Corrupt data win 10 steals from me - Windows 10, 8, 7, XP etc.

Is it possible to corrupt any data win 10 steals from me? ie, garbage in, garbage out. Some kind of code that would change its appearance and location randomly. Hide and seek.
Just wondering.

I don't understand the question, OP can you clarify? If you're talking about the Windows Defender auto-submission feature, that only occurs when the heuristics encounter a file it cannot determine but looks malicious.

Related

help I have over 21 Trojand etc

Awarning just appeared on my hd2 saying my device has viruses. Was directed to Microsoft automatically and a message appeared that attempts to remove it. Is this normal ?.
Almost every folder had a Trojan etc written in red. Don't know if they were removed. Any quick checks possible. Hard reset?.
Just downloaded airscanner trial version. it gave the all clear. The microsoft site was asking me to download some exe files to replace the infected files. How do I know airscanner even works ?.
are you on stock rom or are you a custom rom flasher? either way, i suggest a task 29 and fresh rom flash, just to be on the safe side.
If not, just back up stuff, hard reset, and format your SD card too to be on the safe side
Unless someone else can clarify, that sounds quite scary, i have yet to hear of anything like that
fallenmonk said:
Just downloaded airscanner trial version. it gave the all clear. The microsoft site was asking me to download some exe files to replace the infected files. How do I know airscanner even works ?.
Click to expand...
Click to collapse
Something popped up on your HD2 saying you have trojans? I've never heard of that... what do you have installed? I don't think there is any type of antivirus scanner on the HD2, so I don't know why anything would pop up on your HD2. Are you sure it's sending you to a microsoft site? This sounds like one of those fake virus spyware things that get you to install the virus when you go to the site it takes you to to get rid of the virus.... but I've only seen those on PCs... never on WinMo.
I have never actually read about cell phone viruses. I have vaguely heard via word of mouth that they are possible, though.
check the url of the microsoft website..it will not be the original one I suppose. There is hardly any virus written for Windows mobile..so either you are one of the lucky guys who come in taste of some new spyware which nobody heard of before or..or..I dont know but its very scary indeed.
If you do find anything I would very much like to get a sample. Please PM me if you can verify you have an infected HD2.
[Edit]
By the way, how did the message appear, through Opera/IE or a standard Windows Mobile messagebox?
lmfao!
I bet he got it in the web browser, one of those stupid banners trying to scare people and directing them to dodgy sites.
21 trojans? in every folder? LOL
bronx said:
lmfao!
I bet he got it in the web browser, one of those stupid banners trying to scare people and directing them to dodgy sites.
21 trojans? in every folder? LOL
Click to expand...
Click to collapse
that was my first thought too
"Internet Security 2010" I believe is the current rendition...
Hi and sorry for the late reply. I deleted all cookies, history etc in a panic straight away so I cannot verify if was a genuine microsoft site. I was at the time browsing for dvd rippers, logged of but my WiFi was still connected. I had seen that I had gained a mysterious extra 50mb on my device. So I started deleting stuff I don't remember having. Suddenly the warning appeared saying somebody can access my details and all these folders appeared with loads of Trojans etc. Then it said microsoft giving me a exe file to download and to click it. In s panic I reset my ppc. The last thing I had downloaded was the day before which was pocketdivx . Phone seems ok do maybe nothing happened. Thanks for the replies.
The only WinMo virus I know of is a dialer which calls certain numbers at a certain moment of the day. Other than that, i SERIOUSLY doubt the actual existence of any other forms of viruses.
IMO, it`s just a stupid app yelling things such as "OMFG 21 VIRUSES BUY THE FULL VERSION SO WE CAN GET U RID OF THEM!!!!11!!1", and after you buy it, every virus magically gets eradicated, leaving the phone "clean". God, I hate this things...
EDIT: Quick thought... 21 viruses/folder means that there are 21 files, all of them having AT LEAST 1kb (the size of an empty text file). Seriously now, can you see any suspicious files in any folder? Exactly. You can't.

