Page 15 of 26 FirstFirst ... 511121314151617181925 ... LastLast
Results 141 to 150 of 252

Thread: Suggestions

  1. #141
    Senior Member drragostea's Avatar
    Join Date
    Jan 2008
    Location
    @Home
    Posts
    3,674

    Default

    http://forums.spybot.info/showpost.php?p=199211&postcount=101

    I don't know what the framework is, that is required for ClearType... but I'm just hoping it can be implemented.

  2. #142
    Senior Member
    Join Date
    Jul 2006
    Location
    Croatia
    Posts
    735

    Default

    Can Tahoma be used instead of MS Sans Serif font (I think that this feature has been suggested) ?

  3. #143
    129260
    Guest

    Lightbulb also...

    dont you think this needs to be updated PepiMK?

    http://forums.spybot.info/showthread.php?t=24183

  4. #144
    Member of Team Spybot PepiMK's Avatar
    Join Date
    Oct 2005
    Location
    Planet Earth
    Posts
    3,601

    Default

    Oh, indeed
    Will do in the next days, at the moment I'm a bit slow, just started to learn to type Dvorak
    Just remember, love is life, and hate is living death.
    Treat your life for what it's worth, and live for every breath
    (Black Sabbath: A National Acrobat)

  5. #145
    Senior Member
    Join Date
    Jul 2006
    Location
    Croatia
    Posts
    735

    Default

    One more suggestion: Organize scan results somehow like this:

    ¤ - Adware: 3 entries
    ¤ - Zango: 2 entries
    ¤ - Executable File
    C:\Program Files\Zango\Zango.exe (3,5 MB)

    ¤ - Temporary File
    C:\00Zango.tmp (67,7 MB)
    ¤ - Zippy: 1 entry
    ¤ - Tracking Cookie
    Internet Explorer (Administrator, 3rd party,22.12.2004., 05:35:24)
    ¤ - Trojans: 1 entry
    ¤ - Psyme: 1 entry
    ¤ - JavaScript File
    C:\Program Files\XYZ\script.js (173 KB)
    ¤ - Usage Tracks: 3 entries
    ¤ - Logs: 2 entries
    ¤ - Text Document
    C:\Program Files\log.txt (1,5 MB)

    ¤ - Log File
    ¤ C:\00setup.log (7 KB)
    ¤ - Cookie: 1 entry
    ¤ - Cookie
    Internet Explorer (Administrator, 1st party,04.02.2006.,21:35:24)

    ¤ - Temporary Files: 2 entries
    ¤ - TEMP Dir.: 2 entries
    ¤ - Temp file
    C:\WINDOWS\TEMP\log.tmp (1,5 MB)

    ¤ - Log File
    C:\WINDOWS\TEMP\tmp.dat(7 KB)


    Found 10 entries. (Instead of Found 10 problems.).

  6. #146
    129260
    Guest

    Lightbulb thanks!

    Quote Originally Posted by PepiMK View Post
    Oh, indeed
    Will do in the next days, at the moment I'm a bit slow, just started to learn to type Dvorak
    Thanks, its ok, you do what you can. I can understand that you are a very busy person. Thanks for updating it!
    Last edited by 129260; 2008-09-13 at 22:24.

  7. #147
    Guest
    Join Date
    Jun 2008
    Posts
    478

    Default

    why not have a feature that sets a kill bit on vulnerable activex controls until a patch is released by microsoft.
    Last edited by blues; 2008-09-19 at 17:16.

  8. #148
    Spybot Advisor Team [Retired] md usa spybot fan's Avatar
    Join Date
    Oct 2005
    Posts
    5,859

    Default

    blues:

    If I understand your request properly, you can do that within Internet Explorer. In Internet Explorer, click the Tools button, click Manage Add-ons, and then click Enable or Disable Add-ons.

    Getting an answer is one thing, learning is another.


    Microsoft Windows XP Home Edition running on a 2.40GHz Intel® Pentium® 4 Processor with 512 MB of RAM and a 533 MHz System Bus.

  9. #149
    Guest
    Join Date
    Jun 2008
    Posts
    478

    Default

    i was also thinking about other activex controls that is on the computers, for example a script on a website that does something with an vulnerable activex control that is on the computer. we can not disable all activex controls on the computer with the internet explorer add-on manager.

  10. #150
    Junior Member
    Join Date
    Apr 2008
    Posts
    2

    Default

    When spybot detects or deletes a file, write the file's date created (or date modified) in the log file (and possibly on the screen during the removal stage when the user is prompted) - this would be helpful in determining how long the computer has been compromised. In my case I had a keylogger and wanted to know how long it had been there.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •