Malwarebytes anti malware license key Archives

Malwarebytes anti malware license key Archives

malwarebytes anti malware license key Archives

malwarebytes anti malware license key Archives




Abandonware is software that is shelved by its developer. As such, it is no longer updated nor supported so it may be rife with vulnerabilities.

Account harvesting

Account harvesting is the process of gathering user accounts from a system, service, or database using a variety of methods, such as malware or phishing.

Account hijacking

Account hijacking is the process of taking over user online accounts, such as email and social media accounts.

Ad blocker

An ad blocker is software that blocks advertisements, including pop-ups, when a user visits websites.

Ad fraud

Ad fraud happens when advertisers pay for ads with false impressions. For more information, see this blog post on the difference between adware and ad fraud.

Synonym: Invalid traffic

Ad rotator

An ad rotator allows two or more ads to alternately show in the same place on a website. The rotator triggers whenever a user refreshes or revisits a site.


An add-in is software that gives additional functionality to a device or another software.

Address bar

An address bar is the text box in your web browser that displays the web page URL or IP address. At times, it functions as a search bar if the user entered text that is an invalid URL.

Address bar spoofing

Address bar spoofing is a technique where the legitimate URL on a browser address bar is replaced with a rogue one. This then leads to potential data or financial theft.

Address Resolution Protocol (ARP)

An address resolution protocol (ARP) is the system or process of mapping or finding a physical address belonging to an IP address in the local network.

Advanced Encryption Standard (AES)

Developed by the National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES) is a block cipher that provides fast, strong, and secure encryption of classified data. AES was created as an alternative to the Data Encryption Standard (DES), because it became vulnerable to brute-force attacks.

Synonym(s): Rijndael Block Cipher

Advanced persistent threat (APT)

An advanced persistent threat (APT) is a prolonged, targeted attack on a specific entity or entities with the intention of compromising their systems and gaining information from or about them. For more information, see this blog post on an in-depth look at APT and why cybersecurity professionals often groan at claims of APT attacks.

Advanced Research Projects Agency Network (ARPANET)

The Advanced Research Projects Agency Network (ARPANET) was an experimental computer network, which later on became the basis for the Internet.


Adware, or advertising-supported software, is software that displays unwanted advertising on your computer device. For more information, see this blog post on adware delivery methods.

For an in-depth look at adware, see this page.

Air gap

Air gap refers to computers that are incapable of physically connecting to a network or another computer that is connected to the internet. Air-gapped systems were believed to be more secure until Stuxnet disproved this.

Other forms: Air gapping


An always-on device, software, or network denotes that it is constantly accessible.

American Standard Code for Information Interchange (ASCII)

The American Standard Code for Information Interchange (ASCII) is an encoding standard for electronic communication. Codes in the ASCII table represent text in computing devices.


In computing, analog is a term used to describe old-fashion and slow computers and other devices.

If used in the context of signals, an analog references to a mechanism or device where information is presented by variable physical quantities.


Android is Google’s flagship operating system for smartphones and tablets. Manufacturers have adapted Android in televisions, smart-watches, cars, and many other electronic devices.

For an in-depth look at Android antivirus, see this page.

Android app

An Android app is a program designed for the Android OS.


Annoybot is software that repeats an annoying task. IRC bots, for example, are annoybots that send out unsolicited messages to participants in a channel.


Annoyware is software that continuously shows reminders or pop-up windows to remind users to perform a particular action, such as registering or buying software.

Synonyms: Nagware, Begware

Anomaly detection

Anomaly detection is identifying irregularities or deviations in patterns, data points, events, or observations that do not conform to the norm or the expectations of businesses or groups. Not all detected anomalies are malicious.

Synonym: Outlier detection


Anonymization is the action or an attempt to disable the ability to track back information or actions to a specific user.

Other forms: Anonymize


An anonymizer is a tool that minimizes the amount of tracking done during surfing in an attempt to hide the true identity of the user.

