Jump to content

ShyWriter

Spam Hunters
  • Posts

    5,501
  • Joined

  • Last visited

Posts posted by ShyWriter

  1. .

    Ouch: Microsoft no longer recommends their own Security Essentials anti-virus package

     

    Written by Andre Yoskowitz @ 06 Oct 2013 12:34

     

    Microsoft_security_essentials_250.jpg
     
    Microsoft, which for years has touted its Security Essentials anti-virus package, has now said users should use third-party applications on top of MSE, as it will never be the best option.
     
    In an interview, the company admits it has turned its AV app into a "baseline program," and that the app will "always be on the bottom" of the AV software rankings, where it has languished in the last two years after a few years on top.

    Microsoft also adds that "the company is just sharing its virus tracking findings with the security industry so they can develop better antivirus programs."

    MSE (or Windows Defender in Windows 8) has always been an extremely light-weight app, and it was popular for not being annoying like more commercial programs like McAfee and Norton.

    A few great free options if you want to move away from MSE are Avira, Avast and AVG.

    Check the rest here: Antivirus programs at Afterdawn
     
    /Steve
  2. .
    NSA using Firefox flaw to snoop on Tor users

    Good news/bad news in latest Snowden leak

     

    By Iain Thomson, 4th October 2013

     

    An NSA presentation released by Edward Snowden contains mixed news for Tor users. The anonymizing service itself appears to have foxed US and UK government snoops, but instead they are using a zero-day flaw in the Firefox browser bundled with Tor to track users.

     

    "These documents give Tor a huge pat on the back," security guru Bruce Schneier told The Register. "If I was a Tor developer, I'd be really smiling after reading this stuff."

     

    The PowerPoint slide deck, prepared in June last year and entitled "Tor stinks", details how the NSA and the UK's Government Communications Headquarters (GCHQ) have been stymied by trying to track Tor users, thanks to the strength of the open source system.

     

    "We will never be able to de-anonymize all Tor users all the time," the presentation states. "With manual analysis we can de-anonymize a very small fraction of Tor users, however, no success de-anonymizing a user."

     

    The presentation says that both the NSA and GCHQ run Tor nodes themselves (the Brits use Amazon Web Services for this under a project entitled Newton's Cradle), but these are only a very small number in comparison to the whole system. This makes tracking users using traditional signals-intelligence methods impossible.

     

    There's also a case of diminishing returns as Tor becomes more popular. With each user acting as a transport node, the sheer scale of the system means it becomes steadily more difficult for the intelligence community to run enough nodes to be useful for tracking.

     

    The agencies have also tried to use "quantum" cookies to track targets who are using Tor. Some cookies appear to persist after Tor sessions, the presentation notes, and the agencies are investigating if this can be developed into a working tracking system.

     

    A separate leaked document from GCHQ, published in the Washington Post, gives an indication of how this could be done. Operation Mullenize is a technique for "staining" individual user's computers with trackable code, and is now being rolled out after a year of development. Over 200 stains were injected onto systems in two months last year, the report notes.

     

    There are also indications that the NSA had been trying to influence the design of Tor to make it more crackable, a somewhat Kafkaesque approach given that Tor is primarily funded by the US government itself to provide anonymity to internet users operating under repressive governments.

     

    The NSA has been accused of this before, having been said to be deliberately weakening NIST encryption standards. But Schneier said in the case of Tor, the agency appears to have had little luck.

     

    "It's harder than you think to sneak stuff in," Schneier said. "If you show up and say 'Here, I've got some Tor code!' I don't think you're going to get it in. As far as we know, they've had no success doing that."

     

    But documents shown the The Guardian by Snowden indicate that the intelligence organizations have also been trying sneakier methods in a delightfully named attack dubbed EgotisticalGiraffe. This targets the software that is bundled with Tor, specifically version 17 of the Firefox browser which was vulnerable to a zero-day attack. (More...)

     

    Read the rest at: http://www.theregister.co.uk/2013/10/04/nsa_using_firefox_flaw_to_snoop_on_tor_users/

     

    Steve

  3. .

