UPDATE (1:30 pm ET): Servers are migrated and in perfect working condition. They should be working for you as soon as DNS changes propagate to you. If you are on an affected system you can try the command “ipconfig /flushdns” from the Run box / command prompt (admin) to hurry it up a […]
While it’s not the upcoming v8 update, we released a minor revision to v7 of CryptoPrevent yesterday! There was an issue for some users where sending emails would not work. With this update that issue has been resolved and all SRP block messages should receive an email alert if you have them configured. If you […]
This was posted on Slashdot.org today: itwbennett writes: Researchers from Kaspersky Lab and the Dutch Public Prosecution Service have obtained the last set of encryption keys from command-and-control servers that were used by CoinVault and Bitcryptor,’ writes Lucian Constantin. ‘Those keys have been uploaded to Kaspersky’s ransomware decrypt or service that was originally set up […]
For clarification on our previous post regarding the red X button: The article was about the red X because that’s what most people know, but it also applies to closing an application in any standard method not involving any actual force-terminate means. This includes the red X in the top right of the ‘window’ or form, […]
This pic describes exactly why I recommend people NEVER use the form’s X button in the event of suspected adware, spyware, MALWARE, or any other random POP-UP… DO NOT DO IT. EDIT TO CLARIFY: This article is about the red X in the top right of the ‘window’ or form, but also includes other methods such as the ALT+F4 […]
Please accept my apologies, but to fess up, I did it… Recently I continued a project started earlier before summer, to move our download server to a more capable host, while splitting it into separate servers for different applications/updates so one failure wouldn’t affect all of our apps download/update capabilities, and also to pave the way for some […]
How to stay safe? You would restrict write permissions on the file servers as much as possible. Make sure to educate the users to contact IT if they encounter any suspicious pop-ups. Use advanced endpoint protection that can identify any and all new malware variants and detect any malicious traffic. Make time for regular offline […]
How it works? A ransomware attack will go through five stages from the time it is installed on your computer, until you see the warning on your computer screen. Step One: INSTALLATION – After a victim’s computer is infected, the ransomware will installs itself, and sets keys in the Windows Registry to start automatically every […]
Where is Ransomware? Ransomware can be found everywhere. We thought that the well known file-encrypting ransomware, as known as CryptoLocker, was over and done with after law enforcement knocked out its infrastructure last year, but CryptoLocker , as well as other variations of malware, are back. Ransomware is a form of malware that will prevent […]
ShadowExplorer (www.shadowexplorer.com) is an awesome application which I’ve used as a PC Technician many times in the past. It is used to provide a graphical ‘front-end’ interface for a rather complicated command line utility called VSSADMIN.EXE (an internal Windows component) which handles “Volume Shadow Copies” of files made by Windows. These are sort of ‘backups’ in a […]
Join us for live tech chat, product questions, support, and technical training right here!
Customer or not, you are welcome to drop in and discuss anything ‘tech’ with us!
d7x Quick Tip – Automating the d7xRDT d7x Quick Tip – Automating the d7xRDT with d7x v19.6.18