Jump to content

Amaroq_Starwind

Members
  • Content Count

    508
  • Joined

  • Last visited

Everything posted by Amaroq_Starwind

  1. No problem! One last bit of feedback, I think the script should be bundled with the MalwareBytes Support Tool and with MBTS.
  2. Welp. I was supposed to run DISM before SFC /SCANNOW, and I was also supposed to update DISM. Additionally, I was supposed to reset the WMI. The problem seems to be fixed now.
  3. https://en.wikipedia.org/wiki/Next-generation_firewall So I did a bit of reading. Turns out that the WFP has actually had a few vulnerabilities in the past, and in general, most existing software firewalls aren't 100% effective anymore. Much like how MalwareBytes uses a lot of next-generation anti-malware technology, there is a growing need for next-generation firewalls. Maybe the acquisition of Binisoft will result in significant improvements to network security as time goes on.
  4. I have the consumer version of MalwareBytes, and noticed that in addition to both the MBEndpointAgent reading as NOT_INSTALLED and the flightrecorder as NOT_INSTALLED (both of which I understand), MBAMService.CPU%..... reads as no. What's going on there?
  5. On a system that I'm working on, the WPD FileSystem Volume Driver got corrupted (which seems to be a common occurrence on Windows 10, especially later versions), and all of the advice for fixing it seems to either involve downloading some snake-oil "this will fix all of your problems" software, or going into device manager, showing hidden devices, and uninstalling the WPD FileSystem Volume Driver and reinstalling it. However, in my case it doesn't even show up in Device Manager, even when hidden devices are shown (it is supposed to show up under Portable Devices, but it is not showing up there), and even if I could uninstall it, I have no idea how to reinstall it. Windows Update and built-in troubleshooting tools don't help me, and I can't find any reliable documentation using Google. I could try DuckDuckGo, but I have doubts that it will show me what I actually need to find. I have a feeling that the MBTS Issue Scanner won't be able to find it either... One of the symptoms this system is experiencing is that it is unable to execute files from removable storage or from certain user directories. My laptop back home is also experiencing a similar problem, and it is running the 32-bit version of Windows 10 as opposed to the 64-bit version, which this computer is running. I have an installation drive which I can try using to restore corrupted system files, but I was hoping I could get some advice from this forum as well. Neither sfc /scannow or DISM seems to help me on any of my machines either...
  6. You never know. I have a feeling that if they really wanted to, MalwareBytes is well within their ability to employ Tor networking for a lot of things. It isn't even that uncommon for companies to use Tor browsers for security reasons, and the most well-known Tor browser is itself a fork of Firefox, which most people should already be familiar with.
  7. Um, nevermind on that. The problem seems to have fixed itself while I was at the grocery store. Woohoo! I am now on 1.0.563 like the other beta testers.
  8. My copy of MalwareBytes is still using Component Package 1.0.0. I tried to manually fetch application updates, but the installer didn't run after the program closed, and trying to relaunch the tray application from the Taskbar gives me a "This file is currently in use" error.
  9. A system I recently configured for somebody else is also experiencing BSODs, and my partner is suspecting that maybe MalwareBytes is the issue there as well, based on the results of the memory dumps. However, the system does not currently have other protection software installed beyond the default Windows Defender, and right now it's failing to boot entirely due to NTOSKRNL.EXE and the BCD both being corrupted. It has to be an issue with Windows, because this system was also running Windows 10 x64 (1803 build). Currently waiting on the diagnostic results, because the installation media isn't able to repair the operating system at this time. I am with you in regards to this being super frustrating... I hope that our issues aren't related.
  10. Actually speaking of Tor, @David H. Lipman does the MalwareBytes website use .ONION by any chance?
  11. In general, VPNs just tend to be slow, at least in my experience. Not only does your traffic need to make additional hops, it also needs to be encrypted which increases its volume. This is why a good VPN service would ideally compress your traffic and then encrypt it, or if I were in charge of development, would allow you to only route specific traffic (on a per-port, per-application or per-destination basis) through a VPN. Tor, while seemingly incompatible with VPNs, does seem like the way to go. And yes, definitely use the Cloudflare DNS, because it is not only the quickest-resolving DNS, they also encrypt your DNS queries if you're using the Cloudflare DNS phone app. Welcome to the forum, @SlowRunner. If you have any other questions, feedback or issues, I look forward to helping you out!