    Adobe Flash Player replacement "Shumway" lands in Firefox 27

     

      Death knell for Adobe Flash Player?

     

    3_snag-0002.jpg

    Shumway has landed in the nightlies, but has yet to debut in Aurora.

     

    Mozilla has taken one giant step closer to making Adobe's Flash Player a thing of the past with the inclusion of their own HTML5 Flash Player called "Shumway".

     

    Shumway landed in Firefox 27 nightly, which has yet to make the Aurora branch, and according to our own tests, even though Shumway can be loaded (it's disabled by default) it's in a "pretty much unusable state" right now.

     

    Adobe Flash Player has a long history of being plagued with bugs, and many users opt not to install it at all; so being able to play Flash without the normal player is a big step forward for security, as well as on mobile devices which don't support Flash natively.

     

    Shumway is a HTML5 technology experiment that explores building a faithful and efficient renderer for the SWF file format without native code assistance. Shumway is community-driven and supported by Mozilla. Their goal is to create a general-purpose, web standards-based platform for parsing and rendering SWFs. Full integration with Firefox is a possibility if the experiment proves successful.

     

    If you want to test it out for yourself, download the latest nightly from http://nightly.mozilla.org and then navigate to about:config > find  “shumway.disabled” and set to false, then disable Flash in Tools > Add-ons. As pointed out, Shumway still has a ways to go before it can fully replace Adobe Flash Player.

     

    Via: Gemal.dk

     

    /Steve

  4. .

    What's changed in the Windows 8.1 RTM release?

     

    Summary: If you've been running the Windows 8.1 Preview for any length of time, you'll have to look closely to see the small but significant changes in the RTM code. Here are a few things to watch out for.

     

    By Ed Bott for The Ed Bott Report |

    September 10, 2013 -- 12:36 GMT (05:36 PDT)

     

    Previous | Next Image 1 of 13

     

    01-new-hints-for-ui-620x.png?hash=MTH4ZG

    Here's Start (and other UI hints)

     

    When you first use a new account, animated hints appear in each of the four corners to alert you to their special functions. If you try the action and miss, you get a second level of help text and another animation. (More...)

     

    Working "Picture SlideShow, etc" in complete article at: http://www.zdnet.com/whats-changed-in-the-windows-8-1-rtm-release-7000020475/

     

    Steve

  5. . Grand Theft Auto V rakes in over $1 billion in three days

     

    The launch-day record for Take-Two will more than cover the costs to make the game.

     

    by Megan Geuss - Sept 20 2013, 7:15pm EST

     

    In more billion-dollar news this Friday (this time with a happier bent), the highly-anticipated Grand Theft Auto V has crossed the $1 billion threshold after being on sale for just three days. On its first day on shelves, the fifth installment of the 16-year-old franchise made $800 million.

     

    A mixture of solid-to-breathless reviews as well as five years of anticipation since the 2008 release of Grand Theft Auto IV contributed to creator Take Two Interactive's most lucrative launch ever. According to Reuters, development of GTA V cost Take-Two's Rockstar Games studio “between $200 million and $250 million, according to some analysts' estimates.”

     

    The fast-selling game definitely stands out compared to other recent blockbuster game launches. One game title that comes close to GTA's launch success is Activision's first-person shooter Call Of Duty: Black Ops II, which hit $1 billion in global sales after 15 days on the market.

     

    "Grand Theft Auto is a cultural phenomenon and Rockstar Games continues to redefine what can be achieved in interactive entertainment," CEO Strauss Zelnick told GameInformer. "We are incredibly proud of the extraordinary critical and commercial response to Grand Theft Auto V."

     

    GTA V is currently available for the Xbox 360 and PlayStation 3 consoles. While Take-Two has not yet announced versions of the game for the coming Xbox One and PlayStation 4, investors will surely be watching to see if the company can sustain the momentum come November.

     

    Steve

  6. Microsoft won't discount Windows 8.1 upgrades

    It's free to Windows 8 users, but anyone with the older Windows 7 must pony up full price -- $120 or $200

    By Gregg Keizer
    September 17, 2013 04:18 PM ET
     
    Computerworld - Microsoft today announced that it will charge full price for Windows 8.1 upgrades from Windows XP, Vista or Windows 7.
     
