OBS Studio
Posted by: jAcos - 23 July 24, 14:05 - Forum: Freeware - No Replies

OBS Studio 30.2.1

[Image: 1699807063-obs-studio-hero.jpg]

OBS Studio is software designed for capturing, compositing, encoding, recording, and streaming video content, efficiently. It is the re-write of the widely used Open Broadcaster Software, to allow even more features and multi-platform support. OBS Studio supports multiple sources, including media files, games, web pages, application windows, webcams, your desktop, microphone and more.

Home Site

Download

Portable

Print this item

  VoodooShield CyberLock, the leading Adaptive Zero Trust solution!
Posted by: jasonX - 23 July 24, 11:20 - Forum: VoodooShield - No Replies

[Image: Kjmg9rz.png]




VoodooShield CyberLock, the leading Adaptive Zero Trust solution!




[Image: 1ELZZeN.png]



VoodooShield CyberLock is a security program that is unlike most traditional anti-virus programs. Instead of scanning the user's computer for known malware or using definition files to detect infections, VoodooShield CyberLock instead 'locks' the user's computer so that he is notified when an unknown process is started.  This allows the user to 'lock down' his computer so that it only executes applications that he specifically whitelists and denies all other programs.  This makes it impossible for an application to run without the user first giving his express approval.

 
[Image: yC90aLw.gif]


[Image: 27mohSJ.gif]


VoodooShield CyberLock is designed to protect and shield the user's machine from outside threats. It has 5 Cyberlock modes, i. Always ON, ii. Smart Mode, iii. Autopilot, iv. Training, and v. [/b]Disable/Install[/b]. CyberLock’s default setting is 'Smart Mode'. In this mode, it checks any unknown programs against the 'allowlist database' and the 'VoodooAi' analysis system. Any file that doesn’t get a 'Safe' rating for both doesn’t run. The shield displays 'LOCKED' in this mode.

 
[Image: G52q7vq.jpeg]


In 'Always On' mode, Voodooshield CyberLock checks every new file in two (2) ways, via i. VoodooAi, and ii. allowlist database of known programs. The shield displays 'LOCKED' in this mode.

Voodooshield CyberLock will processes it through the (i.) VoodooAi machine-learning system, which returns a verdict of 'Safe', 'Suspicious', or 'Unsafe'. It then checks with its (ii.) allowlist database of known programs, which simply returns 'Safe' or 'Not Safe'. 

VoodooAi’s 'Unsafe' means that the file is malicious, whereas WhitelistCloud’s 'Not Safe' only means that the database hasn’t registered the program as 'Safe'. The user can always verify and check any file that is marked as 'Unsafe' or 'Suspicious' via 'Get Second Opinion' link in the alert pop-up. Doing so submits a digital fingerprint of the file to the VirusTotal website. If VirusTotal reports the uploaded file is 'bad', it almost certainly it is 'malware'. If no more than a handful flag it as 'malicious', it (probably) is not. 

 
[Image: SuGLCBR.jpeg]


The 'Training' mode (CyberLock shield will show 'TRAINING') is typically used when the user initially installs CyberLock, or when you are  installing or running new software. CyberLock will remain 'TRAINING' and will allow all new  items and automatically add them to the whitelist, so they will not be blocked. The computer is NOT protected in 'Training mode'. 

The 'Disable/Install' mode is similar to 'Training' mode, except new items are not added to  the whitelist, it is typically/basically used when the user is installing new software, but do not want the installer items to be automatically added to the whitelist. The computer is NOT protected in 'Disable/Install' mode (CyberLock shield will show 'DISABLED'). 

In 'AutoPilot mode', CyberLock will automatically allow and whitelist any  file that is determined to be Safe by VoodooAi and WhitelistCloud. If a non-whitelisted  process is spawned that is determined to be Not Safe by VoodooAi or WhitelistCloud,  CyberLock will block the item and prompt the user so they can decide whether to  allow the item or not.  AutoPilot mode is a great choice for users who want the power and performance of  application whitelisting, without the hassle of constantly being bombarded by  affirmative user prompts. Gamers and software testers typically use this mode. (CyberLock shield will show 'AUOPILOT').


WhitelistCloud

WhitelistCloud is a new patent pending feature of Cyberlock that continously monitors running processes and ensures only 'Safe' items are running at any given time. WhitelistCloud is essentially an advanced file reputation service that classifies files as either 'Safe' or 'Not Safe'. When unknown files are encountered, the user can inspect the file to ensure it as a known 'safe file'  that is supposed to run on his system. 

