Jump to content


Honorary Members
  • Content Count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About pifreak

  • Rank
    Regular Member
  • Birthday 05/15/1992

Contact Methods

  • Website URL
  • ICQ

Profile Information

  • Location
    Wisconsin, USA
  • Interests
    Computer Science and programming, etc.
  1. I think there should be an option to allow something like uTorrent.exe from the i.p. blocking. I want i.p. blocking for websites and other traffic; I don't want to disable it totally. As I've mentioned before, at the university we use torrents for Eclipse development tools and Linux Distros. Torrents are great because you can limit bandwidth and help support the projects by not jamming the FTP servers. It isn't fair to block all of the i.p. when trying to share legal, ethical, harmless materials. There should either be an allow for program or allow/deny P2P i.p.'s Does this make sense? pi`
  2. It looks great. Why does Trojans get to be capitalized? "including viruses, Trojans, spyware, adware and rootkits. "
  3. I used uTorrent to download Eclipse SDK for class. Torrent programs are useful when used correctly. You can limit bandwidth (so people watching Netflix on your internet don't get mad...etc) Anyway, even with the torrent deleted and the program blank, MBAM occasionally pops up with blocked i.p. for utorrent.exe Nothing is running, what's this about?
  4. This popped up on MBAM pro when Skype has an update: Is it malicious or is it false positive?
  5. sounds good, every program has it's place and it's good to clarify. Can't make one program do it all, I guess.
  6. Is it possible to implement heuristics in website scanning? (pro MBAM) What I mean is that most of the rouge websites I see are identical or very similar, looking like My Computer and performing a scan, before a generic pop up shows. It would be handy to scan for a peice or peices of javascript that perform a certain way or key things in those websites. The disadvantage would be slow loading times, unless if once scanned websites are added to a trusted list. I don't know if this idea is garbage, and I'm sure it would be difficult to implement. Discussions are fun, though. pi`
  7. Someone posted a pic in IRC, and it came up blocked by MBAM pro, so I'm wondering why it's blocked. http://www.urlvoid.com/scan/e-shuushuu.net http://www.ipvoid.com/scan/ both clean thanks, pi`
  8. Thanks for the wishes Code Hunter! And thanks for the post ShyWriter. Please, everyone, drink responsibly and do not drink and drive. My friend Mike Near was killed by a drunk driver a few months ago, and it's pretty hard to deal with. pi`
  9. Try Puppy Linux Puppy has been tested on a very old machines but the best results for the standard release of Puppy Linux to run at a reasonable pace have been achieved with the following: * CPU : Pentium 166MMX * RAM : 128 MB physical RAM for releases since version 1.0.2 or failing that a Linux swap file and/or swap partition is required for all included applications to run; 64 MB for releases previous to 1.0.2 * Hard Drive : Optional * CDROM : 20x and up It's a free operating system and I like it for old laptops http://puppylinux.org
  10. OH So It's only broken on my link?! Thank you so much! Sorry to bother you about it then. :0) pi`
  11. Nobody fixed it yet. I figured it out, the correct link is: http://bit.ly/9YkJSg the link it makes you tweet is: http://bit.ly)YkJSg The incorrect link is on the twitter part of this site: https://store.malwarebytes.org/342/?scope=c...action=<blah blah blah>&id=<blah blah blah> Fix it unless you want the purchasers to be tweeting a junk broken link instead of linking followers to the purchase page for MBAM? Screeny again:
  12. Seem to be working fine, but remembered not to quit just because symptoms are gone Did I install Java wrong the first time? Is it ready to be installed again? I'll try a million random searches and see if anything funny happens. Edit: I tried getting a redirect but it all seems good now. Thank you for the help, sorry to be a bother! Any idea where this was coming from? pi`
  13. It's a friend's computer..I don't know when I'll have access to it. pi`
  14. Well, I used this instead because I don't have a C: drive "%userprofile%\Desktop\TDSSKiller.exe" -l G:\TDSSKiller.txt -v 16:53:20:343 3028 TDSS rootkit removing tool May 31 2010 10:39:48 16:53:20:343 3028 =========================================================================== ===== 16:53:20:343 3028 SystemInfo: 16:53:20:343 3028 OS Version: 5.1.2600 ServicePack: 3.0 16:53:20:343 3028 Product type: Workstation 16:53:20:359 3028 ComputerName: FAMILY 16:53:20:359 3028 UserName: Howard 16:53:20:359 3028 Windows directory: G:\WINDOWS 16:53:20:359 3028 Processor architecture: Intel x86
  15. pfft, I just bought one liscense for $19.96 with a coupon code I googled
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.