    Customers already running Windows 8, however, will receive the update -- which is slated to hit the Windows Store Oct. 17 and reach retail Oct. 18 -- free of charge.
     
    Downloads or retail packages containing a DVD of Windows 8.1 will cost $119.99, said Microsoft spokesman Brandon LeBlanc in a post to a company blog Tuesday. The more capable Windows 8.1 Pro will be priced at $199.99.
     
    Those prices are identical to the current costs of Windows 8 and Windows 8 Pro for users who want to upgrade from an older edition of Windows.

     

    The lack of promotional pricing for Windows 8.1 was in stark contrast to Microsoft's marketing of Windows 8 last fall. Then, the Redmond, Wash. company heavily discounted upgrades to Windows 8 Pro, selling them for just $39.99. The promotion ran from the Oct. 26, 2012 launch of the radically overhauled operating system to Jan. 31, 2013.
     
    It was after the latter date that Microsoft raised prices to the $119.99 and $199.99 marks.
     
    Wes Miller, an analyst with Kirkland, Wash.-based Directions on Microsoft, noted the switch in sales strategy by Microsoft. "I don't think [upgrades] matter quite as much to Microsoft now," he said. "Windows 8 was really focused on consumers and upgraders," he added, referring to last year's launch and discounts. "Windows 8.1 seems more focused on businesses."
     
    He cited several features, including Workplace Join -- which lets enterprise IT administrators fine-tune what resources a Windows 8.1 device can access -- as evidence of Windows 8.1's attempt to lure businesses into upgrading.
     
    As for consumers still running Windows 7, the older Vista, or the soon-to-retire Methuselah, Windows XP, Miller said Microsoft hoped those customers would buy a new device instead of upgrading. The high prices Microsoft's maintaining for Windows 8.1 supports that reasoning.
     
    "There should be a better selection of x86 tablets later this year, and Microsoft will be hoping that [consumers] buy a new tablet rather than try to upgrade from Windows 7," said Miller.
     
    Historically, Microsoft has generated the bulk of its Windows revenue from sales to OEMs, or "original equipment manufacturers," the computer makers like Lenovo, Hewlett-Packard, Dell and others that pre-load the OS onto new machines. Retail upgrades typically contribute only small amounts to the company's bottom line.
     
    Another change from last year in today's announcement was Microsoft's declaration that Windows 8.1 is not suitable for Windows XP or Vista.
     
    "Windows 8.1 is not designed for installation on devices running Windows XP or Windows Vista," said LeBlanc, who also said an upgrade from those older editions was "not recommended."
     
    In 2012, Microsoft promoted Windows 8 as a suitable upgrade not only for PCs running 2009's Windows 7, but also 2007's Vista and even 2001's XP.
     
    The price of Windows 8.1 Pro Pack -- an after-device-purchase upgrade that bumps Windows 8.1 to Windows 8.1 Pro -- will be $99.99, the same price Microsoft's charged for the similar Windows 8 Pro Pack since Jan. 31.
     
    /Steve

  7. Microsoft Fixes 47 Flaws, Pulls Problematic Stability Fix for Outlook 2013 (September 10 & 11, 2013)

     

    On Tuesday, September 10, Microsoft issued 13 security bulletins to patch a total of 47 vulnerabilities. The updates address security flaws in Windows, Office, Internet Explorer and SharePoint Server. Four of the bulletins are rated critical; the rest are rated important. Microsoft has pulled a non-security, stability and performance update for Outlook 2013 following reports that it blanked the folder pane.

     

    Internet Storm Center:

    [Editor's Note (Pescatore): This week had one of the vulnerability-est Vulnerability Tuesdays in a long time, with all the Windows, Adobe and Oracle patches hitting on the same day, with lots of remote execution vulnerabilities that are high priority to patch and some active attacks already out. Since many are finalizing 2014 budgets, make sure you will have capacity next year to deal with both the patching and shielding servers that can't be patched quickly at this rate. ]

     

    SANS ISC

     

    /Steve

  8. .

