v2.0 v2.0.1 of my Cryptolocker prevention utility has been released with new whitelisting capabilities and command line parameters for scripting!
UDPATE: v2.0 had a bug in the whitelisting component which didn’t work on some systems, it is fixed in v2.0.1 and is tested on all platforms.
https://www.d7xtech.com/cryptoprevent-malware-prevention/
New functionality:
- Automatically whitelist all EXEs currently located in %appdata% / %localappdata% and their first level subdirectories.
- Whitelist editor where you can view existing whitelisted items, and whitelist individual EXEs manually, with a browse button of course!
New command line parameters:
- /whitelist – whitelist all EXEs currently located in %appdata% / %localappdata% and their first level subdirectories.
- /w=[pathfilename.exe] – whitelist a specific file.
- The path/filename may not contain wildcards.
- If no path is specified (e.g. /w=foo.exe ) then %appdata%foo.exe will be whitelisted.
- If a path is specified it should be only one first level subdirectory in %appdata% (e.g./w=FooBar.exe ) will whitelist %appdata%FooBar.exe
- /undoall – this option removes the protection and any whitelist policies defined as well.
New in the white-label version:
- Automatically whitelist all EXEs currently located in %appdata% / %localappdata% and their first level subdirectories upon installation.
- The ability to pre-define pathexecutable names for whitelisting upon installation.
- Optional start menu shortcut to launch the whitelist editor.
1 Comment
Leave your reply.