Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


Everything posted by ritchie58

  1. Microsoft is reaching for the clouds as well. Geared towards business applications Microsoft has embraced cloud based technology to enhance connectivity and productivity in the workplace environment. The cloud is not just for anti-virus applications anymore!
  2. Gawker.com has apparently been the victim of a pair of security compromises this weekend, one of which put reader's data at risk. The news, pop culture, and gossip site informed readers today in a blog post that its database of 1.5 million reader-commenting accounts had been compromised and urged its users to change their passwords: Our user databases appear to have been compromised. The passwords were encrypted. But simple ones may be vulnerable to a brute-force attack. You should change your Gawker password and on any other sites on which you've used the same passwords. We're deeply embarrassed by this breach. We should not be in the position of relying on the goodwill of the hackers who identified the weakness in our systems. And, yes, the irony is not lost on us. Later in day, it was revealed that the site itself was compromised as well when a post appeared there reportedly linking to the site's source code at The Pirate Bay. The story appeared under the byline of Gawker writer Adrian Chen, but Chen tweeted that he had not written the story and the site had been hacked. Gawker representatives did not immediately respond to a request for additional information. Original post: CNET Security
  3. When I was running the free versions of Panda and Immunet I was more concerned about rootkits myself. I tried the Panda Anti-Rootkit app and couldn't get it to work for me. My review I posted at CNET can be seen in the link provided by falcon under ritchie58. If you read some of the other reviews other people besides me ran into the same situation. It works great for some folks, others not so lucky. Another good app at sniffing out rootkits is F-Secure Blacklight Root-Kit Eliminator which works flawlessly for me. One downside to F-Secure's app is no technical support but it's very easy to use. Just follow the instructions. If a rootkit is detected all you have to do is rename the file which renders the rootkit inoperable. After which is easily deleted.
  4. What Kyle is saying, if a user, for some reason, ends up with no internet connection the "Fix It" appears in the GUI. If you click on the "Fix It" it directs you to the online support page. If you have no internet connection the page would never load of course. That's where a offline help or read me file you can access from the GUI would come in handy, as Kyle has suggested, especially for a novice PC user. Very good idea Kyle.
  5. In line with this thread, Google unveiled their beta Chrome Operating System, very recently, being shipped in a prototype laptop. It is unique at this time in that some of the functions of the operating system will be utilizing cloud based technology. Read CNET's full review of Google's Chrome OS here.
  6. It stands to reason that if free users were given the ability to use these features it would benefit the overall collective security of the whole community.
  7. I am not familiar with Kingsoft so I couldn't tell you one way or the other. Comodo Internet Security comes highly regarded. It gets great reviews at CNET's download.com. It's a security package that has a firewall and anti-virus. I use Comodo as my firewall and opted out of the antivirus since I already had Panda. If you try this and install the complete package turn off the Windows Firewall (I'm assuming your OS is Microsoft Windows) to avoid conflicts with running two firewalls. If this doesn't work out for you there is a chance your already infected with something. Some types of malware will screw up your current AV and keep any other AV you install from operating properly. That is a possibility.
  8. On the heels of a government report pushing a "do not track" option for Web browsers, a recent study from the University of California-San Diego finds that browser vulnerabilities can allow access to your Web-surfing history. Researchers cautioned, however, that the practice is not as harmful as malicious software attacks like malware. JavaScript code used by Web sites and advertisers exploit browser vulnerabilities to track which sites a user has or has not visited, the report said. Researchers have dubbed the practice "history sniffing," and they claim their work is the first empirical analysis of history sniffing across the Web. "Nobody knew if anyone on the Internet was using history sniffing to get at users' private browsing history. What we were able to show is that the answer is yes," UC San Diego computer science professor Hovav Shacham said in a statement. History sniffing is possible because browsers display links to sites you've visited differently from those you have not. If you've clicked on a link, it shows up purple. If you have not clicked, it displays as blue. "History sniffing JavaScript code running on a Web page checks to see if your browser displays links to specific URLs as blue or purple," the report said. Why is this important? Researchers said that Web site owners can use this information to see if you have been visiting the Web sites of their competitors. Advertising companies can also used the data to build user profiles, while criminals could watch which banking sites you use to know which fake banking site they should use for a phishing attack. "JavaScript is a great thing, it allows things like Gmail and Google Maps and a whole bunch of Web 2.0 applications; but it also opens up a lot of security vulnerabilities. We want to let the broad public know that history sniffing is possible, it actually happens out there, and that there are a lot of people vulnerable to this attack," said Sorin Lerner, a computer science professor with the university's Jacobs School of Engineering. The report found that the latest versions of Firefox, Chrome, and Safari block history-sniffing attacks. Internet Explorer, however, does not currently defend against history sniffing. November data from Net Applications found that IE still holds 58.26 percent of the global browser market share. A Microsoft spokeswoman said the company takes "a holistic approach to protecting consumer privacy." That includes browser options like InPrivate Browsing, which lets customers surf without having their activity tracked. "Internet Explorer 8's InPrivate Browsing feature puts people in control of their privacy, giving them the important features and controls to understand what information is being shared when they browse the Web," Microsoft said. To gather their data, researchers used their JavaScript monitoring tool to look at the top 50,000 Web sites, as ranked by Alexa. The practice is not particularly widespread, at least. Of the 50,000 sites, they found that 485 of those sites can monitor a browser's history. Of those 485 sites, 63 of them transferred the browser history to the