Leaderboard
Popular Content
Showing content with the highest reputation on 07/07/2023 in Posts
-
I don't remember when I started using Process Hacker, the version 2.38 is still installed on XP partition, which I may boot to every once in a blue moon. But otherwise, I haven't used "stable" Process Hacker in years, much preferred "nightly" builds on my daily driver Win10 and eventually switched to System Informer (renamed from Process Hacker, Win10+ only program).3 points
-
Hello, recently I started working on modifying DWM to customize Windows to my tastes, and this is what I've managed to get so far: I implemented all of this using Windhawk, but I might eventually move it all into its own program. The code is definitely not ready for release (buggy), plus it's still missing a few things that I'd like for an initial release. The blur implementation is also not the best, and I'd rather do it in a way closer to BigMuscle's, since this is based on Valinet's method, which considering was just quickly created to prove that blur is possible in 2004+, has its fair share issues. This can be seen as a proof of concept in a way, maybe a tech demo. For the buttons, I decided to rewrite both the functions that handle their positions and sizes in DWM, which gives me full control over the implementation. For example, I can modify this mod to make the buttons look the way they do in the Basic theme, Luna theme, even Classic theme, theoretically, all in DWM, meaning that there should be no compatibility issues with applications. You may have also noticed that the text is missing from the titlebars. That's due to the fact that in Windows 8.1 and 10, the titlebar text is rendered using GDI, and I'm still not sure how to make the background transparent (I've tried using SetBkMode but it didn't seem to do anything). I'll probably end up trying to render the text the same way Windows 7 does, as that's the OS whose look I'm trying to match. As for a release, I'm not sure when this will be ready. Could be this year, could be next year, it really depends on how much time I have on my hands, especially considering the project's current primitive state.2 points
-
New build of post-deprecated Serpent/moebius for XP! * Notice: This repo will not be built on regular schedule, and changes are experimental as usual. ** Current moebius patch level should be on par with 52.9, but some security patches can not be applied/ported due to source milestone differences between versions. Test binary: Win32 http://o.rthost.win/basilisk/basilisk55-win32-git-20230708-fe0a96ad1-xpmod.7z Win64 http://o.rthost.win/basilisk/basilisk55-win64-git-20230708-fe0a96ad1-xpmod.7z repo: https://github.com/roytam1/basilisk55 Repo changes: - import from UXP: Simplify incremental GC sweeping (95a1e4b7) (d2253a89a) - import from UXP: Avoid TLS lookups when checking if zones need to be marked for GC. (24b1a0f1) (e1689e78a) - import from UXP: Fix debug builds (890e1eb8) (f084c5f2a) - import from UXP: Issue #1969 Follow-Up: Error reporting arguments in RelativeTimeFormat/DateTimeFormat (5a531ea8) (69c57d4d0) - import from UXP: Issue #2259 - Add missing IsAscii* helper functions in mozilla/TextUtils.h (7716602a) (984ee494c) - import from UXP: Issue #2259 - Add mozilla::Vector -> mozilla::Span implicit conversion (9914c061) (ba968e34b) - ported from UXP: Issue #2259 - Add mozilla::Result<V, E> and JS::Result<> for fallible return values (4c2e3786) (c64ea42b8) - import from UXP: Issue #2259 - Add JS::StackGCVector and JS::RootedVector (f8f7aed5) (95477f4ad) - import from UXP: Issue #2259 - Adjust self-hosted Array.prototype.sort to ES2018 (a7d752de) (2ae545058) - import from UXP: Issue #2259 - Introduce helper for self-hosted hasOwnProperty calls in intl (adffcb12) (95626129f) - ported from UXP: Issue #2259 - Update Intl.* Object-ness to ECMA-402, 4th edition (30157344) (3c8e8054d) - ported from UXP: Issue #2046 - Introduce mozIntl.DateTimeFormat with mozExtensions (85612acc) (7954eab77) - import from UXP: Issue #2259 - Implement caseFirst option in Intl.Collator (949f69ef) (1f6a9788f) - ported from UXP: Issue #2259 - Reimplement String.prototype.toLocale{Lower,Upper}Case per ECMAScript Intl specification (8d97bd43) (974255cc9) - import from UXP: Issue #2259 - Support Unicode extensions with multiple value subtags in BCP47 language tags (e3dbf7c5) (a16d19623) - import from UXP: Issue #2259 - Improve ResolveLocale performance when initializing the default Intl objects (e923c48f) (71f8a0937) - import from UXP: Issue #2195 - Add support for hourCycle to Intl.DateTimeFormat (cf7bd823) (216d8574f) - ported from UXP: Issue #2259 - process