Jump to content

GeoffreyB

Experienced Members
  • Posts

    24
  • Joined

  • Last visited

Reputation

0 Neutral

Profile Information

  • Gender
    Not Telling
  1. If you want professional grade, and guarantees, you need to purchase a product that offers such. You won't get what you are looking for with free software (most likely). Geoff
  2. No brouhaha here. I agree that uninstalling the old and re-installing the new is the proper procedure, if one cannot install over the old. However, some anti-malware products (especially older designs) can and will cause problems with installs. Geoff
  3. Truculent? How long have you been waiting to use that in a sentence? No problem, however. Users of multiple anti-malware products are akin to MAC users who believe they cannot be infected. Discussions with them are impossible. Geoff
  4. I agree that you should not HAVE to turn off anti-malware protection. However, depending on what anti-malware product(s) are currently in use, and how old/outdated they are, turning them off would be the first step for a long term resolution. If the install works, then it is one or more of the anti-malware products causing the problem. Having two or more real-time anti-malware products installed is a great place to start looking. Now, for all those who believe that if one real-time anti-malware product installed is good, then two installed must be better, take your discussion elsewhere. Geoff
  5. Turn OFF all, I repeat ALL, ANTI-MALWARE products. Then, do the install. Geoff
  6. The versions are the same. It is the support option you pay for. Geoff
  7. I see this type of question more and more lately - where users want support for beta products. If you use a beta product, you need to understand why you are using a beta product, and what to expect as far as support. It is difficult enough to support the released version of a product. Geoff
  8. frequently is a relative term. There is no issue here. CCleaner is updated approximately every 30 days. Why? An ever-changing world of browers and improvements. Differences? Look here: http://www.piriform....iriform+Blog%29 Geoff
  9. Rob, Sorry if this sounds crass, but the only real blame here is on you for not having a backup. If you lost a few hundred MB of personal files, you can certainly look at Perforce and Piriform as the effect. But, the cause was you. If these files were that important, why did you not take the time to backup? With today's disk cost, internal and external drives, and usb sticks, backups are fast and easy. A few hundred MB of personal files will fit easily on a USB stick. Sorry for your loss. But, it is an important lesson, especially when playing with cleaners and beta software. Geoff
  10. Alan, if you would learn to read, and control your urge to argue, the answer is in my post. Clue: I did mention DEC and DG. If you would like personal instruction on coding for such applications, from 40 years ago, just PM me. I'll see if I can fit you in my schedule. First consultation is free. Geoff
  11. Alan, it is pity that you never worked for Microsoft in their early days. All of their archtecture would have been blessed by you and error free. There would be no such thing as bloat, except for your ego. Let's see you write a modern day app, with all of the web interfaces, all of the bells and whistles. Your comments on this forum are insulting to those who work long, hard hours, in an extermely competitive environment, to earn a living. Why did I respond this morning? I was bored, and your posts always make me laugh. Geoff
  12. Alan, what is concerning is that you actually believe in your imagined greatness. Forty years ago, I did much the same work. When you work on a small, specific, piece of code, such as you did, it is relatively easy to avoid problem, and perform an extremely detailed code-review. Dare I say that, 30 years ago, you never knew about ?buffer overflow?? I did much the same work on security and fire systems for nuclear plants. Very isolated systems, very well controlled environment, not a lot of bells-and-whistles. When one begins to consider that the complexity of software has evolved greatly, from back in the early DEC and Data General days, and mainframes, and early PCs, one