New
#30
Until Windows 8 came along and spoilt it by Windows Defender determining that a certain user-editable file (if modified by the user) was being modified by malware, and reset the file to default settings, using a modified file would send any recognised unwanted malware IP addresses to the localhost loopback address at 127.0.0.0, or at 10.0.0.0.
Maintained by the folks at
Let me google that for you
the database contains names and IP addresses of many of the malware sources that disfigure, dishonestly misdirect, and misinform on pages at software download sites, news media pages and sites that are often mostly harmless, but that monetarize with gaudy panels that often lead to dishonest and malicious downloads.
Fortunately. it seems that Windows 10 allows user modification of this file, without the reversion found in Windows 8, so it works again.
This post has been shrouded in fog to comply with forum rule XIII :)
Try this one: at malwarebytes
Reading this thread I'm not sure I want to try it again at this time. Office 365 - Malwarebytes Anti-Ransomware Beta - Malwarebytes Forums . I have Malwarebytes Anti-Exploit, Malwarebytes Anti-Malware, NoScript, Eset Smart Security and my backup images so I don't mind waiting.
Interesting read about ransomware protection from Malwarebytes.
https://forums.malwarebytes.org/topi...ti-ransomware/
Jim