Leaderboard
Popular Content
Showing content with the highest reputation on 10/19/2023 in all areas
-
The transition to the minimum Win10 1607 is inevitable. "Support for Windows 8 and for Windows 10 before 1607 is now dropped" https://qutebrowser.org/doc/changelog.html The fact 120 Chrome started to work seems more like a temporary bug.5 points
-
Actually, it would be nice to start a monkey business thread, so all these scripts are available in one place.3 points
-
The description fits a lot of websites as of now, btw, another typo.3 points
-
Could be they were simply ashamed, when we caught them lying.3 points
-
2 points
-
Why the thread Extensions and custom buttons for UXP browsers - Corrections, modifications, adjustments, and special recommendations is located in the forum Browsers working on Older NT-Family OSes, does not need to be explained any further and is crystal clear . Same for userscripts to inject further functionality into old, legacy browsers. But in terms of the thread Monkey Scripts, the creator @NotHereToPlayGames should first be asked whether he agrees to a relocation. It is not acceptable that someone here simply orders such a relocation. That is rather a no-go.2 points
-
Finally, here's my stucturedClone polyfill specifically for chase.com. Should be good on both Chrome (prior to version indicated) and FF-derived browsers. // ==UserScript== // @name Inject structuredClone() Polyfill [98] // @version 0.0.1 // @match *://*.chase.com/* // @run-at document-start // @grant none // ==/UserScript== function stringify(obj, replacer, spaces, cycleReplacer) { return JSON.stringify(obj, serializer(replacer, cycleReplacer), spaces) } function serializer(replacer, cycleReplacer) { var stack = [], keys = [] if (cycleReplacer == null) cycleReplacer = function(key, value) { if (stack[0] === value) return "[Circular ~]" return "[Circular ~." + keys.slice(0, stack.indexOf(value)).join(".") + "]" } return function(key, value) { if (stack.length > 0) { var thisPos = stack.indexOf(this) ~thisPos ? stack.splice(thisPos + 1) : stack.push(this) ~thisPos ? keys.splice(thisPos, Infinity, key) : keys.push(key) if (~stack.indexOf(value)) value = cycleReplacer.call(this, key, value) } else stack.push(value) return replacer == null ? value : replacer.call(this, key, value) } } self.structuredClone = function (value) { return JSON.parse(stringify(value)); } This correctly deals with self-referential arrays and objects, but has other restrictions, so I use it only when a site (like chase.com) needs it.2 points
-
2 points
-
SOLVED!! Both UXP's built-in structuredClone implementation and @UCyborg's polyfill kept blowing up on a circular reference, so neither works on chase.com. I had to go hunting for a fix; finally found one at https://github.com/moll/json-stringify-safe Here's my (chase.com only) polyfill incorporating that code. I don't fully understand what I did, but it works: // ==UserScript== // @name Inject structuredClone() Polyfill [98] // @version 0.0.1 // @match *://*.chase.com/* // @run-at document-start // @grant none // ==/UserScript== function stringify(obj, replacer, spaces, cycleReplacer) { return JSON.stringify(obj, serializer(replacer, cycleReplacer), spaces) } function serializer(replacer, cycleReplacer) { var stack = [], keys = [] if (cycleReplacer == null) cycleReplacer = function(key, value) { if (stack[0] === value) return "[Circular ~]" return "[Circular ~." + keys.slice(0, stack.indexOf(value)).join(".") + "]" } return function(key, value) { if (stack.length > 0) { var thisPos = stack.indexOf(this) ~thisPos ? stack.splice(thisPos + 1) : stack.push(this) ~thisPos ? keys.splice(thisPos, Infinity, key) : keys.push(key) if (~stack.indexOf(value)) value = cycleReplacer.call(this, key, value) } else stack.push(value) return replacer == null ? value : replacer.call(this, key, value) } } self.structuredClone = function (value) { return JSON.parse(stringify(value)); } I think what it does is convert the object to a JSON string then convert it back to a new object. If any circular references are detected, a special value is placed in the JSON string instead of going into a loop and blowing up on a stack overflow. There are probably a lot of things this won't work on, so I limited it to chase.com, leaving the native implementation for everything else. Perhaps someone more skilled than I (@UCyborg?) can apply the same idea to UXP's native implementation and submit a pull request upstream.2 points
