Jump to content

nukecad

Honorary Members
  • Content Count

    457
  • Joined

  • Last visited

About nukecad

  • Rank
    True Member
  • Birthday 02/26/1960

Profile Information

  • Location
    Cumbria (UK Lake District)
  • Interests
    Beer, Beer, and did I mention Beer?

Recent Profile Visitors

3,368 profile views
  1. From your post I assume you are only scanning occasionally and not running the real time protection. Even when you close the GUI the little icon remains in the system tray because it leaves a background task still running. Try right clicking the icon in the system tray and selecting 'Quit Malwarebytes' from the menu that pops-up. (Note on some systems you have to left click not right click, it seems to be machine specific). That should remove the icon, stop the background process, and prevent it from reappearing/relaunching at computer startup. One thing to note is that you will have to do this after every manual scan that you run, I find it easiest just to 'Quit Malwarebytes' from the tray after I have completed a scan.
  2. Apologies for jumping in, but I would suspect that install of Chrome made the .android directory. If you are ever tempted to try it then it can be a PITA to get rid of everything Chrome creates/changes when you install it.
  3. Since last posting in this thread I've become a moderator on the Piriform (CCleaner) forum. So I can now access the private 'staff' forum there and see a bit more about what they are intending, which is in line with what your email says. Not mentioned in that email is that they are also making changes the behaviour of the pre-ticked offers, we'll see just what they do. As far as the hijacked file associations we have seen a few complaints about it on their forum. Not as many as I was expecting TBH, maybe because the browser is only being offered to 'a few' users at the moment. I'm sure everyone here knows how to reset file associations, but just in case: https://forum.piriform.com/topic/54518-a-warning-about-the-latest-update-and-fix-for-pdf-files-hijacked-and/?tab=comments#comment-308428
  4. Is this old news, a collection of old issue reports? I haven't checked all of them; but just taking ASUS that was know about in December 2018, I remember checking it on my Asus laptop. https://www.bleepingcomputer.com/news/security/asus-gigabyte-drivers-contain-code-execution-vulnerabilities-pocs-galore/
  5. They have improved again recently. Someone finally saw sense and started listening to the user forum. There are still some issues but it does look as if the marketing men have been told to back off and let them get their former reputation back. We'll see how it goes.
  6. Just to add to what Exile360 has said about using CCleaner. If you do try it then I suggest that you use the 'Custom Clean' rather than the newish 'Easy Clean'. Easy Clean uses it's own cleaning definitions which you can't modify (well you can a bit, but have to do it each time) it's meant as a very simple option for users with little computer knowledge. Custom Clean gives you more control of what to clean and what not to clean, lets you add specific things to clean or exclude specific things, and remembers your settings.
  7. This is because they have different ways of looking for different things. Malwarebytes is designed to look for malware, and will also find some Potentialy Unwanted Programs (PUPs) and Potentially Unwanted Modifications (PUMs). Adw is designed to look more specifically for PUPs and PUMs. So for the moment the two things do different jobs, and that is why they are still different programs. I believe that the intention is to eventually merge them into a future version of Malwarebytes, but for now they still each stand alone and do different jobs.
  8. I looked at one or two 3rd party junk cleaners, and just what they were finding to clean, then took a plunge and wrote a batch file to clean what I wanted from my computer. A long time since I had done any coding, but I found it easy enough to do. Because it's basic (no error handling), specific to my particular machine, and only cleans the browsers/apps that I actually use, it's like a rocket. It will finish a clean of cookies,supercookies, browser history/cache, some recent file lists, etc. in about half a second. (Less time than it takes a cleaning app to launch). It also cleans some Windows stuff, but I generally leave that to Storage Sense to handle on a daily schedule. I'm still developing it and add new things now and again.
  9. I'm still active on the CCleaner forum. (Although I rarely use CCleaner these days, I wrote my own cleaner). We have been nagging them for years (well before Avast acquired them) about the pre-ticked offer boxes. And there have in the past been other problems with bundleware being installed without the option even being shown. (I once got an install of Avast that wasn't offered so there wasn't even a box to untick. That made for an interesting thread on the forum, especially when it happened again but I caught it before it actually installed). We know that they are working on a new installer, but they haven't confirmed yet if that will still include pre-ticking as well. It can be a pain to remove these downloaded/installed offers if you aren't paying attention and leave the box(es) ticked when updating. This issue with the new CC browser 'hijacking' the file associations is just the latest consequence if you inadvertently download/install the browser. TBH most browsers do this when you first install them, CCleaners browser is not unique in that respect. Most CCleaner 'regulars' do not use the 'Standard installer', or update from within the programme itself. Instead we go to the CCleaner 'Builds' page and download either the 'Slim' installer which does not contain any bundled offers, or the 'Portable' which does not need to be installed. https://www.piriform.com/ccleaner/builds In fact I will usually download the 'Portable' zip file, copy the new CCleaner.exe/CCleaner64.exe from within it, and overwrite the existing/installed CCleaner.exe/CCleaner64.exe. That gives you the latest version on your PC without running any installer. I also delete the following after any actual install that I do. (And I have them as an 'Include' in CCleaner, so it deletes them itself when first run following an install): The first in the list is their 'Emergency Updater' with which they can change things without asking you first, that's a security hole and has to go. C:\Program Files\CCleaner\CCupdate.exe C:\Program Files\CCleaner\Lang\*.* C:\Program Files\CCleaner\Setup\*.* C:\Windows\System32\Tasks\CCleaner Update
  10. I had already downloaded/installed it yesterday, by ignoring the block. But I just tried it again and it downloaded with no problem, so looks like you fixed it.
  11. The download of the installer for Wintopo (Raster to Vector converter for CAD operators, free version) was blocked by the MB Firefox extension. Once downloaded the file itself scans as clean with Windows Defender/MB3 and on virustotal. Download page: http://www.wintopo.com/download.htm Name of file download blocked: setup-wintopo.exe EDIT- Just noticed that the site is http: and not https: - although the page itself wasn't blocked maybe that's why the download was blocked? (Because it was comming from a 'non-secure' webpage?)
  12. I don't think that is the job of Malwarebytes. MB is here to stop odd (nasty) things getting onto your computer. Anything more than that is a different problem.
  13. I still suspect that this is your government doing something, Malwarebytes can do nothing about that other than block anything that is dodgy by blocking the video play itself. MB is simply warning you that there is / maybe something dodgy going on. It's up to you whether you accept that warning or ignore it and turn MB off for that site.
  14. No, I don't read Spanish. (I can handle a bit of French). It's easy enough for a hacker to hide their IP and give a false one, even simple forum spammers do it all the time. Everyone can hide their real IP and look like they are originating from somewhere else, that's part of what using VPN's is about, in fact it's probaby the main use of VPN these days - to look like you are in a different country and so get around local geographical blocking. (Amazon run a VPN service, so anyone using it could/would look like they were coming from Amazon). Have you tried allowing the site in the MB extension settings? (Or even temporarily disabling the extension in the Firefox add-ons manager).
  15. Yes, but your government may be trying to redirect it, or inject a 'warning' message , or even inject a 'tracking cookie' to see who's trying to go there, or some other restriction for users in your country. And they are clever enough to only do that for IP's registered in their own country. You do say that there were government sponsored DDoS attacks on the site recently, if that's true then they are hardly likely to just stop at just that. That could be what MB is picking up, any government sponsored meddling, and so MB is blocking the site for you because of that meddling. Presumably you have tried 'Allowing' the site in the MB extension settings? You might consider trying a VPN from a different country to get around any local meddling that may exist? https://www.howtogeek.com/133680/htg-explains-what-is-a-vpn/
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.