¿ªÔÆÌåÓý

ctrl + shift + ? for shortcuts
© 2025 Groups.io
Date

Scanning Commander memories banks

 

Hi,

I'v set up several memory banks with different club frequencies, the ten positions per bank nicely fit one QRG for each band from 160 - 6 m :-)

Now I want to scan just three or four of these QRG's, depending on time of day.

Any easy way of just using these three/four QRG's ???:-\

73,

--
Herman van den Berg / PA3BFH
Hoofdweg 132
1433 JX kudelstaart
Tel 0297 322011


Windows Defender

 

I have added an entry for Windows Defender to the list of applications that can interfere with DXLab applications:

<>

The new entry provides links to Microsoft's instructions for declaring an application to be "safe" by defining an exclusion, and to
Microsoft's instructions for restoring an erroneously-quarantined application.

73,

Dave, AA6YQ


Re: add Contest To Contest_ID

ART W2NRA
 

Thanks, Dave,

I knew the ¡°but¡± part. ?I¡¯ve been importing lots of N1NN Logger+ contests and using names that aren¡¯t in the master contest_id list. ?I thought it¡¯d be easier to filter by contest_id under the Adv window in Contest Filter, but there¡¯s lots of alternate way to do that in DXKeeper.

73, Art W2NRA
CWOPS #1955
SKCC #11634Sx6


Re: DXKeeper and FT8 Should have been Spot Collector

 

+ AA6YQ comments below

See /g/DXLab/message/187814

+ Thanks for finding that message, Iain! I have created a "Getting Started" article with its contents:

<>

73,

Dave, AA6YQ


Re: add Contest To Contest_ID

 

+ AA6YQ comments below

How do I add a Contest to the Contest_ID list in DXlab DXKeeper. I think I¡¯ve done this before but I don¡¯t remember how and I can¡¯t find it in the help files.

+ The "Contest ID" selector on the Contest tab of DXKeeper's Configuration window is pre-populated with the contest IDs defined in ADIF:

<>

+ Users cannot alter this set of pre-populated contest IDs, but you can type anything you like into the "Contest ID" selector.

73,

Dave, AA6YQ


add Contest To Contest_ID

ART W2NRA
 

How do I add a Contest to the Contest_ID list in DXlab DXKeeper. ?I think I¡¯ve done this before but I don¡¯t remember how and I can¡¯t find it in the help files.

73 Art W2NRA
CWOPS 1955


Disregard Test only

 

Testing my change to groups.io
73, Pete


Re: DXKeeper and FT8 Should have been Spot Collector

 

See /g/DXLab/message/187814

73,

~iain / N6ML

On Mon, Apr 13, 2020 at 5:04 AM Tony Dixon G4CJC <tdxio@...> wrote:

Sorry I meant Spot Collector Just checked EI7MRE is showing the same.
Tony G4CJC


Re: My Defender past 3 days

 

Correction.? I went back and looked in Defender and noticed that I had
DXLab file listed instead of
C:\DXLab folder. My fault.? Hopefully that will take care of it.
Sorry for any confusion.
73, Pete, N4KW

On 4/13/2020 10:49 AM, Pete N4KW wrote:
Apr 3 no Commander, but after reading Joe's instructions I was able to
restore Commander.
Apr 3 later same day I lost DXK, Joe's instructions again bailed me out.
Apr7 I believe it was, I again lost DXK, no icon on my desktop etc. This
time I used Joe's procedure to
???????? prevent Defender from messing with DXLab Suite.

Apr 13 this morning open up no icon for DXK and opened up defender and
see that DXK is quarantined.
??????????? So back to Joe's instruction and DXK is back along with the
desk top icon.

I've never seen this before, and fear that there is something else
running around or I should say "it has me running around"

73, Pete, N4KW




My Defender past 3 days

 

Apr 3 no Commander, but after reading Joe's instructions I was able to
restore Commander.
Apr 3 later same day I lost DXK, Joe's instructions again bailed me out.
Apr7 I believe it was, I again lost DXK, no icon on my desktop etc. This
time I used Joe's procedure to
???????? prevent Defender from messing with DXLab Suite.

Apr 13 this morning open up no icon for DXK and opened up defender and
see that DXK is quarantined.
??????????? So back to Joe's instruction and DXK is back along with the
desk top icon.

I've never seen this before, and fear that there is something else
running around or I should say "it has me running around"

73, Pete, N4KW


Re: Fear, Uncertainty and Doubt Regarding Anti-Virus / Anti-Malware Solutions like Defender etc...