    Microsoft reissues September patches after user complaints

    A fix to fix the fixes that didn't

     

    By Iain Thomson, 13th September 2013

     

    Problems with Microsoft's last round of operating system and application patches have forced the company to reissue part of the update on Friday.

     

    "Since the shipment of the September 2013 Security Bulletin Release, we have received reports of updates being offered for installation multiple times, or certain cases where updates were not offered via Windows Server Update Services (WSUS) or System Center Configuration Manager (SCCM)," said Redmond's Office team in a blog post.

    "We have investigated the issue, established the cause, and we have released new updates that will cease the unnecessary re-targeting of the updates or the correct offering of these updates."

     

    Register readers – and many other Microsoft users – started complaining about the patches shortly after their release on Tuesday. Some readers reported detection issues that left servers stuck in a loop of patching when the updates weren't recognized, while others reported being unable to install flaw fixes.

     

    Eight patches have now been reissued, covering security flaws in Excel, SharePoint Server, and Office suites going back to 2007. Two non-security patches for PowerPoint have also been reissued.

     

    Unusually for Microsoft, not all the patches it promised for Patch Tuesday were in the final release, with one being pulled for quality-control issues. El Reg suspects there have been some harsh exchanges between management and the software testing teams at Redmond. ®

     

    /Steve

  9. .
    Wednesday, September 11, 2013

    Malware: the blame game
     

    As you may know, there's a never-ending debate between who's at fault when a user is infected:

    •  is it the user for being "gullable" or being social engineered to click on a malicious link?
    •  is it the fault of the antivirus or antimalware application for missing an infection?
    •  is it the fault of the administrator in corporate networks for not having proper policies?
    •  last but not least side-question: is antivirus useless?

    Here's an excellent article which goes deeper into these questions and discusses about it:


    http://www.welivesecurity.com/2013/01/03/imperva-virustotal-and-whether-av-is-useful/
    (TL;DR: Imperva performed an antivirus test with doubtful and possibly improper testing methods and the (antivirus) community reacted on it)

     

    My personal opinion? There's only one group to blame here which seems to get missed in these debates: the malware writers themselves. After all, the people who create (and use) the malware are responsible for the millions of infected machines and affected businesses, which may both lose a considerable amount of money by either

    • users: paying up to ransomware or rogueware, or CC (Credit Card) theft or fraud

    • businesses: personal records stolen (user/password databases), business plans stolen, not to mention the financial & productional losses.

    So what's the endless discussion on about and why are we not blaming the malware authors and botnet operators? (to learn more about botnets see my blogpost: the botnet wars: a Q&A)

    Here are the main points antivirus companies are blamed on:

    • making money on the back of the customer and 
    • not protecting well enough.  

    How much of this is true? Is antivirus dead? My only comment about this:


    antivirus provides a good (basic) layer or level of protection on your machine. Is it sufficient? Maybe. Do you need extra protection? Depends. If you're a normal "home user", an antivirus and firewall will surely suffice. Free or paid antivirus doesn't really matter at that point. If you're in an organisation or corporation, antivirus will surely provide a good base to start from, not only signature-based but heuristically as well.

    But you'll need more. Ideally, you need an extra set of eyes just for monitoring unusual behavior in your network. Is this realisitc? Maybe. Are there solutions specifically designed for this on the market? Yes.

    I won't go any deeper into the points above, as it's been discussed & debated upon many times.

    Moving on:

    Do ISPs (Internet Service Provider) need to take an arrow in the knee for this? How many and which ISPs are already detecting machines which are infected? These are newer and interesting questions as well. ISPs are obviously not responsible when a user is getting infected, however... When that machine in question starts sending out quite a lot of traffic (zombie), does the ISP need to take action? (More...)

     

    Continued on Bart's fine blog at: http://bartblaze.blogspot.com/2013/09/malware-blame-game.html

     

    Steve

  10. Thanks DD.. I appreciate yours (and Dave's) heads up.. Hopefully Gordon will update the Software topics as I'm leaving your post here until the Software topics get updated by someone. ;)

     

    For the time-being, your post here is all the notification there'll be.