Running Metro Apps with UAC Notifications Off

As I'm sure many people have discovered (at least if my searching about it is to be believed), Metro Apps - sorry - Windows 8 style apps, can not be run when UAC is turned off. They just yell at you and don't start.
This leaves one solution, turning on UAC. But, when you do that, those annoying little pop-ups appear any time you want to do anything useful on your computer with any non-built-in program. Seems like we can only choose one, right? Running Metro apps and being annoyed all the time or not being annoyed by UAC but not being able to use Metro apps.
Luckily, this isn't the case! This can be fixed, giving you the nice non-nagging of having UAC off and the convenience of running Metro apps! How, you ask? A very simple registry edit!
First, open up control panel and get to the UAC section
- I have no idea where this is, just search "UAC" in the top right bar of control panel, or easier yet, in the system search
Drag the slider down to "Never Notify"
It should ask you to restart. You MAY not need to, but I haven't tried it. I recommend restarting.
Next, open up the registry editor.
- just press windows+q to get to search and type in "regedit" - it should be the first thing there
Navigate to the UAC registry setting - it is located here:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
That setting (EnableLUA) should be of type "REG_DWORD" and the Data should be "0x00000000 (0)". If not, you didnt do the last step correctly. Redo it.
Double click on that and change the "Value data:" from 0 to 1.
This should also prompt you to restart. You definitely need to do this one.
After this, magically, you can run Metro apps and also not be nagged by UAC!
I haven't run in to any errors doing this, but I quite literally did it an hour ago. So far, no problems I can see.
Pseudonym117 said:
As I'm sure many people have discovered (at least if my searching about it is to be believed), Metro Apps - sorry - Windows 8 style apps, can not be run when UAC is turned off. They just yell at you and don't start.
This leaves one solution, turning on UAC. But, when you do that, those annoying little pop-ups appear any time you want to do anything useful on your computer with any non-built-in program. Seems like we can only choose one, right? Running Metro apps and being annoyed all the time or not being annoyed by UAC but not being able to use Metro apps.
Luckily, this isn't the case! This can be fixed, giving you the nice non-nagging of having UAC off and the convenience of running Metro apps! How, you ask? A very simple registry edit!
First, open up control panel and get to the UAC section
- I have no idea where this is, just search "UAC" in the top right bar of control panel, or easier yet, in the system search
Drag the slider down to "Never Notify"
It should ask you to restart. You MAY not need to, but I haven't tried it. I recommend restarting.
Next, open up the registry editor.
- just press windows+q to get to search and type in "regedit" - it should be the first thing there
Navigate to the UAC registry setting - it is located here:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
That setting (EnableLUA) should be of type "REG_DWORD" and the Data should be "0x00000000 (0)". If not, you didnt do the last step correctly. Redo it.
Double click on that and change the "Value data:" from 0 to 1.
This should also prompt you to restart. You definitely need to do this one.
After this, magically, you can run Metro apps and also not be nagged by UAC!
I haven't run in to any errors doing this, but I quite literally did it an hour ago. So far, no problems I can see.
Click to expand...
Click to collapse
Thanks for this I was really starting to get annoyed at it. Not just because they are annoying little boxes but it also meant some of my startscreen links with run as didn't work I had to actively right click etc not so easy in 8.
I have UAC disabled on my desktop and laptop both running build 8400 and metro apps work fine, is this something new in RTM?
X10man
Sent from my U20i using xda premium
x10man said:
I have UAC disabled on my desktop and laptop both running build 8400 and metro apps work fine, is this something new in RTM?
X10man
Sent from my U20i using xda premium
Click to expand...
Click to collapse
I believe so. I have the official RTM of the x64 Professional Edition (student licences are awesome), which is build 9200. From my searching, it did worked at one point and doesnt in the RTM.
I am also on the RTM pro x64 and turned off UAC first thing. I haven't had any problems with Metro apps.
Thanks for have made the world just a little less secure big time
Sent from my GT-S5360 using xda app-developers app
sireangelus said:
Thanks for have made the world just a little less secure big time
Sent from my GT-S5360 using xda app-developers app
Click to expand...
Click to collapse
has anyone ever been so far as to decide what to do more like?
but srsly, if i actually know what you are saying (big if...), this shouldnt make windows any less secure than just turning UAC off would, as the registry change actually turns UAC back on, it doesnt just fake that it is on. It just doesnt have the annoying pop-up. metro apps are still sandboxed and not allowed administrator rights anyways.