-
Did you try with the flags I posted here? You would need to test with a new profile! Applying the flags on old won't show the difference.2 points
-
Ah, thanks. I was actually kind of suspecting that this was due to an unsupported OS / Service Pack basically being "played off as" some sort of "security risk" for those of us running SUPPORTED OFFICIAL Operating Systems. Future references to this "trojan scan" shall be ignored, of course. Thank you, @we3fan. edit: "official" versus "supported, since neither XP or Vista are technically "supported" operating systems2 points
-
It'd be very interesting to read your feedback regarding Supermium. You say it's heavy, what's your system? Answer here, please. https://msfn.org/board/topic/185045-supermium/page/2 points
-
@Dave-H could you please move the "Monkey Scripts" topic to Browsers working on Older NT-Family OSes subforum?1 point
-
Pity that the "topic" is inside the Windows XP subforum ; IMHO, it should be transferred to the "Browsers working on Older NT-Family OSes" subforum (where this very thread resides ); but I know, I'm just a minority Vista user myself ...1 point
-
I see that you don't understand how Trimcheck works. First of all, you need to launch a program from a partition on an SSD/NVME disk that you want to test. If you run the program, e.g. from a pendrive, it doesn't make sense and nothing will test! the first launch of the program is created by the trimcheck.bin file (probably always 64MB with random data) copies the first 16 KB of data from the trimcheck.bin file to the .json text file in which he also saves data on the location of the trimcheck.bin file (offset e.g. 21018939392) removes the trimcheck.bin file from the disk and informs to do TRIM now now we are doing TRIM, e.g. in O&O now we run Trimcheck again from the same location as before (where the .json file was created) Trimcheck compares the data from the .json file with data in disk offset 21018939392 If there are only zeros there, it means that TRIM operation in O&O has worked, but if you are there, the same data from the .json file, it means that TRIM operation in O&O did not work In general, instead of using Trimcheck, you can check it manually: make or copy file (a few megabytes) on partition on NVMe disk in Hex Editor check location (offset or sector) this file - save this information somewhere e.g. Notepad or on a piece of paper delete file from disk use Shift key to not remove to Windows Recycle Bin run TRIM in O&O on partition where there was a deleted file run Hex Editor and check if starting from the sector you wrote on a piece of paper are only zeros If zeros - TRIM it worked If any data - TRIM it did not work1 point
-
And here's @UCyborg's polyfill for structuredClone (Chrome before v.98; K-Meleon, New Moon 27, FF 45; not needed on UXP-based browsers or Serpent 55) // ==UserScript== // @name Inject structuredClone() Polyfill [98] // @version 0.0.1 // @match *://*/* // @run-at document-start // @grant none // ==/UserScript== if (typeof self.structuredClone !== "function") { self.structuredClone = function (value) { if (Array.isArray(value)) { const count = value.length; let arr = new Array(count); for (let i = 0; i < count; i++) { arr = self.structuredClone(value); } return arr; } else if (typeof value === "object") { let obj = {}; for (const prop in value) { obj[prop] = self.structuredClone(value[prop]); } return obj; } else { return value; } } } This will fail if an array or object property references itself, but works well in most cases.1 point
-
