to both products. On occasion, the Malwarebytes icon does not load in the system tray at boot-up unless Malwarebytes' self-protection module is disabled at Settings | Protection | Startup Options | Enable Self-protection Module | OFF. (see <here>). On occasion, my Norton Automatic LiveUpdates will not run to completion and will eventually time out and fail [i.e, my Norton security history at Security | History | LiveUpdate will log an update session with a Medium (orange) status and "0" updates delivered] unless Malwarebytes Web Protection module is disabled at Settings | Protection | Realtime Protection | Web Protection | OFF. Norton Download Insight will also fail intermittently and "Safe" executable files will be assigned a reputation of "Unknown" if Malwarebytes' Web Protection module is enabled (see <here>). If you have a Win 8.x or Win 10 OS then disabling the Windows Fast Startup power option (also known as hybrid boot-up / hybrid shutdown) will solve Problem # 1 for most users - see exile360's post # 14 in the thread Malwarebytes Free System Tray Icon Sometimes Just Does Not Appear. However, I know of a few Norton users with Win 8.x or Win 10 OSs who have reported in this forum that the Malwarebytes icon will occasionally fail to load into the system tray at boot-up even after Fast Startup is disabled. Regardless, I'd strongly recommend you disable Fast Startup on your Win 10 computer since it can can also interfere with product updates and loading of Norton services at boot-up and result in all sorts of odd glitches and unexpected behaviour - see peterweb's thread Windows 8/8.1 or 10 and Fast Start Feature in the Norton forum. Problem # 2 might be unique to users with older operating systems since I use Norton Security on an old Vista SP2 computer. I have deactivated my Malwarebytes Premium license and am currently using Malwarebytes Free as an on-demand manual scanner because of the problems described above. ASIDE: ...and further to exile360's suggestion in post # 3, if you need help creating mutual scan exclusions in Norton and Malwarebytes see the last two paragraphs of my 26-Jan-2019 post in Amylogamy's thread Norton Internet Security Hangs and Scan Does Not Complete in the Norton forum. ---------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Premium v22.15.2.22 * MB Free v3.5.1.2522-1.0.365
  9. Hi Abzyx: Catalin Cimpanu's 26-May-2019 ZDNet article Intense Scanning Activity Detected for BlueKeep RDP Flaw notes that many antivirus manufacturers have already developed exploits for this CVE-2019-0708 vulnerability "which they intend to keep private". Symantec released an Intrusion Prevention (IPS) definition (v20190522.061) for Norton on May 22, 2019 that adds protection for this vulnerability - see the details of Symantec's Security Update 2032 - and the image below shows my Norton Security v22.15.2.22 received this IPS definition update that same day. The fact that Norton v22.15.2.22 is in "maintenance mode" for Win XP and Vista as described <here> only means that product updates and feature changes will be limited going forward. I'm still getting all the virus and protection definition updates as other Norton users with Win 7 and higher, and as I noted in my 17-Apr-2019 reply to you in the BleepingComputer thread Hardening Vista- Are These Utilities All Legit?, "Norton v22.x products installed on Win XP and Vista machines have received three product updates [v22.15.0.88 (rel. Aug 2018); v22.15.1.8 (rel. Sept 2018); v22.15.2.22 (rel. Apr 2019)]" since Norton entered "maintenance mode" in June 2018 for these unsupported operating systems. ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Free v3.5.1-1.0.365
