Jump to content


Immunet Insiders
  • Content Count

  • Joined

  • Last visited

  • Days Won


dallas7 last won the day on February 2 2013

dallas7 had the most liked content!

Community Reputation

9 Neutral

About dallas7

  • Rank
    Advanced Member

Profile Information

  • Gender
  1. dallas7

    64 bit Protection??

    In a thread from last year it was discussed that Immunet 6.0 "...only protects 32 bit processes at this time." 64 bit yet? In 6.0.8? Thank you!
  2. dallas7

    Windows 10 Au?

    Nice to be back. I don't put too much faith in anyone's home page. I think I'll just bang out a email to support@
  3. dallas7

    Youtube Test - Excellent Showing

    Yeah. When he enabled that and game mode I thought, "He'll be back." He caught on to that pretty quick and disabled both.
  4. Very good... https://www.youtube.com/watch?v=RoLFL8gwqSY
  5. dallas7

    Windows 10 Au?

    Wow. My login still works. Congrats on Immunet 5! I have a Windows 10 Home x64 system which started out as a Technical Preview build on an old clunker E8400 box. But it keeps on updating and works just like retail. Immunet 5 is installed on there and runs well with Defender, Spy Shelter free and Voodoo Shield free. Test results are superb, snagging everything I throw at it from VXVault and malc0de. I also have a new Dell i3-6100 running 10 Home X64 Anniversary Update. I'm a bit reluctant to install Immunet because of, well, you know... Microsoft. Have you folks cleared for AU yet? Thanks.
  6. dallas7

    Clamav Files?

    Hey Ritchie... Glad to see you're still alive and kickin' too. I'm good, thank you. Except for my memory. The cvd file is there as is that cld file; I should know those well as I supported Clam on a couple of Linux mail servers some years back. I'm sure I was looking for a bit BitDefender folder stuffed with 150+ files. Thanks for the memory jog! Take care.
  7. I remember when I was working with Free v3.0.3 and the ClamAV engine and allow updates were enabled a healthy amount of definition files got downloaded and written to a local directory. I did not see that occur in the v3.0.8 I installed on a freind's system yesterday and I cannot locate any directory containing ClamAV defs. Is this OK? Thank you!
  8. Immunet continues to rock the MRG Flash tests, hitting detections even when Bitdefender fails. Now running about 15-20 percentage points ahead of some of the big-shot AVs and suites and on par with others! My latest spreadsheet compilation... https://docs.google.com/leaf?id=0BxamVvlZYmoyNmZhYTQ0MDEtMmY2OS00MzczLTg2MWEtOTU3Yzc2NDNmYjVj&sort=name&layout=list&num=50 Enjoy! Would some one PLEASE disable the Quote function in sweidre's profile. PLEASE!
  9. dallas7

    Agent.exe Causing System Instability

    So what? Well, thank goodness for that.
  10. dallas7

    No-Nag User Inteface

    While I'm logged in for something else, I'd like to once more post up my suggestion for a user interface devoid of the side-banner and orange pane upon a donation-based $12 payment to Immunet and providing the user with the more informative visuals of the Plus version without Tetra's local overhead. Cheers.
  11. dallas7

    Agent.exe Causing System Instability

    Immunet Free v3.0.3.6870 This may or may not be strictly related to the issue(s) under discussion here, but it's as good a thread as any... As reported by Task Manager, agent.exe eventually begins utilizing 400,000-600,000 K of VM Size. I close iptray and any attempt to stop the service returns a failure message (using the services mmc or the net stop command). I have a static 2048kb pagefile so a rampant VM size of that magnitude is causing problems. I should note that when agent isn't problematic, the VM Size is about 120,000 K and stopping the service has always been rapid and successful. I see this behavior on two similarly configured XP SP3 32-bit systems though the hardware platforms are significantly dissimilar. It's been annoying enough for me to have stopped running Immunet as of about three weeks ago. I'll give it another shot with the next upgrade... 3.0.4 or 3.1? Cheers.
  12. dallas7

    Ransomware On The Rise In 2011

    Recently while searching for a video related to a significant breaking news event, opening a page in a small city news affiliate presented me with some unusual requests from my browser. I had hit upon a ransomware attack. Using my test system I have observed in three separate tests last month that those ransomware attacks begin with the browser requesting a TCP port 53 connection to a rogue DNS server followed by a request to open csrss.exe with a connection to Blocking either of these stops the attack. Unless you have a firewall that can lock down DNS connections to UDP and the DNS servers configured in your TCP/IP properties and "ask" for any others as well as "ask" for the loop back you'd never know those were happening. (I use Malware Defender to evoke those rules.) However, this is beyond the expertise of even most network savvy users. The latest crop of suites don't even contain the feature set to build such rules which would mimic a real world example of stopping a criminal "at the gate." The best alternative protection is BitDefender's superb new free Traffic Light extension and to use the DNS services of DynDNS Internet Guide or Norton DNS. (I'd also suggest OpenDNS but if you haven't turned off Firefox's or Chrome's filtering you're already taking advantage of that.) As of Tuesday, either one of those has warned of danger when opening a ransomware link as posted up in malc0de and the Malware Domain List. I know that's not definitive but no one can deny it's Better Than Nothing. Failing those, where the criminal makes it past the gate and gets into your home, up-to-the-minute signature data and/or a powerful HIPS is the only protection. And we know the downside in those... the user will usually select OK or Allow. I am not convinced anyone makes a "behavior blocker" that would be any good because there is nothing unusual about the behavior with respect to the network or user activity. And therein lies The Rub. These attacks are socially engineered to prey on the unsuspecting. As ritchie58 said, "Extortion, plain and simple." So sad.