New Update CyberLock 8.0

Digmor Crusher

Level 26
Verified
Top Poster
Well-known
Jan 27, 2018
1,591
@Digmor Crusher, I looked at the code and the change I had made was already corrected. Can you please email me your DeveloperLog.log? BTW, does this happen only when you restart your computer, or does it also happen if you exit CyberLock, and then start it again, without rebooting the computer?

BTW, I am pretty much finished updating all of the apps, and I have always wanted to explore the possibility of implementing a LLM into VoodooAi, so that is what I have been working on. It looks like it might turn into a massive project (in order to do it correctly), but I think it might be pretty cool. I should know in a few days if it will be worth implementing or not. Then again, with the progress they are making with LLM's, even if it is not viable at this point, it should be soon... and we will be ready for it ;).
Yes, it happens when I restart and also when I exit CL and start it again.
I turned off the setting to synchronize my settings to the cloud and it seems to have fixed it. Still need logs?
 
Sep 21, 2022
71
:eek: @Allego ,

I didn't notice this cloud button running back to on after we boot ? so it means he has an authorization to exploit the API of Microsoft security essential, i see....

of course Microsoft Azure server,..... where was my mind stocked...,

This is unbelievable !! the API of MS security essential is not public (the key is private - under contract)

and now he want to put a LLM ? what for ? this is already an automated security app

we, users consumers need answers,

the back-end app is really dangerous in the hands of somebody unetical !

hope the changes will come soon Mister Dan But.....

clock is running.

:rolleyes:
 

danb

From VoodooShield
Thread author
Verified
Top Poster
Developer
Well-known
May 31, 2017
1,884
:eek: @Allego ,

I didn't notice this cloud button running back to on after we boot ? so it means he has an authorization to exploit the API of Microsoft security essential, i see....

of course Microsoft Azure server,..... where was my mind stocked...,

This is unbelievable !! the API of MS security essential is not public (the key is private - under contract)

and now he want to put a LLM ? what for ? this is already an automated security app

we, users consumers need answers,

the back-end app is really dangerous in the hands of somebody unetical !

hope the changes will come soon Mister Dan But.....

clock is running.

:rolleyes:
Stop stalking me.
 
Last edited by a moderator:
Sep 21, 2022
71
You are a very stubborn person Mister D. - and i will con damn you legally, because your app touched entirely in my device with no authorization (no consent)
and you tried to keep the logs without my authorization sending (from a query network before the installation has finished and before i execute the app for the first time manually).

to inform the public about his accusation on me :

I don't know who is Jeff, don't worry we shall soon see if i am really this JT he pretend i am,cause i am born in Europe not the America content like him.
I am just waiting until the 20/06/2025 included, to send my report signed to authorities, i warned him already (30 DAYS since the 21/05/2025).

for the reminders as a proof, now he continue to defame me & because the moderators made invisible my legal notice :

Exif-Tool :

File Name : defamation 2 of 2.png
Directory : C:/Users/*****/Desktop/MalwareTips
File Size : 85 kB
File Modification Date/Time : 2025:05:21 11:41:53+02:00
File Access Date/Time : 2025:05:22 08:48:35+02:00
File Creation Date/Time : 2025:05:21 11:41:52+02:00

case open again : for the moderators, don't touch in any way to my account, thanks.
 

Attachments

  • REPORT #156 #159.txt
    195 bytes · Views: 58
Last edited by a moderator:
Sep 21, 2022
71
@Fan-of-spyshelter you should probably avoid any kind of 3rd party protections and use Windows Application Control as default-deny, then you won't have to worry about privacy "invasion", your kernel, or your machine.You can figure it out.🤘
As you suggest a system of denial i do not consent, I respond with a system of rights from here — as completed by the Article 30 from the U.D.H.R

From Article(s)ThemeCause
Art. 1Dignity and EqualityThe right to choose digital tools from transparency (for the people that i represent)
Art. 2Non-DiscriminationNo one can impose in silence, a tech-based discrimination or marginalize, digital choices.
Art. 3Personal Freedomfreedom includes how I interact authentically with the digital world.
Art. 19Freedom of Expressionright to access, receive, and share information via modern tools with who i want, inside a public forum.
Art. 21Participation in Public Lifeable to access the platforms where civic debate and public dialogue happen on the "World Wide Web"
Art. 27(2)Scientific & Cultural ParticipationUsing digital technology is part of engaging in today’s world (from the non interception of the privacy life).
Art. 29(2)Limits Must Be Legal & Proportional"Security" cannot override those basics above rights. Limits must be lawful, necessary, and justified.
 

RSE9

New Member
Dec 3, 2020
3
As you suggest a system of denial i do not consent, I respond with a system of rights from here — as completed by the Article 30 from the U.D.H.R

From Article(s)ThemeCause
Art. 1Dignity and EqualityThe right to choose digital tools from transparency (for the people that i represent)
Art. 2Non-DiscriminationNo one can impose in silence, a tech-based discrimination or marginalize, digital choices.
Art. 3Personal Freedomfreedom includes how I interact authentically with the digital world.
Art. 19Freedom of Expressionright to access, receive, and share information via modern tools with who i want, inside a public forum.
Art. 21Participation in Public Lifeable to access the platforms where civic debate and public dialogue happen on the "World Wide Web"
Art. 27(2)Scientific & Cultural ParticipationUsing digital technology is part of engaging in today’s world (from the non interception of the privacy life).
Art. 29(2)Limits Must Be Legal & Proportional"Security" cannot override those basics above rights. Limits must be lawful, necessary, and justified.
Care to elaborate what happened? Did your system or files get compromised?
 