excactly. so by finding a way users are not forced to have uac on, you make windows in general less secure, because these are MEANT to obbligate people to have uac on.
What I don't get is why this workaround is required in the first place... the first time I got a UAC notification I went to settings and turned it off. Haven't had a problem since.
sireangelus said:
excactly. so by finding a way users are not forced to have uac on, you make windows in general less secure, because these are MEANT to obbligate people to have uac on.
Click to expand...
Click to collapse
sure, but i dont like UAC yelling at me. as such, i want it off. i dont care when programs are trying to do something they need administrator permission to do, because i know what i download and what it does.
Pseudonym117 said:
sure, but i dont like UAC yelling at me. as such, i want it off. i dont care when programs are trying to do something they need administrator permission to do, because i know what i download and what it does.
Click to expand...
Click to collapse
Exactly. UAC is meant for people who have no idea what they are doing when it comes to Windows system-wise. If they don't know what programs do what it is useful to deny something they didn't request.
JihadSquad said:
Exactly. UAC is meant for people who have no idea what they are doing when it comes to Windows system-wise. If they don't know what programs do what it is useful to deny something they didn't request.
Click to expand...
Click to collapse
if you dont know what you are doing, NEVER OPEN THE REGISTRY EDITOR.
Tell that to people annoyed that use Google
Sent from my GT-S5360 using xda app-developers app
I honestly don't know what all the fuss about UAC is, theres almost no lag any more, it doesn't have to dim, and if set correctly doesn't nag about every little thing.
For all those that feel that the world is a 100% safe place to live and work, good for you, keep it turned off, for everyone else with a interest in helping the wider community stay safe, just keep it on yeah, worms and viruses don't typically jump up and say they are about to install so any prompt for programs doing stuff with higher level privileges is good in my book.
I do a lot of stuff on my computers, id say im fairly well clued up as to what im doing but I for one like the UAC pop up, why? because you cant possibly know that every little program is safe. with UAC on, you can turn it way down but leave it on still meaning any program that requires admin rights (which shouldn't be many) has to ask me.
Yes I do know that if run something it may trigger the response, yes I do know what im running, but you are all naïve to assume that bad things never happen
One other thing, I have no AV software at al, beyond what comes with windows, I run periodic off line scans which are all clear, why is that? because I have a properly setup 2 way firewall, I know what im doing, and I know what the programs are trying to do, for all you lot that turn UAC off, you cant possibly know what programs are doing with admin rights without your knowledge.
Pseudonym117 said:
As I'm sure many people have discovered (at least if my searching about it is to be believed), Metro Apps - sorry - Windows 8 style apps, can not be run when UAC is turned off. They just yell at you and don't start.
This leaves one solution, turning on UAC. But, when you do that, those annoying little pop-ups appear any time you want to do anything useful on your computer with any non-built-in program. Seems like we can only choose one, right? Running Metro apps and being annoyed all the time or not being annoyed by UAC but not being able to use Metro apps.
Luckily, this isn't the case! This can be fixed, giving you the nice non-nagging of having UAC off and the convenience of running Metro apps! How, you ask? A very simple registry edit!
First, open up control panel and get to the UAC section
- I have no idea where this is, just search "UAC" in the top right bar of control panel, or easier yet, in the system search
Drag the slider down to "Never Notify"
It should ask you to restart. You MAY not need to, but I haven't tried it. I recommend restarting.
Next, open up the registry editor.
- just press windows+q to get to search and type in "regedit" - it should be the first thing there
Navigate to the UAC registry setting - it is located here:
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
That setting (EnableLUA) should be of type "REG_DWORD" and the Data should be "0x00000000 (0)". If not, you didnt do the last step correctly. Redo it.
Double click on that and change the "Value data:" from 0 to 1.
This should also prompt you to restart. You definitely need to do this one.
After this, magically, you can run Metro apps and also not be nagged by UAC!
I haven't run in to any errors doing this, but I quite literally did it an hour ago. So far, no problems I can see.
Click to expand...
Click to collapse
Enabling UAC is not an option for me.
What you do to get the Metro apps "magically" start is absolutely no magic. You turn UAC back on.