 

As I see it, it¡¯s all about the appetite of risk. If one is comfortable with A/V solutions that have signatures written ¡°In the Wild¡± then that is your decision. The same criteria with knowing the pedigree of the software at hand (e.g. who wrote it, where is it maintained and so on) applies.

If the acceptance of risk is low, then independent research on the testing by a certified lab would be in order (e.g. Common Criteria and the Target of Evaluation). In that same light, does one depend on only one security solution or does one apply a Defense in Depth approach? Leaving one¡¯s unhardened platform facing the Internet without basic hardening is assuming a higher level of risk. There are plenty of A/V solutions that do provide quality service, even those that employ a sandbox construct, that will serve your target level of risk. BLUF, you get what you pay for.

Basic cyber hygiene such as turning off unneeded protocols (e.g. NETBIOS and SMB), Backing up, Turning on Audit logging for Failed Logins and setting a timeout value for Failed Logins should be considered.

I do not know of one software developer that does not want a successful ¡°Chain of Custody¡± ensuring the software at hand goes from the development, gets distributed and performs as expected at the user¡¯s platform. The is especially difficult in a fast-moving agile development process.

Software developers are not responsible for the user¡¯s installation of the latest wiz-bang applications that may have uncertain pedigree. Open Source software is a wonderful thing, but it must have a user conscience state involved such as the PC ownership/responsibility thread that was recently discussed.

As for me, I am not perfect by any means as there is a residual level of risk. I believe that I do employ a DiD environment and do not depend on one A/V solution or audit oversight. Yes, there is overhead with this put that¡¯s part of the journey.

Food for thought, 73, JohnF


On Sun, Apr 12, 2020 at 11:17 PM neil_zampella <neilz@...> wrote:
Joe,

I've been using AVG for over since 2003 and have NOT had 'meltdowns' nor
have I had programs arbitrarily deleted without the program notifying me
before it did anything. ? Of course, I made sure that I had the program
settings setup to notify me before any actions are taken, so YMMV.

As far as Norton ... totally agree.

As far as Defender ... I see more issues with that program removing
executables without any advance notice than any other AV program, not
only here, but with other programs which have a small user base.