  • Like
Reactions: danb and oldschool
Sep 21, 2022
71
Care to elaborate what happened? Did your system or files get compromised?
@RSE9 :
if you are a little aware about cyber military defense from a kind of expression of liberty that was describe above,

understand that, is not about being compromised directly, user 89910,
it's about to have the possibility for somebody like me (a alerted consumer with responsibilities) to communicate with another lambda consumer on the world wide web, from sharing some information to my known insecure collaborators who are using any third party security software they do not the same work as i do daily, as a watcher.

why it matter ?
for example from this security solution (that i was just saying in the beginning there is a big bug and reply to me : "that the owner don't understand what i said" ),

has inside a trust security API key from MICROSOFT to unlock the windows kernel OS (from a driver host svc) and command it without any consent of users, in total silence.

&

because we, consumers :

don't have a trusted installer control only the super administrator,
are only the owners of the license of the OS, not the OS it self,

- with a remote functionality (from silent domain names systems queries), every software like this can be used for what we call snooping,



We don't want that our communication can be snooped in any sort of queries, with the people with who we are speaking with, because we have no right to say to them, you should use this...

Even our queries are just in a database with no eyes drops officially, they are always eyes drop, this is how we make unfair business !

protocol n°1 :
*don't let somebody snoop, to make the business fair.

protocol n°2 :
*every legitimate security software need to have a secure protocol to transmit the data
inside a database with no user interaction from the backed side (duty of the developer)
and who can only be transferable from the client side (right for the client)

protocol n°3 :
*if you want to distribute your software for commercial purpose
use a root signed certificate inside all the sub-software, to distribute your software globally

consequences for the future :

"What I’m trying to say for every one who is reading me, is that even though a system hasn’t been directly compromised, it can still be vulnerable due to the negligence of other users I communicate with. If these users don’t have the same security practices as I do, it can expose our communication to risks, even if I’m taking all the necessary steps to secure my own data. For example, if someone uses security tools that aren’t as reliable, or if there’s a vulnerability in their system, it can affect the integrity of our communication and allow malicious actors to intercept the information. It’s not just about individual protection, but also about how our collective actions regarding security can impact the privacy of everyone involved, and we all want trust in our business for legitimate interest that express our personalities, that's all"
 
  • Thanks
Reactions: Dave Russo

JasonUK

Level 5
Apr 14, 2020
243
Jeez if you're so capable and knowledgeable why didn't you just run the new software, particularly as it's relatively niche security software, in a safe environment to ensure it met your standards first? It would probably have saved you a lot of time, energy and stress and it would have saved us the eye-strain having to wade through your posts :)
 

Oldie1950

Level 8
Verified
Well-known
Mar 30, 2022
351
Jeez if you're so capable and knowledgeable why didn't you just run the new software, particularly as it's relatively niche security software, in a safe environment to ensure it met your standards first? It would probably have saved you a lot of time, energy and stress and it would have saved us the eye-strain having to wade through your posts :)
He just wants to annoy Dan, no matter what the reason.
 

n8chavez

Level 22
Well-known
Feb 26, 2021
1,108
I've been having extreme slowdown at boot whenever Cyberlock is active. Certain things like my VPN launching and autoconnecting, or simple apps autolaunching can often take 10+ minutes. During that time my system is completely bogged down, as though I was running an old Tandy system; the task manager refuses to open, as does explorer.exe. After that amount of time everything seems fine. I'm pretty sure this issue is related to Cyberlock for two reasons, when Cyberlock does autolaunch at startup and I manually exit it those issues are immediately gone and also if Cyberlock is not autolaunched I do not have any of those issues. I never had any of these issues prior to version 8.00, and I'm not exactly sure what changed to have caused them. Anyone else have anything similar to this?
 

danb

From VoodooShield
Thread author
Verified
Top Poster
Developer
Well-known
May 31, 2017
1,884
I've been having extreme slowdown at boot whenever Cyberlock is active. Certain things like my VPN launching and autoconnecting, or simple apps autolaunching can often take 10+ minutes. During that time my system is completely bogged down, as though I was running an old Tandy system; the task manager refuses to open, as does explorer.exe. After that amount of time everything seems fine. I'm pretty sure this issue is related to Cyberlock for two reasons, when Cyberlock does autolaunch at startup and I manually exit it those issues are immediately gone and also if Cyberlock is not autolaunched I do not have any of those issues. I never had any of these issues prior to version 8.00, and I'm not exactly sure what changed to have caused them. Anyone else have anything similar to this?
Thank you for letting me know, can you please send me your log: C:\ProgramData\CyberLock\DeveloperLog.log
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top