What - no polyfills? Here are a few contributed by n16s. Should be good on both Chrome (prior to version indicated) and FF-derived browsers. // ==UserScript== // @name Inject findLast() Polyfill [97] // @version 0.0.1 // @match *://*/* // @run-at document-start // @grant none // ==/UserScript== if (!Array.prototype.findLast) { Object.defineProperty(Array.prototype, "findLast", { value: function (predicate, thisArg) { let idx = this.length - 1; while (idx >= 0) { const value = this[idx]; if (predicate.call(thisArg, value, idx, this)) { return value; } idx--; } return undefined; } , writable: true, enumerable: false, configurable: true }); } // ==UserScript== // @name Inject findLastIndex() Polyfill [97] // @version 0.0.1 // @match *://*/* // @run-at document-start // @grant none // ==/UserScript== if (!Array.prototype.findLastIndex) { Object.defineProperty(Array.prototype, "findLastIndex", { value: function (predicate, thisArg) { let idx = this.length - 1; while (idx >= 0) { const value = this[idx]; if (predicate.call(thisArg, value, idx, this)) { return idx; } idx--; } return -1; } , writable: true, enumerable: false, configurable: true }); } // ==UserScript== // @name Inject randomUUID() Polyfill [92] // @version 0.0.1 // @match *://*/* // @run-at document-start // @grant none // ==/UserScript== if (!('randomUUID' in crypto)) crypto.randomUUID = function randomUUID() { return ( [1e7]+-1e3+-4e3+-8e3+-1e11).replace(/[018]/g, c => (c ^ crypto.getRandomValues(new Uint8Array(1))[0] & 15 >> c / 4).toString(16) ); };1 point
-
Interesting. I don't mind doing another update for 2036 in the 2036 thread despite some members here not "liking" that. No skin off my back, not a fan of the gigantic "like" game here at MSFN anyway. 2036 has one "update check" telemetry item that was found while performing mods for 2044. 2036 also needs "restore defaults" button removed. There may be some other minor stuff, don't recall offhand.1 point
-
1 point
-
FYI, I opened a new issue on Mypal 68's GitHub page. It is the issue #296 with the title Errors and problems when installing and updating extensions in Mypal 68. As the title already says, I will post there all errors and problems that come to my attention when installing and updating extensions in Mypal 68. By doing so, I hope that @feodor2 will be able to fix the currently existing errors and bugs related to extensions more easily and in a more targeted way. Cheers, AstroSkipper1 point
-
Apply the flags before, on a clean new profile, also some versions of Chrome understand --disable-encryption, not --disable-encryption-win. The second one is the same, namely --disable-machine-id.1 point
-
The error message in broken English comes from the browser itself! No protection installed on that PC. https://en.wikipedia.org/wiki/Broken_English1 point
-
I doubt, it had been discussed about the minimum requirement for 1607, it's most likely there will be missing dependencies, even if you unpack the installer. https://msfn.org/board/topic/185023-future-of-chromium-on-older-windows-10-versions-and-rtm/1 point
-
13.5 1030 is much more stable than any of the 13.0 series, I think Dave would agree.1 point
-
The coincidence is strange, agree? 2044 doesn't run with the aforementioned Trojan scan suggestion, others that are based - do run.1 point
-
That's valid. Although a simple HOSTS file block would not be a violation. Also, the "CVE Vulnerability" (which also exists for MalwareBytes, AVG, Avast, McAfee, Norton, etc!) is REMOVED COMPLETELY by a registry entry that removes the "unique ID string". The CVE Report against Kaspersky (and MalwareBytes, AVG, Avast, McAfee, Norton, etc!) is NOT about Kaspersky "collecting data", it's about linking that harvested data to a unique ID string that points to "a person". MalwareBytes has CVE Reports for the same! So does AVG! So does Avast! So does McAfee! So does Norton! Et cetera. Some users are okay with this sort of "data". Doesn't Windows Update also do this? There's no MSFN Boycott on Windows Updates. In fact, we go out of our way to "make it work" instead.1 point
-
Agreed! But let's be fair and open. Firefox, SRWare Iron, etc is not secure by default, the end user has to take steps to make it secure. 360Chrome is not secure by default, MSFN went through great lengths to create a version we are comfortable using. The same CAN be done for Kaspersky. And it is a valid topic of discussion for this thread.1 point
-
Whatever reservations anyone may have about using Kaspersky, or any other security program, discussing them here is completely appropriate. The whole point of threads like this, and indeed this whole forum, is to enable people to make informed decisions about this sort of thing. There will be no shutting down of debate by anyone. Any attempt to do that will result in this thread being closed.1 point