  10. For Vista SP2 users, please note that MS support article Customer Guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability: May 14, 2019 was modified on 23-May-2019 and now recommends that Vista SP2 users patch this vulnerability with the Win Server 2008 KB4499180 (May 2019 Security Only) update. Kudos to Vistaar for posting that information <here> in the Vista Forums. The release notes for KB4499180 at https://support.microsoft.com/en-us/help/4499180/windows-server-2008-update-kb4499180 imply that KB4403730 (the latest Servicing Stack Update of April 2019) should be applied before KB44991180. I've posted further details in reply # 1736147 of the AskWoody.com thread MS-DEFCON 3: Get Windows XP, Win7 and Associated Servers Patched. Given all the problems Vista SP2 users have reported after installing the April / May 2019 Win Server 2008 updates, I've decided to hold off installing KB4403730 (if required) and KB4499180 until I'm sure it's safe to do so. I’ve ensured that Remote Assistance (Control Panel | System and Maintenance | System | Remote Settings) is disabled, and when I checked the status of Port 3389 at https://www.grc.com/port_3389.htm by clicking Probe THIS Port my port status was reported as Stealth (see my image in post # 12). I assume that means I'm currently protected from the vulnerability described in CVE-2019-0708. I'm still wondering, though, if applying the recommended Win Server 2008 patch(es) would provide additional protection from exploits that could be designed to attack other vulnerabilities in Remote Desktop / Terminal Services. ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Free v3.5.1-1.0.365
  11. Further to my previous post # 9, has anyone heard if a patch specifically designed for Vista SP2 has been released for the Remote Desktop / Terminal Services vulnerability? I've been monitoring the MS TechNet article Prevent a Worm by Updating Remote Desktop Services (CVE-2019-0708) but it hasn't been revised since 14-May-2019. As of last month's April 2019 Patch Tuesday the Win Server 2008 patches have changed the build number of Vista SP2 from build number from 6.0.6002.xxxxx (Build 2) to 6.0.6003.xxxxx (Build 3). I don't know if Win Server 2008 updates KB4499149 (the Monthly Rollup) and KB4499180 (Security Only update) both increase the build number, but this is a deliberate change by Microsoft – see the support article Build Number Changing to 6003 in Windows Server 2008 – and some users posting in Jody Thorton’s MSFN thread Server 2008 Updates on Windows Vista are speculating that this change to build number 6.0.6003.xxxxx is the cause of the BSODs and software errors on their Vista SP2 system. Regarding CVE-2019-0708, GoneForPlaid has posted a helpful hint in reply # 1717774 of the AskWoody.com thread There’s Now a Freely Available Proof of Concept Exploit for the “Wormable” WinXP/Win7 Bug. Go to Steve Gibson's Gibson Research Corporation site at https://www.grc.com/port_3389.htm and click the Probe THIS Port button. If the status of Port 3389 is Stealth (best) or Closed (good) as shown below then your system is supposedly configured to block an attack from this Remote Desktop / Terminal Services exploit. Definitions for the port status (Stealth / Blocked / Open) are available at https://www.grc.com/su/portstatusinfo.htm. ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Free v3.5.1-1.0.365
  12. Please note that a few Vista SP2 users like Pim, dinosaur, etc. who tried to install the May 2019 Patch Tuesday Windows Server 2008 updates KB4499149 (Monthly Rollup ) or KB4499180 (Security Only) have reported issues like failed updates and BSODs in the AskWoody.com thread MS-DEFCON 3: Get Windows XP, Win7 and Associated Servers Patched. Woody is currently suggesting <here> that "If you’re running Vista, hang tight. Looks like Microsoft forgot to document that one." I'd advise that Vista SP2 users monitor that AskWoody thread for further feedback or at least make sure they create a full system image with imaging software like Macrium Reflect Free before applying these May 2019 Windows Server 2008 updates just in case they cause problems. I've decided to wait a bit longer to see if Microsoft eventually revises the MS TechNet article Prevent a Worm by Updating Remote Desktop Services (CVE-2019-0708) and includes links in that article to a security patch designed specifically for Vista SP2. Microsoft posted five special out-of-band security updates for NSA-leaked exploits for Vista SP2 on the Microsoft Update Catalog after this OS reached its end of extended support (see the MS Answers thread More Shadow Brokers Exploits Patched June 2017 for Win XP and Vista) and I'm hoping they'll release a similar out-of-band patch for this Remote Desktop Services (known as Terminal Services in older OSs like Vista SP2) vulnerability in the next few days. In the mean time I've gone to Control Panel | System and Maintenance | System | Remote Settings and confirmed that Remote Assistance is disabled on my Vista SP2 system. ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Free v3.5.1-1.0.365