Synonyms: Anonymous proxy


Anonymous, in computing, is to keep one’s true name and identity concealed online with the use of various applications.

Other forms: Anonymity


Anti-ransomware is software specifically designed to combat ransomware. Such software could make use of specific techniques that general security tools don’t deploy.

Anti-virus (AV) killer

An AV killer is malicious code that disables the user’s anti-virus software to avoid detection. Sometimes, this term is used for malware that disables firewalls.

Synonym: Retrovirus


Antivirus is an antiquated term used to describe security software that detects, protects against, and removes malware.

For an in-depth look at antivirus, see this page.

Synonyms: anti-malware


An applet is a piece of software that usually performs one specific task. Applets are often part of a more complex program.

Application programming interface (API)

An application programming interface (API), in simple terms, is a means for different software to talk to one another. It is the code that governs its server’s access points. APIs have many uses and take many forms.

Application security

Application security is the practice of applying security measures to the software application. This has to be done to defend against threats and attacks from the outside that attempt to exploit the app.

Artificial intelligence (AI)

AI is a system’s or an application’s ability to correctly interpret and learn from data to achieve specific goals and tasks. For more information, see this blog post on how AI and machine learning can impact cybersecurity.

Synonym: Machine intelligence


Astroturfing is the masking of initiatives by corporations, governments, or political parties to make a campaign appear spontaneous or initiated by civilian groups. Sometimes, masking the origin makes a campaign more effective or less controversial.

Asymmetric cryptography

Asymmetric cryptography is a system of secure communication that uses a pair of keys: a public key and a private key. A public key can be shared with anyone and publicly known, but only a private key must be kept secret and known only by the owner.

Synonym: Public-key cryptography

Attack vector

An attack vector feres to the technique used to obtain unauthorized access to a system or network. It is an integral part of vulnerability research to know which attack vector is or might be used.


Attribution is the practice of taking forensic artifacts of a cyberattack and matching them to known threats against targets with a profile matching a particular organization. For an in-depth look, see our two-part blog series on when you should care about attribution and why one shouldn’t overthink it.

Augmented reality (AR)

AR is a cross between the physical world and virtual reality. It adds images, sounds, motion, and even smell to the physical reality.


In computing, authentication is the process of verifying the identity of a user or process. For more information, see this blog post on the basics of two-factor authentication (2FA).

Other forms: Auth

Autonomous system

An autonomous system is a group of networks managed by one large entity to ensure there’s a reliable routing policy to the internet.



A backdoor is a type of Trojan that allows a threat actor access to a system by bypassing its security. This term can also refer to the method of gaining access to user systems undetected.

For an in-depth look at backdoors, see this page.

Other forms: backdooring

Bad sector

A bad sector is a sector on a computer’s disk or flash drive that is already unusable. This is usually caused by physical damage.

Bait advertising

Bait advertising is an unethical advertising practice wherein customers are promised a sale or inexpensive item. However, once customers are interested, the advertiser makes the product unavailable then redirects them to a similar product that is more expensive.

Synonym: Bait and switch advertising

Banking Trojan

A banking Trojan is a type of Trojan specifically created to harvest credentials and other sensitive financial and personal information stored and processed through online banking systems.


In the context of computer malware, behavior refers to the actions malware performs on an affected system once executed.

Behavioral biometrics

Behavioral biometrics is a biometric modality that dynamically analyzes and quantifies unique identifiers and measurable human patterns. For more information, see this post on the use of behavioral biometrics in the financial sector.

Big data

Big data pertains to huge datasets that can be analyzed computationally to reveal trends, patterns, and associations. Companies use big data to improve their operations and make more intelligent decisions.


A binary is a numerical system with only two different values: 0 and 1, or True and False. Binary is popular in both electronics and in computing.


In computing, biohacking is a form of hacking that refers to the application of IT concepts to biological systems, usually the human body.

Biohacking can include the modification of the human body, such as introducing implants and other wearable computing tech.


Biometrics is the measurement and statistical analysis of people’s physical and behavioral characteristics. In biometrics authentication, personally identifiable and unique features are stored in order to give the holder access to certain resources.