Unicode langtags and locale identifiers according to BCP 47 (3ee2c9dc) (6e6363b76) - ported from UXP: Issue #1819 - Implement Intl.Locale proposal (c10a29d9) (a115fffe3) - ported from UXP: Issue #2259 - Performance improvements in Locale (4ad4a82a) (4e25a11d6) - ported from UXP: Issue #2259 - Performance improvements for LanguageTag parsing (0b3079d8) (46975f66d) - import from UXP: Issue #1819 - Further align Intl.Locale to spec (e01ff1c5) (b40437880) - import from UXP: Issue #2046 - Implement Intl.DateTimeFormat's date-/timeStyle and hourCycle options (4400677a) (df34fda78) - import from UXP: Issue #1656 - Follow-up: Re-nuke the vim lines introduced in #2265 (f9c39aca) (e2666e4ac) - import from UXP: [multiple] Update Intl tests. (81a3a92b) (22360cb99) - ported from UXP: [network] Prepare for requiring Authorization in CORS ACAH preflight (96d1e276) (c58b948b1) - ported from UXP: [DOM] Filter out symlinks for webkitdirectory. (a299eaa9) (64d75ced6) - import from UXP: [XPCOM] Win: Update executable extension list (c292f9ff) (fe0a96ad1)2 points
-
New build of Serpent/UXP for XP! Test binary: Win32 https://o.rthost.win/basilisk/basilisk52-g4.8.win32-git-20230708-3219d2d-uxp-9f1550fb5-xpmod.7z Win64 https://o.rthost.win/basilisk/basilisk52-g4.8.win64-git-20230708-3219d2d-uxp-9f1550fb5-xpmod.7z source code that is comparable to my current working tree is available here: https://github.com/roytam1/UXP/commits/custom IA32 Win32 https://o.rthost.win/basilisk/basilisk52-g4.8.win32-git-20230708-3219d2d-uxp-9f1550fb5-xpmod-ia32.7z source code that is comparable to my current working tree is available here: https://github.com/roytam1/UXP/commits/ia32 NM28XP build: Win32 https://o.rthost.win/palemoon/palemoon-28.10.7a1.win32-git-20230708-d849524bd-uxp-9f1550fb5-xpmod.7z Win32 IA32 https://o.rthost.win/palemoon/palemoon-28.10.7a1.win32-git-20230708-d849524bd-uxp-9f1550fb5-xpmod-ia32.7z Win32 SSE https://o.rthost.win/palemoon/palemoon-28.10.7a1.win32-git-20230708-d849524bd-uxp-9f1550fb5-xpmod-sse.7z Win64 https://o.rthost.win/palemoon/palemoon-28.10.7a1.win64-git-20230708-d849524bd-uxp-9f1550fb5-xpmod.7z Official UXP changes picked since my last build: - Simplify incremental GC sweeping (95a1e4b7a) - Avoid TLS lookups when checking if zones need to be marked for GC. (24b1a0f16) - Fix debug builds (890e1eb84) - Issue #1969 Follow-Up: Error reporting arguments in RelativeTimeFormat/DateTimeFormat (5a531ea80) - Issue #2259 - Add missing IsAscii* helper functions in mozilla/TextUtils.h (7716602a2) - Issue #2259 - Add mozilla::Vector -> mozilla::Span implicit conversion (9914c0616) - Issue #2259 - Add mozilla::Result<V, E> and JS::Result<> for fallible return values (4c2e37861) - Issue #2259 - Add JS::StackGCVector and JS::RootedVector (f8f7aed52) - Issue #2259 - Adjust self-hosted Array.prototype.sort to ES2018 (a7d752def) - Issue #2259 - Introduce helper for self-hosted hasOwnProperty calls in intl (adffcb127) - Issue #2259 - Update Intl.* Object-ness to ECMA-402, 4th edition (30157344f) - Issue #2046 - Introduce mozIntl.DateTimeFormat with mozExtensions (85612accf) - Issue #2259 - Implement caseFirst option in Intl.Collator (949f69ef4) - Issue #2259 - Reimplement String.prototype.toLocale{Lower,Upper}Case per ECMAScript Intl specification (8d97bd437) - Issue #2259 - Support Unicode extensions with multiple value subtags in BCP47 language tags (e3dbf7c5e) - Issue #2259 - Improve ResolveLocale performance when initializing the default Intl objects (e923c48f4) - Issue #2195 - Add support for hourCycle to Intl.DateTimeFormat (cf7bd8232) - Issue #2259 - process Unicode langtags and locale identifiers according to BCP 47 (3ee2c9dcf) - Issue #1819 - Implement Intl.Locale proposal (c10a29d96) - Issue #2259 - Performance improvements in Locale (4ad4a82a1) - Issue #2259 - Performance improvements for LanguageTag parsing (0b3079d8e) - Issue #1819 - Further align Intl.Locale to spec (e01ff1c5f) - Issue #2046 - Implement Intl.DateTimeFormat's date-/timeStyle and hourCycle options (4400677af) - Issue #1656 - Follow-up: Re-nuke the vim lines introduced in #2265 (f9c39acaa) - [multiple] Update Intl tests. (81a3a92b0) - Issue #2255 & #1240 - Simplify and enhance Maybe and Some(). https://bugzilla.mozilla.org/show_bug.cgi?id=1325351 This is a prerequisite for our BigInt V8 fast forward and potential #2255 fix. (2c0384c4a) - [network] Prepare for requiring Authorization in CORS ACAH preflight (96d1e2766) - [DOM] Filter out symlinks for webkitdirectory. (a299eaa96) - [XPCOM] Win: Update executable extension list (c292f9ffd) No official Pale-Moon changes picked since my last build. No official Basilisk changes picked since my last build. My changes picked since my last build: - webextensions: remove experiment related elements (7c4d0444b) Update Notice: - You may delete file named icudt*.dat inside program folder when updating from old releases. * Notice: From now on, UXP rev will point to `custom` branch of my UXP repo instead of MCP UXP repo, while "official UXP changes" shows only `tracking` branch changes.2 points
