|
Are you sure it's 10 letters ?
Life should not be a journey to the grave with the intention of arriving safely in a pretty and well-preserved body, but rather to skid in broadside in a cloud of smoke, thoroughly used up, totally worn out, and loudly proclaiming “Wow! What a Ride!" - Hunter S Thompson - RIP
|
|
|
|
|
I treble checked!
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
Headliners ?
Life should not be a journey to the grave with the intention of arriving safely in a pretty and well-preserved body, but rather to skid in broadside in a cloud of smoke, thoroughly used up, totally worn out, and loudly proclaiming “Wow! What a Ride!" - Hunter S Thompson - RIP
|
|
|
|
|
Afraid not!
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
Figurehead Headliners LEADERSHIP
|
|
|
|
|
Beat me by 10 minutes Derek!
|
|
|
|
|
Hey Craig,
May I ask a quick question? What's your favorite programming language? Which language are you most proficient at?
|
|
|
|
|
Good Morning Randor,
My favorite - probably because I was so proficient using it: PL/MI. It was similar to PL/1 and used to write parts of the IBM S/38 and later AS/400 operating systems. This was back in the early to mid 1980's. I have a lot of fond memories from those days. I could also pull an all-nighter back then.
Most proficient today: Until recently I was doing a lot of work with mainframe COBOL and using CA/Gen for the corresponding desktop client software. That whole project was retired -- so today I'm doing mostly the business analysis side of things and dabbling in C# as well as using a lot of SQL. I plan to be retired myself by year-end.
Best wishes from Minnesota!
|
|
|
|
|
Dat's de bunny! You are up tomorrow.
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
Do we have a group for questions about Windows 10 in specific ?
Mine is, about once every two or three weeks, doing something weird (no clue what that "weird" something is).
After the weird thing...
- I am NOT able to connect to any https:// type of site
- I AM able to connect to any http:// type of site
The current "Fix" is windows restore; generally to go back X-Number of days; where X is highly indeterminate
Again, if there's a better place to ask this on this site, please point me.
|
|
|
|
|
Try Quick Answers, but you will need to add a lot of detail.
|
|
|
|
|
It'll probably be hard to track that sort of thing down unless you do some extensive logging, or catch it in the act.
It just so happens that last week I was playing with WMI's event watcher...essentially, tracking and logging each and every process that launches, its path on disk, and any command line args it received. It's amazing how much crap nowadays is taking place automatically, all the time, on Windows - recent versions about 10x as worse as, say, 7.
Anyway, if you could log every process that launches/shuts down, and then eliminated the noise, and you had a decent idea when the problem starts, I'd bet you could narrow it down somewhat quickly.
The gist of it is:
private bool SetupEventWatcher()
{
if (Watcher != null)
return false;
int nTimespanInSeconds = 1;
string strScope = @"\\.\root\CIMv2";
string strWQL = $"SELECT * FROM __InstanceOperationEvent WITHIN {nTimespanInSeconds} WHERE TargetInstance ISA 'Win32_Process'";
Watcher = new ManagementEventWatcher(strScope, strWQL);
Watcher.EventArrived += new EventArrivedEventHandler(OnEventArrived);
Watcher.Start();
return true;
}
private void OnEventArrived(object sender, EventArrivedEventArgs e)
{
TrackedEventType tet = TrackedEventType.Unknown;
if (e.NewEvent.ClassPath.ClassName == "__InstanceCreationEvent")
tet = TrackedEventType.Creation;
if (e.NewEvent.ClassPath.ClassName == "__InstanceDeletionEvent")
tet = TrackedEventType.Deletion;
if (tet == TrackedEventType.Unknown)
return;
foreach (PropertyData pd in e.NewEvent.Properties)
{
if (pd.Name == "TargetInstance")
{
if (pd.Value is ManagementBaseObject mbo)
{
if ( mbo.Properties is PropertyDataCollection pdc )
{
ListViewItem lvi = CreateEventLVI(tet, mbo.Properties);
if (lvi != null)
InsertEventLVI(lvi);
}
}
}
}
}
private ListViewItem CreateEventLVI(TrackedEventType tet, PropertyDataCollection pdc)
{
foreach (PropertyData pd in pdc)
{
if (pd.Name == "Name")
...pd.Value is the name of the EXE
if (pd.Name == "CommandLine")
...pd.Value contains the cmd line args
}
I'm using a ListView to show processes that got created/deleted, but I suggest you just dump it to a plain-text file, so it's easily searchable.
Didn't think your question would lead you to actual code, did you?
I'd share the whole thing if it was refined, I just can't afford to do that right now.
|
|
|
|
|
I think the group for Win 10 weirdness, now, is "The Weird & The Wonderful" ... but, I think you are right: we need to have another forum, perhaps named "Windowssuks."
«The mind is not a vessel to be filled but a fire to be kindled» Plutarch
|
|
|
|
|
What is the best anti-trojan/virus/etc. for Windows 7 ?
Hello. This is a general question asking for specifics, not opinions. Please either give references with your answers or state if they are from direct experience.
I have been tasked with building an older system with Windows 7 Professional or Windows 7 Ultimate.
I have been reading that Windows 7 is vulnerable to the WannaCry trojan/virus/etc. and others of that type.
Yes, I have been searching the net. I want further input from what I have found.
I am looking for a (if possible) 100% effective way to block those trojans while being able to surf the net (with Windows 7) and view any page therein.
I would like to use Firefox 100+ and definately not Google chrome.
Do not tell me to upgrade to a newer version of Windows as that is not an option.