BIOS stands for “basic input/output system”. It is firmware used by the computer’s microprocessor to initialise the computer when the user physically turns it on.


Bitcoin is a type of digital currency, or cryptocurrency, which is a payment medium that is not tied to a central bank or regulated by a governing body. Instead, it relies on secure storage of transactions on a technological platform known as blockchain.

Bitcoin is a popular payment method among Internet criminals, as it uses a fast, reliable, and verifiable system.

Black Friday

Black Friday is regarded as the unofficial start of the Christmas shopping season. Starting from midnight on the Friday after US Thanksgiving, retailers open their doors and offer numerous specials and deep discounts. Because of this, consumers often go online or to brick-and-mortar retail shops en masse.


In computing, a blacklist usually refers to a list of domains and/or IP addresses that are known or suspected malicious servers and/or domains. These lists are used to protect users from receiving mail from the blacklisted servers or from browsing to dangerous sites hosted on these domains/IP addresses.

Blended threat

A blended threat is an attack that makes use of multiple vectors to gain leverage on a target. This could include malware, phishing, social engineering and more.

Blue Screen of Death (BSoD)

A Blue Screen of Death (BSoD) occurs on Windows systems when a full blue screen appears to the user after encountering a fatal error.


Bluejacking is the act of sending messages between mobile devices via Bluetooth wireless connection.


Bluesnarfing refers to the unauthorized access and theft of information through a Bluetooth connection. Mobile devices, such as smartphones, laptops, and tablets that are Bluetooth-enabled can be affected by this.


Bluetooth is a wireless technology mainly used for short distance connections between devices due to its low power signal. Communication is done at a bandwidth around 2.45 GHz. It doesn’t need a line of sight to establish a connection.


In computing, to boot a system is to turn the device or machine on and load the OS into RAM. The boot-up process is made up of different stages, depending on the setup of the system and the OS that has to be loaded.

Boot sector

A boot sector is part of a physical information carrier (usually a hard drive) that contains the code that has to be loaded into a system’s RAM to start the actual boot process and load the OS. The boot sector is created when a volume is formatted.

Boot sector virus

A boot sector virus is malware that infects the boot sector of a drive or other storage device. During a boot, this sector is automatically located and loaded into memory, making them harder to remove, as they will load before normal removal software.


A bootkit is a type of rootkit that alters or replaces the bootloader of the affected system in order to take control. To remove a bootkit, you need a bootable medium, which has the necessary tools to undo the changes made by the bootkit.


The word “bot” is a derivative of “robot.” It usually pertains to (1) one or more compromised machines controlled by a botmaster or herder to spam or launch DDoS attacks, or (2) an automated program coded with particular instructions to follow, which includes interacting with websites and humans via web interfaces (e.g., IMs).

A collective of bots is called a botnet.

Synonym: zombie machine

Bot herder

A bot herder is the threat actor who controls and maintains a bot or botnet.

Synonym: botnet herder


A botnet is a collection of bots. The term also refers to the malware run on a connected device to turn it into a bot.

Synonym: zombie network


In computing, breadcrumbs are navigation aids that tell users exactly where they are while surfing on a site or in a set of folders. Breadcrumbs show the hierarchy of links on a site or the steps in the folder structure.

Consider, for example, the address bar in a Windows explorer window, which contains breadcrumbs from a file to the folders in which it is contained.


Bricking refers to the practice or act of rendering an electronic computing device—often a smartphone—useless or inoperable. Bricking usually happens by accident, such as when a firmware update gets interrupted.

Bring your own device (BYOD)

Bring your own device, abbreviated as BYOD, is a trend wherein employees bring their personal computing devices, usually a smartphone or laptop, to be used in the workplace. These devices are then connected to the company’s internal network, which may introduce additional risks to the company.