If the user enables 'WhitelistCloud', an initial 'Snapshot Scan' will be performed which should usually take <10 minutes. There are usually a handful of files that WhitelistCloud is unable to determine to be safe during the scan. So once the scan is complete, the user can manually verify the files classified as 'Not Safe' , safe or not. Thus, the user will be continually be aware that only Safe files are running on his system. WhitelistCloud is also indicated by a white colored WC icon at the bottom right, by the clock. 

Note: A 'Not Safe' result does not necessarily mean a file is 'malicious' but it is classified that it is NOT known to be safe.


Voodooshield Cyberlock's pure allowlist solution, with it's characteristic as an 'always blocks' the execution of all new files, could be too annoying for many users. CyberLock only uses simple allowlisting when your computer is safely disconnected from the internet. When you’re exposed to danger via the internet or a USB drive, it rings in advanced behavioral detection and cloud-based analysis to help sort safe files from malicious ones. That said, Voodooshield Cyberlock should be used in tandem with a 'traditional antivirus' solution. It might be also be noteworthy that the user should scan his system with his preferred 'traditional antivirus' prior usage of Voodooshield Cyberlock. 


 
HOW CYBERLOCK IS DIFFERENT

DYNAMIC SECURITY POSTURES + ANTIMALWARE CONTEXTUAL ENGINE + WHITELISTCLOUD FILE REPUTATION SCAN

1. CyberLock is the only patented tangible toggling computer lock in the industry, and it is designed to complement your traditional or next-gen antivirus (including Microsoft Defender). There are other deny-by-default / zero trust products, but only CyberLock functions as an actual computer lock with dynamic levels of protection (dynamic security postures). If it does not toggle, it is not a lock.
Quote:2. The Achilles’ heel of all cybersecurity products is that they are only able to offer a single static level of protection, so at any given time their security posture is likely either too aggressive or too relaxed, resulting in false positives and breaches. CyberLock solves this issue by dynamically adjusting its security posture on the fly, based on the end-user’s current activity and behavior. Because of our dynamic security postures feature, CyberLock is able to offer a tighter and more robust lock than is possible with any other product.

3. Cybersecurity experts agree that application whitelisting is by far the most effective security mechanism on the market, but no one ever bothered to make this technology user-friendly enough for the masses, until we created CyberLock. Before CyberLock, all application whitelisting products were active full-time, often when it did not make sense to be active, which most users and Administrators found to be annoying and untenable, so they would choose to forgo application whitelisting altogether. Our patented snapshot technology automatically builds the tiny, customized whitelist for the end-user, resulting in the smallest possible whitelist and attack surface in the industry.

4. CyberLock does not force the end-user to respond to dangerous affirmative user prompts, which eliminates the possibility the end-user inadvertently allows an unknown item. Instead, CyberLock displays a mini prompt prior to asking the end-user to make a decision on whether to allow a new item or not.

5. Through our WhitelistCloud technology, CyberLock scans its tiny, customized whitelist specifically for safe / clean files and automatically creates firewall rules for unknown items. In other words, traditional and next-gen antivirus scans for malware while WhitelistCloud scans for safe / clean files. As a result, Administrators are continually aware that only safe items are running on the endpoints. With traditional and next-gen antivirus, Administrators are somewhat certain that malware is not executing on the endpoints, but with WhitelistCloud, they are essentially certain that only safe items are executing at any moment in time.

6. Our unique Antimalware Contextual Engine considers the entire attack chain in the parent / child process creation relationship. Not only does this make CyberLock more secure, our mechanism is flexible so that blacklisting vulnerable items globally is not required. For example, CyberLock is not required to blacklist PowerShell globally in order to protect against PowerShell attacks. In other words, CyberLock considers the entire attack chain so that benign scripts that need to execute are able to do so, while blocking malicious PowerShell attacks.

7. CyberLock includes extremely robust ransomware, script, LOLBins and fileless malware protection capabilities.

8. LOLBins (Living Off the Land Binaries) have become an increasingly common attack vector in the cybersecurity landscape. Other endpoint protection products typically only protect 5-50 vulnerable process (for example, powershell, cmd, cscript, regsvr32, forfiles, scheduled tasks, bcedit), while CyberLock protects 1,000’s of vulnerable processes system wide, all automatically, all with zero configuration. If a new vulnerable process is discovered, CyberLock automatically updates each endpoint in 4 hours or less.

