Jump to content

ritchie58

Honorary Members
  • Posts

    60
  • Joined

  • Last visited

Reputation

0 Neutral

Profile Information

  • Location
    Oil City, Pa. U.S.A.
  1. Manaully adding exclusions is not supported at this time I do believe. If a detection occurs and it's found to be a False Positive then an Exclusion can be added then.
  2. That is reassuring that it wasn't any of the add-ons that I currently use. Thanks for the explanation and getting back to me on that.
  3. That's a great question Ricorocks and something definetly good to know. My Firefox browser is highly customized with add-ons and a theme! Is it possible that one of my Firefox add-ons may have caused those weird detections a while back Pedro? I have been wondering about that. I do have one that gets a data update quite frequently. It's the weather add-on Forecastfox. The weather data and radar gif are updated on a regular basis, about every half-hour or so. Yahoo Mail Notifier would be another one that checks for new mail regularly. I also use an add-on called BrowserProtect that helps protect against browser hijacking attempts. A conflict there maybe? Since I'm using MBAE maybe using this add-on too is a bit redundant now anyway. Mmm..
  4. As a long time member of CNET I was plesently surprised to read this article about the official launching of MBAE! Hey, that's a great picture of you included in the article Pedro, and glad to see you get the recognition you justly deserve! http://www.cnet.com/news/malwarebytes-finally-unveils-freeware-exploit-killer/?tag=nl.e757&s_cid=e757&ttag=e757&ftag=CAD2e9d5b9 Cheers, Ritchie...
  5. Oh! I wasn't aware of that fact. Sorry about that!
  6. Hi Intersys, the log files are located in the ProgramData directory. The file path for my Win 7 machine is: C:\ProgramData\Malwarebytes Anti-Exploit. To access the ProgramData directory you will need to click on Folder Options and select the View tab. Next click on Show hidden files, folders or drives. Then you can zip the contents of this Malwarebytes Anti-Exploit folder and add it as an attachment in your next post using the More Reply Options as Pedro mentioned. Hope this info is helpful to you and don't forget to go back into Folder Options and change that setting back to default as that is a built in Windows security feature. Best wishes, Ritchie...
  7. Hi John, point well taken! If you don't know what script is doing what then you should either do some research or just leave it disabled by default.
  8. I don't completely agree with you John. I do agree that log files can be very helpful in bug reporting and troubleshooting and some should not be deleted. However CCleaner can remove a lot of unnecessary files that can clog up your drive and slow your system down without having to manually hunt them down, which could be time consuming for a busy person. I've used it for years without much conflict or trouble. You just have to know which scripts to disable. As far as CCEnhancer only advanced/expert users should use this executable as it does install cleaning scripts that may overwhelm a novice user with the wide range of choices now avaliable, depending on what you have installed on your computer. Definetly leaving the script for Anti-Exploit disabled even if it seems it's not functioning properly just to be on the safe side! Best regards, Ritchie...
  9. Hi Pedro, this is what's in my winapp2.ini Configuration settings folder located at C:\Program Files\CCleaner\winapp2, same as satrow's. [Malwarebytes Anti-Exploit Beta*] LangSecRef=3024 DetectFile=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Exploit Default=False FileKey1=%CommonAppData%\Malwarebytes\Malwarebytes Anti-Exploit|*.log FileKey2=%LocalAppData%\VirtualStore\ProgramData\Malwarebytes\Malwarebytes Anti-Exploit|*.log It appears the script is for deleting the log files of course. Satrow, you tried the script and CCleaner reports nothing was cleaned? Is that correct?
  10. Hi Pedro, CCEnhancer is an application that can add many additional cleaning scripts for the very popular junk file cleaning program CCleaner. After updating the scripts with CCEnhancer today I noticed a cleaning script for Malwarebytes Anti-Exploit has been added (see image). It doesn't give a detailed description of just what files are being cleaned. As a beta tester I'm a little concerned that this script will delete possible files that may be useful for troubleshooting or bug reporting. Because of this I have decided to keep this script turned off and would reccomend anyone that uses CCEnhancer & MBAE to also keep this script disabled for now until Pedro gives the ok. Am I wrong on that or is it ok to use this cleaning script instead? What's your opinion on this Pedro? Cheers, Ritchie...
  11. I understand what you're saying Pedro since the article did state that the vulnerability has, as yet, to be verified that it has been used malicously. If not, it would only be a matter of time before some hacker takes advantage of the situation since the cat is now out of the bag so to speak. Since your professional opinion is that it's a good bet that Anti-Exploit would block this exploit I'm sure XP users that still use IE8 will find that rather reassuring!
  12. The Zero Day Initative has discovered a zero-day vulnerability that has, for 7 months, gone unpatched in Microsoft Interner Explorer 8. After Microsoft allowed XP users to get the patch for the last IE vulnerability comes this bad news for XP users! http://zerodayinitiative.com/advisories/ZDI-14-140/ http://www.cnet.com/news/zero-day-flaw-haunts-ie-8-for-7-months-and-counting/?tag=nl.e757&s_cid=e757&ttag=e757&ftag=CAD2e9d5b9 I was wondering if Anti-Exploit would be able to protect an IE8 user from this vulnerability? Or would this be something that would be considered in a future build if Microsoft doesn't issue a security patch any time soon? I'm sure the XP users that's testing A-E right now would like to know that too. Cheers, Ritchie...
  13. Hello guys, I can also confirm that the install over top the older build went without a hitch and that includes not having to kill the protection before installing. That is sweet! On another note, so far with this build I have not seen the sys tray icon infrequently fail to launch as with the previous builds. I'll take that as a very good sign that this issue has been resolved for good, really hoping that anyways! So far so good, lol! Best wishes, Ritchie...
  14. Since I'n now using the newest beta (which, btw, didn't seem to resolve the issue) any further threads regarding this cm scan problem will be posted in the appropriate beta testing section here. https://forums.malwarebytes.org/index.php?showtopic=147951
  15. Installed 2.0.2.1007 beta over top the old build and ran a (enabled in Settings) Explorer Context Menu Scan test on a small AVI file and the GUI will now launch showing the Dashboard but the file does not automatically get scanned. If you click on the Scan Now tab it just goes to the usual Threat Scan. For "Detection Options" all three of these have been enabled from the start. Is there something I'm doing wrong or a setting I'm missing to enable this feature? Or is this something you want to investigate further?
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.