Synonym: bring your own technology (BYOT)


Browlock is a portmanteau of “browser” and “lock”. This term is used either (1) to describe the state of an internet browser when the user is unable to perform certain actions or (2) to pertain to a malware’s malicious control over browser windows. A browlock can close the open tab or window, block access to the desktop of the system, and stop you from navigating to another site. For more information, see this blog post on browser lockers.

Browser helper object (BHO)

A browser helper object (BHO) is a DLL component of Internet Explorer (IE) that provides added functionality to the browser.

Brute force attack

A brute force attack is a method wherein an application attempts to decode encrypted data, such as a password, by trial and error. A dictionary attack, for example, is a type that falls under this attack.

See also password cracking application



In computing, a buffer refers to the amount of data stored and shared between applications to compensate for the difference in speed with which these can handle the data. Consider, for example, your browser buffering (part of) a movie while downloading it and, at the same time, while your movie player plays it.

Buffer overflow

A buffer overflow is a computer anomaly wherein a program writes to a block of memory (or buffer) more than what it is allocated to hold.

Synonym: Buffer overrun

Bug bounty

A bug bounty is a rewards program through which individuals can receive monetary compensation and/or recognition for finding flaws or vulnerabilities in a company’s software or system.


A bundler is an assemblage of two or more software offered in one combined package. It usually contains (1) the main program a user is after and (2) bundleware. Many bundlers are found in freeware download sites. In some cases, these “free” software are actually trial versions of programs one commonly pays for.


Bundleware is a term used to collectively describe one or more software that comes in bundles as extra. This isn’t necessarily malicious.

Bundleware that are dodgy at best have a few types:

  • Programs that are considered adware and PUPs. These may or may not offer users the option to opt out of the extra programs.
  • Programs that are useful but nobody wants to pay for their functionality, so the developer enters some monetization program that incorporates adware into his/her program.
  • PUPs that offer to install other PUPs from the same manufacturer during the installation.
  • Programs that also install software packages they need to run on the affected system.

Malwarebytes detects these types.


In computing, to burn is to write data to a drive with a recordable disc (i.e. burn a CD or DVD). The data is written onto the disc using a laser and, until the invention of rewritable discs (RW), this was considered a one-time-only process.

Business continuity management (BCM)

Business continuity management is a term used to describe the holistic process of identifying an organization’s risk of exposure to potential threats found internally and/or externally and the impacts these may cause. Its goal is to prepare the organization to effectively respond to threats, protect the business’s interests, and ensure the continuity of the company in the event of such threats.

Business email compromise (BEC)

A business email compromise (BEC) is an attack wherein an employee, who is usually the CFO or someone from the Finance department, is socially engineered into wiring a large sum of money to a third-party account.

Business process compromise (BPC)

A business process compromise (BPC) is an attack wherein the threat actor targets weaknesses in an organization’s processes, systems, and loopholes in its operations to manipulate or alter them to their advantage. Unlike in business email compromise (BEC), BPC doesn’t rely on social engineering tactics.



In computing, a cache is a temporary storage that is used to speed up future requests. For example, a browser cache stores contents of websites so they can be displayed faster the next time the user visits them. For information about DNS cache poisoning, have a look at the blog post, DNS hijacks: what to look for.

Children’s Online Privacy Protection Act (COPPA)

The Children’s Online Privacy Protection Act, or COPPA, is a privacy law that protects children under the age of 13. It was first passed in 1998. The Federal Trace Commission (FTC) manages COPPA. To read more, go here.

Click fraud

Click fraud is the practice of artificially inflating statistics of online advertisements by using automated clicking programs or hitbots.

Synonym: Pay-per-click fraud

See also ad fraud


Clickbait is content (especially a headline) that uses exaggeration and sensationalism to entice you into clicking on a link to a particular web page. Clickbait often leads to content of questionable value.


Clickjacking is a type of attack that tricks a user into clicking a website element that is either invisible or disguised as another element. This hijacks a user’s click meant for one thing but leads to another. For example: instead of clicking a button to reply, a clickjacking attack on a Twitter user can make them re-tweet a malicious domain to followers instead.

