Jump to content

Amaroq_Starwind

Honorary Members
  • Posts

    700
  • Joined

  • Last visited

Posts posted by Amaroq_Starwind

  1. I thought I'd be able to provide some insight by looking on Google, but "CheeseTwistKGL" provided no results beyond, well, pictures of cheese twists and recipes for making them. I kind of want some cheese twists now.

    In addition to providing the MalwareBytes logs, also go to the folder where the file was located, and tell us what you find. If it was a legitimate program that was mistaken for a false positive, we may be able to ascertain its purpose by looking at the associated files. Screenshots might help also.

  2. *sigh* How can I explain this...?

    Most android devices share a common file structure, and most use filesystems that computers can already work with. And the Android version of MalwareBytes can be downloaded from the Google Play Store, but it has recently been restricted quite severely. As such, the only way to get a fully-featured version of MalwareBytes onto Android would be to sideload it, an activity which MalwareBytes does not condone because of how difficult it is to do it safely. Of course, I actually had this idea before I learned what happened with MalwareBytes on the Google Play store.

    If the Sideloading process were performed by the PC MalwareBytes client itself, though, and if the files being sideloaded onto the device were also provided from within the PC client, then it would be a lot less dangerous to work with since MalwareBytes could make sure you were always receiving the correct files and that they couldn't be tampered with. And if you're able to synchronize an Android device with a Windows computer, then any malicious software running on an Android device could be detected over USB and removed.

    As for MicroSD Sanitation... that might actually be harder to do to be honest, now that I remember that MalwareBytes can't really detect threats in that way.

    @exile360 might be able to back me up on my explanations. Not sure if my idea is entirely feasible however.

  3. And here we go:

    https://en.wikipedia.org/wiki/IP_multicast 


    Turns out there's numerous different extensions to Multicast, so it should already be well-suited to this feature.

    Side-note: I really hope that I eventually get the permission to edit my own posts, even if the edits have to be moderator-approved before they're shown to the world. I just really dislike having to make multiple posts in a row.

  4. Actually, in IPv4 you can use something called MultiCast to cut down on the number of packets you need to send, since you just need to send a single packet for every MultiCast address or destination you're polling, and it will take care of polling everything below it. At least that's how my dad explains it. I'm also not sure what the equivalent would be for something like IPv6.

    You could also use a database for Verified websites, not just Fraudulent ones, and any websites which are known to be associated with MalwareBytes would of course also be part of the database. You wouldn't even have to update a clientside database constantly, just periodically, and anything not already in the database can be uploaded as needed once its status has been determined by the client.

  5. The Webroot SecureAnywhere browser extension will show an icon next to websites on a Google search results page if the websites in question have been verified as legitimate (example, a green checkmark in a circle). That feature should be added to the MalwareBytes extension for Chrome and Firefox, along with a different icon for websites which have have been suspected as fraudulent (a red exclaimation in a circle), and/or a Malwarebytes logo for websites which are directly affiliated with MalwareBytes. Maybe it could also generate an identicon preview for URLs you find on a search results page, determined by the IP address which is hosting the website.

  6. Very belated welcome to the forum, @SamDil, and also welcome @webeagle. A Search Engine Optimizer isn't something I've heard of before, but I myself have been trying to spread the word of MalwareBytes as far and wide as possible. Maybe you can give me some more direct advice?

    If MalwareBytes had little button links that I could include in my signature on other forums, then that'd be helpful too.

  7. If anyone here would like to share random facts about themselves or the world, this is the thread to do it. If you do not wish to share any information about yourself, then you have no obligation to participate.
    My random fact(s) of the day:

    1. The name Amaroq is an alias of mine, since I try to avoid using my legal name online unless I have a good reason to do so (such as when signing up for a job. I haven't had much luck there). I first started using the name several years ago because I was only twelve when I started using the internet (I'm 21 now), and it is also the name of a wolf from Inuit mythology. I was inspired to use this name by a really good book I had read, called Julie of the Wolves.
    2. My favorite color is blue. Especially a dark, vivid blue. Bonus points if it is accented by White, a Golden-Yellow, or both.
    3. My favorite musician is Wolfgun, though I am a fan of electronic music in general, especially the kind that is sequenced by the player or engine during playback as opposed to being rendered as a WAV file or MP3.
    4. I am predominantly left-handed, except when using a computer; I always use the mouse as if I were right-handed, since I don't have to reconfigure anything that way.
    5. I have never exactly been photogenic. I am also not in the best shape, so that may also have something to do with my distaste for photos being taken of me.
    6. My voice can sound somewhat young or effeminate at times, especially over the phone, due to years of practice in trying to emulate the voices of various singers and actors.
    7. Though I have friends all over the world (thanks, internet!), not once have I set foot on another country's soil. Given recent sociopolitical and socioeconomic trends however, both domestic and worldwide, I have been strongly considering moving to another country at the first opportunity. I probably wouldn't last five minutes anywhere else, though, excluding Canada due to its overall similarity to the US.
  8. I've requested this myself before, but there are issues. MalwareBytes doesn't have a license to package a Windows Preinstallation Environment, and porting Malwarebytes to Linux hasn't been achieved yet. Not to mention, it would be difficult to read the registry and filesystem of an offline Windows system and make any changes from Linux without potentially screwing stuff up. Now, if you wanted something that resided on your computer and booted before the rest of Windows did, you could try building a Native API application, but that wouldn't be entirely feasible for more than a few reasons.

    So yeah, it would actually take a lot of time and effort to create, unfortunately.

  9. It would be an optional thing, probably, enabled by SysAdmins and uploaded only for their own workgroup. There's also ways to build encryption that can't be easily defeated by quantum computing, and since this would be managed by D'Wave (who have extremely strict policies about privacy and ethics)... It's complicated, but I suppose nobody has to go down that rabbit hole if they don't want to. At the very least, cloud-based quantum computing could still be used to enhance the already existing machine learning aspects of Malwarebytes.

  10. A musician friend of mine recently made an application called Rez's Flowers, a sort of dynamic vizualizer that creates its own music. However, people who've tried it out have gotten warnings from SmartScreen. I haven't had a chance to download it myself yet, but I promised that I'd get it run through Malwarebytes as soon as possible in the event that it shows up as a false positive.

     

  11. It actually lets you place different files or folders next to eachother with different names. If you set a folder to be Case-sensitive for Windows programs however however, it isn't a Recursive property, so you'd need to repeat this step for subfolders or you might not be able to access the contents of one of them.

  12. Even a Native API application along the lines of Chkdsk, the Windows Memory Diagnostic, the Windows Boot Manager, or the bugcheck (bluescreen of death) program? o.o

    I actually stand by what I said about a Native API implementation of Malwarebytes being awesome, even if there's no practical reason for it to exist. If I worked at the company, I'd try making it myself just to impress people~

    Actually, I think the Breach Remediation program is already a Command Line application, so it wouldn't be that hard to imagine porting it to the Native API despite all the manyears of coding that it would require.

  13. In regards to number five being too computationally intensive, this is cloud-based quantum computing that we're talking about. It's kind of a given that a lot of this would be far beyond the capabilities of what the average user would have access to at their desktop. So really, that's a problem that wouldn't even affect the end-user.

    Quantum computing excels at optimization problems, especially ones with more variables and constraints to consider. This is exactly that kind of problem.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.