Neil, KN3ILZ

On 4/12/2020 4:50 PM, Joe Subich, W4TV wrote:
>
> I also agree with Gil.? The Windows anti-malware has given me far
> less problems than either Norton or AVG - both of which have been
> banned from my systems after resulting in major melt downs *MULTIPLE*
> times.
>
> The recent issue with Defender quarantining Commander was entirely
> my own fault for not excluding the DXLab Suite folder from Defender
> scanning.? However in my defense, I have been using Defender since
> it was introduced and this is the first false positive I have
> encountered.? As the recovery was relatively painless (as documented
> here): </g/DXLab/message/192460>, I consider this
> recent false positive to be a learning experience (and reminder to
> always exclude the folders of trusted applications like DXLab Suite
> and JtAlert).
>
> In the future, I will add the folders of "niche" applications to
> Defender's exclusions once I have evaluated them and decided to add
> them to my roster of "production" software.
>
> 73,
>
> ?? ... Joe, W4TV
>
>
> On 2020-04-12 2:34 PM, Gilbert Baron W0MN wrote:
>> I have to agree but I doubt there is an anti malware application in
>> existence that would not be susceptible to this problem and since
>> defender has only given me this one problem over the years I will
>> stick with it. Free and for the most part as effective as any
>> antivirus can be. I think not running as an admin and effective
>> backups are the real protection even though they are a real pain at
>> times.
>>
>> Outlook Laptop Gil W0MN
>> Hierro candente, batir de repente
>> 44.08226N 92.51265W EN34rb
>>
>> -----Original Message-----
>> From: [email protected] <[email protected]> On Behalf Of Dave AA6YQ
>> Sent: Sunday, April 12, 2020 13:02
>> To: [email protected]
>> Subject: Re: [DXLab] Fear, Uncertainty and Doubt Regarding Anti-Virus
>> / Anti-Malware Solutions like Defender etc...
>>
>> Regarding the lengthy post from Max NG7M appended below,
>>
>> 1. Windows is vulnerable to malware because it fails to implement
>> well-known operating system security measures; correcting this
>> architectural defect would break many existing Windows applications,
>> some of which can no longer be updated because their source code or
>> unique development tools no longer exist. Microsoft has chosen to
>> live with this defect and mitigate it with anti-malware applications,
>> which are provided by many software companies and Microsoft itself.
>>
>> 2. During Microsoft's two unsuccessful attempts to recruit me (once
>> to lead the Visual Studio organization, once to lead the Windows
>> Mobile organization), I interviewed with several senior Windows
>> developers and executives. They acknowledged that "protected folders"
>> and "User Account Control" (UAC) provide little actual security
>> value; these mechanisms were introduced to visibly demonstrate that
>> Microsoft was taking security concerns seriously. "Oh, so you want a
>> secure operating system, do you?" one of them joked.
>>
>> 3. There is no evidence that installing DXLab applications in
>>
>> c:\Program Files
>>
>> or digitally signing them would protect them from mis-identification
>> by Microsoft anti-malware applications.
>>
>> 4. Since there is no malware in any DXLab application, Microsoft
>> anti-malware applications that identify them as malware are by
>> definition defective. If you chose to use a defective anti-malware
>> application, enable it to autonomously upgrade itself, and enable it
>> to autonomously quarantine applications it considers malware, then
>> you should not be surprised when one of you applications suddenly
>> stops working.
>>
>> 5. Microsoft's "solution" to their defective anti-malware is to
>> accept submissions of executables incorrectly identified as malware
>> for reconsideration. Over the past several days, multiple attempts to
>> submit the 4.5 megabyte executable for Commander 14.5.5 stalled; the
>> Microsoft submission site was evidently over-subscribed. Last night,?
>> the submission site took less than a minute to accept Commander's
>> executable; today, the submission status shows "not malware". How
>> long it will take for this updated determination to reach deployed
>> instances of Windows Defender is anybody's guess. Will this stop the
>> next public version of Commander from being mis-identifed as malware?
>> Unknown.
>>
>> My inclination at this point is to add Microsoft anti-malware to the
>> list of applications that can interfere with DXLab applications in
>>
>> <>
>>
>> Control your computing environment, or it will control you.
>>
>> ??????? 73,
>>
>> ?????????????? Dave, AA6YQ
>>
>>
>>
>> -----Original Message-----
>> From: [email protected] [mailto:[email protected]] On Behalf Of Max NG7M
>> Sent: Sunday, April 12, 2020 11:53 AM
>> To: [email protected]
>> Subject: [DXLab] Fear, Uncertainty and Doubt Regarding Anti-Virus /
>> Anti-Malware Solutions like Defender etc...
>>
>> As we can see, the FUD (Fear, Uncertainty and Doubt) regarding Anti
>> Virus / Anti Malware solutions (MS Defender in this case) have
>> reached a new rhetorical level in regards to DXLab applications /
>> exe's. (based on the number of posts)
>>
>> First off, I'm not suggesting Dave AA6YQ change anything at this
>> point because the effort would be rather high and the migration of
>> currently installed application exe's to the proper location for a
>> modern day operating system bring a level of complexity along with
>> the change... installer changes and proper use of User Access Control
>> (UAC) would be required along with changes to the installer code used
>> by DXLab (digital signing of exe code etc...).? So I'm happy with the
>> way things are and I know that I need to exclude the directory where
>> DXLab applications are installed in my Anti Virus software.? So let
>> me make that clear, I'm not complaining or suggesting that Dave do
>> anything to address why this topic keeps coming up over and over and
>> over and over and over again. Well, other than repeating the current
>> solution and referring users to how you need to exclude the DXLab
>> installation path from your anti-virus / anti-malware solution. The
>> bitching and complaining about controls that are put in place to
>> protect you and other users in what is in effect a shared network
>> (the Internet) is rather comical at this point.
>>
>> If you want to know why DXLab executables are getting identified as
>> having problems, the problem is not Windows Defender or any other
>> anti-virus / malware solution.? Identifying Defender as the problem,
>> just exposes your ignorance around this topic. In a nut shell, the
>> problem is where the exe's (any any other executable code like dll's)
>> for DXLab are getting installed along with the fact that the exe's
>> are not digitally signed.? If you don't agree, ask a software
>> engineer who has been coding and helping release commercial Windows
>> exe based (rich client) applications for over 30 years.? And it helps
>> if the engineer you are asking has had extensive experience related
>> to using industry standard practices which are designed to help users
>> keep their computers safe. Your lack of understanding about bad
>> actors out there that are trying to exploit executable code and at
>> what OS level this code can execute, is not helpful to the
>> discussion.? Stop acting like you are a 'safe computing expert' when
>> you are not one... especially when you are disparaging solutions that
>> have been put in place to protect you and others despite your own
>> stupidity.
>>
>> So for DXLab users at this stage of the game... which I am one of