To salve this problem, and yet keep UAC disabled, make sure EnableLUA is still "0"
Then make sure your user account is a member of the local Administrator group.
then goto Run > secpol.msc > Local Policies > Security Settings > Security Options >
User Account Control: Run all administrators in Admin Approval Mode > Enable
Reboot
And the Metro Apps will work while UAC is still disabled.
Seems to be quite the day for "power users"
Your approach is overly complex, and doesn't actually do what you think it does.
Iceberger said:
Enabling UAC is not an option for me.
Click to expand...
Click to collapse
It deeply disturbs me that people like you exist, and use the Internet. You *appear* competent in the rest of your post, and yet say things like this... Running as root/Admin was known to be a bad idea 20 years ago. Do you think antivirus will protect you when somebody uses a 0-day to turn your PC into a spam-spewing, DDoS-ing zombie in a botnet?
If you absolutely must avoid seeing UAC prompts, but still want at least a sliver of security, take the following approach instead:
1: Enable UAC if you previously disabled it (set it to whatever level you want except "never prompt" which actually turns it off entirely; we're about to override the prompting).
2. secpol.msc (you can just type it into Start, incidentally).
3. Local Policies -> Security Options (like you said).
4. Open the "Behavior of the elevation prompt for administrators in Admin Approval Mode" item.
5. Select "Elevate without prompting" and hit OK.
Behold, Metro apps work but software still runs with limited permissions by default. You can elevate things if you want to; still no prompt. You can even set them to always elevate using the Compatibility tab, if needed. No rebooting required at all. Still less secure than requiring approval to elevate - apps (including malware) can simply and invisibly elevate themselves when in this configuration - but at least stuff that assumes it is already admin won't work.
The real kicker is below, though...
Iceberger said:
What you do to get the Metro apps "magically" start is absolutely no magic. You turn UAC back on.
To salve this problem, and yet keep UAC disabled, make sure EnableLUA is still "0"
Click to expand...
Click to collapse
Emphasis on "appear" above. To somebody unfamiliar with Windows, you sound like you know what you're doing, but that secpol switch you flip (the one called "Run all Administrators...")? That's the master key for UAC. You just went through an excessively complicated set of steps to turn UAC on in the least intrusive manner, when all it took was changing the one policy I listed above.
GoodDayToDie said:
Your approach is overly complex, and doesn't actually do what you think it does.
It deeply disturbs me that people like you exist, and use the Internet. You *appear* competent in the rest of your post, and yet say things like this... Running as root/Admin was known to be a bad idea 20 years ago. Do you think antivirus will protect you when somebody uses a 0-day to turn your PC into a spam-spewing, DDoS-ing zombie in a botnet?
If you absolutely must avoid seeing UAC prompts, but still want at least a sliver of security, take the following approach instead:
1: Enable UAC if you previously disabled it (set it to whatever level you want except "never prompt" which actually turns it off entirely; we're about to override the prompting).
2. secpol.msc (you can just type it into Start, incidentally).
3. Local Policies -> Security Options (like you said).
4. Open the "Behavior of the elevation prompt for administrators in Admin Approval Mode" item.
5. Select "Elevate without prompting" and hit OK.
Behold, Metro apps work but software still runs with limited permissions by default. You can elevate things if you want to; still no prompt. You can even set them to always elevate using the Compatibility tab, if needed. No rebooting required at all. Still less secure than requiring approval to elevate - apps (including malware) can simply and invisibly elevate themselves when in this configuration - but at least stuff that assumes it is already admin won't work.
The real kicker is below, though...
Emphasis on "appear" above. To somebody unfamiliar with Windows, you sound like you know what you're doing, but that secpol switch you flip (the one called "Run all Administrators...")? That's the master key for UAC. You just went through an excessively complicated set of steps to turn UAC on in the least intrusive manner, when all it took was changing the one policy I listed above.
Click to expand...
Click to collapse
Let me start with this
"It deeply disturbs me that people like you exist" wtf are you, god?
Is my post so difficult to understand? guess for you it does, you suggest I want UAC on, No, I want it off, out, disabled. clear?
To secure Windows I use other 3rd party programs (that work) to do the job. UAC is just as annoying as you.