This is typically seen as browser security issue. However, such an attack can also take place in mobile applications.

Clickjacking has different types, such as likejacking.

Synonyms: User interface (UI) redress attack, UI redressing

Cloud computing

Cloud computing refers to the delivery of services that are hosted over the internet to computers and other computing devices. For more information, see this blog post on the cloud.

See also Anything-as-a-Service (XaaS)

Cloud phishing

Cloud phishing refers to a phishing trend that uses the guise of cloud computing services to get users to click malicious links. Campaigns of this kind usually start off in emails and social media posts.

Cold boot

In computing, a cold boot happens when a system is powered up from its off state. Cold booting is sometimes used to remedy certain system hiccups.

Other forms: Cold booting

Command & control (C&C)

Command & control, also called C&C or C2, is a centralized server or computer that online criminals use to issue commands to control malware and bots as well as to receive reports from them.


Companion virus

A companion virus is an old type of virus that poses as a legitimate file by copying its file name but uses a different extension. It doesn’t modify files.


Compromised sites (or servers) are otherwise legitimate sites that are being used by hackers without the owner’s knowledge. Compromised sites are often used to house and spread malware.


Computer ethics

Computer ethics is a philosophy concerned with how professionals in the field of computing should make decisions. Examples would be rules for disclosing of compromised information and vulnerabilities, copying of electronic content, and the impact of computers—AI, for example—on human lives.

Computer science (CS)

Computer science, abbreviated as CS, is a multi-disciplinary collection of studies in the fields that are related to digital information. Computer systems, the internet, programming, and data storage are some of the best-known fields.

Computer-Aided Design (CAD)

Computer-Aided Design, or CAD, is the use of computer technology to help with the design of two- or three-dimensional objects. This specialized type of software helps to design, modify, analyze, optimize, and even create objects in many fields, including architecture, mechanics, engineering, and art.

Consumer fraud protection

Consumer fraud protection is a law designed to shield consumers against goods and services that didn’t perform as advertised. Consumers are also protected against unfair trade (overcharging) and fraudulent credit practices.


In the context of computing, a cookie is a text file that a website puts into a visitor’s computer to recognize them and keep track of their preference. A cookie can be stored temporarily (session cookie) or permanently on the hard disk (persistent cookie). For more information, see this blog post on whether we should worry about cookies or not.


A crack is either used as a:

  1. noun: A piece of software used to figure out passwords using a dictionary attack. It can also be a piece of software or tool used to illegally bypass certain software security features, such as copy protection.
  2. verb: The act of breaking into a secured computer system. The person doing the crack is called a cracker. Some argue that there are distinctions between a cracker and a hacker.

Credential stuffing

Credential stuffing is a popular tactic of attempting to access online accounts using username-password combinations acquired from breached data. This is usually done using an automated tool.


Crimeware is sophisticated software designed specifically for certain criminal acts, such as data theft, ransom, network poisoning, and communications monitoring.

Cross-site scripting (XSS)

Cross-site scripting is a type of injection attack wherein a vulnerability in web applications is exploited that allows a threat actor to inject malicious script into the site’s content. Affected trusted sites are made to deliver the malicious script to visitors.


In malware research, this refers to a program that makes malware hard to read by researchers. The crudest technique for crypters is usually called obfuscation. A more elaborate blog post on that is Obfuscation: Malware’s best friend.

Obfuscation is also used often in scripts, like JavaScript and VBScript. But most of the time, these are not difficult to bypass or de-obfuscate. More complex methods use actual encryption. More information about this and related subjects can be found in our blog post, Explained: Packer, Crypter, and Protector


Cryptocurrency is a decentralized digital currency. It is the preferred payment method of ransomware authors, and it can be generated by mining scripts embedded on websites.

Cryptocurrency mining

Cryptocurrency mining, popularly known as cryptomining, is the process of adding new transactions to a public ledger of previous transactions (called the blockchain) and introducing new cryptocurrencies into the system. For more information, see this blog post on the dangers of drive-by mining and online ads.


