Utorrent Blocked By Windows

1 view
Skip to first unread message

Janie Mccorey

unread,
Aug 5, 2024, 6:40:25 AM8/5/24
to stonunabaz
Filesand Directories on the NTFS system have an additional 'stream', this is where the blocking information is stored and cleared when you click the 'unblock'. It is not an actual file attribute. This is tedious for lots of files. Download the 'streams' utility from the microsoft website. use 'streams -d *.epub' for example, this deletes the stream data only, preventing some windows apps from slow loading (Coolreader) or refusing to handle the file correctly.

Several times a day I see a notification that says, "Bitdefender blocked a Windows Store app from gaining access to your webcam." While it is comforting to know that it was disallowed, I would like to address the underlying cause to stop it from coming up repeatedly. How can I determine which Windows Store App is pinging my webcam all the time?


Further to this, BitDefender blocked a trojan yesterday and cleant it, but it so odd to have a trojan in my computer as I am extremely careful in installing only legitimate software and will navigate only known sites or else do it with Microsoft Edge with Protection Guard open.


Is it normal for the Windows Store process to be adding up itself? I understand that Windows Store is the process that allows face recognition for login. But also it is odd that it continues to access the webcam even at times nobody is there in front of the computer, literally nobody is at home.


Since I cannot get any sense from Bitdefender I am repeating the question here about this message. If a Windows Store app has been blocked from accessing my webcam, how and I supposed to know which one it is? Since Windows Hello Face Recognition is not working at the moment I do wonder if the two are connected.


After this, if you are expecting incoming connections on this port and feel that the firewall may be blocking them, you could use start windows firewall logging and check the logs for dropped connections


If you are running an application/service that is listening on 3306, the firewall config should show it to be Enabled. If this is not seen, you have probably missed adding an exception with the firewall to allow this app/service.


Finally, port 3306 is typically used for MySQL. So, I presume you are running MySQL server on this windows machine. You should therefore see a listener for 3306 accepting incoming connections. If you do not see that, you need to work with your application (MySQL) to get that started first.


NETSTAT will tell you if the port is listening but it will not tell you if the port is open to the outside world. What I mean by this is that NETSTAT may show that the 0.0.0.0 is LISTENING on port 3306 but a firewall may still be blocking that port which is preventing outside connections; so it isn't sufficient to rely on NETSTAT alone.


For those not familiar with the program, it is hosted on a server from a mapped letter drive (m:\ in this case) and executed from a shortcut on your desktop, that is mapped to the EXE on the mapped drive. It is a massive bandwidth hog, so running remotely is never a good idea, but i digress.


Problem 1: i am the network admin, and i didnt block this publisher. If i did, i wouldnt be the only one with the problem...but here i am, the only one blocked. i can run this on any other machine with my username/password no problem


Problem 2: this isn't outside my network. i am connected to a domain. Granted, at the time of this writing, i was trying to troubleshoot this while connected via VPN, but still, not an outside network (technically in this case), but the problem still exists when i am of my office network


Problem 3: the link in the error message that should take me to information on how to unblock, takes me to the Windows 11 site and asked me to download and run windows 11... small issues there, i have windows 11 on this machine already.


I have also looked at Manage Computer Certificates. and at first this system was listed as untrusted. i got rid of that certificate, and reinstalled the certificate as a trusted published... and that worked for about 1 day, then it goes right back to blocking me again.


i also looked as security settings on the server. "Everyone" is set to full access on this mapped drive due to the nature of the program. but to be safe, i added myself to the list with full access as well. no change.


my best guess right now is the system sees that the certificate from the publisher expired in 2015, but not sure why that would matter, since every other computer on our network (windows 10 or better) works fine. so just bypassing the monitoring would be an acceptable solution in my book, but i have tried the obvious stuff like disabling the security services in Windows that would do this, but it doesn't seem to work.