>> them and very happy with the amazing job Dave has and continues to do
>> an amazing job with this free software offering!? I'm perfectly happy
>> excluding the default directory location where DXLab exe's are
>> installed from my anti-virus software solution as an exclusion.? I'm
>> trusting Dave to not deliver exe based code that is malicious. And
>> even if it pains me so, I'm letting the DXLab installation process
>> install this executable code (that is not digitally signed) in a
>> read/write location.
>>
>> If you are happy with what you have and have excluded your DXLab
>> installation path from your anti-virus / malware solution's scans,
>> then you can stop reading now... or you probably never made it this
>> far anyway.? If you want more of the details as to what the industry
>> standard has been for decades now, keep reading.? DXLab has been
>> around so long, it may be hard for Dave to justify a big change (and
>> personal expense to digitally sign things) at this point.? I total
>> get that as I have stated above. However, when other users spew out
>> fear, uncertainty and doubt regarding this topic, they should be
>> corrected and their ignorance should be exposed.
>>
>> Solutions like Windows Defender (a darn good free solution) are
>> designed to protect you despite your, ignorance and laziness. You can
>> give someone a Twenty Dollar Bill for free and then based on their
>> ignorance, they will complain that you didn't give them two Ten
>> Dollar Bills.
>>
>> For decades now, the industry and creators of commercial operating
>> systems in use in business and at home have tried and tried to make
>> commercial and home computing safer. Linux / Unix based OS's and even
>> MS Windows (make your silly evil sounds and wiggle your fingers in
>> the air), have been trying to get software developers to locate
>> executable code in a OS level protected directory structure.? i.e.
>> for Linux it would be /bin, or /usr/bin etc... for Windows it would
>> be C:\Program Files (x86) for 32bit executables, and or C:\Program
>> Files for 64bit executables.? Constrains are put in place to protect
>> the executable code in these directories using an OS level of User
>> Access Control to keep code from executing at a 'root' level or
>> administrator level (in the case of windows) where bad / malicious
>> code could do all kinds of bad things... install key loggers to steal
>> you passwords, or execute code to encrypt all your data and hold you
>> hostage to ransomware schemes.? Or just help use your computing power
>> and network bandwidth to jump start other evil bad things without you
>> even knowing day after day and week after week.
>>
>> For the above reasons and many others not even listed, modern OS's
>> and their designers do all they can to try and get software installed
>> into protected areas of the file system and to only be run at levels
>> where other bad code can't do bad things without you knowing.? Is it
>> perfect?? nope but it's better than nothing and it's better than just
>> burying your head in the sand and turning off all the protection.
>>
>> So what is a Mother to do?? The best practices which have been in
>> place for decades now (and are not enforced with a draconian solution
>> yet) are to install executable code in protected directories like,
>> you guessed it: C:\Program Files etc... AND to locate application
>> down a path specific to data like c:\Documents\YourUserName where
>> read write access to data is based on user privilege's.?? AND in the
>> case of executable data you digitally sign your executable code with
>> a signature that can be verified by a known good certificate
>> authority. (do a google search on PKI infrastructure if you want to
>> learn more) this is what virus scanning software is looking at when
>> it scan for issues.? If the exe code of application A is properly
>> signed and in the proper directories, then it's less likely to report
>> a false positive. (yes a pretty simple description of what is going on)
>>
>> Older software that has been around for a long time gets a bit of a
>> pass on the above, but users are still required to know what is going
>> on when they trust this software.? DXLab applications fall into this
>> category.? Exclude the installation paths from virus scan's / malware
>> scans.? It's just the way it is right now, and only Dave can decide
>> if the effort and cost is worth it to revamp the install locations
>> and incur the cost of executable code signing into his build routines
>> of the VB application in question, not to mention move all the
>> read/write data to User/Document paths and deal with UAC.? The arm
>> flailing and weeping and wailing and gnashing of teeth from existing
>> users of an amazing and free application, would reach an exponential
>> level if they had to move their data around etc.... even if automated
>> in the installer.? I shudder at the flood of questions if this change
>> were made and I'm guessing Dave would fear the same thing on the
>> list here.? I certainly don't speak for Dave at all.
>>
>> An example of another amazing and free Ham related application that
>> has adopted most if not all of the above standards is N1MM Logger+.?
>> Multiple developers in this case are coding on the N1MM project. N1MM
>> Logger+ exe's are signed (see the link at the end of this post) and
>> N1MM's installer tries to get you to install the exe's down the
>> proper path in a Windows operating system.? However, as we all
>> know... you can override all of this and in effect disable all the
>> efforts to try and protect you from yourself.? But there is a cost
>> here... time, money and laborious education.? And this requires
>> dealing with a new set of questions from uninformed users.
>>
>> So, at the end of the day... DXLab users need to understand the
>> current state of how DXLab is coded and how and where it is installed
>> and understand that the exe's are not signed.? It's okay if you
>> understand that Dave clearly isn't out to deliver malicious code, but
>> DXLab, like many other older exe based applications install into a
>> directory structure that violates current best practices in the
>> software industry.? It's just the nature of the technical debt
>> incurred with an older application that has been around for a long
>> time. Again, I'm not suggesting Dave stop the train and crack this
>> nut.? We get the benefit of using DXLab which is an amazing suite of
>> applications written by one super human developer and we just need to
>> understand that the legacy nature of the installation and location of
>> the data and exe's will make it suspect for industry standard virus
>> scanning / malware scanning / bad actor detection software. Stop
>> blaming Windows and modern virus / malware scanning / detection
>> solutions and start understanding and why things were created they
>> way they are.
>>
>> In the ending of this massive diatribe of mine, executable code on a
>> modern OS needs to be installed in OS / UAC locations and the exe
>> code needs to be signed.? Data needs to be installed in OS / UAC
>> controlled locations where read/write is possible for the processes
>> that need access to this data.? And all executable code should be
>> signed with a known digital certificate that is trusted by a known
>> certificate authority so you a user knows where the code comes from
>> in the first place.? Is it all 100% fool proof?? Nope, but it's
>> better to understand how things work rather than spewing out the
>> continued FUD around this ongoing topic.
>>
>> Image showing the digital signature on the main N1MM exe
>> <>
>>
>>
>> Max NG7M
>>
>>
>>
>>
>>
>>
>>
>
>
>

