Freedom won?
Only because you don't live here. How things look and how things are are two very different things. I could go on forever, but I shall leave it...
I save them as .mht* files. Windows Search indexes them. My file manager let's me set tags, ratings and descriptions, show these as columns, sort...
Too little, too late. Good news will be if the USA ever sue some ----hole country, then annex half of it for reparation.
I paid for the personal license (EUR 5) in 2016-07-01. I don't think there were any updates since. Wish everybody else had helped too so he could...
Looks like the domain expired. Wonders what happened to him.
After using PingPlotter for a while, wfcs.exe (5.3.1.0) started to be very busy and did not idle even after I stopped PingPlotter. Only a restart...
Same confirmation here, but only a few rules are imported. Opening the file with a text editor I can see there are many more rules in it. Also...
Has anyone had issue importing a full policy (.wfw)? Some of my files won't import correctly from WFC (shows no error, imports a few rules only)...
I bet machine name and user name can leak via DNS even if NTLM SSO is disabled.
Your tears make it worth.
Everything else on the page can change as long as four specific strings and the relation among them stay the same. There has been no game of cat...
Just regular expressions right now, but I could plug-in anything available via command line (e.g. machine learning scripts).
I agree. What I do is convert pages to atom feeds and filter these feeds with a blacklist, then send the updates as e-mail messages. That way I...
Test #2.
Test.
On the 'Windows Defender Security Center', there is a tab for "Firewall & network protection", you can click on the left side or, if on the "home"...
@OFF-TOPIC Warning about W10 1709 (in case this happens to other Windows' users): on the About page of the modern control panel, I see a red X...
It is true for a laptop that is kept in sync with a desktop.
Feature request: automatic sync, so a master instance can update a slave. It could be done by publishing rules to disk and the other side...
It could be of use for those wanting to play with the program on a VM, for example, to simulate a threat.
Is there a community list of applications caught by ReHIPS trying suspicious actions?
Any chance these results could have been influenced by an antivirus engine messing with one and not the other?
Are there plans to send the 2.2 version to security professionals for reviews?
Understood. The reason behind the question is that sometimes I would like to add a new range of addresses to multiple block rules that are...
Separate names with a comma.