  13. Has anyone tried reinstalling FF ESR v52.9.0 today with a new installer downloaded from https://www.mozilla.org/en-US/firefox/new/ ? I was curious if the v52.9.0 installer from this download page now includes the updated certificate. I just checked the 32-bit installer on their FTP site at https://archive.mozilla.org/pub/firefox/releases/52.9.0esr/win32/en-US/ and it looks like it hasn't been updated since 25-Jun-2018. Just an FYI that Forum Moderator philipp posted instructions today in the Firefox forum thread “Add-ons disabled” problem in Firefox 52.9.0 ESR (32-bit) for Windows XP for manually importing the updated certificate into FF ESR v52.9.0 (the legacy version for Win XP and Vista) that fixed the problem in my own browser. Here are the general steps: Download the updated certificate addons-public-intermediate.crt from https://hg.mozilla.org/releases/mozilla-release/raw-file/tip/security/apps/addons-public-intermediate.crt (link is external). In Firefox, go to Tools | Options | Advanced | Certificates | View Certificates, click Import, and select the downloaded addons-public-intermediate.crt file. Click OK in the pop-up dialog box (i.e., do not check any check boxes). You will see a new certificate listed for Mozilla Corporation named signingca1.addons.mozilla.org (see attached image). Enter the advanced configuration settings (type about:config in the address bar) and search for app.update.lastUpdateTime.xpi-signature-verification. Right-click this setting and choose Reset from the context menu. Re-start Firefox. If you previously implemented the temporary workaround and changed xpinstall.signatures.required to FALSE in about:config, remember to change this setting back to TRUE after importing the updated certificate. My understanding that this is a permanent fix but this procedure will likely have to be repeated if you re-install / refresh your FF ESR v52.9.0 browser at some point in the future. ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Free v3.5.1-1.0.365
  14. The latest available announcements on this topic are now being posted on the public Mozilla Add-ons Blog at Update Regarding Add-ons in Firefox, which confirms that the automated fix being rolled out via the Shield Studies feature does not apply to FF ESR (extended support release) editions, since the Shield Studies feature is not included in FF ESR editions: The following workaround for Firefox ESR has been suggested in many forums. Type about:config in your address bar and click I Accept the Risk when you see the warning This might void your warranty!. Then search for xpinstall.signatures.required and double-click the setting to temporarily change the value from TRUE to FALSE . Once a permanent fix is announced for Firefox ESR users can go back into their configuration settings and double-click xpinstall.signatures.required to toggle the value back to the default TRUE. See the Mozilla support article Add-on Signing in Firefox for more information about this configuration setting. I tried this in my Firefox ESR v52.9.0 (the legacy version for Win XP and Vista) and Tools | Add-ons | Extensions now shows a warning for Adblock Plus and my other extensions (“<extension name> could not be verified for use in Firefox. Proceed with caution.“) but they're all enabled again and functioning normally. ------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Deluxe v22.15.2.22 * Malwarebytes Free v3.5.1-1.0.365
  15. Never mind, then. I just assumed this was a bug Malwarebytes might be able to fix on their end after reading MAXBAR1's 14-Mar-2019 thread Problems with Mail Notification of the Forum on iPhone about issues reading forum auto-notifications with iOS Mail (but not MacOS Mail). I can try adding noreply@invisioncloudcommunity.com to my Safe Senders list. That might be safer than turning off my default Junk E-Mail rules altogether. -------------- 32-bit Vista Home Premium SP2 * Firefox ESR v52.9.0 * Norton Security Premium v22.15.2.22 * MB Free v3.5.1.2522-1.0.36
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.