Dan, I didn't do that....so, my settings go back still to April 2017, when I did the original install of Glasswire.
Sure but if you have issues it is recommended to do clean install over top and you don't have to re-register. Plus here is a new Beta: https://forum.glasswire.com/t/try-the-glasswire-windows-2-0-81-beta/5715
Yes, I know that...and saw that, and you have posted about it in their forum. Is it worth updating to that beta version? Any significant benefit, to do so?
Yes, but sometimes one can take on too much. Besides, I would have to sign up to their forum. I am sure Glasswire monitor this topic at Wilders.
Thanks, but I was asking about success of 'over the top' in the sense of NO clean install, in order to leave the settings intact. The installer uninstalls the previous version in either case. I was aware of the recommendation, so that is why I was asking.
I got a connection to IPv4: 191.235.222.53 as per Glasswire alert, pac100pacprodpacservice.cloudapp.net > PSProfiler I want to block it, but I see no way to do that using the GUI interface in Glasswire. I have found it is related to Panda Security which I have been using, but no longer use at present. I may want to use it again in the future. - https://www.threatcrowd.org/ip.php?ip=191.235.222.53 I have tried to find out how to block it it Windows Firewall, but have been unsuccessful. Just wondering if anybody can give me some advice as to how to block the outward connection. P.S. It apparently is a a sub-domain of Microsoft: - https://www.threatcrowd.org/domain.php?domain=pac100pacprodpacservice.cloudapp.net Edit: added Post Script
Overpriced spyware, that looks pretty. Not to trust, to many outbound connections. Wasted my money on this crap.
Thanks for the warning. It might look neat and streamlined but if it's a caller outer like that, no thanks. And this camp certainly doesn't fork out to cater to spyware
From today's logs: 'Glasswire Control Service' appears to have made a connection to 'activate.glasswire.com' over HTTPS. 'Glasswire Control Service' also seems to be used by the integrated VirusTotal scan service, also over HTTPS. Other than that, and a few connections to 'localhost', that's about it here. Probably making a mountain out of a molehill...
+1 here. Can see nothing remotely (pardon the pun) GW-related connecting out...so would also appreciate something concrete to support the allegations..