-
The best time to make a clone is before the drive goes bad.2 points
-
No, the actual "testing programs" can tell if a disk drive has already become bad, and since they need to write on all surface they do stress the disk (particularly in a laptop/where you cannot provide good/additional cooling), you should NOT use them routinely.. The programs that can read S.M.A.R.T. values usually offer a (highly unreliable/unproved) "grading" of these values, providing warnings if certain thresholds are reached, but it is the underlying technology which is not capable of providing (meaningful) predictions: https://msfn.org/board/topic/128807-the-solution-for-seagate-720011-hdds/?do=findComment&comment=1073898 https://msfn.org/board/topic/153191-does-copying-several-giga-bytes-on-a-daily-base-screw-the-hard-drive/?do=findComment&comment=975216 Keeping an eye on the handful of actually (but partially) useful S.M.A.R.T: parameters as found by Backblaze in their reports (namely 5, 187,188,197,198 and - possibly - 189.) won't make any harm, see also: https://msfn.org/board/topic/177196-is-my-drive-still-healthy-seagate-sshd-1tb/?do=findComment&comment=1146918 but it won't anyway predict reliably a possible failure. jaclaz2 points
-
On my main Linux system I compile FFmpeg myself (with the help of this guide, and without libaom, libsvtav1 and libvmaf). Resulting binary: ~32MB. Does everything yt-dlp asks it to do.2 points
-
Dear guru AstroSkipper, hello! Would you be so kind to tell your opinion about Comodo Varanus FW, I don't see it in either of you lists (good-bad). Would it be polite to trouble you for such a personal advice, just a couple of words really, use-not use, thank you! PS. As always, can't get enough of your amazing software compilation! I can't even imagine how much hard work is in it!2 points
-
A brilliant solution! The German software is always on top! I know newer versions, up to recent years, still work via CMD, it's just the interface that is not loading properly.2 points
-
... There's still some "volatility" surrounding this specific issue on the yt-dlp devs side ; they keep going back and forth between the old and the new Twitter APIs: https://github.com/yt-dlp/yt-dlp/commit/49296437a8e5fa91dacb5446e51ab588474c85d3 https://github.com/yt-dlp/yt-dlp/commit/b03fa7834579a01cc5fba48c0e73488a16683d48 https://github.com/yt-dlp/yt-dlp/commit/92315c03774cfabb3a921884326beb4b981f786b At the same time, yt-dl is fully broken on Twitter ... BTW, this sounds ominous: https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-v8mc-9377-rwjj ... Yes, it's the never-ending cat-and-mouse game between Google and the downloading apps; G keep changing their yt-player "signature" javascript code; when the apps fail to properly decode/decrypt it, this results in throttled Youtube downloads (ca. 50kbps), rendering those apps "unappealing"... FFmpeg is indeed an essential dependency of both yt-dl and yt-dlp for the majority of their users who (unlike you ) wish to end up with a standalone media file, compatible with a vast number of media players; additionally, FFmpeg isn't only used as a "merger", but 1) can be used as a downloader when [hlsnative] isn't specified and for downloading LIVE streams 2) as a multi-task post-processor (e.g. transcoding AAC/OPUS audio to MP3, webp images to jpg, webvtt subs to srt ones, etc.) and 3) as a media tagger, especially in the yt-dl builds provided by nicolaasjan ... The size of the resulting binaries relies on a variety of factors: The "vanilla" code of FFmpeg itself has grown quite a bit over the years, following probably Zawinski's Law ; it's now 2023, version n6.1-dev, not 2012 and v0.12 ... Over the course of years, support for many additional third party libs has been added, while some older libs have been deprecated and their support removed... Depending on the number of third party libs you compile FFmpeg with, the binary size can increase significantly (third-party-libs is a generic term, which encompasses decoders/encoders/muxers/demuxers/filters/etc.) ... The type of compiler used also plays a role: Cross-compilation in Linux using e.g. Cygwin results in bigger Windows executables compared to native compilers like MS Visual Studio or MSYS2... Binary sizes also increase if you're building for Windows x64... With disk storage and bandwidth today being relatively cheap , no-one really cares anymore about file sizes...2 points
