Official forum for Utopia Community
You are not logged in.
Nobody whatsoever believed me when I said Windows would eventually come out with a version 11. My guess was correct.
In fact a few were quite adamant about that prospect. But anyone with half a brain who is been on Windows since 98 or even before had to know it was a real possibility if not completely likely the next level would be coming. I rest my case.
Besides, what's more better for marketing & sales than looking forward to new and improved products in natural version series progression. :isay: But where the heck did 9 go.
If they was really smart they could repackage 8.1 with super improvements, throw in Edge and Micro Defender AV and sell the heck out of Windows 9 as an alternative factor for those diehard committed customers of it.
I am a soon-to-be MAC user, awaiting delivery of my new MAC Air laptop, with Big Sur OS, o/a Jan. 27. In the meantime I have been reading up on security, especially firewalls.
As you all know, Windows Operating System (winOS) has a very effective firewall (FW) built right into itself. So does macOS.
As delivered, the winOS FW is enabled. winOS does not make it easy for the user to disable its FW.
Unlike Windows, the firewall in macOS, as delivered, is disabled. It is up to the user to enable it.
WHY is macOS delivered with its FW disabled? I am still pondering that question. So far, the best comments I have found about this issue are in the HowToGeek's article at HERE. That article deals with several issues including:
Why macOS FW isn't enabled by default
Downsides of FWs
Why you might want to enable macOS FW
==>How to enable & configure macOSFW
As you all know, there are a several 3rd party FWs for winOS. So far I have uncovered only two for macOS:
Lulu: see HERE and HERE. Lulu is a free "front-end" for macOS FW -- like Windows Firewall Control is for winOS FW.
Little Snitch: see HERE and Here. Little Snitch is a not-free stand-alone FW for macOS. (While there are stand-alone FWs for winOS, such as Comodo's, they are all free, as far as I know.)
I would VERY much appreciate comments and/or answers to the following questions:
Q1: Besides Lulu & Little Snitch, are there any other 3rd party FWs for macOS?
Q2: Given that I possibly will NOT run any anti-virus on my MAC***, should I enable the macOS FW AND/OR should I run a 3rd party FW?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
*** For those interested in WHY MACs don't need much added security, I suggest reading THIS article, et alia.
OK found something, to stop at least some Chrome UDP connections:
Chrome:
“chrome://flags”
Experimental QUIC protocol | Disabled
it is on (Enabled) by default since 2013
"The issue is not with the protocol or the technology itself. The supposed upside of QUIC is that it makes web communications more efficient and faster. The problem is that it is not supported by security appliances such as firewalls yet, and has therefore inadvertently created a security hole for many organization"
according to some forum user there is possibility of Windows using Shell32 DLL and API for Bing functionality in Windows 8 and later versions since that IP seems to point to Bing search server.
On some systems chrome doesn't connect to 255 (...) but normal chrome ip addresses
ok found something here https://www.lifewire.com/how-to-turn-of … the%20list.
but apparently it is not possible to disable chromecast
the option for disabling it was the first thing I did, didn';t help though, also its random, on some pcs it doesn't want 255.255 but the normal dns I have set
I don't get it, it seams to be jumping around between extensions so removing one helps for a limited period of time only
it was indeed grammarly, not that I need it my English is perfect (joking)
another one that seam to do that is ublock origin
This address is a IP multicast.
I hear this alot, but can it be dangerous, you too get multicast ip on chrome?
As if everyone knows what is multicast but if a non techie tries to find how this can be exploited he finds nothing useful, only that it is a multicast (obviously)
I don't get such on other browsers and not everytime on chrome , just this device
I am thinking it might come from some addon/extension
"224.* is a multicast "domain", wherein various apps will use it to connect to other apps etc." I do have browser addons
so my question in short is, is it typical for chrome.exe? or I should investigate further
What will happen if you are not going to transition to SSL, is basicly browsers will warn you users before they enter your site that it doesn't have SSL.
You really bring a good point. great
not a chance
"Our boss wants us to minimise hand-to-hand interactions and, obviously, cash carries a lot of germs."
No less than those filthy debit cards. And I even hate to think how many
germs are in those shop payment terminals that everyone have typed their PIN code with their crummy little fingers with glee ...
Yuck!
don't have any devices that should connect between themselves and media routers are disabled in about:config, I am confused about this connections, on some devices I don't have such traffic with chrome.exe
if I block this Internet is gone on chrome
Yes, it would be good to try out some examples, to see what the cause might be.
For Google to search for specific phrases by putting key words in quotation marks. For example, instead of writing:
Sony WF-S900 bluetooth headphones
Try this instead:
“Sony WF-S900” bluetooth headphones
Are you still creating user accounts everywhere? Maybe you should stop and sign in with your Google, Facebook, or Apple account instead. It might just be more secure—and it’s definitely more secure if you’re not currently using a password manager.