understands this problem (buffer overflow). Yes, there are ways (and should be more ways) to mitigate the problem. It is not just a Windows/Microsoft problem. It affects every OS and environment: Windows Apache Linux Unix OS X Novel OpenBSD Blackberry MS-DOS PC-DOS DR-DOS IBM DOS VMware Etc., etc., etc. It affects every browser. It does not matter which programming language is used. It does not matter which DB product is used. I ran a quick search on the articles from the SANS NewsBItes, for the last five years, on ?buffer overflow?. You will see that every product is affected. And, these were just the ones that were reported. Now, Alan, these are listed merely to show you how widespread the problem is, and that it is not a Windows-only issue. SANS NewsBites Vol. 13 Num. 7 (January 19, 2011) RIM Warns of Blackberry PDF Distiller Flaw SANS NewsBites Vol. 12 Num. 3 (January 8 & 12, 2010) MAC OS X, versions 10.5 and 10.6 SANS NewsBites Vol. 12 Num. 19 (March 5 & 8, 2010) Critical Flaw in Opera SANS NewsBites Vol. 12 Num. 65 (August 13, 2010) Fixes for Opera and QuickTime SANS NewsBites Vol. 12 Num. 84 (October 19 & 20, 2010) Mozilla Releases Firefox Update SANS NewsBites Vol. 11 Num. 9 (January 30 & February 2, 2009) Novell GroupWise Security Updates SANS NewsBites Vol. 11 Num. 10 (February 5, 2009) Multiple Flaws in Areva's e-terrahabitat SCADA Software SANS NewsBites Vol. 11 Num. 15 (February 19 & 20, 2009) Targeted Attacks Exploit Unpatched Adobe Flaw SANS NewsBites Vol. 11 Num. 22 (March 18, 2009) Critical Buffer Overflow Flaw in WordPerfect Library SANS NewsBites Vol. 11 Num. 24 (March 26, 2009) Overflow Flaws in Sun Java Runtime Environment Unpacking Utility SANS NewsBites Vol. 11 Num. 38 (May 12 & 13, 2009) Apple Issues Security, OS X Update SANS NewsBites Vol. 11 Num. 50 (June 25, 2009) Green Dam Exploit Posted to Internet SANS NewsBites Vol. 11 Num. 57 (July 16 & 17, 2009) Google Chrome 2 Update Addresses Two Flaws SANS NewsBites Vol. 11 Num. 76 (September 23 & 24, 2009) Apple Releases iTunes Update SANS NewsBites Vol. 11 Num. 93 (November 23, 2009) New Version of Opera Browser Addresses Serious Security Issue (November 23, 2009) SANS NewsBites Vol. 10 Num. 3 (January 10, 2008) Proof-of-Concept Code for Zero Day QuickTime Flaw SANS NewsBites Vol. 10 Num. 6 (January 15 & 18, 2008) Citrix Issues Fixes for Code Execution Flaw in Several Products SANS NewsBites Vol. 10 Num. 12 (February 11, 2008) Apple Issues Mac OS X Update SANS NewsBites Vol. 10 Num. 17 (February 27, 2008) Mozilla Releases Thunderbird Update SANS NewsBites Vol. 10 Num. 21 (March 11 & 12, 2008) US-CERT Warns of Critical Flaws in Adobe Form Designer and Form Client SANS NewsBites Vol. 10 Num. 59 (July 25, 2008) RealPlayer Update Fixes Four Flaws SANS NewsBites Vol. 10 Num. 60 (July 29 & 30, 2008) Oracle Issues Out-of-Cycle Alert, Says it Will Issue Patch SANS NewsBites Vol. 10 Num. 71 (September 8, 2008) Google Releases Chrome Update SANS NewsBites Vol. 10 Num. 75 (September 19 & 22, 2008) VMware Issues Fixes for Critical Buffer Overflow Flaws SANS NewsBites Vol. 9 Num. 3 (5 & 4 January 2007) Fix Available for OpenOffice Flaw SANS NewsBites Vol. 9 Num. 8 (24 January 2007) Apple Fixes QuickTime Flaw SANS NewsBites Vol. 9 Num. 12 (8 February 2007) Trend Micro Patches Flaw in Anti-Virus Scanning Engine SANS NewsBites Vol. 9 Num. 15 (16 February 2007) Apple Releases Second Security Update of 2007 SANS NewsBites Vol. 9 Num. 16 (22 & 19 February 2007) Buffer Overflow Flaw in Snort SANS NewsBites Vol. 9 Num. 22 (March 15, 2007) Patches Available for Critical Flaw in OpenBSD Kernel SANS NewsBites Vol. 9 Num. 49 (June 21, 2007) Apple Patches IPv6, Apple TV Flaws SANS NewsBites Vol. 9 Num. 51 (June 27 & 28, 2007) RealPlayer Flaw Fixed SANS NewsBites Vol. 9 Num. 54 (July 9, 2007) Buffer Overflow Flaws in SAP Products SANS NewsBites Vol. 9 Num. 55 (July 10 & 11, 2007) Lack of Update Coordination at Sun Poses Security Concerns SANS NewsBites Vol. 9 Num. 57 (July 17, 2007) Vulnerabilities in Trillian And Yahoo! Messenger SANS NewsBites Vol. 9 Num. 76 (September 18, 2007) Overflow Flaw in OpenOffice Could Allow Remote Code Execution SANS NewsBites Vol. 9 Num. 97 (December 6 & 10, 2007) November Skype Update Fixes Remote Code Execution Flaw