--
This email has been checked for viruses by AVG.






Re: DXKeeper and FT8 Should have been Spot Collector

 

?Sorry I meant Spot Collector Just checked EI7MRE is showing the same.
Tony G4CJC


DXKeeper and FT8

 

A very odd happening that I guess was a problem with CQDX. In DXKeeper it was showing FT8 as RTTY. Spots that I sent out and by others were showing as RTTY. Anyone else notice. I have a screen snip but cannot attach it.
Tony G4CJC


Re: Fear, Uncertainty and Doubt Regarding Anti-Virus / Anti-Malware Solutions like Defender etc...

aburkefl
 

I agree with you - also agree with Gil, W0MN and, of course, with Dave!

Been using PCs since 1979 and, for many years, thought I was a lot smarter than the average bear. I was probably wrong. On the issue of PC software protection,
I was definitely wrong. When this mess began two or three weeks back, I had the same issues as many of my fellow readers. I suddenly became painfully aware
that I was one of those Dave singled out - I really had very little idea how to use my virus protection!

On Day 1 (my personal timeline) I stumbled around and managed to restore Commander. I have to conclude that was somewhat sheer luck!
On approximately Day 3, I stumbled around yet again, somehow managing to successfully restore Commander yet again.
On Day 4, Commander was yet again quarantined. Now adding insult to injury, DXKeeper was thrown into the mix.

My reaction at that point was to operate as best I could, handcuffed by the inability to run a couple of major pieces of DXLabs. Yea, right!

Several days ago I finally got off my lazy rear end, clicked on a HELP button (I'm disappointed in that too, but that's another story!)
and started learning how to use my protective software. I'm still upset about the way it works but I know understand it at least a bit better.

Thanks to Dave for all his patience.

Several years ago I bought a PC from a local "mom & pop" dealer. It came with a free virus checker. I found another virus checker of the same?
name with a "...pro" suffixed on the end of it. I purchased said software, assuming that the "pro" version (for a price) would offer better protection.

The next time I was in the store, one of the family members (whom I trust explicitly with my hardware/software) cautioned me about my choice
of virus protection. He said "...blah, blah, blah Pro is like a big dog that protects your computer. But every once in a while, the dog goes
berserk and won't let you in either!"

It appears that dog is back, but at least I think this leash will work better!

Art - N4PJ
Victimized by Windows Software but still effectively hiding from that other virus. Stay healthy guys!


Re: Fear, Uncertainty and Doubt Regarding Anti-Virus / Anti-Malware Solutions like Defender etc...

 

Hi All,
I'm using AVG free since 2003, and I never had real problems; most of them began with the lack of stability of Windows 10, and the culprit has always been the OS. Now M$ tries to force the Windows 10 users to switch to Defender, with the usual way: the KB2267602 update (Security intelligence update for Windows Defender Antivirus and other Microsoft antimalware) I downloaded in Oct.2019 disconnected AVG, letting it work for nothing, and replacing it with Defender. I had to reinstall AVG free, to inverse the situation.
I would never let my accountant being also his auditor; why let M$ control itself?
73
Franco 3A2MW


Updated eQSL AG and LoTW databases are available...