-
That is true. Because I do not use nor believe in anti-virus products. That said, it IS the anti-Kaspersky talks that have me INSTALLING IT on a laptop "to witness for myself". I am not "praising" Kaspersky. In fact, it's the opposite. My view (from past experience) is that ALL anti-virus programs do what we often point out in regards to Kaspersky. I am installing it! Among a couple others. By all means, please tell me exactly which ones to install. My goal is to install only THREE and one of those three MUST be Kaspersky.1 point
-
True, but let's not hide those concerns under the rug for OTHER anti-virus programs. Let's NOT act like Kaspersky is the only offender. McAfee is equally "offensive" and I may end up posting the same sort of "DLL H3LL" screencap later this weekend. How many .dll's does AVG use? How many additional "processes" listed in Task Manager? Et cetera. I view it along the lines of “Why do you look at the speck of sawdust in your brother's eye and pay no attention to the plank in your own eye?" Pointing out the Kaspersky Plank while pretending sawdust doesn't exist in other products is "misleading".1 point
-
@UCyborg kind of beat me to the punch. I have an XP Era Correct laptop (Dell Latitude D830) that I spent last night formatting and creating four partitiions. One partition is for shared data, the other three are for a "triple boot XP" setup. Boot into first partition and you have an untouched default-install XP x86 SP3 (no POSReady, maybe later) installation with Anti-Virus "Brand X". Boot into second partition and you have an untouched default-install XP x86 SP3 (no POSReady, maybe later) installation with Anti-Virus "Brand Y". Boot into third partition and you have an untouched default-install XP x86 SP3 (no POSReady, maybe later) installation with Anti-Virus "Brand Z". My next step was to install anti-virus onto each partition, with one being KASPERSKY. The informed reader needs information. Let's seek to supply actual INFORMATION. Again, a many MANY thanks to @UCyborg for starting an INFORMATIVE discussion.1 point
-
Pleasse count the .dll's for other anti-virus programs and report back your findings on them also. McAfee for one is also very big into this "DLL file invasion and abuse". Taking this thread to such "anti-Kaspersky" extremes serves your viewers a dis-service and not a "service". What @UCyborg posted is of USEFUL IMPORTANCE and is INFORMATIVE to the viewer. We need more of THAT instead of useless "massive security concern" innuendos without actual proof or verification.1 point
-
I can confirm Kaspersky 18, obtained from https://products.s.kaspersky-labs.com/, installs and works fine on my XP SP2 x64 installation, although it was a bit glitchy after initial installation, couldn't add exclusions, it complained about insufficient memory, despite there being about 2 GB free, nothing logging off and back on to Windows couldn't resolve and it didn't recur after reboot either. Definitions are updatable, Web-Antivirus module seems to work - two random malicious URL blocked: Also pulled 4 random recent samples that were blocked after extracting (ZIPs are encrypted): https://bazaar.abuse.ch/sample/01e79ebb5c2b318f0c68c11912b987255ae55662acca4fbb67c958828107f5a7/ https://bazaar.abuse.ch/sample/6238893de251eb7a3b61b171129dfc45afb8de90aaebe85da8e945ae1e095be3/ https://bazaar.abuse.ch/sample/22b66f492bdc66158e2cd53bd9525c49a7b061798cfb6ff6158b69869c1e4d61/ https://bazaar.abuse.ch/sample/36ffe3d8a0b23ce2d6af158c493daf1daf6667a4c4b0d4a4ea017bd40f748893/ One might notice it uses a lot of DLL files, many of them not rebased and even though some are, chances for conflicts are high and hence need to be relocated at runtime is high, so some extra megabytes are consumed since XP doesn't have the ability to manage them smartly like newer OS, at least under the condition right flags are turned on in the specific header, which in this case they are. It requires .NET Framework 4, specifically just the Client Profile, designated as Microsoft .NET Framework 4 Client Profile under Add or Remove Programs. It installs it automatically if missing.1 point
-
