Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 07/05/2019 in all areas

  1. Now locked. Removed. Kept (to help keep growing this already hyperginormous thread, of course!)... and because it's the right place... despite being yestermonth's (and some days) news.
    3 points
  2. Only a little bit better as adding ten prefs one by one, would be your original first approach to this preflist project: add them as a little list at the end of the profile prefs.js, while the browser is closed, then restart. Or there's always user.js, which enforces prefs at every startup, but that my be too restrictive. What would be interesting, where do the 'automatic' values come from? By the way, would like to share a general idea for all people using their own pref lists. Would you sometimes like to see in about:config little comments, what some of the prefs and values are about? Since awhile I'm very happily adding self-written info-prefs :-) Just a few examples, not perfect: pref("security.tls.version.__INFO", "INFO: FF23+(KM7X) 0=SSL3, 1=TLS 1.0, 2=1.1, 3=1.2 since FF24, 4=1.3 beta"); pref("security.tls.version.__INFO2", "INFO: check available versions on about:support. TLS1.3 needs min NSS 3.3"); pref("toolkit.telemetry.__INFO", "INFO: Prefs NOT about collecting, only about SENDING! See profiler pref"); pref("profiler.enabled__INFO", "INFO: COLLECT data or not: Telemetry prefs only decide if they are SEND"); pref("dom.messageChannel.enabled__INFO", "INFO: for user identity / reCaptcha not clickable if false"); pref("dom.serviceWorkers.enabled__INFO", "INFO: MarioNET module for remote control (since FF44)"); pref("security.fileuri.strict_origin_policy__INFO","INFO: fileuri/checkloaduri: If websites can load resource-links. Check on browserleaks.com/Firefox");
    2 points
  3. Version 2 (mbam-setup_v2.2.1.1043.exe) works with the offline update of Malwarebytes. Unfortunately, I would not call this definition current. The current definition for MBAM v2 is v2019.07.05.03. I work in combination with Avast Free Antivirus v17.5.3585.0 and MBAM v2.2.1.1043.
    2 points
  4. The download is only suitable for older versions of MBAM. As for an offline update of the definition in MBAM 3.5, this is not available!
    1 point
  5. @dencorso, I wonder if this thread and the "Antivirus for XP" thread could/should be merged? They seem to be covering the same ground, even to the point that posts in one are getting answered in the other.
    1 point
  6. It's important to be precise here. The bug isn't that typing file:///c:/ in the address bar shows your C: drive - that's what it's supposed to do. The bug is that an HTML document in C:\ can access any other file on the C: drive. This isn't easy to fix though, as Mozilla explains: A fix would probably involve treating certain locations as special cases: drive root directories, "C:\Program Files," the desktop, etc., which are likely to contain "unrelated things." (Mac/Linux would have different exceptions, of course.) Probably along with a new set of prefs so users could control it on a spectrum from Chrome-tight to "anything goes." Unfortunately it would take a much better programmer than I to make a change like this. Probably best to just wait and see what Mozilla and/or MCP come up with. In the meantime, just avoid saving Web pages or other HTML documents to the desktop or similar "high-level" directories. Even if you use your browser's or email client's default "downloads" directory, all anyone will be able to steal is your other downloads.
    1 point
  7. I'm afraid I can't help you on that, as I use Malwarebytes Premium online, so it updates automatically. I guess you'll have more luck asking about this on the Malwarebytes forum.
    1 point
  8. And all for a readily available patch that's been around since the middle of May!
    1 point
  9. 1 point
  10. ... and what, may I ask, is this: @dencorso: This is all over the place: 1. In its own thread, linked to above: https://msfn.org/board/topic/179433-rare-winxp-patch-most-important/ 2. In the @roytam1's browsers thread: https://msfn.org/board/topic/177125-my-build-of-new-moon-temp-name-aka-pale-moon-fork-targetting-xp/?do=findComment&comment=1167128 3. In the POSReady 2009 updates thread (the most suited place for it, IMHO...): https://msfn.org/board/topic/171814-posready-2009-updates-ported-to-windows-xp-sp3-enu/?do=findComment&comment=1167126 You are free to leave things as are , but I humbly think some housekeeping is in order! (... and I don't mean to belittle poster's efforts in the slightest, just don't like things scattered everywhere; probably an OCD of mine... ).
    1 point
  11. And, still on the same topic (slightly Off Topic, I know), just in case, should anyone spot an XP in a surgery room, before starting bad mouthing the NHS (or similar) consider how there may be reasons why it is there: https://linustechtips.com/main/topic/975883-windows-10-automatic-updates-during-hospital-operation/ jaclaz
    1 point
  12. Binisoft, the company behind Windows Firewall Control (WFC), was bought out by Malwarebytes: https://www.zdnet.com/article/malwarebytes-acquires-windows-firewall-control-firm-binisoft/ https://www.binisoft.org/ https://www.binisoft.org/wfc On the current iteration of the WFC home page, no archived versions of the app exist , only a historical changelog ; v4.9.6.0 (Vista+WS2008 EoS) was released on Mar 26th 2017 and at a time when the "free" version had several limitations compared to the registered (paid for) one... I can't help commenting on the author's "rush" to drop Vista (but also WS2008) support with version 4.9.7.0, just days after MS ended Vista's Extended Support on April 11th 2017: FWIW, .NET FW 4.6 was/is officially supported on Vista, so what was the rush to drop Vista? Fortunately, the Web Archive has salvaged the download link for WFC v4.x.x.x: http://www.binisoft.org/download/wfc4setup.exe The Mar 1st 2017 snapshot will get you v4.9.4.0 (Vista compatible): http://web.archive.org/web/20170301124512/http://www.binisoft.org/download/wfc4setup.exe but, sadly, there's no WA link for v4.9.6.0 . I have managed to track down a saved copy of v4.9.6.0 in a Czech software portal, and that's because they had actually archived it on their servers (and not just redirect to author's download link): https://stahnu.cz/firewall/windows-firewall-control/download/6 I've scanned the setup locally with Kaspersky Internet Security (with latest defs) and it appears legit and clean; virustotal also gives it a clean bill: https://www.virustotal.com/gui/file/6dc5106c7018567adc4e5473ed0676b7d9acfe0312f3eb0578b9f9954848b1c1/detection NB, you do need .NET FW 4.5.x+ to run the app; screengrab of the setup running just before actual installation: Enjoy...
    1 point
  13. 1 point
×
×
  • Create New...