Jump to content

Amaroq_Starwind

Members
  • Content Count

    508
  • Joined

  • Last visited

Everything posted by Amaroq_Starwind

  1. It actually lets you place different files or folders next to eachother with different names. If you set a folder to be Case-sensitive for Windows programs however however, it isn't a Recursive property, so you'd need to repeat this step for subfolders or you might not be able to access the contents of one of them.
  2. I really appreciate it! I can't wait to see what I'll achieve with Windows Server, or if I'll just find new ways to break Windows that can only be done on the Server version~
  3. No promises I'll actually find what I'm looking for (Google really hates me), but thanks for the lead. I do wish I had a little bit more to go on, though.
  4. Even a Native API application along the lines of Chkdsk, the Windows Memory Diagnostic, the Windows Boot Manager, or the bugcheck (bluescreen of death) program? o.o I actually stand by what I said about a Native API implementation of Malwarebytes being awesome, even if there's no practical reason for it to exist. If I worked at the company, I'd try making it myself just to impress people~ Actually, I think the Breach Remediation program is already a Command Line application, so it wouldn't be that hard to imagine porting it to the Native API despite all the manyears of coding that it would require.
  5. In regards to number five being too computationally intensive, this is cloud-based quantum computing that we're talking about. It's kind of a given that a lot of this would be far beyond the capabilities of what the average user would have access to at their desktop. So really, that's a problem that wouldn't even affect the end-user. Quantum computing excels at optimization problems, especially ones with more variables and constraints to consider. This is exactly that kind of problem.
  6. Are you using Google Chrome? Google Chrome has done this to me very recently, but fortunately I had a Firefox installer ready to go on a flash drive. Whatever web browser you're currently using, I'd suggest trying a different one and seeing if that fixes the problem.
  7. Option A: When enabled by the user, this thing will try to keep track of everything that loads when the computer boots, including enabling the Windows boot log if it isn't already. Whenever something of note changes, it will tell the user. Besides being a general troubleshooting tool, it will also help the user spot rootkits more easily if they're not already found by the anti-rootkit engine. Option B: Alternatively, a Native API version of the Anti-Rootkit scanner could be built, which wouldn't even require initialization of NTDLL. However due to the fact that the Native API is mostly undocumented and isn't meant for non-Microsoft use, so the chances that something will change that breaks it are not the lowest. I'd only suggest Option B for awesomeness points, otherwise go with Option A.
  8. @MHBates You don't need to bump an old topic, I actually got in trouble for this recently. That said, they probably eventually got it working, otherwise they would have said something already.
  9. I'm not sure if this is the right place to be asking this, but a while back someone I know had set up a Windows Server VM on Azure for me to run tests with, but when to sat down with it, it didn't take me long to realize that I was completely lost. As such, I'm looking for a crash course on Windows Server which is aimed at people who are already Windows Home/Professional power users, and I am notoriously bad at finding anything helpful on Google. I'm also hoping that somebody who has experience with Windows Server could show me the ropes directly, either in instant messages, here on the forum (via private messages), or in-person as part of a class of some kind.
  10. Any WFP-based firewall programs, if they are already aware of your firewall rules, could probably also have their own firewall (in the event that a vulnerability is discovered in the WFP) and only use it when requested by the user.
  11. Response from GlassWire after I mentioned this thread pretty much confirms your own comment, @exile360.
  12. I recently made an account on D'Wave's LEAP community forum, and I have gotten a chance to learn more about how quantum computing actually, well, computes. I was actually expecting to be disappointed, but instead I actually got even more hopeful of its capabilities, and it's given me some new ideas. I'd like to share a few of them, but I really would also like some other people to join in my brainstorming. I don't like being the only guy who has ideas. Anyways, here's my handful: 1. Troubleshooting and correcting vulnerabilities, crashes and other bugs 2. Recovering data, particularly structured data which has been heavily corrupted or encrypted, or unstructured data which is at least partly intact (assuming there's something to compare it to, like a hash of the original file) 3. Predicting multiple possible signatures from a single Malware sample, so that signature-based detection isn't completely useless and so that "block at first sight" policies can still be helpful. 4. Optimizing slow code, prioritizing critical workloads when resources are constrained, and tracking suspicious activity to its source. 5. Identifying false positives by predicting the consequences of letting a sample go.
  13. To my understanding, there shouldn't be any conflicts between GlassWire and the MalwareBytes/Binisoft WFC, but I should probably ask the GlassWire company to be sure.
  14. This is why I love the CloudFlare DNS; on top of being extremely fast, your DNS queries are encrypted. So while it isn't a true VPN, it's still just a little bit harder to snoop on and interfere with.
  15. Thanks for the links, but was expecting something a bit more subjective. Like, opinions/recommendations.
  16. Since Apple keeps aggressively shooting down cybersecurity for iDevices, is there a way that users could transition to obtaining Malwarebytes through the Enterprise Management system?
  17. Windows 10, by default, reserves Case-sensitive filenames/folders for the Linux subsystem, but there is a registry change you can make to enforce Case-sensitivity for Windows programs as well, and you can use PowerShell to set specific folders to be Case-sensitive.
  18. The MalwareBytes team could put an unrestricted version of the app inside of the MalwareBytes Windows client, and allow the user to manage the sideload that way. Since it would be through a secure channel, it wouldn't be anywhere near as dangerous as grabbing it from a website.
  19. Due to recent events, I feel a strong urge to switch over from the Home version of MalwareBytes to the Business version, but before I fork over the delicious cash or plan my budgeting, I want to know some things: 1. As a current Home user, what business-exclusive features could I reasonably expect to benefit from in everyday use? 2. When upgrading from Home to Business, which products in particular would you recommend? 3. Based on the answers to the previous two, how much more can I expect the Business-line products to cost me compared to the consumer versions that I'm already using? Thanks! 🦊
  20. Does Malwarebytes have the ability to scan case-sensitive files and directories? If not, then I strongly feel like that ability should be added, especially since Windows supports case-sensitive files and directories now, and cross-platform threats are becoming increasingly common.
  21. Sometimes, an app is just a lot more convenient. And I'm sure that there's a ton of room for optimization to minimize resource consumption, especially battery.
  22. Just out of curiosity: would analog computers be more resistant to Malware?
  23. This is why the security providers need to get their hands on the quantum computers first, and why we need to start using mesh nets.
  24. This idea is a simple one; incorporate the Android version of the MalwareBytes components within the Windows and Mac versions, and allow it to scan Android devices over USB. This would be a good way to remove Android-based threats when an Android device is no longer under the user's control, as Android threats can't target Windows. This functionality could also extend to sanitizing MicroSD cards from Android devices, or even allow you to sideload the Android version of Malwarebytes through the Windows/macOS Malwarebytes client.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.