network; researchers only considered it history sniffing if that data was sent to the network. The topics of these 63 sites were varied, though most focused on entertainment. A complete list is included in the report. To gather their data, researchers tagged – or "painted" – a link that was being tracked, akin to the paint packets banks add to bags of stolen money. "As soon as a JavaScript tries to look at the color of a link, we immediately put 'paint' on that. Some sites collected that information but never sent it over the network, so there was all this 'paint' inside the browser. But in other cases, we observed 'paint' being sent over the network, indicating that history sniffing is going on," Lerner said. Going forward, the researchers said they would use this technique to see if history sniffing is also used by Web 2.0 applications and social-network sites. Shacham said that while history sniffing might be invasive, it is not as great a risk to your privacy as malicious software programs like malware, which can steal banking information or an entire Facebook profile. Still, "history sniffing is unusual in effectively allowing any site you visit to learn about your browsing habits on any other site, regardless if the two sites have any business relationship," he said. He advised users to keep their browsers and Flash plug-ins up-to-date to avoid history sniffing. The report comes several days after the Federal Trade Commission released an online privacy report that recommended "do not track" technology for browsers. Essentially, browser companies should add the ability for consumers to opt-out of having their Web activity tracked, the agency said. The FTC discussed it more at a House hearing last week, where a researcher from Symantec expressed his concern about "do not track" technology. Major browser firms like Microsoft, Google, and Mozilla have said they will review the FTC's proposal. Original post: pcmag.com
  9. Sorry you had problems with Panda. A few of my friends use the free version and so did I before upgrading to the Pro version and never had any problem with it. I know what the problem might have been. I had to add a couple of files that Panda uses into the Immunet exclusion list. I should have mentioned that to you and told you which files to add to the exclusion list. That's my fault that I forgot to tell you about that. As far as a hacker gaining access to your cloud connection, I have never heard of anyone running into such a situation.
  10. Falcon, that depends if your using the free or the Plus (paid) version. The Plus version can be used as a very good stand alone anti-virus solution. If your using the free version I would recommend installing another anti-virus to complement Immunet. I use Panda Cloud Anti-virus Pro running along side of Immunet. There is a free version of Panda Cloud you can download and install at the link provided. The free versions of Panda and Immunet run "great" together. Plus Panda uses very little system resources so it shouldn't slow your system down like Avira Antivir did. Just like Immunet you don't have to worry about signature updates (as with traditional AV's like Avira) as the definitions are in the "cloud". That layered approach will definitely give you added protection against being infected. If Panda is not to your liking you could also try a traditional AV like Avast! or AVG but try Panda first and see what you think. Best wishes, ritchie58
  11. Falcon, if you're using the free version it does not have the ability for you to use the right click context menu scan for files that are compressed such as rar and zip files. I believe the next release will give free users the ability to use that function. That's something that's sorely lacking for the free users at this time, the ability to scan compressed files. May I suggest installing Malwarebytes Anti-Malware. It will scan for malware in compressed files using the context menu scan.
  12. Spam may be down but malware marches merrily on. That's the message from the "November Threat Landscape Report" released yesterday by security vendor Fortinet. Global spam levels ultimately fell 12 percent in November after Dutch authorities took down a large Bredolab network made up of 140 different servers. The Bredolab botnet was typically used by cybercriminals to send out spam selling fake drugs, according to Fortinet. Spam had actually fallen as much as 26 percent the week after the network was dismantled but was able to stage a bit of a recovery afterward. (Credit: Fortinet) The ever-present Koobface botnet, known for affecting Facebook users, also suffered a hit on November 14 when U.K. Internet service provider Coreix took down three of its central "MotherShip" servers. The perpetrators of Koobface use these MotherShip servers as their main command-and-control systems to direct the spread of the botnet and control infected PCs. The bad guys communicate with the MotherShip machines through intermediary servers. Though the takedown of the MotherShip servers dealt Koobface a severe blow, the success was short-lived as the botnet operators were able to use stolen FTP accounts to hijack other servers, according to Fortinet. "We confirmed that on November 14, when the primary servers were taken offline, the intermediary servers failed to proxy content, which effectively crippled the botnet," Derek Manky, project manager for cyber security and threat research at Fortinet, said in a statement. "Unfortunately, we saw communication restored five days later on November 19th. This is likely due to the fact that Koobface contains an FTP harvesting module." Looking at other botnets, Fortinet found another prominent threat in November in the form of Sasfis, a botnet that infects PCs by using the standard port 80 reserved for HTTP traffic. Increasingly, botnets are using common ports to spread in an effect to blend in with normal traffic. Detections of Sasfis command-and-control servers were third on the top 10 attack list maintained by Fortinet. Fortinet also discovered in November that the Hiloti botnet was using legitimate DNS queries to report back to its command-and-control servers, another example of a botnet trying to use standard protocols to avoid being detected. Finally, zero-day vulnerabilities were found last month in Adobe Shockwave, Adobe Flash, Microsoft PowerPoint, Apple QuickTime, and Microsoft's Internet Explorer. All of these weaknesses were cited by Fortinet as critical as they leave the applications open to attacks that are able to run code remotely. In terms of sheer malware attacks among the top countries hit in November, the U.S. accounted for 35 percent, up from 32 percent in October. Japan took 22 percent of the total attacks, up from 16 percent the prior month. And Korea took the brunt of 12.5 percent of the world's total malware attacks, up from less than 9 percent in October. (Credit: Fortinet)
  13. For one reason or another I've had to uninstall and reinstall Immunet on several occasions and have never run into any uninstall (and reinstall) glitches either.