SANS NewsBites Vol. 9 Num. 99 (December 18, 2007) Apple Releases QuickTime and Java Fixes The top 25 programming errors provide some light on the subject: http://www.theregister.co.uk/2010/02/17/top_25_programming_errors/ And, the reason ?buffer overflow? is so prevalent is that it is the low-hanging fruit. As code gets corrected, and programmers become more aware, and because of better tools, the number of buffer overflow problems should be going down [as they appear to be doing so]. There is also the issue of manufacturers reporting the problems. This was the case with Apple and Unix/Linux, especially Apple, for a very long time ? that their product(s) was invulnerable to such problems. Well, surprise, surprise. They have as many, if not more problems with their code, as anyone else. Windows, OS X, Linux/Unix, and the browsers that run on these platforms are (hopefully) becoming more secure. A result of that is that more hackers and malware writers will move to other low-hanging fruit. This means PDAs, smart phones, and the like. These are the targets today. And, with the ?social? environment, many users will fall well short of securing their devices. All that remains is the integrity of the manufacturer to report the problem(s). Geoff
  13. Now, before the moderators get their knickers in a twist, I am not asking ?where is the slim build??, I am asking ?when is the slim build??. It has been ten days now, since the latest release. We are not talking a few days here, but ten days. That is 1/3rd of a month. Were the moderators successful at killing the slim build? Is there some delay in creating the slim build? Has Google exerted their heavy hand on the Piriform management regarding the slim build and its, heaven forbid, absence of their precious adware/spyware/virus option? Remember, Piriform says: 100% Spyware FREE This software does NOT contain any Spyware, Adware or Viruses. One could argue, since the majority of users simply skip the check box for the Google option, that CCleaner is, in fact, a Trojan to get Google on your PC. Once that happens, a host of other things can happen. The biggest, of course, is Google counting on monitoring your web habits. Perhaps Piriform should rethink their claim about ?100% Spyware Free?. Also, to all those who will jump on this thread and say that the slim build is not needed, that is not the question I asked. If you do not know WHEN the slim build will be available, or the answer to any of my other questions, then you really need not respond. Geoff
  14. Alan, decaf is available in most countries around the world. Have a cup, sit back, and relax. As I said, once a process is running with elevated privileges, all bets are off as to what the process can do, no matter what anti-malware product is being used. All anti-malware products have their features, and their shortcomings. There is no anti-malware product that will satisfy every need/concern that arises. Find one you like, and be happy. My comment was just that. If you feel the need the argue, which seems to be the case most of the time, you will not do it with me. You are simply not worth the time. Geoff
  15. MSE does protect itself. For some application/malware to be able to turn off MSE, it needs to be running elevated. Once a process is running elevated (with such high security privileges), turning off MSE is only one of many things that can be done. RPCSS service is a part of Windows and has special protection mechanisms, only available to Windows and processes that ship with Windows. MSE is not part of Windows, and does not have special security privileges. If it did, it would have an advantage over other AV vendors. And, if so, all the other AV vendors would cry foul. MSE has a number of security safeguards and controls in place to prevent malware from infecting/affecting MSE. Having a ?watcher? service, like OCHealthMon, would serve little purpose. This also begs the question: Who watches the watcher? However, to the point, the issue of the MSE logs, while a nuisance, does not affect MSE?s real-time protection, which is where the benefit of MSE is to be found. Prevention first, detection (scanning) second, removal/repair third. Geoff
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.