  12. It's not exactly a software or hacking convention, but Modular Houston is a good place to check out since a majority of the people attending are into live electronic music performances. Maybe they'd be receptive to cybersecurity representatives as well.
  13. I'll need to see when those events are, and where they'll be. I hope one of them involves opening an office here in Houston.
  14. I have since delivered the system in question to my relative, with GDIPP disabled. However, I can install GDIPP on my current system and run some tests. I think it's more of an issue with GDIPP than with MalwareBytes though, because there are other apps which are negatively impacted by the different font rendering. It's possible that this is on a per-font basis.
  15. There's no reason that I should actually be doing this, but just for the sake of experimentation, I'd like to see if it's possible to change the font used by MalwareBytes to something else. Does anyone know where I should start, and/or what could go wrong if I were to actually do this? I'm thinking that for my first experiment, I'm going to try using a Raster typeface, similar to what the Windows Command Prompt uses. I was actually inspired to give this a shot because of rendering glitches that first occurred on a system using GDIPP, where some of the text in MalwareBytes became unreadable.
  16. I'm sorry to hear about that. You might be able to upgrade to the Business version of MalwareBytes, but you'd need to be protecting at least ten devices for that if I understand correctly (for instance, protecting a relative's devices). And from what I understand, it's also fairly expensive, so you'd probably want to split the cost with somebody else. I'll have to ask around.
  17. Good idea on paper, but might make things more cumbersome in practice for those who don't want the feature. I'd suggest making that optional. Also, it might break some webpages.
  18. Does anybody know where I can find official MalwareBytes swag and merchandise, like T-Shirts and/or posters? I've been told that there used to be stuff along that lines, but there's nowhere that you can get it now.
  19. Do I smell a class action lawsuit brewing? Oh my~ Where do I sign my name?
  20. A community-made Service Pack 2 for Windows 7 might eventually be developed, sort of like how there was a community-made Service Pack 4 for Windows XP. I have to ask from a cybersecurity standpoint... is the unofficial SP4 for XP any good?
  21. For me, the problem is just finding a free, one-click VPN solution that will run at all on Windows. It's much harder to get a VPN running on a computer than on a phone, in my experience -.- Do let me know if you find any good VPN clients I can use.
  22. If I ever get hired by MalwareBytes, I might spearhead the formation of a division focused on making online gaming safer, taking the time to work with game developers and create a safer experience for everyone.
  23. According to D'Wave... it will actually be a very long time before quantum computing will actually be able to pose much of a threat to cybersecurity. As it stands, it doesn't even pose much of a threat to encryption in its current form due to just how limited quantum computing still is. There are folks working on making encryption methods which are less susceptible to quantum computing, though. For instance, Lockheed Martin (one of D'Wave's first customers) is more than likely working on that as we speak, though the details are probably classified. They are a defense contractor after all. Really, a lot of articles saying that quantum computers will threaten cybersecurity everywhere... are written by people who don't fully understand how it actually works and how long of a way it still has to go. Their fears are well-founded, and their logic is undeniable, but they're also being a little bit pessimistic. I'm a pessimist myself, and yet I'm not afraid. Should I be, though? Maybe, but only time will tell. Yes, it's a problem, but people are working on it. I should just have faith that quantum key cryptography takes off sooner rather than later. However, there are also types of mathematical problems which quantum computers are currently ill-suited for, and will probably never be able to solve better than a classical computer can. Anything that's not a factoring problem or optimization problem, for instance. Quantum key cryptography is not the only hope, and there's still plenty chance for other forms of encryption to be developed which are also resistant to quantum computing. In the meantime, we should probably focus on how to turn the tide while we still have the chance.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.