Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - Triple Helix

Pages: [1] 2 3 4
Security Software / Re: GlassWire Firewall
« on: February 13, 2017, 11:44:25 pm »
Glasswire Firewall v1.2.96 - (February 13, 2017)

Hash # B8505E56EF2B3148BA1A4051061C86C7

- You can now change firewall modes from the GlassWire Windows tray menu. Right click the GlassWire icon in the bottom right Windows tray to change modes.
- The year is now added to the GlassWire network tab.
- Three security upgrades were made due to HackerOne bug reports.
- Fixed a problem where a network scan could cause the GlassWire service to crash.
- We added protection so third party DLL files can no longer interact with GlassWire and cause it to crash.


VoodooShield / Re: VoodooShield Releases Thread
« on: February 13, 2017, 04:03:09 pm »
I just uploaded 3.51... there were not any fixes that should have broken anything, so I just uploaded it to the public. Usually, I like to see if you guys can run the new version for a few days, but I really needed to get this version out.

There were tons of small fixes, and I think everything you guys had posted since 3.50 is fixed, but if not, please let Alex or I know.

Here are the main fixes...

- Added compression utilities to the vulnerable process list... I think they are all included, but if you guys find another one, please let me know
- There was an extremely uncommon silent blocking issue when VS could not determine the absolute path, this is fixed
- Blocking in Disable / Install Mode should be fixed, if not, please let me know
- Regional bug when the system time was changed to a different format should be fixed, if not, please let me know
- Drag and drop and the right click context "VoodooShield Scan" now supports all file types
- Logging bug fixed
- Too many command lines were being added to the list... should be fixed, if not, please let me know
- Xcopy was being blocked by batch files
- "Threats Blocked: x" to be a clickable button that leads you to the UI section that shows your quarantine/blocked was added
- A lot of other small fixes

I will catch up on the posts and PM's asap, thank you guys!

More info here:

VoodooShield / Re: Windows XP Is No Longer Supported By VoodooShield!
« on: December 11, 2016, 10:18:28 pm »
Yes i sent it to you!  :P

Updates Talk / Re: Installers Hall of Shame (Unwanted add-on)
« on: July 19, 2016, 04:58:16 am »
Updated Divx 10 Pro as it comes with PC Speed Maximizer now!


VoodooShield / Re: Windows XP Is No Longer Supported By VoodooShield!
« on: July 12, 2016, 04:26:51 pm »
Well the older version still works on XPeee and all you have to do is ask Dan at VoodoShield for version 2.86 but yes no further new versions for XP.

VoodooShield / Re: VoodooShield Beta Thread
« on: July 12, 2016, 04:25:02 pm »
Hey everyone, here is the latest version, and here is what was changed.

- Added even more logging to see if we can isolate the freeze issue. I think there were a couple of different things causing the freeze issue, mainly because various users would describe the bug a little different. Also, VS used to freeze on my every 2 or so days, now it is every 10-15 days. Either way, we have to be getting close to figuring it out.
- The bug that Umbra found in Custom Folders should be fixed, if not, please let me know.
- I also just last night discovered a bug... I think someone mentioned this to me before, I was not sure what they meant. Anyway, for example, if you are running VS on AutoPilot and you download something with Internet Explorer, then try to run the file, VS will think it is an exploit (even though it is not). Anyway, that is fixed now, and AutoPilot should be even more user-friendly now. I do not think there is a chance that fixing this bug opened up a security hole, but if something is not quite right, please let me know!

Thank you guys!

VoodooShield / Re: VoodooShield Beta Thread
« on: June 23, 2016, 04:24:54 pm »

VoodooShield / Re: VoodooShield Beta Thread
« on: May 02, 2016, 02:45:57 am »
Here is VS 3.16 beta This should fix most of the Windows 10 issues. I have not heard back from Vlad yet (he has a lot going on at the moment), but I think this is the way he would have fixed it, but I guess we will see for sure soon ;).