  14. Sweidre, the circular list will only display a maximum of 14 members. The rest are located in the full community drop down list and yes I have some duplicates as well. I have two listings for Dave Shirk and four listings for Jorgen Nordahl. I didn't think it was a bug. I thought that Dave and Jorgen had Immunet installed on multiple computers using the same account. That's logical thinking, no? If it is a bug than I stand corrected.
  15. You make a good point. Besides the privacy issue you mentioned sweidre, it will keep your profile account from getting cluttered up with already read messages.
  16. It looks like IMP beat some of the big guns in those tests. That's reassuring!
  17. I wouldn't mind getting a few more users in my personal community as well. There is two PC's running Immunet with individual accounts at this residence so it would be "two" new people added to your community. Private message me! Peace, ritchie58
  18. If any new or current member would like to add a couple of people to your "personal community" feel free to private message me. There's two PC's at this residence I can hook you up to. Regards, ritchie58
  19. I use Panda Cloud Antivirus Pro and my OS is Windows XP Professional. The free version of Immunet is indeed compatable with Panda. They run great together. However I tried the 14 day trial of the Plus version and had some issues with false positives generated by Panda.That was due to the Tetra detection engine which isn't activated in the free version. I should also mention that when using the Plus version I resolved the problem by putting the Panda Cloud files that were being flagged as FP's in the exclusion list. So with a little tweaking it is possible to run PCA and IMP Plus together.
  20. Got your own web site. That's pretty cool Duncan! I clicked on a couple of links and the ones I checked out sent me to the right place. I am curious about that cleaner called "Wipe" and I see your also familiar with CCleaner (who isn't). In your opinion is Wipe better than CCleaner at getting rid of unnecessary files? Or do you use both? I've used CCleaner for years. The newest version (3.01.1327) is much better at deleting index.dat files. In fact I used a cleaner just for those type of files called Index.dat Analyzer 2.0 but now it's unneeded as CCleaner does a through job with that now.
  21. Here's what a gentleman who WORKS for Microsoft has to say about the subject: Don't run two firewalls. You achieve no extra protection, you incur the extra overhead of running two firewalls, and you run the risk (probably small, but not zero) of conflicts between them. See http://www.microsoft.com/athome/secu.../firewall.mspx which includes the following: "Q. Should I use both the built-in firewall and a software firewall from a different company on my Windows XP computer? "A. No. Running multiple software firewalls is unnecessary for typical home computers, home networking, and small-business networking scenarios. Using two firewalls on the same connection could cause issues with connectivity to the Internet or other unexpected behavior. One firewall, whether it is the Windows XP Internet Connection Firewall or a different software firewall, can provide substantial protection for your computer." Ken Blake, Microsoft MVP - Windows Desktop Experience Post copied from: Windows VistaForums
  22. Here is some info on the subject that makes a lot sense. Using two software firewalls on a single computer could cause issues with connectivity to the Internet or other unexpected behavior. Further, running multiple software firewalls can cause conflicts that are hard to identify and troubleshoot. Only one of the firewalls can receive the packets over the network and process them. Sometimes you may even have a conflict that causes neither firewall to protect your connection. However, you can use a hardware firewall (your router) and a software firewall (Kerio, Comodo or ZoneAlarm etc..) in conjunction. For more information see "The Differences and Features of Hardware & Software Firewalls".
  23. jerry, If you want people to join your community in your local area why not send an invitation to friends and family near you. If the people you contact are not Immunet users at this time they will be prompted to install IMP and thus be able to be added to your community.
  24. I agree with you jerry. Scan times for both the quick and the full scan has improved. When starting the program the GUI also populates in about half the time it use to take as well. I have not had to report to Malwarebytes any anomalous behavior so far. The beta seems to work like a charm.
  25. The first 1,000,000 can't be that far off!!! Immunet has made a justly deserved name for itself in a very competitive AV marketplace. The word is getting out and more loyal members are being added every day! Fantastic!
  • Create New...