Cryptography is the knowledge of sending and storing encrypted data. For more information, see this blog post on how to encrypt files and folder.


Cryptojacking is the surreptitious use of computing devices to mine cryptocurrency.

CVE identifier

A Common Vulnerabilities and Exposure (CVE) identifier is a unique number assigned to publicly known software vulnerabilities. It follows the format:

Vendors and researchers alike consider CVE identifiers as standard for identifying vulnerabilities. For example, CVE-2014-0160 is the CVE ID for the vulnerability commonly known as Heartbleed.

Synonyms: CVE names, CVE IDs, CVE numbers, CVEs, vulnerability identifier

Cyber Monday

Cyber Monday is the marketing term given to the Monday after the Thanksgiving holidays in the United States. For more information, see this blog post on safe online shopping on Cyber Monday.


Cyberbullying is the act of threatening and intimidating others via electronic and digital means.


Cybercrime is the term referring to crimes that are related to computers and networks, including traditional crimes like fraud, blackmail, and identity theft that are done over the Internet or by using computing devices.


Data breach

A data breach happens when data deemed sensitive, protected, or confidential were illegally accessed or disclosed. Individuals may have viewed, copied, transmitted, stolen, or used such data accidentally or deliberately. For an in-depth look at data breaches, see this page.

Data exfiltration

Data exfiltration is an act of retrieving, copying, and transferring data, such as user credentials, about individuals or organizations without authorization.

Synonym: Siphoning

Data mining

Data mining is the process of sifting through large data sets to identify patterns or generate new information.


A decryptor is a tool used to transform unreadable data back to its original, unencrypted form. This is typically used by those affected by ransomware to restore their files.


In computer security, a definition is code written into a database that enables cybersecurity software programs to identify and detect specific, known families of malware. Definitions are used in signature-based detection methodology and therefore cannot be used to detect new or unknown forms of malware.


Defragmentation is the process of reorganizing a file system so that files that were split up when saved and changed are put back together again. This removes pointers to and from the fragments and optimizes the speed with which these files can be used.

Other forms: Defrag, defragment

Destruction of service (DeOS)

Destruction of service is an attack using IoT botnets that aim to destroy an organization’s backups and safety nets, which are used to recover critical systems and data after a cyber attack.


A dialer can mean (1) a program or app that initiates the best connection for the number chosen by the user, (2) a program that connects a system to the internet over a telephone or ISDN line, or (3) malware that connects a system to a network or phone number with the intent to fraud.

Other forms: Dialler

Dictionary attack

A dictionary attack is an act of penetrating password-protected computer systems or servers using large sets of words in a dictionary. This attack usually works as many users still use ordinary words for their passwords.

See also brute force attack

Digital footprint

A digital footprint is the term used to describe the recorded—thus, traceable—internet or device activities of a particular person.

Synonym: digital shadow

Distributed Denial of Service (DDoS)

A distributed denial of service (DDoS) attack is a network attack wherein threat actors force numerous systems (usually infected with malware) to send requests to a specific web server to crash, distract, or disrupt it enough that users are unable to connect to it.

For an in-depth look at DDoS attacks, see this page.


In computer security, a domain can refer to:

  1. A group of computers that are under the control of a common operator and administered as one unit, or
  2. The name of a Web resource following the rules of the Domain Name System (DNS), which translates the domain name into an IP address

Domain administrator privileges

Domain administrator privileges refer to administrator access to all machines within a network.

Domain Name System (DNS)

A Domain Name System, abbreviated as DNS, is an Internet protocol that translates user-friendly, readable URLs, such as, to their numeric IP addresses, allowing the computer to identify a web server without the user having to remember and input the actual IP address of the server.

Name Servers, or Domain Name Servers, host these translations. They are part of the overall Domain Name System.

To learn how threat actors can abuse DNS protocols, read up on DNS hijackers, a type of malware that modifies users’ DNS settings.