No I'm not a god, but I am a computer security professional, as well as a volunteer tech support provider. People who make claims such as the one you did above make my job a lot harder, and are responsible for a lot of harm in the world. I hold MS partially responsible for this, as it was their stupidity in making the first account created an Admin by default which led people down this path (well, that and making an OS without user permissions at all) but at least they're trying to correct those past mistakes (discontinuing Win9x for the latter and adding UAC for the former). I do not appreciate (and will call out) people trying to revert this progress!
Your post is logically inconsistent. You insist that you want UAC off, then you go and enable *THE* security policy that that turns it on again. I didn't suggest that you "want" it on at all; I merely stated that you are so unfamiliar with how Windows works that you turned it on yourself. Apparently, you also have trouble with reading comprehension.
Perhaps you are confused about the difference between UAC (the entire feature that is a component of the Windows NT 6.x security system, and includes split tokens, Admin Approval Mode, and elevation prompts, among other things) and the particular sub-component that is the elevation prompts caused by Admin Approval Mode being configured to require approval before granting a full-security token? I can understand (although I do not agree with) the desire to modify this configuration. That is why I provided the steps to do so. Do not confuse them (or what you yourself did) with disabling UAC as a whole, however!
I'd *love* to hear of a third-party program that "works" to secure a Windows machine running as Admin against zero-day threats. Really, I would. You could write a bloody PhD dissertation out of such a piece of software, because that's currently believed to be literally impossible. Windows RT can't do it, AppLocker can't do it, and you can be quite sure that third parties can't do it, not and leave anything that can still be called "Windows" behind.
Even running as a non-Admin isn't going to fully secure the machine; where a zero-day in a user process won't be able to compromise the machine by itself, it could still do quite a bit of harm, and if there's a second vulnerability providing EoP from user to admin or kernel, or if the zero-day is in a high-privilege process already, then you're screwed. There's *still* no software, third-party or otherwise, that will protect you against such things though. The best you can do is defense in depth. In order of increasing (low to high) importance:
1. use multiple firewalls (such as a hardware firewall)
2. use frequently-updated anti-virus (ranked low because it's an inherently reactive defense, not a proactive one)
3. use an OS with strong exploit mitigations (pretty much anything since XP, though they keep getting better)
4. avoid monoculture (if there are multiple equally secure options, it's best to use the least-used one... but be aware that the lesser-used options are not always secure even if they get exploited less frequently)
5. patch regularly and promptly
6. limit your attack surface (disable features and plugins you don't need, block ads, etc.)
7. don't run as Admin
8. use sandboxed applications (on Windows, this requires not running as full Admin).
Items 7 and 8 are part of a core tenet of security, the principle of least privilege. It has been applied to computer security for decades (ever hear of a system called MULTICS? It was all about this, with eight different hardware-enforced levels of privilege. Modern PCs have four such levels, and most OSes only use two of them). It applies in the real world as well; you may be familiar with the concept of "need to know"? Assume everything *could* act maliciously, and limit the damage it could cause if it does.
There are more items which I could add to the list to provide even greater security, such as using virtualization for untrusted software (basically a bigger sandbox), or air-gapping vital systems, or so on. That's beyond the scope of what most people can reasonably be expected to do with a personal computing device, though. Also, note that this isn't a "if you do X, you don't have to do X-1" list; running AV is still a good idea, even though the actual degree of protection provided is low.
Also, that all is for protection against attacks which don't require the user doing something stupid (except for turning off the protection...). For defenses against things like Trojans, AV becomes more important, but the really critical element there is simply "be smart about security" (which sadly is apparently beyond most people, given the stuff I see every day).
This is getting off-topic; the methods required to achieve the stated goal have been given.
GoodDayToDie said:
No I'm not a god, but I am a computer security professional, as well as a volunteer tech support provider.
Click to expand...
Click to collapse
people volunteer to do tech support? never thought anyone would do that willingly...
also, have a question for you. what is your opinion on the built in windows 8 antivirus? i know if there is an exploit, it is much more likely to be exploited than in other AVs, but as far as known virus/trojan protection, does it do as good of a job as other, less free antiviruses?
Wait wait... I have UAC disabled and I didn't edit any registry or policy settings, and apps work fine for me. What's this about them not working?