VoodooShield / Re: VoodooShield Beta Thread
« on: April 27, 2016, 01:05:40 pm »
Here is the final to do list for VS 3.0

- This hardly ever happens, but there is a path is denied error. It will be a super easy fix (the code is already written), I just have to be able to reproduce this error first.

- Cloud command lines feature… this will be easy, but there is a lot of busy work

- Activate the realtime scanning of processes on VS’s startup. It is already in the code and ready to go, but it is not activated… I wanted to fix all of the other bugs first.

- Cuckoo Sandbox RDP for Windows 10… Can someone who is running Windows 10 confirm either way if the Cuckoo Sandbox is working for them or not? If it is not working, I think I know what is wrong. Please let me know!

- Mini prompt location… sometimes it is too far to the left. This is an easy fix.

- Sign with SHA 256… I just need to find my password for the signature. I put it somewhere so I would not lose it, but guess what, I lost it ;).

If there is anything that I am missing, please let me know. I will catch up on the posts I missed asap! Thank you!

VoodooShield / Re: VoodooShield Beta Thread
« on: April 26, 2016, 12:04:48 am »

VoodooShield / Re: VoodooShield Beta Thread
« on: March 06, 2016, 04:35:23 pm »
Yes you are Sherry!  :P  beta

Daniel  :o

VoodooShield / Re: VoodooShield Beta Thread
« on: February 28, 2016, 07:37:19 pm »
VoodooShield 3.09 Beta Release
You can download it from

System requirements:

    Windows Vista sp1 and above (XP is not supported!)
    .NET 2.0/3.5 and above

What's new in VoodooShield 3.09 Beta:

This release contains:

    Added the new Edit form for editing Command Lines with wildcard support (currently only * and ? are supported for wildcards)
    Added search box to Whitelist, Command lines and Quarantine lists
    Improved performance of User Log, Whitelist, Quarantine and Command Line lists
    Some small bugs fixes

Known issues

    Sometimes gray user prompt is shown - have direction of an investigation

Have a good day,

Members Corkboard / Re: Hardhead Happy Birthday!!
« on: February 24, 2016, 05:02:03 pm »
Happy Birthday Tim!

Security & Technology News / Webroot releases our 2016 Threat Brief
« on: February 23, 2016, 04:46:01 pm »
Key findings from the Webroot 2016 Threat Brief include:
  • Malware and potentially unwanted applications (PUAs) have become overwhelmingly polymorphic, with 97% of malware morphing to become unique to a specific endpoint device. By changing attributes to evade detection, polymorphic threats pose a major problem for traditional, signature-based security approaches, which often fail to discover singular variants.
  • Approximately 50 percent of Webroot users experienced a first contact with a zero-day phishing site, as compared to approximately 30 percent in 2014. This data indicates that zero-day phishing attacks are becoming the hacker’s choice for stealing identities.
  • Technology companies, including Google, Apple and Facebook, were targeted by more than twice as many phishing sites as financial institutions, such as PayPal, Wells Fargo, and Bank of America. These tech companies are targeted because the same login credentials are often used to access many other websites, resulting in multiple compromised accounts with each phishing victim.
  • 100,000 net new malicious IP addresses were created per day in 2015, a significant increase from the 2014 average of 85,000 a day indicating cybercriminals rely less on the same list of IPs, and are expanding to new IPs to avoid detection.
  • The U.S. continues to have the most malicious IP addresses of all countries. In 2015, it accounted for over 40 percent of all malicious IP addresses, a significant increase from 31 percent of malicious addresses in 2014. Top countries hosting 75 percent of malicious IPs include the U.S., China, Japan, Germany, and the UK.
  • As with malicious IP addresses, malicious URLs are largely hosted in the U.S. (30 percent), followed by China (11 percent). Furthermore, the U.S. is by far the largest host of phishing sites, with 56 percent of sites within its borders.
  • In the second half of 2015, 52 percent of new and updated apps were unwanted or malicious—a significant increase over the first half of 2014, when only 21 percent were unwanted or malicious.
See the PDF links for full threat brief details.

Daniel ;)

Pages: [1] 2 3 4