-
Hello @Andalu! Have a look into this post: https://msfn.org/board/topic/178377-on-decommissioning-of-update-servers-for-2000-xp-and-vista-as-of-july-2019/?do=findComment&comment=1221841 There you find a link to an attachment down below. The link https://www.fileeagle.com/software/470/Process-Explorer/16.26/ doesn't work anymore. Alternatively, you can download it from here: http://process-explorer.findmysoft.com/2 points
-
Agree, but you have no more socilal networks to talk about it freely, that's precisely what I'm talking about. Checkmate. It was exactly the same with Facebook, where they forced everyone to post cat pictures only, or be banned.2 points
-
Not sure I follow. I remember when Kuwait was invaded and how the WORLD reacted, 30-some nations across the Globe. Crimea and Ukraine is not as cut-and-dried as Kuwait and global armed defense assistance. Media news cycle or not, Ukraine is being supported by more than what Kuwait was - https://en.wikipedia.org/wiki/List_of_military_aid_to_Ukraine_during_the_Russo-Ukrainian_War So I don't follow with the fast and constant news coverage comment - I would much prefer the support level being "on the ground" as opposed to being "on our television screens". But again, a very lengthy discussion best not suited for MSFN.2 points
-
JustOff, the rebel! Thanks for the link. Managed to get it running after adding brotli and six packages to my Python 3, converting palemoon.res to uncompressed and back to Brotli-compressed results in the exact same file. Uncompressed shaves a tiny bit off startup time at best here, but then more space is wasted in the process memory address space at runtime. Brotli-compressed: C:\Program Files (x86)\Pale Moon\palemoon.exe - 5 executions 3.1078 3.0923 3.1070 3.0984 3.1073 Uncompressed: C:\Program Files (x86)\Pale Moon\palemoon.exe - 5 executions 3.0923 3.0768 3.0605 3.0610 3.0767 Used PassMark AppTimer for those. Results are in seconds. I suppose modifying extensions' .xpis with the script would also work? I guess nobody tried. Though to be thorough, one would also have to minify all JavaScript/HTML/XML/etc. inside these archives. BTW, Brotli is Made by Google™2 points
-
Antimalware, firewall, and other security programs for Windows XP working in 2023 and hopefully beyond I hereby open a new thread on the topic of security programs for Windows XP. I have been thinking about that for a longer time, and then I decided to tackle this project. Windows XP is a very old operating system and a deeper knowledge of how to make it more secure is very important in my opinion. Therefore, I think it makes sense to get an overview of all the security programs still available for Windows XP. The thread "Which Antiviruses are Known for a Fact to be Working on XP SP3 as of 2019?", where I have previously written frequently about antivirus programs, has become rather bloated and confusing due to many informationless posts, is mainly focused on the topic of antivirus programs for Windows XP and has been completely unstructured from the very beginning. It is good to have such a thread full of different information for reference but there are many posts either outdated, incomplete or off-topic. Therefore, I have decided to start a completely different thread from scratch. I deliberately chose the term antimalware in the title of this topic. In these days, most so-called antivirus programs can not only identify computer viruses, but also trojans, worms, rootkits, exploits, spyware, and so on. Generally speaking: a virus is a malware, but a malware is not always a virus. Therefore, malware is a generic term for any malicious software, including viruses. For many years now, the so-called antivirus programs have actually been antimalware programs. In any case, this new topic here is about antimalware, firewall and other security programs for Windows XP. Under the term other security programs, I include among others security suites like internet security and total security, antivirus, antispyware, anti-rootkit, anti-exploit, online and offline scanner, ad blocker, protection layer, virtualization, security check and control programs and so on that make the use of Windows XP safer. And to avoid any misunderstanding, the main focus in this thread is on the concept of security. Those security programs that have been officially classified as insecure or not trustworthy are not the subject of consideration