How to unlock metro personlization without activating?

Is anybody know a way to unlock personlization in windows 8 without activating?
Lasanda said:
Is anybody know a way to unlock personlization in windows 8 without activating?
Click to expand...
Click to collapse
there is in app in the development and hacking windows 8 forum on xda... Its called ModernBackChanger
Just activate using a KMS activation.
Or you know, stop stealing software.
You unlock it by going to your closest best buy on October 26 and buying it
Sent from my SPH-D710 using xda app-developers app
ShinigamiH4ck3r said:
You unlock it by going to your closest best buy on October 26 and buying it
Sent from my SPH-D710 using xda app-developers app
Click to expand...
Click to collapse
Lmao
Sent from my primoc using xda app-developers app
redviper666 said:
Or you know, stop stealing software.
Click to expand...
Click to collapse
hacking is stealing now?
ohgood said:
hacking is stealing now?
Click to expand...
Click to collapse
I think the difference here is that if you actually purchase Windows 8 and activate it properly (which happens to be something you can do when you purchase a copy of Windows 8), that you don't need to "hack" the operating system to change the background.
So in this particular scenario, if you can't change the background on a copy of Windows 8 you are running, you either have not legitimately purchased a copy of Windows 8 (which is probably why you can't activate your copy and thus customize your background), or you are using a trial of some sort.
I'm gonna guess (and I think most people will also make this guess) that 95% of people that are looking to hack their copy of Windows 8 to change the background probably haven't gotten their copy through a legal method. Quite similar to people looking to remove the "Evaluation copy" watermark commonly found on unactivated or stolen copies of Windows.
Best way now is buying key
prjkthack said:
I think the difference here is that if you actually purchase Windows 8 and activate it properly (which happens to be something you can do when you purchase a copy of Windows 8), that you don't need to "hack" the operating system to change the background.
So in this particular scenario, if you can't change the background on a copy of Windows 8 you are running, you either have not legitimately purchased a copy of Windows 8 (which is probably why you can't activate your copy and thus customize your background), or you are using a trial of some sort.
I'm gonna guess (and I think most people will also make this guess) that 95% of people that are looking to hack their copy of Windows 8 to change the background probably haven't gotten their copy through a legal method. Quite similar to people looking to remove the "Evaluation copy" watermark commonly found on unactivated or stolen copies of Windows.
Click to expand...
Click to collapse
assumptions, and guessing. he may, I may, or you may have stolen a piece of gum in the third grade. that's about as relative at this point as the assumption that he's "stolen" something today.
I'm just curious what mechanisms are used to prevent customization, and why.
ohgood said:
assumptions, and guessing. he may, I may, or you may have stolen a piece of gum in the third grade. that's about as relative at this point as the assumption that he's "stolen" something today.
I'm just curious what mechanisms are used to prevent customization, and why.
Click to expand...
Click to collapse
i cant say the how, but they why is because microsoft isnt going to make it easy for you to get the full benefits of their os without paying for it. Even if its something as small as not being able to change the background. Obviously enough people care about that small thing that they might just go out and buy a copy. I doubt they will go out and buy it, but its a nice thought
I could tell you how to unlock the stuff BUT I may get banned for it.
