Jump to content


  • Content Count

  • Joined

  • Last visited

Everything posted by exile360

  1. That's definitely possible since all of your traffic has to go through their servers. You can try disabling the VPN to test and verify that it is as fast as normal, then re-enable it to see if it slows down again just to make sure, but that is probably the cause. There will be some natural latency when using a VPN just because all traffic must go through the VPN provider's servers first so it adds a lot of additional hops and overhead to your traffic/connection. Depending on what you are trying to accomplish with regards to the VPN, if it's just a matter of privacy from your ISP then you could try an alternate DNS instead such as OpenDNS (and optionally use DNSCrypt as well which adds additional encryption to your DNS lookups/connections), Cloudflare's DNS (one of the fastest DNS providers available), Google DNS or one of many other alternate DNS providers. Of course there are also other VPN providers out there, but I believe pretty much all of them will likely slow down the connection at least somewhat. You could also use an alternative if browsing privacy is your main concern such as Tor which is a special build of Mozilla Firefox designed to provide the highest level of privacy/anonymity online possible pretty much. You can also take a look at the info in this article to see if any of those tips for speeding up your VPN help.
  2. Yes, my theory is that it's probably just some trace left behind from the PUPs you removed with Malwarebytes and ADWCleaner. It is likely some kind of browser add-on or something and the scanners are just missing a small part of it like one or two files and/or registry entries and that may be what's causing all of this. Either way it doesn't hurt to check so I'm glad you decided to go ahead and post in the malware removal area. At the very least you'll have peace of mind knowing that nothing is left of those PUPs that were detected/removed before and that nothing else is present on the system. I will go ahead and inform the Devs about this issue anyway though, just in case it is a bug with those settings in Malwarebytes so that they can investigate it. Thanks again for the logs and info.
  3. They usually send people to the major security software/hacker tech conferences each year and they often have a booth if possible, and that would be where to grab the swag.
  4. Confirmed it's still broken just in case anyone was wondering (this very area shows as unread due to a single moved topic).
  5. Yep, that's definitely an option.
  6. It may also be using system fonts, which can be changed, though some of them can be tricky as some are hard coded and must be modified via more advanced theming tools/system file modification tools (hex editors, style builders etc.). That's not true of all of them though, but I suspect they are probably just using an embedded font or that the setting to indicate the font for Malwarebytes is hard coded into the application somewhere like in one or more of its exe(s)/DLL(s).
  7. Thanks, there are actually a large number of recent detections in your logs from Malwarebytes. This makes me suspect that perhaps the blocks might actually be related to that which would explain why disabling those settings didn't help. Please run ADWCleaner and have it remove anything it finds then restart if prompted to complete the removal process. Once that's done, try launching IE again with Exploit Protection enabled to see if there is any difference. If not, then I would recommend that you follow the directions in this topic and create a new topic in the malware removal area including the requested logs and info by clicking here and one of our malware removal specialists will assist you as soon as one becomes available to help you check and clean any remaining threats, and hopefully they will be able to eliminate or fix whatever it is causing this issue. You don't have to do this of course, but I would definitely recommend it just to be safe as I wouldn't want your system to be infected or have some remaining PUPs (Potentially Unwanted Programs) onboard without you knowing.
  8. OK, thanks for the additional info. I don't want to be a bother, but I really would like to gather some info for the Devs so that they may investigate and hopefully fix this issue in the future if you wouldn't mind and if you have the time. If you're up to it, please open Malwarebytes and navigate to Settings>Application and under Event Log Data toggle the setting to On, then restart your system and then replicate the issue with Malwarebytes blocking IE again with the two settings still disabled and with Exploit Protection enabled then do the following: Download and run the Malwarebytes Support Tool Accept the EULA and click Advanced tab on the left (not Start Repair) Click the Gather Logs button, and once it completes, attach the zip file it creates on your desktop to your next reply If you decide to assist, please provide the ZIP file then you may (and should, so it doesn't continue creating large logs on your system) disable the Event Log Data setting in Malwarebytes again. Thanks
  9. Unfortunately I doubt that you can. Malwarebytes uses QT for the vast majority of its codebase/UI, and I suspect the font and other UI elements are locked within the code and I've discovered no specific fonts or font settings anywhere for it. That said, if you could post some details and images of the issues you're seeing, I'd like to report the issue to the Devs as they may be able to fix it.
  10. That's odd, you should be able to uncheck the following two options then click Apply as illustrated below, though it's possible that the module is remaining loaded into the IE process so you might also need to exit/restart Internet Explorer or even quit/restart Malwarebytes for it to fully take effect: If it still doesn't work, try restarting the system to see if it works with Exploit Protection active and those two options disabled and please let us know if it does not. Thanks
  11. Pricing for business products can be found on this page.