I appreciate it, but this is an app I have had on this particular computer for the last 3 or 4 months without incident and on 20 other machines for the last 15 years. The link assumes I am trying to install it for the first time. I have it installed already and trying to run the exe either locally or from the mapped drive on the server.


i was able to run the installer again and basically install the app on top of what was there before, and that worked for a couple of days. This morning i was able to open the main program, but as soon as i tried to run a sub program with in the main one, i got the same error again. i think this is tied to a KB, and i am working backwards to see if i can figure out which one.


The Learn More button goes to an article for end users and information workers that contains information about the security risk of bad actors using macros, safe practices to prevent phishing and malware, and instructions on how to enable these macros (if needed).


In some cases, users also see the message if the file is from a location within your intranet and isn't identified as being trusted. For example, if users are accessing files on a network share by using the share's IP address. For more information, see Files centrally located on a network share or trusted website.


Prepare for this change by working with the business units in your organization that utilize macros in Office files. These files are often opened from locations like intranet network shares or intranet websites. You want to identify those macros and determine what steps to take to keep using those macros. Work with independent software vendors (ISVs) that provide macros in Office files from those locations. For example, to see if they can digitally sign their code and you can treat them as a trusted publisher.


The following table list different common scenarios and possible approaches to take to unblock VBA macros and allow them to run. You don't have to do all possible approaches for a given scenario. In the cases where we list multiple approaches, pick the one that best suits your organization.


If the user previously opened the file, before this change in default behavior, and selected Enable content from the Trust Bar, then the macros are enabled because the file is considered trusted.


To unblock macros in a file, like one from the internet or an email attachment, remove the Mark of the Web on your local device. To remove, right-click on the file, choose Properties, and then select the Unblock checkbox on the General tab.


You can also use the Unblock-File cmdlet in PowerShell to remove the ZoneId value from the file. Removing the ZoneId value allows VBA macros to run by default. Using the cmdlet does the same thing as selecting the Unblock checkbox on the General tab of the Properties dialog for the file. For more information about the ZoneId value, see Mark of the Web and zones.


For example, if users are accessing a network share by using its IP address, macros in those files are blocked unless the file share is in the Trusted sites or the Local intranet zone.


If a user downloads a file on OneDrive or SharePoint by using a web browser, the configuration of the Windows internet security zone (Control Panel > Internet Options > Security) determines whether the browser sets Mark of the Web. For example, Microsoft Edge sets Mark of the Web on a file if it's from the Internet zone.


If a user selects Open in Desktop App in a file opened from the OneDrive website or from a SharePoint site (including a site used by a Teams channel), then the file won't have Mark of the Web.


Set the Windows internet security zone assignment for OneDrive or SharePoint domains to Trusted Sites. Admins can use the "Site to Zone Assignment List" policy and configure the policy to place your-domain-name.sharepoint.com (for SharePoint) or your-domain-name-my.sharepoint.com (for OneDrive) into the Trusted Sites zone.


SharePoint permissions and OneDrive sharing aren't changed by adding these locations to Trusted Sites. Maintaining access control is important. Anyone with permissions to add files to SharePoint could add files with active content, such as macros. Users who download files from domains in the Trusted Sites zone bypasses the default to block macros.


When the user opens the macro-enabled template file, the user is blocked from running the macros in the template file. If the user trusts the source of the template file, they can remove Mark of the Web from the template file, and then reopen the template file in the Office app.


When the user tries to install the macro-enabled Add-in, by using File > Options > Add-ins or by using the Developer ribbon, the Add-in is loaded in a disabled state and the user is blocked from using the Add-in. If the user trusts the source of the Add-in file, they can remove Mark of the Web from the Add-in file, and then reopen PowerPoint or Excel to use the Add-in.


Using a digital signature and trusting the publisher doesn't work for Excel Add-in files that have Mark of the Web. This behavior isn't new for Excel Add-in files that have Mark of the Web. It's worked this way since 2016, as a result of a previous security hardening effort (related to Microsoft Security Bulletin MS16-088).

3a8082e126
Reply all
Reply to author
Forward
0 new messages