1. GT500


    Emsisoft Employee

    • Points


    • Content Count


  2. stapp


    Global Moderator

    • Points


    • Content Count


  3. JeremyNicoll



    • Points


    • Content Count


  4. Frank H

    Frank H

    Emsisoft Employee

    • Points


    • Content Count


Popular Content

Showing content with the highest reputation since 05/26/18 in all areas

  1. 3 points
    It means that the tests done by AV-C and AV-T have a clear image of how they think AV software should work. The problem arises when your product doesn't fit the mould. Then you get penalized for not doing what everyone else does, even though what everyone else does may not be in the best interest of the user, to begin with. Best example: Snooping around in your encrypted connections, which literally every AV vendor screwed up at least once in the past and probably will continue to happen, exposing users to potentially greater risks than most malware does. For starters, the test sets aren't nearly as representative anymore. When we participated in AV-T and AV-C both tested with less than 200 samples a month on average. 200 samples out of literally tens of millions. The exact selection isn't clear and not representative of what users deal with either. None of them tests with PUPs for example, even though a simple look at any tech support community will tell you, that it is probably by far the biggest problem users are dealing with. So no, neither of those test scores represents real-life performance and it becomes blatantly obvious when you go to places like Bleeping Computer, GeeksToGo, Trojaner Board, Malekal, and all those other communities where people infected by malware show up for help and look at what products these victims used at the time they became infected. Then you will notice that a lot of these products with perfect scores don't look nearly as perfect in real-life conditions. The reason for this discrepancy is quite simple: Most AV vendors will specifically optimise their products for these tests. The most severe cases are where vendors end up outright cheating and detecting the test environments which then results in a change of behaviour of the product (think Dieselgate, but with anti-virus). But there are many ways you can game these tests. For example: you can try to figure out the threat intel feeds the companies use, then just buy those same threat intel feeds so you have all samples in advance you can track their licenses and supply different signatures to them or use your cloud to treat those test systems differently some particularly shady organisations literally also sell you their sample and malicious URL feed, so you can just outright buy the samples and URLs your product will get tested on later What you end up with as a result is a product that is optimised really really well for the exact scenario they are being tested under using the exact type of URLs and samples these testers use, but that is utterly useless when it comes to anything else. We just really don't want to create this type of product. So when we were asked whether we wanted to continue to participate this year, we discussed the matter internally, looked at what we get out of these tests (meaning: whether these tests have a discernable impact on our revenue) and decided that they are simply not worth it and that the tens of thousands of Euros we spent on them every year would be better spent on extending our team and building new ways of keeping our customers safe.
  2. 2 points
    I've been told that the time window for being able to figure out keys for .kiratos has ended, however I will go ahead and pass this on to the developer of STOPDecrypter so that he can archive it just in case he's able to figure out the decryption key at some point in the future.
  3. 2 points
    Hi Marshall. Not sure, but I do know that I recognize the URL of "MVPS Hosts" and I recognize the list. I don't recognize the list attached to MVPS Hosts (Domains). To view the list, click the blue "Details", "View" & "Original" buttons - see image. Sorry I couldn't offer a better explanation.
  4. 2 points
    Hi Marshall. To add the MVPS Hosts list to uBlock Origin, perform the following steps (see images for more details): (1) Go to the following link: https://filterlists.com/ (2) Enter "130" in the page field. (3) Click the blue "Details" button on the "MVPS Hosts" line. (4) Click the blue "Subscribe" button. You're all done! The MVPS Hosts file should now be added to uBlock Origin in your browser. To check you can look at the uBlock Origin "Options" page by right-clicking the uBlock Origin icon in your browser, as per images. Hope this helps. Best Regards, Steen
  5. 2 points
    Personally I think following the tests is a waste of time. If you are really concerned then you will need to make the effort to do your own testing. that is what I did. Also the tests don't tell you a thing about the nature of the company. I will stick with Emsisoft because I think it's the best
  6. 2 points