Domain Name System Security Extensions (DNSSEC)

Domain Name System Security Extensions, abbreviated as DNSSEC, is a set of extensions that add extra security to the DNS protocol. For more information, see this blog post on why we need DNSSEC.


A downloader, or Trojan downloader, is malware with the sole intention of downloading other programs—usually more malware—to the affected system as soon as an Internet connection is available.


Dox is an informal abbreviation of the word “documents”. The term is used to describe the act of researching and disseminating private information about a person or organization. Many doxxers—those who dox—employ a number of techniques to gather information, such as searching the internet, hacking, and social engineering.

Other form(s): doxing, doxxing

Drive-by download

A drive-by download pertains to (1) the unintended download of one or more files, malicious or not, onto the user’s system without their consent or knowledge. It may also describe the download and installation of files bundled with a program that users didn’t sign up for.

Drive-by mining

Drive-by mining is a term coined to describe a method in which a piece of JavaScript code is embedded into a Web page to perform cryptocurrency mining on user machines that visit this page. For more information, see this blog post on drive-by mining and ads.


A dropper, or Trojan downloader, is a type of malware that installs other malware on the affected system. The other malware is part of the same executable, which is usually in compressed form.

Dwell time

Dwell time refers to the amount of time passed from when malware has initially infiltrated a system to when it has been detected and removed.


Electronic sports (eSports)

Electronic sports, or eSports, are basically video games competitions. Any computer- or console-game that has a multi-player competition qualifies as an eSport.


Encryption is the process of changing data in a way that can not (easily) be undone (or decrypted) by parties that don’t have the decryption key. For more information, see this blog post on encryption and types of secure communication and storage.


The end-user is the person that a specific product is designed, developed, and created for. For this intended user, the product should be suitable (ease of use), and it should be a finished product.


EternalBlue is one of the handful of “exploitation tools” leaked by a group called The Shadow Brokers (TSB) that take advantage of weaknesses in how Windows implemented the Server Message Block (SMB) protocol. The WannaCry and NotPetya ransomware strains used this exploit to target unpatched systems.

For more information, see this blog post on how threat actors are using SMB vulnerabilities in their attack campaigns.


Ethernet is a networking technology commonly used in various networks, such as LAN, MAN, and WAN. It is so commonplace that most PC motherboards have a built-in Ethernet interface.

Executable and Link format (ELF)

An ELF file is an executable file format for the Linux and Unix platforms. Its known file extensions are .axf, .bin, .elf, .o, .prx, .puff, .ko, .mod, and .so.


Exploits are a type of malware that takes advantage of bugs and vulnerabilities in a system in order to allow the exploit’s creator to take control.

For an in-depth look at exploits, see this page.

Exploit kit

An exploit kit is a packaged collection of exploits for use by criminal gangs in spreading malware.

Synonym: Exploit pack

Extended Validation SSL Certificate (EV SSL)

An Extended Validation SSL Certificate is an identity authentication solution used in HTTPS websites that tells users that the owner or operator of the site they’re interacting with is legitimate. A green bar displayed in the address bar denotes the presence of an EV SSL.



In computer security, a family refers to a group of malwarevariants that all exhibit at least one base characteristics.

Fear, uncertainty, and doubt (FUD)

Fear, uncertainty, and doubt is a disinformation strategy that is used as a weapon against competitors.

In hacking, FUD could also mean “fully undetected,” which means (1) that data that is made to appear like random noise due to encryption, or (2) a piece of software that cannot be detected by AV tools and scanners.

File type

A file type is a name given to a specific kind of file. For example, a Microsoft Excel sheet file and a Python script file are two different file types. A file type is not the same as a file format.


File-based attack

A file-based attack is an attack where threat actors use certain file types, usually those bearing document file extensions like .DOCX and .PDF, to entice users to open them. The file in question is embedded with malicious code; thus, once opened, this code is also executed.

Источник: []
, malwarebytes anti malware license key Archives

Fashion Cup Support

On the off chance that you are looking on the web a Malwarebytes Premium key along these lines,

you went to the opportune spot. These days imparts to you a Malwarebytes Antivirus Serial keys you can

enlist for a lifetime and appreciate the full functionalities and improve the PC speed and execution.