here, of course. Furthermore, many of these security programs can no longer be clearly classified in one of these categories due to their multifunctionality. I therefore define the following categories and their abbreviations: AM+ = Antimalware program with real-time protection AM- = Antimalware program without real-time protection SP = Specialized program (focused on one main antimalware function) IS = Internet Security TS = Total Security ON = Online scanner OF = Offline scanner AB = Ad blocker FW = Firewall VP = Virtualization program PL = Protection layer program SC = Security check program CP = Control program MF = Multifunctional program In addition, for the sake of simplicity, I define the following licence types and their abbreviations, reduced to the essentials: C = Commercial (any payment software including shareware) F = Free D = Donationware O = Open source In the second post of this thread, I will provide and maintain an alphabetical list of working antimalware, firewall, and other security programs for Windows XP which were each presented in a corresponding post here. This list has the following columns: Name, Version, Type, Date and Link. Name means the name of the program, Version means its last/latest version, Type means its license type, Date means its last/latest date of release or creation (in some cases, there is no date of release available anymore) and Link means the link to its corresponding post here in this thread. I will only include programs in this list that receive updates in some form, be it program updates, definition updates or database updates. With the exception, of course, that there are also programs that do not necessarily need such updates. In the third post of this thread, I will create and maintain an alphabetical list of programs that need to be tested for compatibility, features and support or whose installers have been lost and therefore could not be tested. In the fourth post of this thread, I will create an alphabetical list of programs that have recently been abandoned or should be avoided. Some of them should only be used for a while or be avoided due to security reasons. This project is very extensive and involves a lot of work. In-depth research in particular is very time-consuming, but necessary. So be patient, especially if the list of programs fills up slowly! As always: Good things come to those who wait. And just for clarification, I will not check all the programs myself to see if they can be installed properly and work, of course. Here, other members can make a perfect contribution with their knowledge or experiences already made. Furthermore, all the programs I have listed are not necessarily to be understood as recommendations. Basically, they are simply options that are still available for Windows XP. Because we all know that most manufacturers of security software have long since given up on Windows XP. If I personally consider a program to be good, I will express this in its relevant post. More about that here: Any discussions, questions or suggestions about security programs for Windows XP are explicitly welcome. But one thing must be very clear, everything should relate to this topic. Just for clarification, insulting, provocative or completely off-topic posts (especially about operating systems other than Windows XP) will not be tolerated. That means, please stay on topic! This thread is intended to be a well-structured source of information where readers can get ideas on how to make their old Windows XP a bit more secure. If you like this thread, or you find it interesting and helpful, I would appreciate any contribution, be it a comment, a like or an upvote. Thanks for your interest! Windows XP forever! Kind regards, AstroSkipper1 point
-
I may or may not have a hard drive going bad ... makes a little noise at startup but then seems to be OK for hours. I have a couple of hard drive testing tools on the computer and they report everything is just fine. Have no idea how accurate they really are. Searching around for more information I came across this article '13 Best Free Hard Drive Testing Programs' which was just updated on July 05, 2023. Most all these 'free test tools' are still listed as working with Windows XP and newer. I downloaded everything for any future need should there be one and since they still have Windows XP support. I thought others might also be interested. 13 Best Free Hard Drive Testing Programs An updated list of the best free hard drive test software programs By Tim Fisher / Updated on July 5, 2023 https://www.lifewire.com/free-hard-drive-testing-programs-2626183 ...1 point