     

    Cheers.. and thanks again,

    Steve

     

    EDIT: I no longer have the powers to LOCK or PIN here (or MOVE) so feel free to bump as needed to keep it visible.

  11. Hmmmmmmm, I might just have to take the plunge with Netflix.

    (No, I'm not an "early adopter". :D )

     

    So, "whodunnit" on Broadchurch?

     

    In spite of my reputation ( ;)) I usually have a bit more patience, at least with British TV, but BROADCHURCH lost me two weeks ago... too darned slow..

     

    Steve

     

    @DD You can get a 30 day FREE trial on Netflix and that's more than enough to watch all 12 episodes of the original HOUSE OF CARDS..

  12. Nope, this LUTHER. :D

     

    Continues tonight, tomorrow and Friday.

     

    Let's see a show of hands of how many viewers can't wait to see Luther shove a size 13 brogan up that obnoxious, called-from-retirement, ex-DCI's sunless orifice. (The @ that's trying to prove Luther operates way out of bounds and wants to hang him for it?)  Gggrrrrr...

     

    Steve

  13. .

    Apple neglects OS X privilege escalation bug for six months, gets Metasploit on its case...

    by Paul Ducklin on August 29, 2013
     

    bulet-through-apple-500.png?w=115&h=115&

     

    Six months ago, we wrote about a risky bug in the sudo command, the Unix equivalent of Run As... on Windows.

     

    The vulnerability is still unpatched on OS X, and now there's a Metasploit exploit pack to take advantage of the hole.

     

    Read the full article at: http://nakedsecurity.sophos.com/2013/08/29/apple-neglects-os-x-privilege-escalation-bug-for-six-months-gets-metasploit-on-its-case/

     

    Steve

     

  14. These are dictionary attacks, not brute force attacks.  Though in time even that probably won't matter but for now as long as its not in a dictionary and the attacker doesn't have access to the hash then much of this is just scare tactics.

     

    Most hackers (at least the password hacker kind) build custom dictionaries that far exceed normal the normal dictionaries used in dictionary attacks. I ran across an article a month or so ago that I should have published here. Three "password crackers" did a VERY remarkable job on a password file that was encrypted and included all numbers, letters (U&L-case), all punctuation marks and special symbols as well as the umlauts and other special accent markings. The password file was even "salted" and still hacked.. If I can run across it again I will post it.  :P

     

    Steve

  15. .
    All your passwords belong to us

     

    Summary: Password hacks and new cracker tools surfaced this week to reinforce passwords are indeed sitting ducks. Will anything be done about it?

     

    By John Fontana for Identity Matters |
    August 29, 2013 -- 21:03 GMT (14:03 PDT)


    I think I detected a discernible sigh of relief this week from billions of Internet users with 56-character passwords.

     

    I could be wrong. Likely I am.

     

    People try all sorts of crazy things to manage passwords, but 55 character strings are not anywhere near the top of the list.

     

    This week has been another example of the hacker blitz on passwords; leading off with the password-cracker program oclHashcat-plus, which was infused with upgrades that allow it to break passwords as long as 55 characters

     

    Talk about bringing down barriers to entry. Perhaps the last of our defenses are gone. And by the way, oclHashcat-plus is a free download if you're looking for a cheap and sinister hobby.
     

    I've argued for a while now that it's the infrastructure that needs to change more so than the tired password system. Users need to understand the value of their personal data and they need to take steps to protect it. Why? Because the bad guys are actively after it.

     

    It was a phished password that brought down the New York Times this week. But it wasn't a password that belonged to someone at the newspaper. The password was spear phished out of an Australian DNS registrar by the Syrian Electronic Army and used to poison DNS records and direct traffic away from nytimes.com.

     

    Security firm Sophos reported an attack going on this week trying to get Gmail users to click on a Google Docs link in order to see a "secure document" from their banking institution.

     

    Not to pick only on Google users, the page said it would accept Google credentials, as well as, Yahoo, Outlook.com, Hotmail, AOL, Comcast, Verizon, 163.com or any other email account.

