-
Content Count
75 -
Joined
-
Last visited
-
Days Won
2
bobbonomo last won the day on November 3 2018
bobbonomo had the most liked content!
Community Reputation
2 NeutralAbout bobbonomo
-
Rank
Active Member
Profile Information
-
Gender
Male
-
Location
Montreal Canada
-
Interests
GOOD beer
Contact Methods
-
Yahoo
mydumbsite#yahoo.com
Recent Profile Visitors
3758 profile views
-
It's OK now. I've never seen it go for 3 hours without an update. I checked the log for all July and it had not happened once. I can see there being times without updates being published but not 3 hours. Anyway case closed.
-
bobbonomo started following Firefox Phishing or not, no updates for 2 hours, Anthony Williams and 4 others
-
There have been no updates for 2 hours. Click "update now" does nothing. Changed to 30 minutes and nothing but when I click update now the timer resets to 29 minutes until the next update. Have 488 days left. Have rebooted the machine twice. Should I be worried? Log says: General Information: Version 2019.6.0.9533 Update started: 2019-07-28 21:16:18 Update ended: 2019-07-28 21:16:18 Time elapsed: 0:00:00 No modules for downloading Detailed Information: 0 modules, 0 bytes
-
You will find that next to impossible to do. There are services you can subscribe to $$ which will filter by blacklist. Search for: web site nanny protection service Now they also know where you surf.
-
This is dated yesterday March 10. It's a short read Googling Searching for Strangers: One professor's lesson on privacy in public spaces https://www.npr.org/2019/03/10/702028545/googling-strangers-one-professors-lesson-on-privacy-in-public-spaces
-
Is there a safe way to view JPG?
bobbonomo replied to iondjp's topic in Malware and Computer Security
Submit the file to https://www.emsisoft.com/en/support/submit or to Virustotal https://www.virustotal.com/ This will just check the file against about 60 engines. I doubt very much if JUST downloading the attachment would cause harm. Your anti-virus should kick in. Now could look at it with a hex editor and see if the magic number is correct. Just what is the URL of the attachment? As for 2.) I seem to remember an exploit where the default action for a file would kick in despite what the extension was. As in double clicking a exe disguised as a jpg. That must have been fi -
Not sure to whom this was intended for. This is one of the first things I said in my post above of Sunday at 02:29 PM. I'm almost positive your reasons are close to mine. This post by Quara.com is kinda related. You may not think so from the title. Why are Bots unable to Check "I am not a Robot" Checkboxes? https[:]//www.quora[.]com/Why-cant-bots-check-%E2%80%9CI-am-not-a-robot%E2%80%9D-checkboxes/answer/Oliver-Emberton It describes the methods and data Google uses for their CAPTCHA thingy. It's a short read. I read the supporting document presented at Black Hat ASIA 2016
-
Let me say this about privacy on the Internet. It does not exist really. OK so you are protected from the prying eyes of your service provider and all intermediate routers between you and the server if using https. This is good but... You make a request to thiscrazydomain.com which needs to be resolved. This is done by UDP in clear text. Your ISP probably farms out DNS to a Big Boy like Google's 8.8.8.8 or other like cloudflare's 1.1.1.1 or openDNS's 208.67.222.222 just to name a few. So now it is known. The http request is encrypted but the hosting company now knows too and what pag
-
I probably posted this in the wrong forum so I will post here. On the blog https://blog.emsisoft.com/en/32736/phishing-vs-spear-phishing-vs-whaling-attacks/ I left this comment: On my work horse machine, where I have Emsisoft, I installed the Firefox extension and the Edge extension. In Firefox (and I presume Chrome) there is also Google safe browsing activated. Let's put aside that you don't track what URL I visit and Google's whole purpose is to know just that. I do not kid myself about the benevolence of Google and all the " free" stuff they give away. I'm fairly certain Goog
-
I'm reading this article from ZDnet called: New browser attack lets hackers run bad code even after users leave a web page https[:]//www[.]zdnet[.]com/article/new-browser-attack-lets-hackers-run-bad-code-even-after-users-leave-a-web-page/ It describes a neat MarioNet attack. (neat from an attacker point of view) So am I protected using my EMSIsoft?
-
I just use Emsisoft (blocking PUPs) on my workhorse PC with the extension and Norton with its extension on another. I use Firefox because I see Google as a data collection machine and Chrome as an extension of it. But using either you also have Google's safebrowsing.phishing and safebrowsing.malware options enabled by default. I have Privacy Badger from the Electronic Frontier Foundation And I use my instincts.
-
On the blog https://blog.emsisoft.com/en/32736/phishing-vs-spear-phishing-vs-whaling-attacks/ I left this comment: On the work horse machine, where I have Emsisoft, I installed the Firefox extension and the Edge extension. In Firefox (and I presume Chrome) there is also Google safe browsing activated. Let's put aside that you don't track what URL I visit and Google's whole purpose is to know just that. I do not kid myself about the benevolence of Google and all the "free" stuff they give away. I'm fairly certain Google just checks their Virustotal results. Microsoft also has i
-
I'm not so convinced. The name is still registered with namecheap and probably still operates (ping = OVH Poland) using different URL parameters. I never contacted the hoster OVH. There will be others.
-
Seems to not respond any more. The registrar says so and so do my tests
-
FYI Here is a fake tech support which comes through: a red screen and audio (both emsi and norton) https: // stfebwehgbewhew.info /90t/?c5aeb99095434e0ftfn1d5aeb99095438a=(866)%20465-8113 It started as https: // stfebwehgbewhew.info /90t/?a=10012592&campid=46 from an ad from: adjustable .global. ssl. fastly. net I have the screenshots and all
-
The Norton one. The fingerprint must have been different The Emsisoft did miss a coin miner but I reported it in my coin miner thread and it was caught by Norton so I went to my other computer with Emsi to test just to see. I always have a CPU meter on so I would notice a spike for a new coin miner. Neither of these are dangerous so I don't worry much.