Discussion in 'other anti-malware software' started by svenfaw, Feb 28, 2015.
Interesting to find that Windows Defender doesn't like the latest version...
Strange, Windows Defender doesn't complain here. Can you check the hash?
Yes, it is strange. But I have rechecked the file again, and this time Windows Defender "doesn't complain". Must have been a glitch!
RCC 1.69.035 available
https://www.trustprobe.com/fs1/apps.html / Hashes
What happened to RCC page/development?
Maybe thats the problem: https://sitecheck.sucuri.net/results/trustprobe.com
Site Likely Compromised
That rather seems to be FP by Sucuri & McAfee, as is often the case with them.
Sucuri result (URL corrected)
VT result - no detection ~ De-linked VirusTotal Results URL as per Policy ~
Quttera result - clean
URL Query - clean
Maybe someone who has Twitter account can ask him about the tool, or just wait him to come here and make clarification...
I got there today.
But no downloads available.
Still no answer from Dev
Sorry, RCC will be back soon.
(The website is currently broken but not compromised.)
Thank you for the info. (I am greatly relieved!)
It seems that there is a new version available but the website isn't updated yet.
I have used this download link:
I haven't executed it yet (hashes still points to the old version) but i have already looked into the file with a hex editor to know about the version and Definitions:
RCC v1.69.37 (Definitions updated: 2018-02-18)
Sadly still no updates on the site and the RCC tool now say it need new Updates and then close
OK, I could finally fix the website and RCC is back with a fresh update.
Things should be back to normal now.
Really sorry for the long wait!
I tried to DL and run twice. Kept getting:
Tried all the usual methods of fixing.
"Windows cannot access the specified device, path, or file" error when you try to install, update or start a program or file
RCC 1.69.037 available
https://www.trustprobe.com/fs1/apps.html / Hashes
Solve the problem of the Equifax certificate:
But may I request you - as your video is too fast and window fonts too small indeed , so can you kindly post a stepwise guide by private message or on this thread ? Thanks !
I tried very hard to remove Equifax certificate since long, but unsuccessful,as it always comes back(I am on Windows 7 Pro / Ultimate 64bit)
Enter the full screen view of the video.
It is impossible that you can not see the operations to be done.
The resolution is 1440 X 900.
certmgr.msc (enter) (administrator)
found the certificate...............
@bellgamin and others users of Windows XP:
In Windows XP there are 3 certificates to disable:
After extensive tests even following Sampei N's guide to disable Equifax cert on Win 7 x64, I now get certificate revoked errors for all secure google sites in Chrome & derivative browsers (Opera,Slimjet,Vivaldi etc) as well as in IE11. But, I can use Firefox and Palemoon to get into google sites without any issue,as these use theor own certificate store(not Windows certificate store like IE11 & Chrome/Chromium).
Allowing the Equifax certificate to remain, makes the certificate errors/warnings go away in those browsers where i faced errors. The Equifax cert. has some numbers in extended validation tab , but its a standalone PC behind a router.
Is it safe to use certutil.exe instead of certmgr.msc to manage/edit/remove trusted root certs on Win 7 x64 ?
I really hope SvenFaw can release his RootExposureManager and update RCC and CTLInfo - most valuable programs indeed !
To eliminate those errors you need to enable:
GeoTrust Global CA
i dont get the reason why to disable certs in general?
based on this news?
if malware has reached this level on system you gonna lost, however. fail on all security layers.
ofc xp user have to panic, but you were told....
well "geotrust" is listed in the cert path of equifax. should be logical that it fails because of missing geotrust chain.
at least equifax run out in august'18 if not renewed - who cares? (same for cybertrust)
No, they're just the latest addition to the long-standing problem and malware is just 1 possible case. The reason is modern OSes and browsers by default trust too many CAs which I never need and some of them have bad record, others are tied to govt. agency. Every several years we hear news about mis-issued certificate or compromised CA, but if you had disabled affected CAs you're safe before CRLs or OCSP response come to your device, and even before the issue is disclosed. CRLs can sometimes be slow, OTOH Firefox take soft-fail for OCSP response and Chrome don't use OCSP by default. Google is also going to remove HPKP as they claim CT is way to go, but actually CT can't address some attack vector which HPKP can. OKTurtles explains these things well.
It's long time after I disabled about 1/3 or 1/4 of CAs on Android and haven't experienced any problem. For desktop, I disabled less CAs but still many CAs on Firefox are disabled. But I recommend make your own search for what cert to disable. There was a useful site as a reference, but it's dead and not saved on Wayback machine. Also, it should be noted unless you understand what to do when you get certificate warning, disabling certs do not enhance security at all.
Investigating... Can anyone else on Win 7 x64 reproduce this?
Separate names with a comma.