-
The about:addons page is now displayed properly in Serpent UXP (52.0). Thanks for your work.1 point
-
New build of BOC/UXP for XP! Test binary: MailNews Win32 https://o.rthost.win/boc-uxp/mailnews.win32-20230708-ef491d91-uxp-9f1550fb5-xpmod.7z BNavigator Win32 https://o.rthost.win/boc-uxp/bnavigator.win32-20230708-ef491d91-uxp-9f1550fb5-xpmod.7z source repo (excluding UXP): https://github.com/roytam1/boc-uxp/tree/custom * Notice: the profile prefix (i.e. parent folder names) are also changed since 2020-08-15 build, you may rename their names before using new binaries when updating from builds before 2020-08-15. -- New build of HBL-UXP for XP! Test binary: IceDove-UXP(mail) https://o.rthost.win/hbl-uxp/icedove.win32-20230708-id-656ea98-uxp-9f1550fb5-xpmod.7z IceApe-UXP(suite) https://o.rthost.win/hbl-uxp/iceape.win32-20230708-id-656ea98-ia-93af9a0-uxp-9f1550fb5-xpmod.7z source repo (excluding UXP): https://github.com/roytam1/icedove-uxp/tree/winbuild https://github.com/roytam1/iceape-uxp/tree/winbuild for UXP changes please see above.1 point
-
They just added a kill switch to the installer program, running it provides a message saying you need Windows 10. https://bugzilla.mozilla.org/show_bug.cgi?id=1836874 Extracting the latest nightly (2023-07-07) with 7-zip works for now, but there is a permanent yellow triangle in the hamburger menu. It is only a matter of days before the binary compatibility is fully broken once they start compiling with an incompatible compiler or start using new APIs.1 point
-
Thanks for the link even though the version that will be downloaded is 16.21 and not v16.22. The v16.22 can be found here: https://www.filehorse.com/download-process-explorer/37741/ I have tried the various versions and the only one in the 16.xx series that does not attempt to connect to the internet is indeed v16.22. Attempts to connect start occurring from v16.10, until v15.40 I have not detected any.1 point
-
I find it quite funny that you switched from "programs" to "programmes" within the last week or so. Both are legit spellings, of course. Just a funny "observation".1 point
-
Hello @Saxon! Thank you very much for the kind words! I'll try to do my best. Researching and writing is unfortunately very time-consuming. Real life and physical health are two reasons my list of security programmes is increasing quite slowly. Comodo Varanus! That's very funny. I will do that with pleasure when I am back at my desktop computer.1 point
-
Noticed that. yt-dlp for XP (and Vista) is now updated to yt-dlp version nightly@2023.07.07 [92315c037].1 point
-
I agree, but when one just points out to the facts, no MSFN rule against it, no rule that would forbid to name the official investors/owners. Like you wisely pointed out, we are the customers, and have the right to know who owns them. "Russia funded Facebook, Twitter investments through Kushner investor." "Institutions with close links to Kremlin": https://www.theguardian.com/news/2017/nov/05/russia-funded-facebook-twitter-investments-kushner-investor "Facebook is taking that rumored $200 million investment from Digital Sky Technologies, a Russian investment group... giving Facebook a $10 billion valuation." This one is from 2009, so $200 million/ $10 billion was a lot, lot more. https://techcrunch.com/2009/05/26/facebook-takes-that-200-million-investment-from-the-russians-at-a-10-billion-valuation/1 point
-
It wasn't like that at all, actually ... The Mozilla "plans" had been laid out long before, and it was to ape what Google had done already: Remove Vista support at the same time Windows XP support was to be removed ... Some sane voices at the time did point out that Vista support could well have been extended at least up to Firefox v54.0, but Mozilla devs were adamant: Vista was to be taken, alongside XP, to the FxESR 52 update channel when Fx53 was ready for general release, and then be left to rot after 52ESR becomes EOL; FWIW, it was Fx55 that contained lots of compiled Rust code, that required Win7+ to run on... The story is now repeated: Win7/8/8.1 will be soon moved to the FxESR 115 update channel and then be done with ... ... The deprecation of XP+Vista happened early on during the Fx-Nightly 53.0a1 development cycle, in mid-November of 2016, and it was then and there my Firefox Nightly Tester "days" abruptly ended ; I don't want to relive old history, I think I have detailed this somewhere inside the Vista subforums (so an advanced Forum search might yield relevant results ); from faint memory, I recall that the fork-point for Moebius was a Feb/Mar 2017 53.0a1 code snapshot; final 53.0 was released on Apr 19th, 2017 (as linked already...) .1 point