     

    The ultimate target was passwords.

     

    Also this week, a new mobile Trojan is creating havoc for online mobile banking customers who use two-factor authentication. Called Perkele, it infects your PC or laptop along with your mobile device to steal two-factor passcodes sent to the mobile devices.

    Victims are being duped by text message or email to open malicious links or attacked via drive-by downloads. Versafe, which discovered Perkele, told the Bankinfo Security web site that "banking institutions have to build security into their mobile and online banking platforms that goes beyond authenticating the user."

     

    What do hackers do with stolen passwords. Those pilfered in large chunks are used, among other ways, to update rainbow tables, which progressively makes it easier to crack additional stolen passwords.

     

    Once the passwords are cracked, email addresses coupled with stolen passwords are the two ingredients in spear phishing attacks (see: New York Times). In addition, those email/password combinations are loaded into a program and run against other websites. Ones where end-users may have reused the password.

     

    This lingering password problem has been a tough issue to fix, especially given that the weak link in the chain, end-users, are reluctant to change their behavior, and the fact hackers  are becoming more sophisticated. 

     

    Two-factor authentication has been dominating the news as a solution, but Perkele begins to show its vulnerabilities. What else can be done? Where do researchers, vendors and others begin to look for answers?

     

    /Steve

  16. Is there a change log available to keep up with the updates for this tool?  

     

    Hi,

     

    In spite of my Software Group title, I am not on STAFF here nor an employee of Malwarebytes.

     

    That said, I believe it has been the policy of Malwarebytes to NOT release details of bugs and fixes (a changelog) on their BETA products. The closest you might come to "bugs" and such is the particular Forum for that product and reading user interaction with STAFF on problems and replies..

     

    Your mileage may vary,

    Steve

  17. .Just a hint on Season One of the 1990 version of HOUSE OF CARDS.. If you haven't decided it's worth the time after seeing the first few episodes, the last FIVE minutes of Season One where the wanna be PM and the "I love you Daddy" reporter are on the the roof garden of the House of Commons will hook you..

     

    I won't post a spoiler here; you just have to rely on my trustworthiness.. It does make "who shot J.R." a cartoon by comparison. (And I hated that whole series - JR should have stayed in the bottle with Jeanie. ;) )

     

    Steve

  18. I'm anxious to see a US season two of our version of HOUSE OF CARDS as I enjoy the actors.. and these kinds of politics (US and BBC versions) are the kind that I enjoy as opposed to the everyday horse-pucky stuff that's in the newspaper.

  19. .

    Favorite TV shows? (Part 2)

    ( Continuation of Topic # http://forums.malwarebytes.org/index.php?showtopic=130904 )

     

    Just found the original HOUSE OF CARDS series from across the pond in 1990 on Netflix.. The politics are similar but the solutions have more "dirty tricks" and "wickedness" than the US version of 2013..

     

    Just finished Season One of the original and WOW.. what a difference.. On Season Two right now.. looking good..

     

    PS: If you aren't a member of the MORK AND MINDY or the JONATHAN WINTERS group, age-wise, this probably won't appeal even though H of C isn't comedic.. If I have to explain that, nevermind.. :)

     

    Steve

  20. Hi,

    [...]

    it would be very good if you can organize all those three

    programs under one interface; it's logical and much more convenient

    to have one program instead of three from one company

    (say, it could be a Malwarebytes Security Suite).  thank you.

     

    HI;

     

    In spite of my Software Group title, I am not on STAFF here nor an employee of Malwarebytes.

     

    That said, in my humble opinion, it's quire possible that Marcin "might" make a business decision to add the MBAE  program to the TOOLS already installed in the current version of MBAM (Chameleon , Secure Backup , StartupLite and Anti-Rootkit) as an autostart option.  As you can see, one of the beta tools you mentioned, (MBAR), is already a part of MBAM.. Sooooo; logic would follow that MBAE might go either way since MBAE is meant to always be active while the computer is on. ;)

     

    Cheers; your mileage may vary..

