What is your security setup these days?

Discussion in 'other anti-malware software' started by dja2k, Dec 15, 2005.

  1. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    what will adding this do? I mean what will happen if I should add this? :)
     
  2. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    I use HTTPS Everywhere and HTTPS Finder. Do I need to add this? Thanks for the tips by the way :thumb:
     
  3. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,785
    Indeed it does. :D
     
  4. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,785
    Have you reported the FP's to HitmanPro?
     
  5. kupo

    kupo Registered Member

    Joined:
    Jan 25, 2011
    Posts:
    1,121
    I also use HTTPS Everywhere, but I still left the rule intact. I added that rule because of this.
    Try your Firefox with this:
    -https://ie.microsoft.com/testdrive/browser/mixedcontent/assets/woodgrove.htm

    Without that rule in NoScript, Firefox will warn you about mixed content. If you click to load, your input will be logged.
    With that rule in NoScript, Firefox will NOT load the un-encrypted content.
    EDIT:NOTE: Scripting must be allowed for this test. (So you can say that you are safe with NoScript
    I don't know what will happen if HTTPS Everywhere is installed in that test. (I haven't tried it yet, :D)

    You can do a lot of things with ABE, read through the NoScript forums or ask them a question. I think someone is developing an extension (similar to RequestPolicy) that makes it easier to create ABE rules.
    Here it is :D -http://forums.informaction.com/viewtopic.php?f=19&t=8059&sid=8905fabe070ac32b026df8fffbad5514
    Or you can learn how to use ABE here
    -http://noscript.net/abe/index.html
    (I really don't know how to use it, I just used a rule created by a member of NoScript forums which is also a member of Wilders, I can't remember :()

    Only .yahoo.com yimg.com yahooapis.com login.yahoo.com will load in .mail.yahoo.com .mail.yimg.com
     
    Last edited: May 5, 2012
  6. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    I don't necessarily think they are false positives.
     
  7. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,785
    Then why not submit them to HMP for further analysis?
     
  8. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    The program has been removed from my computers... there is nothing to submit.
    My own further analysis was to upload each executable to VT and Jotti.
    A sufficient number of vendors (besides those on HMP) deemed the files to be malicious.
    At that point I don't need more analysis.
    Others might, but I had all the info I needed.
     
  9. ams963

    ams963 Registered Member

    Joined:
    May 3, 2011
    Posts:
    6,039
    Location:
    Parallel Universe
    Ah! Now I understand. But how can add more rules for many more websites? ABE is really useful. But I don't know how add rules and even make them.
     
  10. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,785

    So 4 out of 42 from Virus Total is a sufficient number ?
    HMP is not capable of FP's ?
    BTW MBAM found nothing.
    Not saying they may not be malicious, I just have my doubts.
    I'll take care of submitting them to HMP. (out of curiosity)
     
  11. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    I believe I said VirusTotal and Jotti each showed from 3-7 vendors reporting virus.
    HMP is not capable of FP's? Did I say that?
    I'm well aware that MBAM found nothing.
    Neither did VIPRE.
    As for your doubts, good for you.
    I had mine too, only they were about the file's integrity, not their maliciousness.
    Everyone has doubts.
    As for submitting them yourself... good idea. You should have done that first thing.
     
  12. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    geswall development is dead o_O
     
  13. Rompin Raider

    Rompin Raider Registered Member

    Joined:
    May 6, 2010
    Posts:
    1,254
    Location:
    Texas
    Trying Bitdefender IS 2012...it's been 2-3 years since running and I must say it is lighter than I remember...very light in fact and 3pc for $14.99 ain't bad! Thanks for the tip!:thumb:
     
  14. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    I would say further developement of geswall is dead,but at least the free license can be used for another what 10 yrs or so if am not mistaken.
     
  15. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    i wanted to see if they have a new version but nothing there
     
  16. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,785
    You did, I said 4, after I checked both VT and Jotti.

    No you did'nt, I was simply asking a question.

    Ok, I did not know if you were aware of it sense you mentioned nothing about that in your other post.

    Ok

    So which is it, the file's integrity or the possibility that they are malicious?

    Done

    I would had I discovered this before reading your post on them, I was merely asking a question about if you submitted the files in question.
    I did not mean to offend you in any way, again I was just asking.
     
  17. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    Not a problem. See PM. :)
     
  18. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    And I forgot to mention, prior to the HMP alerts on the two SpyReveal executables, when I tried going to the SpyReveal website from within the program's GUI, TrafficLight put up this warning...

    TrafficLight and SpyReveal.jpg
     
  19. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    Traffic light looks pretty cool and Gigantic.:D I actually dont need glasses to read that.:thumb:
     
  20. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,944
    Location:
    USA
    LOL @ Gigantic! :D
     
  21. KelvinW4

    KelvinW4 Registered Member

    Joined:
    Oct 11, 2011
    Posts:
    1,199
    Location:
    Los Angeles, California
    Online Armor 5.5 Free
     
  22. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,785
    DefenseWall 3.18
    Shadow Defender 1.1.0.325


    Macrium Reflect ~ System Explorer ~ SeconfigXp ~ AdMuncher

    [SIZE="+"]GMER ■ SpyReveal ■ Trojan Remover ■ HitMan Pro
    DrWeb CureIt ■ Malwarebytes ■ AVZ Antiviral Toolkit
    [/SIZE]
    OpenDNS ~ Opera
    Ghostery
    TuneUp Utilities ■ CCleaner
     
  23. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    AppGuard
    EMET
    Shadow Defender 3.25

    All web surfing in shadow mode.
     
  24. The Hammer

    The Hammer Registered Member

    Joined:
    May 12, 2005
    Posts:
    5,752
    Location:
    Toronto Canada
    I might go to it again if Avira can't get a handle on their 64 hidden objects issue involving a Windows update soon.
     
  25. Securon

    Securon Registered Member

    Joined:
    Jan 11, 2009
    Posts:
    1,960
    Location:
    London On
    Good Evening ! Installed Bitdefender I.S.2012 and WSA Essentials. Both in Real Time. Sincerely...Securon
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.