9. CyberLock created the anti-exploit mechanism that many vendors utilize today, but chose not to patent it. CyberLock is also the only deny-by-default product that protects the entire Windows system, as opposed to only protecting the Windows components that are currently being exploited by malware authors. With CyberLock, there is no need to update our mechanism when malware authors discover a new Windows component to exploit, which tends to happen every 3-4 months.

10. CyberLock utilizes ML/Ai (VoodooAi) and reputation based file insight (WhitelistCloud) that provides the end-user with file insight so they are able to make an informed decision, while offering an end-user recommendation based on the provided file insight.

11. Unlike products that utilize legacy / deprecated Software Restriction Policy (SRP) that operates in user-mode, CyberLock utilizes a modern kernel-mode monolithic blocking mechanism that does not require patches, hacks or tweaks to protect against new or undiscovered vulnerabilities and threats. In addition, unlike other products in its class, CyberLock is refined to the point that it does not require vendor co-management of the Web Management Console.

12. CyberLock is highly customizable through its settings, allowing Administrators to fine tune the overall security posture for each end-user.

13. CyberLock trains itself automatically and adapts to each endpoint very quickly. Users might notice a few unwanted blocks the first day or two as it automatically customizes itself to their system, but will soon experience just how silent zero trust can be. Some users prefer to put CyberLock on AutoPilot with the Relaxed Security Posture for a couple of days while it is customizing itself to their system, then switch to Smart or Always ON mode and the Aggressive Security Posture.



 
VoodooShield Review
 
Stop all Viruses with Voodoo Shield
 
VoodooShield Tested! Computer Solutions
 
1,000 Malware Sample Pre-Execution Efficacy Test
 
VoodooShield Malware Analyst
 
VoodooShield Malware Analyst
 
VoodooShield- Messin' with Malware
 
 

Print this item

  Trend Micro Security version 17.8.1121
Posted by: jasonX - 23 July 24, 06:27 - Forum: Trend Micro - No Replies

[Image: Trend-Micrologo.jpg]


Trend Micro Security version 17.8.1121

 
Product covered:
 
  • Trend Micro Premium Security
  • Trend Micro Maximum Security
  • Trend Micro Internet Security
  • Trend Micro Antivirus+ Security


What's new in Trend Micro Security version 17.8.1121 (Nov 21, 2023)?

 
  • Stronger Protection
    New machine learning model for better security.
    Reduced storage space for smoother performance.

  • Email Defender
    Now supports Yahoo Mail.

  • Easier Installation
    Streamlined installation process.

  • Simplified Registration
    Hassle-free registration flow.

  • Enhanced Browser Notifications
    Added protection against browser notification scams.

  • Mute Mode Improvement
    Fewer pop-up notifications when transitioning between screens.

  • Pay Guard for Banking and Shopping
 
[Image: 2024-07-23-143325234.png]
 
Trend Micro - See why we're a proven cybersecurity leader
 
Trend Micro Premium Security Suite Summary
 

Print this item

  XYplorer
Posted by: jasonX - 23 July 24, 04:07 - Forum: Software Updates and New Versions - No Replies

XYplorer ver26.30

XYplorer is a feature-rich file manager for Windows. This file manager features tabbed browsing, a powerful file search, a versatile preview, a highly customizable interface, optional dual pane, and a large array of unique ways to efficiently automate frequently recurring tasks. It’s fast, light, and portable! 

XYplorer enables the user to navigate disk directories and perform file operations in a user-friendly workspace. It comes packed with dual panes and multi-tab support, among others. XYplorer sports numerous handy features, such as support for scripts to run macros, file checksum calculation, custom hotkeys, UI customization, duplicate finder, favorites, tags, labels, and advanced user-defined commands. All actions may be examined in log files and can be undone. Help documentation is readily available to the user anytime to guide him. 


Various kinds of information can be copied to the Clipboard, such as file or folder name, path, base, short or UNC path, along with name, bytes, date of modification, path and MD5 checksum. File information can be either compacted or extended, while items can be duplicated in several ways, by copying them with increment, current or last modified date, for example.
 

XYplorer26.30.0000(22-Jul-2024)
 

  • NEW OFFICIAL RELEASE. Main developments since last release:

    This is a BIG maintenance release. Numerous minor fixes and improvements have been made since the last major release.
 