    Hallo Moreau, vielen Dank für Ihre positive Rückmeldung. Immer wieder gerne und vielen Dank für die freundliche Kommunikation. Ich wünsche Ihnen einen guten Start in die (noch fast) neue Woche!
  7. 2 points
    > Thanks how do I turn off the notification please ? See: Settings - Notifications - Browser Security verifications
  8. 2 points
    Hello, This is legitimate. You can read more about it here: https://blog.emsisoft.com/en/32517/new-in-2018-12-safe-web-browsing-with-emsisoft-browser-security/
  9. 2 points
    FYI: https://blog.emsisoft.com/en/32110/emsisoft-anti-malware-2018-9-beta/
  10. 2 points
    https://www.bleepingcomputer.com/news/google/google-will-block-third-party-software-from-injecting-code-into-chrome/ Our Surf Protection works by filtering DNS requests made by running applications. Since EAM doesn't use network filter drivers, it has to achieve this using code injection. Now that Chromium is blocking code injection by third-party applications, our Surf Protection will not work with it until we are able to make some changes. My recommendation is to install uBlock Origin and uBlock Origin Extra (both work in Google Chrome and Vivaldi) to supplement until we can get our Surf Protection working in Chrome again. uBlock Origin is a free content blocker that not only blocks ads, but also used the extensive blacklists of malicious domains available from Malware Domain List and Malware Domains to block malicious content. Note: Vivaldi 1.15 (the current stable version) is based on Chromium 65 with backported security fixes from Chromium 66, 67, and 68. Vivaldi 2.0 is based on Chromium 69, and is currently available in testing builds. Anyone with the stable version of Vivaldi installed will not be effected by this issue. Anyone using a Vivaldi 2.0 snapshot will also experience this issue with Surf Protection. Also note: Due to the added protection of an ad blocker, we recommend uBlock Origin (with uBlock Origin Extra for Chromium based browsers like Google Chrome, Vivaldi, and Opera) regardless of whether or not our Surf Protection is working with your web browser. Anti-Virus/Anti-Malware does not block ads by default (doing so can break some websites), and the companies that sell online advertising do not do a good enough job of preventing their ads from being abused by their clients, and there have been many cases of serious threats in advertisements even on legitimate websites. Please be aware that there is another content blocker called "uBlock". This is not the same thing as uBlock Origin, and is not recommended. The main reason for recommending uBlock Origin is due to its performance and memory usage being better than popular ad blockers (AdBlock, Adblock Plus, AdGuard, etc). If you wish to use one of those instead, then please feel free to do so, however I do not know if they are configured to use Malware Domain List and Malware Domains by default and recommend checking their configuration to ensure they are offering the same level of protection as uBlock Origin. If they are not configured to use these lists of malicious websites, then you should be able to add them through FilterLists.com. Note that this site was down at the time I posted this, so I was not able to check and verify that, however this site lists almost every popular filter list for ad and content blockers and it should include important blacklists like these.
  11. 2 points
    I could only confirm David's post - on both my computers with Comodo (Win 7 64 bit, SSD HDD - as this probably had some impact on that unpleasant EAM behaviour) I switched to stable version and all seem to work. So yes, the problem with Comodo on some comps is probably over. I want to add my two cents to discusion above. I work with computer more than 25 years. A lot years ago I worked as programmer. This is all over now (even as I sometimes write a few lines of code in php and MySQL). My main work is with graphics software, but for a few of my customers I do also some kind of computer servis. Not that I'm any expert in LAN's or such but I could help individual users with some computer problems. So my computer knowledges are a little bit above standard. Usually I could help myself with any and all hardware or software troubles, but this time it was very frustrating and it took me a lot of precious time (which I should have spent differently) to revert my work and home computers back to working state. And it was because of EAM "no user asking" PROGRAM update (unfortunately it even didn't create system restore point - why this isn't standard upon bigger program update is above my understanding). This is why I ask you for avoiding such program behaviour. I understand your points but you should hear our opinions also. Maybe it's not wise to let some users decide about something they don't understand but I don't ask you to do this. You can let default EAM settings on stable version update but I'd appreciate the possibility for some of us to switch off this behaviour. Why couldn't you add to setup/actualization menu two