He's not asking how to activate the software, he's not asking how to trick it into thinking it's activated, he's asking how to enable a feature so that he can customize his background because he hasn't purchased a key yet... Maybe he wants to explore all of the features of the OS before purchasing it... Whatever his reason is, there's nothing illegal about enabling desktop personalization on a non-activated copy of Windows 8. Just like there's nothing illegal about enabling the Aero Lite theme on an activated copy of Windows 8. Or any other tweak or hack that we come up with to do something that we're not supposed be able to do.
Anyways, I think the guy who made the stealing software comment was speaking to the person who suggested activation over KMS server, not the guy who posed the question... So, we can stop now.
xuninc said:
He's not asking how to activate the software, he's not asking how to trick it into thinking it's activated, he's asking how to enable a feature so that he can customize his background because he hasn't purchased a key yet... Maybe he wants to explore all of the features of the OS before purchasing it... Whatever his reason is, there's nothing illegal about enabling desktop personalization on a non-activated copy of Windows 8. Just like there's nothing illegal about enabling the Aero Lite theme on an activated copy of Windows 8. Or any other tweak or hack that we come up with to do something that we're not supposed be able to do.
Anyways, I think the guy who made the stealing software comment was speaking to the person who suggested activation over KMS server, not the guy who posed the question... So, we can stop now.
Click to expand...
Click to collapse
i would understand if the wallpaper feature was a major feature, but it isnt. Pretty much everyother feature is ready and working in the trial, and chances are if you dont like windows 8 without the wallpaper, your opinion wouldn't change if your able to change it. So if you like windows 8, just buy a key, most people qualify for the cheaper upgrade price anyway, so its not really that expensive. Plus if you actually buy it you dont ever have to worry about your copy becoming non genuine and shutting down, or getting an update that shuts you dont, like the antipiracy update in windows 7
xuninc said:
He's not asking how to activate the software, he's not asking how to trick it into thinking it's activated, he's asking how to enable a feature so that he can customize his background because he hasn't purchased a key yet... Maybe he wants to explore all of the features of the OS before purchasing it... Whatever his reason is, there's nothing illegal about enabling desktop personalization on a non-activated copy of Windows 8. Just like there's nothing illegal about enabling the Aero Lite theme on an activated copy of Windows 8. Or any other tweak or hack that we come up with to do something that we're not supposed be able to do.
Click to expand...
Click to collapse
Except that this particular part of this "personalization" feature is completely dependent on the successful purchase and/or activation of Windows 8. Therefore, in order to personalize the background, you do have to trick Windows into thinking that it has been legally purchased and activated.
This is not a uxtheme patch or something, this is a benefit that you get once you activate Windows 8. Any circumvention of that functionality is clearly not an intended function of a non-activated copy of Windows, and therefore anything you do to get around this is probably just as illegal as stealing Windows itself.
Now we can stop.
thread closed. we don't condone trying to bypass paid function.
prjkthack said:
Except that this particular part of this "personalization" feature is completely dependent on the successful purchase and/or activation of Windows 8. Therefore, in order to personalize the background, you do have to trick Windows into thinking that it has been legally purchased and activated.
This is not a uxtheme patch or something, this is a benefit that you get once you activate Windows 8. Any circumvention of that functionality is clearly not an intended function of a non-activated copy of Windows, and therefore anything you do to get around this is probably just as illegal as stealing Windows itself.
Now we can stop.
Click to expand...
Click to collapse
good lord man, hacking is not stealing! read it again!!!

