¿ªÔÆÌåÓý

ctrl + shift + ? for shortcuts
© 2025 Groups.io

Virus software blocking dx pots dot com


 

Software that Dave recently recommended ( I cannot type it, because if I do, my email sender rejects it) is blocking dxpots.com due to a Trojan. I hav tried excluding it, I have added dxspots.com as an exclusion, I have added the ip address, I have added Spotcollector, and it continues to say the website is blocked, I am not familiar enough with the new piece of software to know what the next step is, any ideas??


 

Obviously, that software is (has become) unreliable and should be
removed from any/all systems.

73,

... Joe, W4TV

On 2025-04-24 4:20 PM, Jamie WW3S wrote:
Software that Dave recently recommended ( I cannot type it, because if I do, my email sender rejects it) is blocking dxpots.com due to a Trojan. I hav tried excluding it, I have added dxspots.com as an exclusion, I have added the ip address, I have added Spotcollector, and it continues to say the website is blocked, I am not familiar enough with the new piece of software to know what the next step is, any ideas?


 

Anyone that does not ger an https address ought to be blocked. It is for our own good.

Outlook LT Gil W0MN
Hierro Candente Batir de Repente
44.08226 N 92.51265 W EN34rb

-----Original Message-----
From: [email protected] <[email protected]> On Behalf Of Joe Subich, W4TV via groups.io
Sent: Thursday, April 24, 2025 3:46 PM
To: [email protected]
Subject: Re: [DXLab] Virus software blocking dx pots dot com


Obviously, that software is (has become) unreliable and should be removed from any/all systems.

73,

... Joe, W4TV

On 2025-04-24 4:20 PM, Jamie WW3S wrote:
Software that Dave recently recommended ( I cannot type it, because if
I do, my email sender rejects it) is blocking dxpots.com due to a Trojan.
I hav tried excluding it, I have added dxspots.com as an exclusion, I
have added the ip address, I have added Spotcollector, and it
continues to say the website is blocked, I am not familiar enough with
the new piece of software to know what the next step is, any ideas?








--
W0MN EN34rb 44.08226 N 92.51265 W

Hierro candente, batir de repente

HP Laptop


 

+ AA6YQ comments below
Software that Dave recently recommended ( I cannot type it, because if I do, my email sender rejects it)
+ Please post the name of the software here - phonetically.

? ? ?73,

? ? ? ? ? ?Dave, AA6YQ


 

¿ªÔÆÌåÓý

Malwarebytes¡­.maybe it will go thru on my phone


On Apr 24, 2025, at 5:34 PM, Dave AA6YQ <aa6yq@...> wrote:

?
+ AA6YQ comments below
Software that Dave recently recommended ( I cannot type it, because if I do, my email sender rejects it)
+ Please post the name of the software here - phonetically.

? ? ?73,

? ? ? ? ? ?Dave, AA6YQ


 

+ AA6YQ comments below
Malwarebytes¡­.maybe it will go thru on my phone
+ In



+ the entry for Malwarebytes says

", when configured for continuous monitoring, has been reported to cause significant slowdowns, however, one-time scans are not problematic; see the?Additional Notes?below."

+ The Additional Notes contain this report from Bill G4WJS (now SK):

"The Malwarebytes premium version protects Internet service ports by monitoring traffic, if it sees traffic going to a local server that it does not know about it grabs that port and sits on it so no other applications can run a service on that port. It can be very confusing as the first packet of information will be delivered then the service trying to use the port then gets blocked by the Malwarebytes service that hijacks the port. This can be hard to trace using normal system tools as the hijacked port is held by a Windows service process that cannot be easily attributed to Malwarebytes.

To diagnose this, use the 'netstat -abn' command from an Administrator command prompt and check the output for the port the non-working service application is expected to be listening on. If the listening process is shown as svchost.exe then a Windows service is using the port. The final step is to move the non-working service to another free port and if that too then appears to be in use by a svchost.exe process then Malwarebytes is probably the culprit."

+ I only recommend the use Malwarebytes for one-time scans.

? ? ? ? ? 73,

? ? ? ? ? ? ? ? Dave, AA6YQ


 

¿ªÔÆÌåÓý

Thanks Dave, that¡¯s what I bought, the premium version¡­ the trial version worked fine, but apparently it doesn¡¯t do more than scan?


On Apr 24, 2025, at 7:27 PM, Dave AA6YQ <aa6yq@...> wrote:

?
+ AA6YQ comments below
Malwarebytes¡­.maybe it will go thru on my phone
+ In



+ the entry for Malwarebytes says

", when configured for continuous monitoring, has been reported to cause significant slowdowns, however, one-time scans are not problematic; see the?Additional Notes?below."

+ The Additional Notes contain this report from Bill G4WJS (now SK):

"The Malwarebytes premium version protects Internet service ports by monitoring traffic, if it sees traffic going to a local server that it does not know about it grabs that port and sits on it so no other applications can run a service on that port. It can be very confusing as the first packet of information will be delivered then the service trying to use the port then gets blocked by the Malwarebytes service that hijacks the port. This can be hard to trace using normal system tools as the hijacked port is held by a Windows service process that cannot be easily attributed to Malwarebytes.

To diagnose this, use the 'netstat -abn' command from an Administrator command prompt and check the output for the port the non-working service application is expected to be listening on. If the listening process is shown as svchost.exe then a Windows service is using the port. The final step is to move the non-working service to another free port and if that too then appears to be in use by a svchost.exe process then Malwarebytes is probably the culprit."

+ I only recommend the use Malwarebytes for one-time scans.

? ? ? ? ? 73,

? ? ? ? ? ? ? ? Dave, AA6YQ