choices: 1) update program without asking user 2) update program only after user confirmation? First choice could be the default one - I don't care. This would be enough. And (not only) after this experience I'd immediately switch it to the "update program only after user confirmation". And a few words to Neneduty post: no, I won't uninstall ANY of my programs only because ANY antivirus software couldn't work with it. All programs are in my computers for good reasons (this is true especially for Comodo firewall). This could end that Emsisoft (or any other antivirus producer for that reason) could ask me not to use my graphics programs, because they could be in conflict with EAM (btw. there was situation Adobe Acrobat didn't start because of conflict with EAM one time - I resolved it with Emsisoft help then - fortunately Emsisoft helpdesk didn't want me to uninstall it :-) ). Antivirus software is in any computer to help not to be infected by computer virus; it's not there to block users to work with their programs... Any other debate about this is ridiculous. Uffff. Enough from me.
  12. 1 point
    Sophal You correctly think this site with kmspico is the source of the infection! Due to the launch of a malicious file from there STOP Ransomware encrypted your files. Before you decrypt the files, you need to make sure that there is neither this infection nor any other infection on the PC. We have seen cases when those who suffered from previous versions STOP Ransomware successfully decrypted files, but then they were attacked by the same encryptor, which encrypted files with a different extension, and used an encryption key that cannot be calculated. In punishment for haste and complacency, the user lost his files a second time and, possibly, forever. As experience shows, very often after encryption on a PC, this or another infection remains, which you could get together with the encryptor. Malicious programs often work in groups: trojans of a different type, password hijackers, backdoors, dormant malware, dangerous browser plugins. Therefore, I advise you to check your PC for active and dormant malware. This can be done here in the forum in the next section. You can also download the free tool Emsisoft Emergency Kit yourself and check the computer.
  13. 1 point
    [!] No keys were found for the following IDs:[*] ID: kdKoug7mCqSlGVQyBnLCBiCVzGFqKASgYnaVFcph (.roldat )Please archive these IDs and the following MAC addresses in case of future decryption:[*] MAC: 8C:16:45:3D:C1:B6[*] MAC: B2:FC:36:27:0F:23[*] MAC: B0:FC:36:27:0F:23[*] MAC: B0:FC:36:27:0F:23[*] MAC: B0:FC:36:27:0F:24This info has also been logged to STOPDecrypter-log.txt
  14. 1 point
    The criminal who made the ransomware threatened to increase the price of decryption if no one released a free decrypter by a certain date, and we didn't want him to know that a decrypter already existed, so no one met his deadline. It's possible that the prices in ransom notes will still vary slightly. I've asked the developer who made the decrypter for confirmation about why your files couldn't be decrypted.
  15. 1 point
    Hallo darktwilight, vielen Dank dass Sie unseren Support kontaktiert haben. Gerne habe ich Ihnen einen Link per privater Nachricht im Forum zukommen lassen mit dem nur eine Lizenz für Emsisoft Mobile Security erstanden werden kann. Auf Anfrage erledigen wir das gerne weiterhin. Wenn auf ein Google Kommentar nicht reagiert wurde dann liegt dass daran dass wir dort nicht so schnell antworten wie in unserem Support-Forum oder wenn Sie uns per E-Mail kontaktieren. Vielen Dank für den Hinweis. Für weitere Fragen stehe ich gerne zur Verfügung.
  16. 1 point
    Yes, all these actions have already been done, access to SAMBA on the router is closed, Guest's account too. The Synology software has always been updated on a regular basis - but that did not help - unfortunately, as you can see. So I am waiting for information and advice on how to decode these files - I will be grateful for your help.
  17. 1 point
    Hallo Emsi-Geschäftsführung. Ich wollte gerade meine Lizenz für ein weiteres Jahr verlängern. Das hat leider nicht geklappt, weil ich kein Häkchen bei "Abonnement" gesetzt habe. So konnte der Bestellvorgang nicht beendet werden. Braucht Ihr Eure treuen Privatkunden nicht mehr? Dann sehe auch ich mich, allerdings ungern, nach was Anderem um, bspw. Malwarebytes.
  18. 1 point