[Image: XY-26.30.png]

[Image: xyplorer2630.png]
 
 
 

Print this item

  EaseUS CleanGenius
Posted by: jasonX - 23 July 24, 03:56 - Forum: Freeware - No Replies

EaseUS CleanGenius 3.0.3
 

[Image: 1681294770-easeus-cleangenius-windows.jpg]

[Image: cleangenius-down-pic-20210728.png]


EaseUS CleanGenius is a comprehensive application designed to optimize and clean up Windows-based computers. It helps to improve PC performance by removing junk files, optimizing system settings, and managing startup items.

PC cleaner: Free more disk space and get rid of unnecessary data
 
  • Removing trash can help you keep your files and folder organized, save a ton of precious storage space, and improve system performance as your computer no longer has to churn through files that do nothing for you.

  • Clean all kinds of files like temporary files, recycle bin, log files, history, cookies that can accumulate to megabytes of wasted hard drive space. Now you can spare more room for your movies, music, photos and stuff that could use some disk space.

  • Delete internet traces and temporary online data - Clear your search and browser history in Google Chrome, Safari, Mozilla Firefox, Microsoft Edge and Internet Explorer.


EaseUS CleanGenius key features:
 
  • Intuitive and user-friendly interface for easy use
  • One-click system cleanup to optimize PC performance
  • Privacy protection with secure file deletion and online trace removal
  • Real-time system monitoring to alert users of low system resources
  • Large database of junk files for thorough system cleaning
  • Customizable cleanup settings for specific file types
  • Automatic cleanup scheduling for convenience
  • Startup manager for faster PC boot-up time
  • Registry cleaner to fix registry errors
  • Uninstall manager to remove unwanted programs and free up space
  • Browser history cleaner for increased privacy and more...
 
 

Print this item

Exclamation Global outage due to Friday’s release of CrowdStrike
Posted by: harlan4096 - 19 July 24, 15:46 - Forum: Kaspersky Security Blog - Replies (1)

Quote:The story of how CrowdStrike released an update on a Friday and brought down thousands, tens of thousands, or maybe even hundreds of thousands of computers around the world.

 Ever heard the unspoken rule: “Never release on Friday”? We have, but CrowdStrike hasn’t. They released a tiny driver on an ordinary Friday morning, which became the cause of a huge outage all over the world.

An incorrect update for CrowdStrike’s EDR (Endpoint Detection and Response) solution has affected Windows devices around the world — giving corporate users the Blue Screen of Death (BSOD). The failure has affected, for example, airport information systems in the US, Spain, Germany, the Netherlands and other countries.

Who else was affected by CrowdStrike’s Friday release and how to roll back bricked computers — all in this post…

What happened

It all started early Friday morning with corporate users around the world reporting problems with Windows. At first, a glitch in Microsoft Azure was blamed, but later CrowdStrike confirmed that the root cause was in the csagent.sys or C-00000291*.sys driver for its CrowdStrike EDR. And it was this driver that caused an abundance of silly office photos showing off the (dreaded) blue screens.

[Image: crowdstrike-global-cyber-outages-01.jpeg]

Blue screen of death on all computers = a day off for airport linemen

If we wanted to list everyone affected by this outage, such a list sure wouldn’t fit into this post – or dozens of them. So instead we’ll briefly cover the main victims of CrowdStrike’s negligence. Airline companies, airports, and people who want to either go home or go off on a long-awaited vacation were the most affected:
  • London’s Heathrow Airport, like many others, announced flight delays due to a technology glitch;
  • Scandinavian Airlines posted a notice on its website saying, “Some customers may experience difficulties with their bookings due to an IT issue affecting several countries. SAS is fully operational but delays are expected”;
  • In New Zealand, banking, communications and transportation systems are experiencing problems.
Various medical centers, chain stores, the New York subway, the largest bank in South Africa and many other organizations that make lives more comfortable and convenient on a daily basis were affected. The fullest list of those affected by the outage we can find is here — and it’s growing by the minute.

How to fix it

At this stage, it’s rather problematic estimating how long it’ll take to fully restore the affected computers around the world. Things are complicated by the fact that users need to manually reboot their computers in Safe Mode. And in large corporations, this is usually impossible to do on your own without the help of a system administrator.

Nevertheless, here are the instructions for how to get rid of the blue screen of death caused by the CrowdStrike driver update:
  1. Boot your computer in Safe Mode;
  2. Go to C:\Windows\System32\drivers\CrowdStrike;
  3. Locate and delete the csagent.sys or C-00000291*.sys file;
  4. Restart your computer in normal mode.
And while your sysadmins are doing this, you could use a hack that’s come out of India today: employees of one of the country’s airports have started filling out boarding passes… manually.