    Steve

  21. .

    screenhunter03jan142153.gif


    Malwarebytes Anti-Rootkit 1.07 Beta


    Malwarebytes Anti-Rootkit BETA removes the latest nastiest rootkits and repairs the damage they cause.

    Version 1.07.0.1005 / 8-23-2013

    ( Note: This BETA expires on October 15th, 2013 )

    Malwarebytes Anti-Rootkit BETA is cutting edge technology for detecting and removing the nastiest malicious rootkits.


    0zvb.jpg


    bB9ZP.gif


    This BETA expires on October 15th, 2013

     

    Malwarebytes Anti-Rootkit BETA removes the latest nastiest rootkits and repairs the damage they cause.

    Malwarebytes Anti-Rootkit BETA is cutting edge technology for detecting and removing the nastiest malicious rootkits.

    Disclaimer

    This is beta software, for consumer and approved partner use only, use at your own risk, and by proceeding you are agreeing to the terms of our license agreement, enclosed as "License.rtf".

    All Beta versions are non-final products. Malwarebytes does not guarantee the absence of errors which might lead to interruption in normal computer operations or data loss. Precautions should be taken. The types of infections targeted by Malwarebytes Anti-Rootkit can be very difficult to remove. Please be sure you have any valued data backed up before proceeding, just as a precaution.

    While we encourage and invite participation, Malwarebytes Anti-Rootkit BETA users run the tool at their own risk. Malwarebytes bears no responsibility for issues that may arise during use of this tool, however all reasonable efforts will be made by Malwarebytes to assist in recovery should the need arise.

     

    Usage

    • Download Malwarebytes Anti-Rootkit from the linked image above. (i.e.; screenhunter02may242032.jpg)
    • Unzip the contents to a folder in a convenient location.
    • Open the folder where the contents were unzipped and run mbar.exe
    • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
    • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
    • Wait while the system shuts down and the cleanup process is performed.
    • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
    • If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
      • Internet access
      • Windows Update
      • Windows Firewall
    • If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit located within the ‘Plugins’ folder and reboot.
    • Verify that your system is now functioning normally.
    • If you experience any problems in running the tool or it hasn't fully resolved all of the issues you had, please contact support.

     

    This BETA expires on October 15th, 2013


    bB9ZP.gif


    Steve

  22. .

    Ballmer’s Departure From Microsoft Comes 10 Years Too Late... (And THAT'S the truth!! ~ Shy)

     

    ballmer-660x440.jpeg

    Microsoft CEO Steve Ballmer. Photo: Jim Merithew/Wired.com

     

    Steve Ballmer is stepping down as the CEO of Microsoft, and Wall Street is rather pleased.

     

    On Friday, Ballmer announced that, after 33 years with the company that defined software in the 1980s and ’90s, he will retire sometime within the next 12 months. As of noon Eastern, Microsoft’s stock price had climbed nearly 6 percent. The money men have spoken, and for once, they’re making sense.

     

    In some ways, it’s sad to see Big Steve go. He had a wonderful way of filling a room — with his bellowing voice, his endless stream of hyperbole, his sometimes awkward physicality, and, yes, with just the size of his frame. And for those of us who lived through the PC revolution, Ballmer — employee Number 30 at Microsoft — is the company’s one remaining link to the days when it so swiftly took hold of the tech universe.

     

    But during Ballmer’s decade at Microsoft’s helm — he took the reins from founder Bill Gates in 2000 — the company dug itself a hole that it will be lucky to crawl from in the decade to come. (More...)

     

    The rest can be read at: http://www.wired.com/business/2013/08/steve-ballmer-steps-down/

     

    Steve

     

  23. YES! YES! YES! YES!

     

    I've been an Idris Elba fan for a LONG time....

     

    I enjoy most of the BBC crime/cop shows with the exception of (Go figure??) their version of Law and Order.. Just can't take wigs and such seriously.. (And I've watched EVERY American version of all the Law and Order genre at least two or three times.) Just a few months ago they (BBC) had a super mini-series on called THE BLETCHLEY CIRCLE... And on Netflix I've found several BBS shows with women detectives solving murders.. Neat'o.. :)

     

    Steve

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.