 

...via the Databases tab of DXView's Configuration window.

? ? ?73,

? ? ? ? ? ?Dave, AA6YQ


Re: Fear, Uncertainty and Doubt Regarding Anti-Virus / Anti-Malware Solutions like Defender etc...

 

Joe,

I've been using AVG for over since 2003 and have NOT had 'meltdowns' nor
have I had programs arbitrarily deleted without the program notifying me
before it did anything. ? Of course, I made sure that I had the program
settings setup to notify me before any actions are taken, so YMMV.

As far as Norton ... totally agree.

As far as Defender ... I see more issues with that program removing
executables without any advance notice than any other AV program, not
only here, but with other programs which have a small user base.

Neil, KN3ILZ

On 4/12/2020 4:50 PM, Joe Subich, W4TV wrote:

I also agree with Gil.? The Windows anti-malware has given me far
less problems than either Norton or AVG - both of which have been
banned from my systems after resulting in major melt downs *MULTIPLE*
times.

The recent issue with Defender quarantining Commander was entirely
my own fault for not excluding the DXLab Suite folder from Defender
scanning.? However in my defense, I have been using Defender since
it was introduced and this is the first false positive I have
encountered.? As the recovery was relatively painless (as documented
here): </g/DXLab/message/192460>, I consider this
recent false positive to be a learning experience (and reminder to
always exclude the folders of trusted applications like DXLab Suite
and JtAlert).

In the future, I will add the folders of "niche" applications to
Defender's exclusions once I have evaluated them and decided to add
them to my roster of "production" software.

73,

?? ... Joe, W4TV


On 2020-04-12 2:34 PM, Gilbert Baron W0MN wrote:
I have to agree but I doubt there is an anti malware application in
existence that would not be susceptible to this problem and since
defender has only given me this one problem over the years I will
stick with it. Free and for the most part as effective as any
antivirus can be. I think not running as an admin and effective
backups are the real protection even though they are a real pain at
times.

Outlook Laptop Gil W0MN
Hierro candente, batir de repente
44.08226N 92.51265W EN34rb

-----Original Message-----
From: [email protected] <[email protected]> On Behalf Of Dave AA6YQ
Sent: Sunday, April 12, 2020 13:02
To: [email protected]
Subject: Re: [DXLab] Fear, Uncertainty and Doubt Regarding Anti-Virus
/ Anti-Malware Solutions like Defender etc...

Regarding the lengthy post from Max NG7M appended below,

1. Windows is vulnerable to malware because it fails to implement
well-known operating system security measures; correcting this
architectural defect would break many existing Windows applications,
some of which can no longer be updated because their source code or
unique development tools no longer exist. Microsoft has chosen to
live with this defect and mitigate it with anti-malware applications,
which are provided by many software companies and Microsoft itself.

2. During Microsoft's two unsuccessful attempts to recruit me (once
to lead the Visual Studio organization, once to lead the Windows
Mobile organization), I interviewed with several senior Windows
developers and executives. They acknowledged that "protected folders"
and "User Account Control" (UAC) provide little actual security
value; these mechanisms were introduced to visibly demonstrate that
Microsoft was taking security concerns seriously. "Oh, so you want a
secure operating system, do you?" one of them joked.

3. There is no evidence that installing DXLab applications in

c:\Program Files

or digitally signing them would protect them from mis-identification
by Microsoft anti-malware applications.

4. Since there is no malware in any DXLab application, Microsoft
anti-malware applications that identify them as malware are by
definition defective. If you chose to use a defective anti-malware
application, enable it to autonomously upgrade itself, and enable it
to autonomously quarantine applications it considers malware, then
you should not be surprised when one of you applications suddenly
stops working.

5. Microsoft's "solution" to their defective anti-malware is to
accept submissions of executables incorrectly identified as malware
for reconsideration. Over the past several days, multiple attempts to
submit the 4.5 megabyte executable for Commander 14.5.5 stalled; the
Microsoft submission site was evidently over-subscribed. Last night,?
the submission site took less than a minute to accept Commander's
executable; today, the submission status shows "not malware". How
long it will take for this updated determination to reach deployed
instances of Windows Defender is anybody's guess. Will this stop the
next public version of Commander from being mis-identifed as malware?
Unknown.