[Image: crowdstrike-global-cyber-outages-02.jpeg]

India isn’t too worried about the global disruption. Source

How the failure could have been avoidedAvoiding this situation should have been straightforward. First, the update shouldn’t have been released on a Friday. This is as per a rule that’s been known to all in the industry since the year dot: if an error occurs, there’s too little time to fix it before the weekend, so the system administrators at all companies affected need to work over the weekend to fix things.

It’s important to be as responsible as possible about the quality of updates released. We at Kaspersky launched a program back in 2009 to prevent mass failures such as this one at our customers, and passed an SOC 2 audit, which confirms the security of our internal processes. For 15 years now, every update has been subjected to multi-level performance testing on various configurations and operating system versions. This allows us to identify potential problems in advance and resolve them on the spot.

The principle of granular releases should be followed. Updates should be distributed gradually, not all at once to all customers. This approach allows us to react instantly and stop an update if necessary. If our users have a problem, we register it, and its solution becomes a priority at all levels of the company.

As with cybersecurity incidents, in addition to fixing the visible damage, you need to find the root cause to prevent these types of problems repeating in the future. It’s necessary to check software updates on test infrastructure for operability and errors before rolling them out to the company’s “combat” infrastructure, and to implement changes gradually — continually monitoring for possible failures.

Incident handling should be based on an integrated approach to building protection from a trusted supplier with the strictest internal requirements for the security, quality and availability of its services. The basis for this work can be the Kaspersky Next line of solutions. This will help your company not only stay afloat — but also increase the efficiency of your information security system. This can be done either gradually — increasing protection step by step — or all in one go. Protect your infrastructure today with us so that the next global outage doesn’t affect your customers.

And we, for our part, can help you make this decision: switch to Kaspersky and unlock two years of Kaspersky Next EDR Optimum for the price of one. Experience the pinnacle of robust, reliable cybersecurity protection!
...
Continue Reading

Print this item

Information You should now be able to get Windows 11 Version 23H2, if you have not already
Posted by: harlan4096 - 19 July 24, 09:55 - Forum: Microsoft Windows News - No Replies

Quote:Microsoft released Windows 11 version 23H2 last year to the public. It,, and the Moments Update that followed, introduced Windows Copilot and thus the first tiny bits of AI in Windows.

The actual release of the feature update was unspectacular, underwhelming even. Microsoft did a bad job at differentiating between the feature update and the feature drop that followed immediately afterwards.

Furthermore, Copilot did not offer much in terms of differentiation when compared to the web or application versions.

This February, Microsoft announced that it is installing Windows 11 version 23H2 on devices automatically that have or about to reach end of servicing. Most users who wanted the new version of Windows had installed it by now, but this was designed to get older Windows 11 versions updated.

Earlier this month, Microsoft reminded customers that the consumer version of Windows 11 version22H2 and Windows 11 version 21H2 for organizations would run out of support in October.

Broad availability

Microsoft announced yesterday that Windows 11 version 23H2 has reached broad availability. This means, that it is now available to "all users with eligible devices" according to Microsoft.

One caveat: It may still be necessary to hit the check for updates button to get the feature update offered on some devices.
Microsoft reiterates that non-managed Windows 11 Home and Pro devices will be upgraded to the new version of Windows automatically "when they reach, or approach, end of servicing".
...
Continue Reading

Print this item

Information Microsoft is bringing Designer's AI editor to Windows 11's Photos app
Posted by: harlan4096 - 19 July 24, 09:53 - Forum: Microsoft Windows News - No Replies

Quote:Microsoft has announced that it is adding some new AI features to the Photos app on Windows 11. The options will be powered by Microsoft Designer's AI.

As you may be aware, the Microsoft Photos app already has a button that lets you edit an image in Designer online. Clicking on the button opens https://designer.microsoft.com in your web browser, with the image loaded and ready for editing. This is the experience that Microsoft is changing, the company wants to allow users to edit the images with Designer directly.

Microsoft Photos app gains AI-powered editing tools

The Photos app is gaining options to use Designer's AI to erase objects, blur the background, use generative erase to remove backgrounds or replace them, automatically crop images, etc. You can also use apply filters, or make adjustments to the brightness, contrast or saturation of the photos. Designer offers various options to add text or markup the images.

