Thank you dmex its disabled now
Thank you dmex its disabled now
A word of warning from my experience. If you change policy settings, create a restore point before doing so.
After I changed the policy setting to 'Deny All', netbios stopped running in file discovery thus no NAS and network printer showing under 'Network'.
I also found that changing that setting to 'Allow All' did not fix the above problem. I had to use an earlier restore point to set all back to normal.
Note, you will also need to restart after changing this policy setting. But I am not changing it again!!
I haven't tested this with the registry setting method but have lost enthusiasm for this, now, especially as I don't use Edge or IE!
For anyone interested: I tested 2 different systems unchecking "Enable Integrated Windows Authentication" and still got vulnerable. (Yes I rebooted) Only success was the reg entry. Really disturbing with such a simple hack. Reason we turned off NTLM on all servers at last company I worked for.
I changed my user account to a Local one and now I'm using Windows Hello authentification. Is this method safer than using a Microsoft account?. I hope it is.
Thanks in advance
Not sure if this is related to the original issue, but I mistakenly went to a wrong website (cinplex.com rather than cineplex.com) and ended up with this:
I couldn't open any new tabs or close Chrome so I just restarted the computer, and when the tabs came up in Chrome again, I managed to quickly delete the one in question. Searching info about it, it seems this can be quite invasive. I've deleted history and reset settings, checked Control Panel programs list, nothing, nothing seems to be in the registry, Malwarebytes found nothing, but given this can be quite a deceptive virus, I want to make sure that simply restarting didn't in some way install this inadvertently. I read on a TenForums thread about using the Tweaking.com Windows Repair, but after installing, I keep getting this:
Not sure if this not working is related to the first issue in any way. Any insights would be appreciated. Thanks very much.
I don't use IE or Edge and I always sign in with a local account, can't remember the last time I signed into my M$ account.
Was your computer talking to you as well? It usually does with this sort of scareware.
Tweaking.com is not a tool for this.
Then run TempFile Cleaner.
Then run JRT (Junkware Removal Tool).
Finally, run ADWCleaner.
You should be good to go after this.
p.s. When you run Malwarebytes, be sure to check the option for Rootkits, as it's not selected by default.
EDIT: Site scans clean?
FREE Online Website Malware Scanner | Website Security Monitoring & Malware Removal | Quttera
scop8 shoulkd also run Malwarebytes (download begins when clicked), noting the setting for Rootkits you mention.
Should I be at least creating new passwords or at worst doing another clean re-install or is the latter neck deep in paranoia? This is precisely the kind of thing I'd hoped to avoid, that dreaded feeling of 'maybe something's left over and I shouldn't check anything that requires a password' with a new Win 10 installation. Yet here we are.
I don't know why all the sites say cinplex.com is clean yet when I hit enter things switched to the address of that red image I posted earlier...
Thanks again, simrick, for a prompt and thorough response, I really appreciate it.