    Ok. Thank to H6T9, balumka13 In short: your files were encrypted by Scarab-Gefest Ransomware, from the Scarab family. No free decoder. You can get the private decryption that DrWeb and ESET do if they have an encoder file. Request for decryption 1) DrWeb makes a free test-decryption, used only encrypted files, registry files and a ransom note file. Link. If they can decrypt, then they offer to first buy a 'Rescue Package' with DrWeb Security Space for 2 years, then give a decoder for the encrypted files. And user will under their protection for 2 years. For users from Russia, the package price is 5299 rubles, and for foreigners - 150 € (euro). The service without the rescue package of Dr.Web is not available. 2) ESET first offers to buy their commercial antivirus, and then make a test-decryption. Link. Recently I told how to make a request in ESET, if you're interested, see the link on the BleepingComputer forum. Starting with post # 554. I have nothing to do with them and can’t influence their prices. I also believe that it was possible to make this service cheaper, if the user gets support for the first time. Later he would still buy protection if she would provide real security for a year. If details Ransomware are interesting: What is this Scarab, I realized immediately when I carefully looked at the results of ID-Ransomware. But extortionists often confuse traces: they take the name of someone else's note, the text of the ransom, imitate the ID and so on. I talked about the fifth element, in fact there are more of them and they came together before I saw the note itself. It was also clear to me exactly which version of the Scarab and which group is currently engaged in this variant. The hint is the BM-address from the note. Previously, the same people spread Hermes, then another and Scarab. Then Hermes was sold and the actors went to other projects. When the basic encryptor of Scarab was updated last year, many extortionists switched to using it. I wrote about some, who switched to the Scarab and came from other projects. The Scarab Ransomware-project employs many groups from different countries, they work in groups and individually.
  19. 1 point
    Hi Gawg Thanks for your comments. I'll try a reboot first when future problems arise.
  20. 1 point
    Ja, Icewolf, wie Du hatte auch ich gedacht, daß Emsi sich unserer Kritik annimmt und da nachbessert. Für mich erstaunlich wegen der bisher so besonders kundenfreundlichen Praxis (keine Daten verhökern, keine Toolbars etc. mitinstallieren...), daß man unsere Beschwerden offenbar stumpf ignoriert. Bei allem Pipifax,wie "nicht übersetzt, fehlt was am Rand, Farbe nicht gut, Anpassung an Monitor unzulänglich etc.)" wurde irgendwann - meist schnell - reagiert und nachgebessert. Jetzt kommt man mal mit einer wirklich schwerwiegenden Kritik - und nix passiert. Naja, Win10 bringt ja den inzwischen reiferen Defender mit, und da "der Geiz geil ist" werden die meisten Kunden keine zusätzliche AV Software installieren. Da scheint die Firmenleitung ihre Felle schwimmen zu sehen... Anders kann ich mir einen so schwerwiegenden Fauxpas nicht erklären bei der bisherigen Philosophie des Herrn Mairoll. Schade
  21. 1 point
    That's correct. We don't exclude all system processes from injection in case they get replaced by malware, and since Windows won't allow injection when it's a legitimate system file with strict code signing requirements then it isn't going to cause any problems.
  22. 1 point
    Advanced users can still see if we block something by checking on VirusTotal.For those who don't know what to do with that list, it doesn't need to be there. It's just a type of simplification, so that only custom rules are shown now. Yes, the host rules are still there, they're just not displayed anywhere in the UI anymore. No, that was developed to supplement the Surf Protection, and not to replace it.
  23. 1 point
    Sorry, der Beitrag wurde aus Versehen verschoben. Sollte jetzt wieder richtig sein. Ansonsten war die Inkludierung von Emsisoft, wie vom Autor in seinem Forum bereits bestaetigt, ein Versehen seinerseits. Wir verschicken keine vollstaendigen URLs. Wir verschicken nichtmal Domainnamen im Klartext. Wir verschicken ausschliesslich Hashes von Teilen des Domainnamens, die von uns nicht einmal zurueck in einen echten Domainnamen umgewandelt werden koennen. Die Idee ist im Endeffekt nicht, dass wir wissen wo da jemand grade rumsurft, sondern nur, dass wir genug Informationen haben um 99.9999% aller schaedlichen URLs die wir kennen auszuschliessen. Das Ziel ist die Liste an potentiell moeglichen schaedlichen URLs soweit zu reduzieren, dass es praktikabel ist sie zurueck an den Browser zu schicken, damit dieser dann schauen kann ob sich der User grade auf einer bekannt schaedlichen Seite aufhaelt.
  24. 1 point
    I am having exactly the same issues. Also have a 4K screen. I have already informed David from customer support regarding this. Do you have a time frame when this would be fixed as this has been going on for months now? Its been a very very long time since this has been like this, probably like 3 months.
  25. 1 point
    We don't generally publish the blog posts before the updates are distributed, that way people don't see the news about a new version before they get it. Usually the lag between updates being available and the blog post going online is relatively short, however since the blog post is done manually the timing can vary a bit.
  26. 1 point
    I have received 2 phone calls regarding this issue. Is this legitimate?
  27. 1 point
    I just got this also. Windows 10 Pro. Pale Moon,Firefox & Chrome installed. Chrome default