My inclination at this point is to add Microsoft anti-malware to the
list of applications that can interfere with DXLab applications in

<>

Control your computing environment, or it will control you.

??????? 73,

?????????????? Dave, AA6YQ



-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of Max NG7M
Sent: Sunday, April 12, 2020 11:53 AM
To: [email protected]
Subject: [DXLab] Fear, Uncertainty and Doubt Regarding Anti-Virus /
Anti-Malware Solutions like Defender etc...

As we can see, the FUD (Fear, Uncertainty and Doubt) regarding Anti
Virus / Anti Malware solutions (MS Defender in this case) have
reached a new rhetorical level in regards to DXLab applications /
exe's. (based on the number of posts)

First off, I'm not suggesting Dave AA6YQ change anything at this
point because the effort would be rather high and the migration of
currently installed application exe's to the proper location for a
modern day operating system bring a level of complexity along with
the change... installer changes and proper use of User Access Control
(UAC) would be required along with changes to the installer code used
by DXLab (digital signing of exe code etc...).? So I'm happy with the
way things are and I know that I need to exclude the directory where
DXLab applications are installed in my Anti Virus software.? So let
me make that clear, I'm not complaining or suggesting that Dave do
anything to address why this topic keeps coming up over and over and
over and over and over again. Well, other than repeating the current
solution and referring users to how you need to exclude the DXLab
installation path from your anti-virus / anti-malware solution. The
bitching and complaining about controls that are put in place to
protect you and other users in what is in effect a shared network
(the Internet) is rather comical at this point.

If you want to know why DXLab executables are getting identified as
having problems, the problem is not Windows Defender or any other
anti-virus / malware solution.? Identifying Defender as the problem,
just exposes your ignorance around this topic. In a nut shell, the
problem is where the exe's (any any other executable code like dll's)
for DXLab are getting installed along with the fact that the exe's
are not digitally signed.? If you don't agree, ask a software
engineer who has been coding and helping release commercial Windows
exe based (rich client) applications for over 30 years.? And it helps
if the engineer you are asking has had extensive experience related
to using industry standard practices which are designed to help users
keep their computers safe. Your lack of understanding about bad
actors out there that are trying to exploit executable code and at
what OS level this code can execute, is not helpful to the
discussion.? Stop acting like you are a 'safe computing expert' when
you are not one... especially when you are disparaging solutions that
have been put in place to protect you and others despite your own
stupidity.

So for DXLab users at this stage of the game... which I am one of
them and very happy with the amazing job Dave has and continues to do
an amazing job with this free software offering!? I'm perfectly happy
excluding the default directory location where DXLab exe's are
installed from my anti-virus software solution as an exclusion.? I'm
trusting Dave to not deliver exe based code that is malicious. And
even if it pains me so, I'm letting the DXLab installation process
install this executable code (that is not digitally signed) in a
read/write location.

If you are happy with what you have and have excluded your DXLab
installation path from your anti-virus / malware solution's scans,
then you can stop reading now... or you probably never made it this
far anyway.? If you want more of the details as to what the industry
standard has been for decades now, keep reading.? DXLab has been
around so long, it may be hard for Dave to justify a big change (and
personal expense to digitally sign things) at this point.? I total
get that as I have stated above. However, when other users spew out
fear, uncertainty and doubt regarding this topic, they should be
corrected and their ignorance should be exposed.

Solutions like Windows Defender (a darn good free solution) are
designed to protect you despite your, ignorance and laziness. You can
give someone a Twenty Dollar Bill for free and then based on their
ignorance, they will complain that you didn't give them two Ten
Dollar Bills.

For decades now, the industry and creators of commercial operating
systems in use in business and at home have tried and tried to make
commercial and home computing safer. Linux / Unix based OS's and even
MS Windows (make your silly evil sounds and wiggle your fingers in
the air), have been trying to get software developers to locate
executable code in a OS level protected directory structure.? i.e.
for Linux it would be /bin, or /usr/bin etc... for Windows it would
be C:\Program Files (x86) for 32bit executables, and or C:\Program
Files for 64bit executables.? Constrains are put in place to protect
the executable code in these directories using an OS level of User
Access Control to keep code from executing at a 'root' level or
administrator level (in the case of windows) where bad / malicious
code could do all kinds of bad things... install key loggers to steal
you passwords, or execute code to encrypt all your data and hold you
hostage to ransomware schemes.? Or just help use your computing power
and network bandwidth to jump start other evil bad things without you
even knowing day after day and week after week.

