Featured Post

1021. Humpty Dumpty Joe [Biden]

 I've been quiet enough. It took me a long time to get on Obama (OBlunder) when in his times he screwed up America along with his sideki...

Friday, July 31, 2020

973. CANDYOPEN threat in AxCrypt V1.7 Resolved

A while ago I reported an AxCrypt and MSFT Defender issue (see Post 966) where Defender detected a LOW  UNWANTED program threat running on my system. It indicated that the potential virus code called CANDYOPEN in the WIN32 folder was the violation and that AxCRYPT code had the infection. Here are is an explanation of resolution to this issue:

The issue started occurring in June 2020 after a Defender update. The CANDYOPEN check finally reported potential WIN32\CANDYOPEN threat in several of files of AxCrypt version 1.7. Thanks to the AxCrypt Community Support board, I was told to use the latest Legacy code which has eliminated the threat (see The AxCrypt Post Here ). In that I reported that "I tried all of these: 1.7.3180.0 (currently using), 1.7.2893.0 Beta MSI, 1.7.1878.0 Beta MSI" and still had the problem. I was told yet another and newest update legacy version(1.x) AxCrypt-1.7.3233.0-Setup.zip should be installed. The instructions were to delete any previous versions and reinstall using above zip-file. I did so and continued to have Defender threat error reported. As it turned out, if the INSTALL SETUP file for 1.7.2893.0 Beta MSI level code is left on the machine after the running version is removed from the system, IT is detected in that SETUP file which is NOT deleted when removal is done. You MUST do a manual delete of the previous SETUP files in addition to removing the running code.

So, when when the running code is removed, the old 2893-level SETUP is deleted PERMANENTLY (i.e., delete from ReCycle Bin too), and 3233-level is installed, the issue will be resolved.

Now, what do you do with all the left over error messages every day still in Defender? To CLEAR the MSFT Defender Protection History simply delete the files in folder C:\ProgramData\Microsoft\Windows Defender\Scans\History\Service. I saw a tip to delete the folder itself, but it is protected by MSFT and can’t be deleted. Instead, delete all the files in the folder  above. Windows will allow deletion of all but one file, some logging file, and after doing so it will be clean again. However, you WILL lose any other errors reported. Some other posts note that the errors errors are kept for 30 days, then deleted automatically. You have that option. I have found however that I could not go to Defender's "Virus and threat protection" to do a SCAN. Instead, it went to the screen where all the errors were reported. I only had one other error (CCleaner detected with LOW threat same as this AxCrypt error) and decided to wipe them all out.

Btw, the CCleaner support team is working with MSFT re that issue and can be searched on Internet. Don't know the final plan of resolution, but CCleaner note it is NOT an issue and most likely a fake positive.

I should also note that MalwareBytes will also detect the AxCrypt unwanted program issue as does several other Antivirus programs. So, the detection is new in June 2020. I should also note that I am using the 64-Bit version of AxCrypt code and Win32, I believe, had no place in that as far as running code; I don't even think I have a WIN32 folder! Yet, the CANDYOPEN culprit evidentially was in the SETUP file as described.

Sunday, July 19, 2020

972. Lost File Sharing on my network

Wow! For years I have been using file sharing across my network allowing me to share files between my wife's PC and mine. Today it ended! I received 0x80070035 when trying to access the file on her system that I have been for years. I saw many interesting articles about this error code, but only one did the trick. It had me (on her system, where the target file resides) look at the properties of her C: drive which showed NOT SHARED. A simple tab selection (Advanced Sharing) allowed me to check the FOLDERS item to share her C: drive. I originally had only the specific file selected before, but decided I might as well get access to her whole drive, which was really my other PC anyway. It worked immediately. I suppose I could have looked at the specific folder that was previously shared to see if it lost its sharing, but did not. I'm satisfied that sharing c: works. Now, what caused the problem? Who knows? No time to mess with this since it works.

971. "The Dying Light" by Joy Ellis - 2 Stars


The Dying Light by Joy Ellis - 2 Stars
Publisher: Joffe Books
ISBN: 9781789314717

This book was slow and unexciting. It focused on Will and Kate who bought an old house on the English fen. There was page after page about Kate’s mental health issues. She obsessed about the history of the house, had dramatic mood swings and deteriorated physically. Will, the long-suffering husband, endlessly worried about her and tried to get her help. I kept reading, hoping for something exciting and original but that never happened. There were other characters and some mysteries to be solved but even those tied into Kate’s emotional issues and Will’s dilemma. This is the first book I have read by this author. It did not encourage me to read others.
    
Reviewer: Nancy

Thursday, July 16, 2020

970. "No Deadly Medicine" by Trudey Martin -- 4 Stars

No Deadly Medicine by Trudey Martin -- 4 Stars
Publisher: Books Go Social
ISBN: 9781702721646

I read a lot of mysteries and am always searching for something with an unusual plot. The description of the story of an elderly gentleman who drops his notebook and the woman who attempts to return it caught my attention. I was not disappointed.
Verity’s husband died recently. She is grieving and trying to decide what to do with her life when she finds herself in the center of more danger and action than she could ever have dreamed possible. She solves encrypted notes, fights bad guys, and saves the day.  I enjoyed the adventure.
  
Reviewer: Nancy

Thursday, July 9, 2020

969. "The Ultra Betrayal by Glenn Dyer – 5 Stars

The Ultra Betrayal by Glenn Dyer – 5 Stars
Publisher: TMR Press
ISBN: 9780999117347

I started with this book 2 in the author’s series and found it excellent. I never needed any other background from book 1, but am now interested enough in the Torch project to read Book 1 and the short story the author makes available to you when you sign up for his newsletter.

This book takes agents Conor and Emily on a mission to locate and apprehend both the missing British cryptologist working on the Ultra encryption breaking project with Alan Turing and the documents he plans to hand off to the Germans in WW II. First Emily pursues Gunnar Lind, the cryptologist, but gets nabbed by the Germans. So, Connor has the secondary job to find and rescue her. Behind the document trade deal is Gunnar’s wife’s father Benjamin Anderson, owner of a ball bearing factory – ball bearings were in premium demand by all military parties. His motive was money. So, various elements are in play with the Germans not only wanting the documents and cryptologist, but also a better deal for the bearings. Who devised the plan to steal the documents? Who all were involved? Those along with all the exciting action involving spy vs. spy is supplemented by the inner betrayal plans of Himmel against Hitler. The history itself is well worth the read. Thank you Netgally.com for allowing me to read this book and present my honest opinions.


Reviewer: Rich

Saturday, July 4, 2020

968. Replace CCleaner if you are tired of it's nagging

This article --> https://www.howtogeek.com/361112/heres-what-you-should-use-instead-of-ccleaner/ tells you how to use Windows 10 functions to clear space, manage STARTUP programs, and manage files without having to deal with CCleaner. I grew tired of the constant nag popups to buy the upgrade and other things. I have summarized the key functions I used below and the Windows 10 replacements: 1. Clear temporary storage to free up space: Start->Settings->System->Storage-> "Free up Space Now" [Personalized settings for Websites will be left alone] 2. Manage STARTUP Programs: Start->Settings->APPS->->Startup OR Bring up Task Manager (Ctrl-Shift-Esc together) and select STARTUP Tab. 3. Browser Cookies [personalized information per website]: Can be managed at browser shutdown by slecting so within browser settings. You can also use the PRIVATE browser mode so no tracking is done for you your sensisitve websites. Read the article to learn about pros and cons. 4. Encryption is allowed in Windows 10 at a hard disk level. You can define a key so nobody can ever get to you hard disk, installed or not. See article for options to set up encryption.