  28. 1 point
    @Tarnak I recommend sending an e-mail to [email protected], and they can let you know what options we have available for you.
  29. 1 point
    Please upload an encrypted file or ransom note to ID-Ransomware and copy/paste the results here for one of the experts to look at. https://id-ransomware.malwarehunterteam.com
  30. 1 point
    Thanks marko. Making AV software bug lists available for the public isn't best practice and might compromise your system. Most bugs are rare and won't be noticeable for most users, no sense to inform everyone about a bug on W7 *32, while most of us run *64 bit sytems. Besides that, the list will contain minor bugs which have low prio and will be fixed in a future releases. When you notice unexpected behavior, like current performance lags, it's good to post such findings here in the beta testers channel so all beta users will be informed, or you can ask me in PM. Sometimes issues are known, sometimes they are not, so its good to post findings here, although in some circumstances such feedback might be obsolete. Cheers
  31. 1 point
    Fixed: issue with Microsoft Internet Explorer. Fixed: issue with Steam and other apps that use DirectX. Fixed: rare instability issue on 32-bit Windows versions. Fixed: issue when apps were started from a network share.
  32. 1 point
    Kurzes Update zum Thema Datenschutzerklaerung: Wir haben das ganze Dokument nun mit weiterfuehrenden Informationen ergaenzt und gehen am Ende im Bereich Haeufige Fragen auf einige Punkte noch gesondert ein: https://www.emsisoft.com/de/company/privacy/
  33. 1 point
    Is this issue fixed in the latest beta update? https://blog.emsisoft.com/en/32158/emsisoft-anti-malware-2018-9-1-beta/ Here's instructions for installing it: Open Emsisoft Anti-Malware. Click on the little gear icon on the left side of the Emsisoft Anti-Malware window (roughly in the middle). Click on Updates in the menu at the top. On the left, in the Updates section, look for Update feed. Click on the box to the right of where it says Update feed, and select Beta from the list. Right-click on the little Emsisoft icon in the lower-right corner of the screen (to the left of the clock). Select Update now from the list.
  34. 1 point
    Is Windows configured to show all icons in the Notification Area? If it tries to automatically hide icons, then it may move them into other positions when it unhides them.
  35. 1 point
    What version of Windows is this happening on? The icon stays where I placed it on Windows 10 x64 (1803).
  36. 1 point
    Just to let everyone know, we are currently looking in to why this is happening. Excluding Steam.exe from monitoring (as xeon mentioned) is the correct workaround for now.
  37. 1 point
  38. 1 point
    OK, I'll make sure Frank is aware of this.
  39. 1 point
    that's fun. firefox doesn't block code injection yet, but it's on their roadmap for q4 2018/q1 2019. i'd also expect opera to start doing it if they merge upstream changes from chromium. *EDIT* Opera is tracking Chromium 69 for Opera 56, and Vivaldi is tracking Chromium 69 for Vivaldi 2.x.
  40. 1 point
    Not a big fan of the GUI. Way too much white space, too much scrolling and I do not like sidebars. Its also starting to look like a web page which I think is what you guys are going for but I hate it. A gui should be compact, crisp and intuitive, this one is none of the above. I need to put on sunglasses for this one.
  41. 1 point
    Upgrade was smooth. I'm using W8.1, 64bit. In the layout on the Overview screen, when one hasn't clicked on the top-left menu icon, it's still possible to click on the mini icons down the lefhand side, but hard to know what they do. I mean... quarantine is possibly meant to look liek something in a cage, but looks to me more like a washing-machine... Maybe these mini icons should produce tooltips? The Support screen talks about getting help from the "?" at the top right, but it's no longer there. Thank-you for - finally - making the About option easier to find, and taking away the problems that clicking on "Emsisoft" could previously cause... but I see one still can't copy the current version number out of the About display. Now would be a fine time to add that facility!
  42. 1 point
    Here's a screenshot of the renewal options showing where to find the number of computers on the license key:
  43. 1 point
    Confirmed in the 2 posts above yours. No problems for the last 5 hours. I would have reported it if there were problems
  44. 1 point
    Yes updated manually and have same sigs as you. They must have kicked that server hard !!
  45. 1 point
    Attachments... only downloadable by staff... is (of course) right, but this poster was previously posting URLs to a pastebin-like site, so anyone could follow the URL.
  46. 1 point
    Even though they're owned by Malwarebytes now, hpHosts has traditionally been a decent HOSTS file (if you really feel you need one): https://hosts-file.net/ The main site is rather slow, however the version of their HOSTS file on their mirrors is dated March 16th, so if you want the latest version you'll need to endure their site's slow speeds.
  47. 1 point
    > as Piotr has rightfully pointed out in his comments... I'm interested in something in Fabian's reponse to those comments, namely: "If a lot of people switch the default value, we may consider adding other options". How will Emsisoft know how many of us change the default value, if there's no 'telemetry' sending that info back to them?
  48. 1 point
    Likewise: Start with Windows was turned off for me as well as dont update while in invisible mode. Also, in the new Protection panel, hovering the mouse pointer over the "i" icon produces no tooltip for: BB's "Suspicious programs" and File Guard's "Only scan...".
  49. 1 point
    Over the next couple of months we plan to refresh the entire user interface of Emsisoft Anti-Malware. The current design served us well for the last four years, but in order to stay on top of modern design trends and changed user experience requirements (e.g. touch screens), it is time for us to get a bigger change on the road. User interface changes typically mean a lot of development work, so we are going to migrate to our new design in stages. Our first step, which you can see in this month’s 2018.6 release, is a completely redesigned and re-organized settings panel. Instead of top menu tabs that open individual pages with custom designed settings pages, the new version merges all settings on one well-structured panel that is much easier to navigate. We also took the opportunity to question the old sorting and grouping of settings and re-organized all sections to what we believe provides the best work efficiency for you, i.e. we moved the most used features to the top. See for yourself and don’t hesitate to provide us feedback in the comments below! Emsisoft Anti-Malware 2018.6 settings panel All 2018.6 improvements in a nutshell Emsisoft Anti-Malware Redesigned and re-organized settings panel. Renamed Game Mode to Silent Mode. Improved auto-update functionality. Improved handling of license subscriptions. Improved MSI uninstaller. Improved offline installation process. Minor user interface changes. Several minor tweaks and fixes. Emsisoft Enterprise Console Added a setting to disable registry scans for all scan types. Several minor tweaks and fixes. Emsisoft Emergency Kit Several minor tweaks and fixes. How to obtain the new version As always, so long as you have auto-updates enabled in the software, you will receive the latest version automatically during your regularly scheduled updates, which are hourly by default. New users, please download the full installer from our product pages. Note to Enterprise users: If you have chosen to receive “Delayed” updates in the Update settings for your clients, they will receive the new software version no earlier than 30 days after the regular “Stable” availability. This gives you time to perform internal compatibility tests before a new version gets rolled out to your clients automatically. Have a great and well-protected day! The post New in 2018.6: Improved settings panel appeared first on Emsisoft | Security Blog. View the full article
  50. 1 point
    Hi all. Just a note that your fix seems to have finally fixed the problem. I had a chance to try it a few days ago and so far I can't tell any obvious problems. I wanted to test it for a bit before replying. I put it in Beta mode, then when that worked put it in Stable. Those both survived reboots. I did update to the latest Comodo Firewall before that (I had been about an update behind). So thanks for eventually finding the fix. This most recent discussion here has motivated me to move back to Delayed, though. I think, generally speaking, experienced users have update fatigue. MS Windows and its attempt at controlling the update process is mostly the culprit here (the whole unpaid beta tester thing and how frequently they break things, after shamelessly tricking many people into Win10), but it isn't only them. Follow the https://www.askwoody.com/ site for a while and one sees the big picture. Despite this recent hiccup with Comodo and how much time it cost me (!) two months ago, I still love your software. I know you don't want what must feel like many different versions of your software. There have also been many reported software and hardware vulnerabilities this year. It must be a difficult time to be responsible for anti-malware software. It won't get any easier. You have to run this show at the level you are capable of. Still, giving the user more control and choice should be a priority. One only has to be burned by updates going wrong a couple of times and one gets update fatigue. Updates going wrong have cost me infinitely more time than malware!
  • Who's Online   0 Members, 0 Anonymous, 57 Guests (See full list)

    There are no registered users currently online

  • Newsletter

    Want to keep up to date with all our latest news and information?

    Sign Up