Jump to content

Amaroq_Starwind

Members
  • Content Count

    609
  • Joined

  • Last visited

Everything posted by Amaroq_Starwind

  1. Something I would like to do in the not too distant future is arrange drills for my local college for both preparedness and response to cyber attacks. However, short of "back up your important files, we will have a ransomware drill this friday afternoon", I can't actually think of any specific ways to execute it. I've been wanting to do this sort of thing for a while now, but I just don't know what to put on paper. Any discussion would be appreciated. 🦊 Speaking of which, what do you think of my accidental acronym? Cyberattack Preparedness and Response, or CPR. I didn't even realize I had made that until I started typing this addendum.
  2. I recently learned about the existence of Named Pipes in Windows, and now I'd like to find some software that lets me do stuff involving them. https://en.wikipedia.org/wiki/Named_pipe Does anybody on this forum have recommendations for such software? I'm also wondering if the MalwareBytes ever does anything involving Named Pipes. Also... Apparently Windows and OS/2 handle Named Pipes differently from UNIX/Linux; on UNIX, Named Pipes are more or less persistent (at least for the duration of system uptime), but on Windows and OS/2, Named Pipes are deleted the moment that they are no longer referenced. Not sure what the benefits and drawbacks of each approach are.
  3. Well, VR Headsets could hypothetically be used to simulate various visual impairments... Personally though, I have the opposite problem: I really dislike when developers keep increasing the font size in a program that I use regularly without giving me any option to change it back. Since I frequently need to multi-task while still maintaining my privacy in a busy household, I usually have very limited screen real estate. It's even worse on mobile devices.
  4. You could have just turned that feature off, or added an exclusion.
  5. I will let the video speak for itself. It was actually just uploaded by JayzTwoCents not long ago.
  6. This has been requested quite a few times, but it would take significant time and resources to develop due to how different Windows and Linux are on a fundamental level, not only in how they work but also in what kind of threats to look out for. They know that people want it, and they know that it's actually needed due to the continually changing infosec landscape, but they make it a policy to not talk about anything they are working on until it's nearly ready for deployment. In short... If they are working on Malwarebytes for Linux, they won't tell us until they're almost done. They don't want to get people's hopes up in case something doesn't pan out.
  7. Turns out computers really are better at finding Waldo than humans are. https://blog.clarifai.com/wheres-waldo-using-machine-learning-to-find-all-the-waldos http://www.randalolson.com/2015/02/03/heres-waldo-computing-the-optimal-search-strategy-for-finding-waldo/
  8. This is a recent video that I came across and I think would be really interesting for fellow community members. It explains how mutation XSS works, and how Client-side Sanitation can be implemented.
  9. Some exploits were "recently discovered" in the ZIP file specification called Zip Slip and ZipperDown. However, these exploits aren't actually that new. I feel like it is still worth sharing this video to explain the dangers of relative paths in ZIP files, as well as the dangers of miscommunication for the sake of advertising. Safe coding, everyone!
  10. Oh hey, somebody else who watches Ross Scott. I'm also surprised that Ross Scott reads the LinusTechTips forums.
  11. I think it's fixed. Sort of. I had to put it onto a flash drive and compress it on another computer, but 7-Zip apparently forgot to put a password the file this time. Hard_Configurator.7z
  12. The password will be in a private message. I tried zipping up the entire directory so it would be easier to analyaze, but 7-Zip gave me an out-of-memory error >.< As soon as I can figure out what's causing the issue, I'll attach the whole directory. HARDCONF.7z
  13. Sure thing! I'm not at my computer at the moment, but I'll upload the file as soon as possible.
  14. You know what... Maybe one of the first utilities I write will be one that detects RTLO-based obfuscation. I guess RTLO does seem more useful for juvenile pranks than anything else.
  15. Welp. Looks like Right-to-Left support can be a bad thing at times. Maybe Malwarebytes should be updated to detect these sorts of things during filesystem scans.
  16. Normally I am extremely in favor of backwards compatibility, but there are times when I feel like my opinion on the matter has switched places with Microsoft's. This is one of those times.
  17. Maybe Microsoft should make a UWP version of office. It would potentially be lighter, more stable and more secure.
  18. Hello! First off, I'd like to state that this is the first complete Filesystem scan I have run on my computer since I upgraded to a Solid State Drive. Man, that went by fast. There's an administrative/security utility I downloaded a while back called Hard Configurator. Today, Malwarebytes identified it as a threat when I did a Filesystem scan. While I do trust the software to a reasonable extent and am sure that it's a false positive, I would still like an investigation and second opinion of the software. Here's the scan log. Official website of the software: https://hard-configurator.com/ Github repository: https://github.com/AndyFul/Hard_Configurator Website where I first found it: https://www.majorgeeks.com/files/details/hard_configurator.html Do let me know what turns up during the investigation. If I'm right, it should be safe, but until that's proven I'll keep it quarantined. Hard_Configurator.txt
  19. There are certain situations where a user might need to temporarily disable a protection layer because it's causing issues with their system, such as putting too much strain on system resources in the case of Ransomware Protection (especially on older computers like mine). However, having to turn that protection layer back on afterwards, sometimes a user can forget to do that, or they might be away from their computer for longer than they expect, leaving their system vulnerable in that time. As such, it would be appreciated if users could pause a real-time protection layer, and have it unpause automatically after a certain amount of time, when certain conditions are met, or both. Additionally, a user could configure rules to prohibit pausing a protection layer under certain conditions, or automatically pause it under other conditions. I'd appreciate some feedback on this idea.
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.