I corrected all links to images in my main article "ProxHTTPSProxy and HTTPSProxy in Windows XP for future use": Due to the length of my article and our forum editor, it was not as easy as I thought, though. But now, all images should open better again. If you still find errors, please report them here! Thanks! Cheers, AstroSkipper1 point
-
I have moved the conversation to this thread:1 point
-
Ok! That looks much better. Now, you have a problem with accessing the Microsoft Windows Update page. As I already wrote, you should follow my guide Complete guide for restoring IE's access to WU/MU website using ProxHTTPSProxy or HTTPSProxy in Windows XP. This guide is well-tested, too, and after doing all steps, MU should actually work. The problem with the loops is probably caused by a misconfiguration of the Internet Explorer. Please read especially step 4 of my guide (but all other steps are also important, of course)!1 point
-
Hello @Outbreaker! Which version of the TLS proxies are you using? Starting the proxy by applying ProxHTTPSProxy_PSwitch.exe means you have installed an older version such as ProxHTTPSProxy REV3e or my package ProxHTTPSProxy's PopMenu 3V1. These versions are TLS 1.2 proxies and not up to date. You should actually use one of the TLS 1.3 proxies, either ProxyMII (20220717) aka ProxHTTPSProxy 1.5.220717 or my most recent package ProxHTTPSProxy's PopMenu TLS 1.3 3V3. Of course, the old TLS 1.2 proxies should still work, too. Under the account Local Computer? If not, it won't work. Did you already read my article Complete guide for restoring IE's access to WU/MU website using ProxHTTPSProxy or HTTPSProxy in Windows XP? The loops are presumably a result of a misconfiguration of the IE (see step 4). If all steps of my guide are performed properly, it will definitely work. Here is my list with all other working methods to access WU or MU successfully: Kind regards, AstroSkipper1 point
-
Thank you for providing information! In the VB100 test report from 21.04.2023, Vir.IT eXplorer just about passed their test with a detection rate of 77.40% (at least 75.00% was required). Unfortunately, that is definitely not marvellous. Is this program well known or popular in Italy? In Germany, it is totally unknown and never mentioned in terms of available antimalware programs.1 point
-
Everyone, thank you for the help, yes, sorry I know I had to read first. Everything was in the tutorilal.1 point
-
Step by step video guide Fix NET Framework 4.8 is Not Supported On This Operating System Error Windows 8 https://www.youtube.com/watch?v=u1S8daWrHTo1 point
-
1 point
-
1 point
-
Who told you that ? The 1st alpha release works with nosandbox on Windows 7 Read here: https://msfn.org/board/topic/184046-future-of-chrome-on-windows-7/?do=findComment&comment=1235004 Later versions of 110, no. https://msfn.org/board/topic/184046-future-of-chrome-on-windows-7/?do=findComment&comment=1230307 I'm not aggressive, it was a simple question. I'm calm, thanks. But I prefer you stay on topic, calmly.1 point
-
Very interesting post ! Brings a lot of new and useful information about the future of chrome on windows 7 !1 point
-
Hi fellas, which engine is this browser is based upon ? Doesn't say on the page. tnx Will it work with Vista ?1 point
-
"Protecting Your Malware" by Adam Chester , Hacker and Infosec Researcher https://blog.xpnsec.com/protecting-your-malware/1 point
-
Absolutely !!! Didn't you read the warnings when installed applications ? Something like "this app is going to read/modify data , send text , etc".1 point
-
It seems we have quite a few things in common, after all ! Even though I have plenty of phones , doesn't mean I use them (they are almost always off, see the above) . BTW , my dad is around 80 y.o. , he is in a pretty good shape , it's quite common for a Dutchman , nothing out of the ordinary , lol . So he can't live without his phone , he needs to be in touch 24/7. He is always furious about me ignoring all this 'phone' life and asks me (almost every day) why am I not answering my phone ?!?!??! And he is a huge fella , much taller than me .... it's very dangerous to drive him angry , lol. P.S. Regarding spam on landlines , no , we don't have much of it here in contrast to the states. But I usually just pick up the phone ans say nothing , I wait for them to talk first.1 point