Do not tell me to change to Unix or Linux or some version of those as that is not an option.
Thank you for your input.
|
|
|
|
|
Basically, if you are running Win 7 and you are concerned about any malware, then either don't connect it to the internet at all, or run Win 7 in a VM you can destroy at frequent intervals and never ever buy anything (or even log in) while using it.
Win 7 support ended in 2020 and no further security patches have been issued since then, so it's not just the trojans and viruses you mention that will be your problem - you are unlikely to be safe from newer stuff either.
You may be able to find somthing that might help you right now (win 7 AV in 2023 - Google Search[^]) but would I trust it to be updated quickly in future myself? Nope.
Good luck - I hope you won't need it, but I suspect you will ...
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
"Common sense is so rare these days, it should be classified as a super power" - Random T-shirt
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
OriginalGriff wrote: Win 7 support ended in 2020 and no further security patches have been issued since then,
MS has been selling patches to businesses at punitive rates for the last three years (to end in a few months).
When they did similar for XP you could get them for consumer installs via a registry hack. (You changed something and your PC claimed to be WinXP Cash Register, a product still getting normal patches.) I'm not sure if anything similar is possible for W7. (W8/8.1 won't be getting paid extended support at all.)
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
|
|
|
|
|
Upgrade to a newer version of Windows. Use Unix or Linux.
This is my opinion, which is definitely not based on any experience.
|
|
|
|
|
1. As OG said, run it in a VM. Easy to back up, just copy the directory.
2. On a host running Linux server. Smaller footprint.
3. Get yourself a router/firewall that includes gateway AV, Intrusion protection, App control, SSL control, etc, etc.
(these are spendy).
4. Bury a dead chicken in the back yard daily.
Good luck.
>64
Some days the dragon wins. Suck it up.
|
|
|
|
|
Glad you specified "dead" chicken. The idea of burying a live chicken daily gives me two thoughts
1. Creepy.
2. You're doing a crappy job if the chicken can get out of the grave every day.
I’ve given up trying to be calm. However, I am open to feeling slightly less agitated.
|
|
|
|
|
MarkTJohnson wrote: You're doing a crappy job if the chicken can get out of the grave every day.
... or you hail from the Caribbean.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Microsoft released a patch for Windows 7 for WannaCry, even though it was past the normal expiration date.
|
|
|
|
|
Member 15078716 wrote: I am looking for a (if possible) 100% effective way to block those trojans while being able to surf the net (with Windows 7) and view any page therein.
Let us know when you can do that even on the most up to date and fully patched OS. You'll be the first.
Windows 7 still has its uses. Being on the net is not one of them.
As others have pointed out, if you insist on using it on the net anyway, do it in a VM isolated from the rest of the world. Assume it's always compromised - don't do any monetary transaction with it, aka don't buy anything or do your banking using it. Heck, don't even provide any credentials to any site, even just for browsing, if that site has anything on you that you wouldn't want to be leaked out. Roll back to a clean checkpoint when turning the VM off.
Don't tell anyone you can put together a system that'll keep them safe on the net if it's built on something that's obsolete and not getting any updates. Because then you're misrepresenting the facts. End of story.
|
|
|
|
|
As far is I know, WannaCry was patched for Windows 7 by Microsoft, as well as for Windows XP.
If you really have to, ask yourself how to protect the operating system as best as you can from attacks.
1.) Put the machine behind a NAT on IPv4 (by using a separate router), or a virtual machine. Attacks on the network card from outside of the NAT or virtual machine are impossible (blocked by the router).
2.) Use a Rasperry Pi or similar for adblocking (Google -> PiHole). It's an excellent blocker. It's a as good as it gets blocking bad sites.
3.) Use a secure DNS Server (for example Adguard DNS - Google it). Configure it to use it in Firefox, or in the Rasperry Pi. That option blocks more bad sites.
4.) Use Firefox only. Google Chrome and Microsoft Edge end support for updates this month as far as I know. By using a current browser, you greatly reduce the attack surface. With using a current browser "Firefox", you greatly reduce the attack surface when browsing.
5.) Virus Scan, see what you can find for Windows 7. Old stuff. Not sure what is available.
6.) Don't go to random sites and visit mostly known sites only. Don't try to download stuff.
That's probably as good it gets, when you don't have other possibilities.
Another tip: With CCleaner (Crap Cleaner) you can investigate all startup programs and services. Once a month check for any bad startup entries.
You won't be 100% safe, but by using the Internet by not calling up "bad", random sites, you probably will be fine. Try using the computer mostly on known sites, use another computer with a current operating system for trying out new sites. Don't randomly click on stuff.
And now let the shitstorm start how to give that advice.
|
|
|
|
|
Member 15861385 wrote: Try using the computer mostly on known sites
Don't forget that a common problem here is that even known, trusted sites can get compromised and start serving malware. A patched OS might not be susceptible to this...but nobody can say the same for 7.
|
|
|
|
|
Ask not how but why.
See OG post, VM.
If because need to access 1 site with an older version of firefox, VM windows 7 for that 1 site, and use main OS for ALL other activity.
If because need to run an application that only works in Windows 7. Use VM of windows 7, and do ALL other activity on the main OS.
both minimise need for extended security complexities beyond windows defended.
Other guesses, machine only runs windows 7. If critical enough that needs a such security, then things like life expectancy of components more important then running windows 7. Replace HD, if CPU gonna konk out in 2 months.
If doing any extra activity stuff, dark web/torrenting, do not use windows 7.
|
|
|
|
|