[Q] High Wifi Usage - Kaspersky Mobile Internet Security

Hello,
Apologies if this is in the wrong forum - please feel free to remove it.
I installed Kaspersky on my device yesterday at approximately 1100 GMT.
Since then there has been a huge amount of data activity originating from the application. Approximately 430 MB worth of background data has been used...
What exactly is this?
At the end of yesterday it was approximately 230MB however, at the end of today it has now nearly doubled to 430MB.
I am trying to scratch my head and wondering what is going on here?
Please find attached screenshots displaying data usage...
Process for installation -
1) I used Android Chrome to navigate to kaspersky.com/downloads/product...ile_for_android
2) Because I downloaded the APK direct from the site I was asked to allow downloads and installations from "Unknown Sources" - I didn't think this was a problem as it is Kaspersky after all....
3) Downloaded and entered my serial and that was it....
Any help or assistance would really be greatly appreciated.
With thanks,
AD
Andyroid232 said:
Hello,
Apologies if this is in the wrong forum - please feel free to remove it.
I installed Kaspersky on my device yesterday at approximately 1100 GMT.
Since then there has been a huge amount of data activity originating from the application. Approximately 430 MB worth of background data has been used...
What exactly is this?
At the end of yesterday it was approximately 230MB however, at the end of today it has now nearly doubled to 430MB.
I am trying to scratch my head and wondering what is going on here?
Please find attached screenshots displaying data usage...
Process for installation -
1) I used Android Chrome to navigate to kaspersky.com/downloads/product...ile_for_android
2) Because I downloaded the APK direct from the site I was asked to allow downloads and installations from "Unknown Sources" - I didn't think this was a problem as it is Kaspersky after all....
3) Downloaded and entered my serial and that was it....
Any help or assistance would really be greatly appreciated.
With thanks,
AD
Click to expand...
Click to collapse
you dont need an anti-virus for android, uninstall it. it was probably downloading/uploading data/libs to check for any malware/adware/viruses. besides, its wifi data usage, does it matter, or is your wifi limited?
simms22 said:
you dont need an anti-virus for android, uninstall it. it was probably downloading/uploading data/libs to check for any malware/adware/viruses. besides, its wifi data usage, does it matter, or is your wifi limited?
Click to expand...
Click to collapse
But I always hear about malware on Android? Why would you say it isn't required? I'm quite interested to know....
Andyroid232 said:
But I always hear about malware on Android? Why would you say it isn't required? I'm quite interested to know....
Click to expand...
Click to collapse
Bumpity bump
Anybody here?
Andyroid232 said:
But I always hear about malware on Android? Why would you say it isn't required? I'm quite interested to know....
Click to expand...
Click to collapse
I've never heard of anyone getting malware on their Android device. Not to say it doesn't exist, but I'm pretty sure it's rare. You can easily monitor what apps are using what resources with the various Android menus. If something is suspicious, you can easily uninstall it. Worst-case scenario, you can just reflash your ROM and since you have a Nexus device, it's pretty simple to do. I would uninstall Kaspersky.

Background data from sbrowser caused me a bill of $15k

Hello guys,
I am searching for help to investigate the "internet" app data usage that used background data while I was on roaming, causing a bill of $15K.
From the data usage I can see that the app that consumed was "internet" over background data, it points to the app "com.sec.android.app.sbrowser".
I have rooted the phone and created a full backup of the phone, and I am now trying to dig into the files to see what kind of site/data was used to pull this 4GB of data on the background.
I was not able to find any relevant file under /data/data/com.sec.android.app.sbrowser
I was also looking into /data/system/netstats
I have a couple of files but I cannot match them to nothing:
dev.1436964562021-1438262284253
dev.1438323941223-1439644944250
dev.1439711478805-1441041568238
dev.1441041681919-1442338775052
dev.1442341207969-
uid.1436965462539-1438262284253
uid.1438323980657-1439644944250
uid.1439711478805-1441041568238
uid.1441042703197-1442338775052
uid.1442341207969-
uid_tag.1441047111561-1441726915830
uid_tag.1441728252039-1442336958585
uid_tag.1442337051894-1442769303730
uid_tag.1442784626099-
xt.1436964562021-1438262284253
xt.1438323941223-1439644944250
xt.1439711478805-1441041568238
xt.1441041681919-1442338775052
xt.1442341207969-
Can someone please guide me what files would contain the traffic info? I am desperate to identify the root cause so that I can provide to the provider.
Thank you a lot in advance.
$15k ?
I'd be telling the provider to do one, something is wrong their end, no way a browser would cause that much unless your phone was infected with a premium rate txt or call virus
*Detection* said:
$15k ?
I'd be telling the provider to do one, something is wrong their end, no way a browser would cause that much unless your phone was infected with a premium rate txt or call virus
Click to expand...
Click to collapse
Exactly, but they don't have any forensic team.
When I do file uid.1442341207969-
I can see uid.1442341207969-: GLS_BINARY_MSB_FIRST but I don't know how to open this files.
Anyone has an idea in how to open these files?

Categories

Resources