-
It never worked good to begin with, even with Win10, I don't know about you, I'm not gonna cry about that buggy game, sorry.1 point
-
Ravenbound Genres: Action RPG, Open world, Third-person, 3D Company: Systemic Reaction This game requires Windows 10/11 ONLY.1 point
-
1 point
-
Yes, they don't! I kinda think the German WinHex could also be more than good for someone who is somewhat tech savvy to find the threats hiding deep inside of the RAM hidden areas. It has a function to open any RAM area, even the protected areas, where malware oftenly resides. One would still need to know how to analyse them though.1 point
-
You just answered yourself, not sure what you don't like or not happy with, malware hides itself under multiple layers, or disguises itself under normal software names, I remember my ex-girlfriend installed a keylogger on my laptop, when I was cheating on her, and it was running under the name "nerohelper.exe", which of course had nothing to do with the real German Nero software. I found it with the help of Process Hacker.1 point
-
So I'm not crazy, the issue was that the script always ran in deoptimizing mode if I ran it like: py optimizejars.py --optimize ./ ./ ./ But invoking the right Python interpreter directly makes it run as intended: "C:\Program Files\Python311\python.exe" optimizejars.py --optimize ./ ./ ./ Go figure...some kind of user/script error? Because I don't think they'd be distributing the launcher if it caused havoc left and right. py -0p returns: -V:3.11 * C:\Program Files\Python311\python.exe -V:3.11-32 C:\Program Files (x86)\Python311-32\python.exe -V:2.7 C:\Program Files\Python27\python.exe -V:2.7-32 C:\Program Files (x86)\Python27\python.exe So without special arguments, the 64-bit Python 3.11 runs anyway with the launcher. I don't get it, when I check Process Hacker, py.exe invokes python.exe the same way I do manually. and the code says < elif MODE == "--deoptimize" deoptimize() >, how can can this pass for "--optimize"?? I swear it's trolling me...1 point
-
Do you refer to the systray icon(s) or the main programme view when talking about a three-in-one view? In my main programme view, I see all of this information about processes, RAM, and CPU. And I have configured Process Hacker to see two separate icons in my systray, one for used RAM and one for the CPU history.1 point
-
I never said I don't believe you, I said you didn't point out to the actual KB number. What is for developers is one thing, we are end users, not developers. Cyberpunk 2077 officially runs on ancient GTX970 from nine years ago (2014) , so no wonder it runs on Win7. I don't think it's a good example, sorry. And please give the actual KB number. My updates are up to the end of service already. Thnx!1 point
-
I do every task such as testing software, downloading files, or surfing the web in my real Windows XP machine. I never had a serious infection. The reason I created this thread was indeed to present, collect and preserve all possible security programmes which are still available for Windows XP to secure such a real machine and protect it against malicious threats.1 point
-
Right! Malwarebytes is compatible with many other AV programmes, but not with Avast. If you have problems, then Malwarebytes Premium's real-time protection can be disabled at any time. In this case, you probably won't observe any further incompatibilities when using both in the same system partition. In my case, I do not have both installed in the same Windows XP partition. However, I have more than one Windows XP partition managed by Boot-US. So I am able to use different antimalware programmes on my old computer.1 point
-
@Dixel! Hello and welcome to my thread! Glad to hear you like my thread! I have been using Panda Free Antivirus for several months. I am generally amazed at how little resources it uses and how it protects my Windows XP computer completely satisfactorily. I hope you will find what you are looking for here. My list of all presented security programmes in the second post of this thread is just under construction, but will be maintained by me and constantly expanded, if my real life allows it and I have not to waste my time commenting on programmes that have long since been sufficiently discussed and put ad acta. Greetings from Germany to The Netherlands, AstroSkipper1 point
-