For the above reasons and many others not even listed, modern OS's
and their designers do all they can to try and get software installed
into protected areas of the file system and to only be run at levels
where other bad code can't do bad things without you knowing.? Is it
perfect?? nope but it's better than nothing and it's better than just
burying your head in the sand and turning off all the protection.

So what is a Mother to do?? The best practices which have been in
place for decades now (and are not enforced with a draconian solution
yet) are to install executable code in protected directories like,
you guessed it: C:\Program Files etc... AND to locate application
down a path specific to data like c:\Documents\YourUserName where
read write access to data is based on user privilege's.?? AND in the
case of executable data you digitally sign your executable code with
a signature that can be verified by a known good certificate
authority. (do a google search on PKI infrastructure if you want to
learn more) this is what virus scanning software is looking at when
it scan for issues.? If the exe code of application A is properly
signed and in the proper directories, then it's less likely to report
a false positive. (yes a pretty simple description of what is going on)

Older software that has been around for a long time gets a bit of a
pass on the above, but users are still required to know what is going
on when they trust this software.? DXLab applications fall into this
category.? Exclude the installation paths from virus scan's / malware
scans.? It's just the way it is right now, and only Dave can decide
if the effort and cost is worth it to revamp the install locations
and incur the cost of executable code signing into his build routines
of the VB application in question, not to mention move all the
read/write data to User/Document paths and deal with UAC.? The arm
flailing and weeping and wailing and gnashing of teeth from existing
users of an amazing and free application, would reach an exponential
level if they had to move their data around etc.... even if automated
in the installer.? I shudder at the flood of questions if this change
were made and I'm guessing Dave would fear the same thing on the
groups.io list here.? I certainly don't speak for Dave at all.

An example of another amazing and free Ham related application that
has adopted most if not all of the above standards is N1MM Logger+.?
Multiple developers in this case are coding on the N1MM project. N1MM
Logger+ exe's are signed (see the link at the end of this post) and
N1MM's installer tries to get you to install the exe's down the
proper path in a Windows operating system.? However, as we all
know... you can override all of this and in effect disable all the
efforts to try and protect you from yourself.? But there is a cost
here... time, money and laborious education.? And this requires
dealing with a new set of questions from uninformed users.

So, at the end of the day... DXLab users need to understand the
current state of how DXLab is coded and how and where it is installed
and understand that the exe's are not signed.? It's okay if you
understand that Dave clearly isn't out to deliver malicious code, but
DXLab, like many other older exe based applications install into a
directory structure that violates current best practices in the
software industry.? It's just the nature of the technical debt
incurred with an older application that has been around for a long
time. Again, I'm not suggesting Dave stop the train and crack this
nut.? We get the benefit of using DXLab which is an amazing suite of
applications written by one super human developer and we just need to
understand that the legacy nature of the installation and location of
the data and exe's will make it suspect for industry standard virus
scanning / malware scanning / bad actor detection software. Stop
blaming Windows and modern virus / malware scanning / detection
solutions and start understanding and why things were created they
way they are.

In the ending of this massive diatribe of mine, executable code on a
modern OS needs to be installed in OS / UAC locations and the exe
code needs to be signed.? Data needs to be installed in OS / UAC
controlled locations where read/write is possible for the processes
that need access to this data.? And all executable code should be
signed with a known digital certificate that is trusted by a known
certificate authority so you a user knows where the code comes from
in the first place.? Is it all 100% fool proof?? Nope, but it's
better to understand how things work rather than spewing out the
continued FUD around this ongoing topic.

Image showing the digital signature on the main N1MM exe
<>


Max NG7M






--
This email has been checked for viruses by AVG.


Re: Cat control

 

Hi Nigel.

While I mainly use WSJT-X, I also use JTDX & MSHV.? I recall that happening a long time ago but not now or even recently.

Are you on the latest version of Commander as well as JTDX??
What are your settings on the radio?

73,
Carl - WC4H


Responding to Anti-virus Report than an Application is Infected

 

1. Don't panic!?

1a. Don't direct Windows to uninstall and then re-install application

1b. Don;t delete the application's folder

?

2. To determine whether or not the file reported as infected is actually infected, see

<

?

3. To recover from an erroneously quarantined or deleted file, see

<

?

4. If you choose to continue using an anti-malware application with a history of reporting false positives, consider configuring it to consider your DXLab applications to be safe.

?

? ? ? ?73,

? ? ? ? ? ? ? ? Dave, AA6YQ


Re: DXKeeper Update Failure

 

Thanks Jim. I will then repair DXKeeper. I don't know what I would do without it.

Steve - N6RSH? ;)