[Image: Microsoft-Photos-app-with-Designer-AI-ed...ptions.jpg]

The AI features in the Windows 11 Photos app are available for users who have opted into the Windows Insider Program. Microsoft says that the AI experience is currently available for the following Windows display languages: English, Spanish, French, German, Italian, or Portuguese (Brazil). You will need the Photos app version number 2024.11070.12001.0 or above, and sign in to your Microsoft account to use Designer's AI features. Signing in to your account will allow the app to save your edits.

Note: I couldn't test the features, so I can't say how they work. (Images: via Microsoft)

The announcement also mentions that these advanced options in Microsoft Designer are coming soon to Edge. Microsoft has also introduced Designer for Copilot Pro subscribers, which will allowing users to create images and designs in Word or PowerPoint. Word users will soon be able to ask the AI to create a banner for their documents based on the document's contents.
...
Continue Reading

Print this item

Information AMD Ryzen 9000 Zen5 “Eldora” CCD to have 27% higher transistor density over predecess
Posted by: harlan4096 - 18 July 24, 09:22 - Forum: Hardware News - No Replies

Quote:AMD Ryzen 9000 CCD uses TSMC 4nm N4P node

[Image: AMD-ZEN5-RYZEN900-DIE-HERO-1200x624.jpg]

AMD has released detailed information about the Zen5 manufacturing node and compute chiplet die sizes. This was part of the Zen5 Tech Day, which covered AMD’s next-generation architecture for desktops and mobile devices.

The company confirmed that the CCD, codenamed Eldora, fits up to 8 Zen5 cores and measures 70.6 mm², almost the same size as the Zen4 CCD, which is 71 mm². Despite the similar size, the architecture has been significantly revamped and will form the foundation for future Zen generations. While many specifications remain unchanged from Zen4 (same core count, same cache size), advancements in the manufacturing node have enabled AMD to integrate more transistors into the core design.

AMD continues to use the same IOD for the Ryzen 9000 processors as its predecessor, so there are no changes in that area. However, while Zen4 uses the TSMC 5nm FinFET node, Zen5 utilizes the TSMC 4nm FinFET node, specifically N4P. Although the exact number of transistors in the Zen5 chiplet has not been confirmed, unofficial sources suggest it contains 8.315 billion transistors. This results in a density of 117.78 MTr/mm², representing a 26.8% increase compared to Zen4.

Ryzen 9000 CCD vs. 7000 CCD
  • Die Size: -0.005%
  • CCD Transistor density : +26.8%
Ryzen AI 300 vs, 7040
  • Die Size: +30.6%
  • Transistors density: ?
AMD has also confirmed that Strix Point’s monolithic die will be 232.5 mm², which is 30.6% larger than its predecessor, Phoenix1. While the transistor count has not been officially confirmed, it’s worth noting that Strix Point will feature increased L2 and L3 cache and significantly larger graphics capabilities (16 CUs versus 12 CUs).
...
Continue Reading

Print this item

Information Google Chrome will soon throw security warnings at you that you cannot ignore
Posted by: harlan4096 - 18 July 24, 09:21 - Forum: Browsers News & Tips - No Replies

Quote:Google is changing how Chrome reports potentially malicious file downloads to the user. While the blocking algorithm is not changing, Chrome will display full screen security warnings to the user.

Google Chrome blocks file downloads that its Safe Browsing feature considers malicious. Whether these are indeed malicious or not is not always clear, as Safe Browsing may block access to files that are not.

Google has changed Chrome's Safe Browsing feature several times in recent history. Here are two recent changes: Google changing how Chrome handles dangerous downloadsSoon, Google Chrome will display a different kind of warning when users attempt to download malicious files.  First up is the blocking of the file download.

[Image: chrome-warning-download.png]

Chrome displaying a download warning when it rates a file as maliciousChrome displays the download list and states "dangerous download blocked" in red letters underneath the download.

A click on the download reveals additional information. In the case of the test download, Chrome stated "this file is dangerous".

[Image: this-file-is-dangerous-chrome.png]

Chrome revealing that a file download is dangerousThe only options at this point are to delete the download from the history and to click on a help link. Deleting the download from history removes it from the system.
...
Continue Reading

Print this item

[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password





[-]
Recent Posts
Movies! Movies!
Kool — 12:34
Worldwide News
Kool — 12:33
GFYI [Official] EaseUS Partition Master...
"Share feedback...mjcn19 — 04:39
GFYI [Official] Ashampoo® WinOptimizer ...
"Share feedback...mjcn19 — 03:06
Internet Download Manager 6.32 Build 9
What's new in versi...Kool — 14:59

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (38)ywixazok

[-]
Online Staff
There are no staff members currently online.

>