Alphabetical list of programs that have recently been abandoned or should be avoided Name Version Type Date Link Reason Avast Free Antivirus 2015 10.4.2233.1299 AM+ 17.09.2015 Link Abandoned † November of 2023 Bitdefender Antivirus 1.0.21.1109 AM+ 19.04.2016 Link Abandoned Free Edition † EOL: December 2021 † EOS: June 30, 2022 Kaspersky Free Antivirus 18.0.0.405 AM+ 27.08.2018 Link Should be avoided † June of 2023 Malwarebytes 1.75.0.1300 AM- 09.04.2013 Link Abandoned Anti-Malware Free † March of 2024 Malwarebytes 1.75.0.1300 AM+ 09.04.2013 Link Abandoned Anti-Malware Pro † March of 2024 Malwarebytes 2.2.1.1043 AM+ 18.03.2016 Link Abandoned Anti-Malware † May of 2022 Wise Anti Malware 2.2.1 AM+ 26.12.2019 Link Abandoned † EOS: After 2019, exact date unknown WiseVector StopX 3.0.7.0 AM+ 03.06.2022 Link Abandoned † January of 2023 Name Version Type Date Link Reason1 point
-
Alphabetical list of working antimalware, firewall, and other security programs for Windows XP All explanations according to this list can be found in the first post of this thread. Name Version Type Licence Date Link 360 Total Security 8.8.0.1119 AM+ F 18.12.2019 Link Essential Avast Free Antivirus 18.8.4084.0 AM+ F 15.11.2018 Link Avast Internet Security 18.8.4084.0 AM+ C 15.11.2018 Link Avast Premier 18.8.4084.0 AM+ C 15.11.2018 Link AVG AntiVirus Free 18.8.4084.0 AM+ F 26.11.2018 Link Comodo Firewall Pro 2.4.18.184 FW F 14.02.2007 Link CurrPorts 2.77 CP F 13.12.2023 Link eScanAV Anti-Virus 22.0.60 AM- OF F 26.04.2023 Link Toolkit (MWAV) InSpectre 0.0.6675.8 SC F 21.04.2019 Link Look 'n' Stop Firewall 2.07 FW C 17.10.2009 Link Malware Hunter 1.185.0.807 AM- OF F 17.06.2024 Link Malware Hunter Pro 1.185.0.807 AM+ C 17.06.2024 Link Malwarebytes Free 3.5.1.2522 AM- OF F 08.05.2018 Link Malwarebytes Premium 3.5.1.2522 AM+ C 08.05.2018 Link Panda Free Antivirus 22.02.01 AM+ F 27.12.2023 Link PC Tools Firewall Plus 7.0.0.123 FW F 01.12.2010 Link Process Hacker 2.39 (r124) MF CP O 29.03.2016 Link RogueKiller 15.17.4 AM- OF F 26.06.2024 Link Anti-Malware Free RogueKiller 15.17.4 AM+ C 26.06.2024 Link Anti-Malware Premium Shadow Defender 1.5.0.726 VP C 02.08.2020 Link Spectre Online SC F 08.01.2018 Link Browser Test Spybot – Search & 2.4.40.0 AM- OF F 01.07.2014 Link Destroy Free Edition SUPERAntiSpyware 10.0.1266 AM- OF F 29.04.2024 Link Free Edition SUPERAntiSpyware 10.0.1266 AM+ C 29.04.2024 Link Professional X Edition Ultra Adware Killer 10.7.7.0 SP F 09.05.2023 Link Ultra Virus Killer 11.9.8.0 MF F 29.03.2023 Link Windows 10 Firewall 7.5.105.217 FW F 06.01.2016 Link Control Free XP Windows 10 Firewall 7.5.105.217 FW C 06.01.2016 Link Control Plus XP Zemana AntiMalware 2.74.2.150 AM- F 21.08.2017 Link Free Zemana AntiMalware 2.74.2.150 AM+ C 21.08.2017 Link Premium Name Version Type Licence Date Link1 point
-
My recommendation of the eicar test files was just what is well-known and easy to apply. To be honest, I usually do not test my antivirus programs. Only if something bad happens, or I have the impression that it is not working properly. The official test which are performed on a regular base are sufficient for me. Sometimes, you have to try a little trust to organisations like av-test.org or other institutes which do such tests for years or decades.1 point
-
According to EICAR's specification, the antivirus detects the test file only if it starts with the 68-byte test string and is not more than 128 bytes long. As a result, antiviruses are not expected to raise an alarm on some other document containing the test string.[13] The test file can still be used for some malicious purposes, exploiting the reaction from the antivirus software https://en.m.wikipedia.org/wiki/EICAR_test_file So looks like no real time test ?1 point
-
1 point
-
Thnx ! I somehow managed to download it, I have to say, it wasn't easy . The dwnl speed is like 12bits . Took more than 2hrs to complete. With the 112 - Twitter videos don't work at all ,showing blank black page, only sound works. With 111 - videos are playable. And I had to apply no sandbox hack, since it doesn't work with Windows7 without it, they wrote on their forum. Someone here knows a fix for Twitter videos ? The browser connects to asian amazon on startup ! Always wants to update.--disable-catsxp-update they suggested, doesn't work.1 point
-
Telemetry is not my main problem with Windows 10. The overall restrictions inside this OS, the access to the system only via account, the cutted rights of an administrator and the disastrous user interface are much worse.1 point
-
About Kaspersky Free on XP. I have v.19.0.0.1088 OK here since a few years... No problem. Automatically patched, recently (last month) to "n". Maybe there (?): https://kaspersky-free-antivirus.soft112.com/download.html => https://products.s.kaspersky-labs.com/homeuser/kfa2019/19.0.0.1088/english-GB-0.57.0/kfa19.0.0.1088en_14173.exe1 point