One Strong Password With No Password Reuse
If you’re creating user accounts for each service you use, there’s a good chance you’re reusing passwords or using simpler passwords that are easy to remember. Then, when a website is breached and leaks your password, an attacker could use those email and password combinations to get access to your accounts. DoorDash losing 5 million logins was just the most recent example, but such breaches happen frequently.
Dear all.
Can a website know my Laptop MAC address? I ask because after signing up with ********, and trying to "Friend" five known friends, ******** immediately blocked me from a new account after about 15 minutes normal usage, stating, suspicious activity. I could not believe it so I used VPN to setup a new ******** account but ******** were aware of this trick (justified trick as this was my account setup for normal usage (Not criminal)) so I bought a new SIM card to setup a new ******** account and still ******** were ahead of me, linking me to the same locked out account. Any ideas of how ******** were aware it was always me trying to access my locked out ******** account or trying to setup a new ******** account from the same laptop?
Many thanks.
Let me just add that to my list of reasons why I never have used and never will use FaceBook.
I'd like to learn more about technology in general so I can make use of it. I have 2 Ryzen 2700X's each paired with 32GB of ram and 3 Ryzen 1700X's with 16GB of ram each. Each computer is pair with either a 1070ti or vega 64. Down the road I'd like to play with remote management, AI, building a NAS, having a local webserver so I can get back into webdesign and maybe throw in a few game servers because, why not?
Then you REALLY need to get out of VM and go to Dual Boot where you learn Linux.
For webdesign, I use Cygwin emulator on Win/7 where I can run AMP (Apache, MySql & PHP) that is native code which can be uploaded to a live server. Even Cygwin is better than any VM for learning. Yes, I can start a local Apache server on Win/7 -- even on my laptop.
Due to the information that I've found recently, there are 4.57 billion Internet users in the world. 31% of those use a VPN. Upon reviewing a sample size of 30 popular VPNs, we can estimate that approximately 62% of those are secretly Chinese-owned VPNs currently installed on 878,354,000 consumer user devices.
Does that really mean that it's a potential threat to us all? According to my understanding, using VPN is not always safe and some data can be collected and used afterward. Do I need to worry or I should forget about it?
I believe they're implemented as follows to simply summarize
Public protects your device from being identifiable on the network, Imagine your pc is in a public space do you really want people to find your device easily, potentially attacking your device or accessing features of it?
Home/Private:This device is used on your personal home network therefor you trust all the devices present in it as such you allow devices to be able to take advantage of features such as Mapping drives or creating Homegroups.
Tbh if you're not going to make use of any features offered in the Home network it is not worth considering and you should always opt for the Public option, as soon as you wish to make use of the features of Private you can switch this yourself from your control panel options.
Please observe forum rules.
All logs have to be pasted not attached.
Paste Attach.txt log from DDS into your next reply.
redtarget.gif You're running three AV programs, MSE, AVG and Norton.
You have to uninstall TWO of them.
If AVG is one of them use AVG Remover: http://www.avg.com/us-en/utilities
If Norton is another one use this tool: http://www.majorgeeks.com/files/details … _tool.html
Do not fix O10 entry. Trained volunteer is needed.
O10 - Broken Internet access because of LSP provider 'c:\program files\netlimiter\nl_lsp.dll' missing
Disable these services. HJT fix check should accomplish this.
O23 - Service: Remote Administrator Service (r_server) - Unknown owner - C:\WINDOWS\system32\r_server.exe
O23 - Service: sdktemp - Unknown owner - C:\WINDOWS\sdktemp.exe (file missing)
HJT fix check these entries
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
Up to this point, no files are deleted.
Download ONLY the programs found in the 8-step Malware Removal Guide.
Caution: Our trained volunteers may substitute different tools from what is cited below:
Reason from HJT tutorial –
Seek advice from an experienced user when fixing these errors. It is also advised that you use LSPFix, see link below, to fix these.
You should use extreme caution when deleting these objects if it is removed without properly fixing the gap in the chain, you can have loss of Internet access.
There is a tool designed for this type of issue that would probably be better to use, called LSPfix. For a great list of LSP and whether or not they are valid you can visit Zupe's LSP List
Move it to new zealand and call it de.mo
Hello
For a week now I have an issue with teamspeak. Week ago I was using teamspeak as usual and after restarting pc I cannot enter specific server . And everytime teamspeak poke me with " Failed to Connect to Server ' . I asked admins on the server to check if im banned and im not .
What I have tried doing :
-Uninstalling/Reinstalling -Updating Windows -Reverting to an older version -Flushing DNS -Using VPN -Changing IP Address . Adding ports . Adding teamspeak to firewall and antivirus -Buying it on my phone (doesn't work on phone either) + contacted my internet host to solve this + they've told me that problem is inside my pc . Also my bro who using the same router as me can join servers I can't normally.
I recently added 2 switches to my home FIOS network. WiFi is ok for the smartphones and tablets, but I like keeping my game systems, streaming systems and NAS servers wired.
Some devices have a specific "uplink" port which you connect the data cable from the 1st router into. The new device may be able to configure itself once it recognizes the uplink port is in use.