  12. Yes, there used to be, but I don't believe there's anything available any more, at least not at the moment but perhaps they'll bring it back at some point. They used to have T-shirts, hoodies, ball caps, mousepads, webcam covers for laptops, stickers, branded USB flash drives etc. but I don't believe any of it is for sale at this point. The closest thing I could find are the wallpapers here. I can put in a request if you like for them to bring back the Malwarebytes branded swag.
  13. Yeah, it sucks that you can't even game online safely any more. We have to deal with Steam password stealers, ad embedding malware, and countless Trojans and bots that try to infiltrate our systems through our favorite games. It's really sad.
  14. Yeah, finding a good, trustworthy VPN is hard. I've still yet to find one that I'm willing to trust/use, though I am using DNSCrypt to encrypt my DNS (I use Simple DNSCrypt with multiple servers, no logs, full DNSSEC support and of course DNSCrypt protocol encryption).
  15. I just spotted this article and thought it might be relevant to this discussion on quantum computing as it applies to cybersecurity.
  16. That's OK, most malicious/unwanted ads (especially the likes of which that would attempt things like drive-by downloads) should be blocked using Malwarebytes own browser extension beta which is available for Chrome (and other Chromium based browsers like SRWare Iron and Vivaldi) as well as Firefox: Chrome Firefox If you don't have it already, I highly recommend it.
  17. Don't you just hate it when you're visiting a website and some ad tries to download something to your computer (usually some sort of malicious browser add-on or junk registry cleaner/driver updater/system optimization etc. that you never asked for and don't need because you're smarter than that, right?). Well, Google has decided to try and do something about it. Apparently they plan to add automatic blocking for any ads that try to use automatic download functionality to install junk on users' systems through the browser. You can read more about it in the article from ZDNet below: Google Chrome to block automatic downloads initiated from ad slot iframes
  18. Bad news for gamers; it has been reported by Dr Web (makers of the popular free Dr Web CureIt! AV scanner/malware remover and Dr Web AV software) that 39% of all Counter-Strike 1.6 game servers were malicious and attempted to infect players with malware according to ZDNet. The servers, which were using 0-day remote code execution (RCE) vulnerabilities (basically the worst kinds of vulnerabilities) in the game clients, were using an infection known as Belonard to display ads to players in-game and add new servers to their client lists, also creating proxies on their systems and advertising those to other players signing into the game, showing a low ping rate to entice them to jump on where they'd subsequently be redirected to one of the malicious servers to have their own systems/clients infected by the malware, thus making them a part of this advertising botnet scheme. Thankfully, according to Dr Web, the botnet has now be shut down but it speaks to the risks involved with any software that interacts with the web, not just web browsers and shows more than ever that we must always be on our guard against the next attack which could come from anywhere.
  19. Somewhat ironic considering they've also just announced that DirectX 12 support is coming to Windows 7 (for at least one game; likely more in the future according to reports): Microsoft Brings DirectX 12 To Windows 7
  20. Yep, or even create additional random passwords as responses, or just absurd stuff. That's generally what I do, that way it reduces the probability of anyone guessing correctly as well as reducing the amount of personal info I give out to anyone.
  21. True, but it's also on a green bar so at least the colors are (somewhat) consistent I definitely think it could be clearer though, and I'll be sure to pass along your feedback to the Developers.
  22. You're welcome, I'm glad I could help. Regarding the use of green/white, yes, I can see why that might be a bit confusing. I believe the logic behind the colors is that green typically means protected in most security applications (or up to date in the case of things like Windows Update) and a switch toggled to the right means "On" and left means "Off" in the case of settings. As for the numbers, this is typical of many ad blockers and similar browser add-ons. For example, here is an image showing two other add-ons and their blocks (Adblock Plus and Ghostery):
  23. My apologies that you sill haven't gotten a response. Let me ping the Product Manager for Malwarebytes and hopefully she will be available to answer your questions. @bdubrow could you assist please? Thanks
  24. By the way, for the curious, Malwarebytes' own Director of Research, Mieke Verburgh (also known by her online handle Miekemoes (yes, that's literally "Mickey Mouse")) does an excellent job of explaining Malwarebytes' approach to AI in this post. I highly recommend reading it, particularly the sections entitled What does Malwarebytes do instead? and What are the weaknesses?.
  25. The switches are for blocking those categories of items on the current website you are viewing, so when each one is on/enabled (i.e. green) those types of items will be blocked for the current site you are viewing in your browser: Likewise, under Settings you can configure individual blocking components on a global level for all sites (if, for example, you didn't want Malwarebytes to block PUP related sites (Potentially Unwanted Programs): The Allow List is where the list of sites are stored which you have chosen to exclude from blocking, either from individual components, or to exclude completely for all of the browser extension's blocking functions (think of this just like the Exclusions tab in Malwarebytes where you can exclude items from individual protection/detection components or from all of Malwarebytes components). The number you see on each page you visit is the number of items that Malwarebytes has blocked for the current tab/site (it may be particularly high on sites that contain many ads and trackers for example). You can find documentation on the browser extension in the Malwarebytes support knowledgebase here and if you have any issues or questions (such as a possible false positive to report) you may post it here for the Chrome version and here for the Firefox version. I hope that helps to clarify things
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.