Malwarebytes antivirus most recent variant premium its propelled level security gives to shield you from

a Trojan infection. It secures your working framework and all your fundamental archives.

The most conspicuous Anti-Virus programming supporting Mobiles gadgets and PCs is malware bytes.

It is accessible on all stages. You have the Malwarebytes Premium Key, or you can utilize the Malwarebytes

Activation Key to initiate this record with this program. You'll approach this key when you purchase the

application permit. Be that as it may, on the off chance that you don't have one, don't stress! Here we're going

to give you working and most recent Malwarebytes Keys.

malwarebytes key

camtasia studio 9 crack

Serial Keys Free

Источник: []
malwarebytes anti malware license key Archives

Talk:Malwarebytes Anti-Malware/Archive 1

This page is an archive of past discussions. Do not edit the contents of this page. If you wish to start a new discussion or revive an old one, please do so on the current talk page.

about my recent edit

I don't see how the current version of the article could be considered an advert in any way, so that tag is removed. I also eliminate the information about them signing a contract with someone to help distribute their software, since I fail to see how that has anything to do with the software itself. Wonderful program by the way, I using it to eliminate the DNS changer trojan, when nod32 failed. DreamFocus 03:45, 1 June 2009 (UTC)

The official website links to the CNET download site to give out the free version, and mentions the Editor's Choice award

The official website links to the CNET download site to give out the free version, and mentions the Editor's Choice award. So that information is quite relevant, and should be in the article. I also mentioned how many millions of people have downloaded it so far, that demonstrating just how successful and well received the product is. DreamFocus 03:55, 1 June 2009 (UTC)


"Reception" section doesn't seem balanced and only focuses on positive reviews. Laurent (talk) 18:15, 27 June 2009 (UTC)

Can you find any negative ones? Its free, and it does what all others can not. Fixed my system good. DreamFocus 22:31, 27 June 2009 (UTC)

One big AD

This reads like an AD posted by either the author of MalwareBytes or someone they paid. On the contrary, MalwareBytes has lots of bad reviews (A simple Google for MalwareBytes Sucks draws out a few), thus is not received well by everyone as this post suggests. It also does not work as well as this page suggests (Just test it). The entire page is one big advertisement. I vote for permanent removal as this topic is not suiting for a wiki of this caliber and the author is in denial of blatant NPOV. D2SP (talk) 10:37, 29 July 2009 (UTC)

Thanks for your input. We've already discussed both of those points (the tone of the article and the notability of the subject) and both have been addressed to the satisfaction of the wider community. Chris Cunningham (not at work) - talk 10:45, 29 July 2009 (UTC)
How is this not an AD: The freeware version includes on-demand malware detection and disinfection, while the paid-for version monitors for threats continuously. -- That is an AD. Why would I need to know that? —Preceding unsigned comment added by D2SP (talk • contribs) 10:51, 29 July 2009 (UTC)
Furthermore, the entire "Reception" section should be changed from "Reception" to "Shameless Plug". Again, why would I need to know any of this and also how does any of this describe its reception? Really, the whole thing is an advertisement. I still vote for permanent removal.D2SP (talk) 11:05, 29 July 2009 (UTC)
You seem to regard a description of the product's features as advertising. This raises the question of what you expect an article about a software program to contain. As for the Reception section, if you feel that it gives undue weight to positive reviews then by all means please suggest reliable bodies who have given negative reviews to the product. In the past, editors who argued for such material were unable to provide any more reliable sources for their comments than anonymous forum or blog posts. Chris Cunningham (not at work) - talk 13:15, 29 July 2009 (UTC)
... Actually, upon inspection, it appears that significant material has been deleted from the article in the last few months. I've restored the version which was present at the beginning of March. Chris Cunningham (not at work) - talk 13:19, 29 July 2009 (UTC)
Many people contributed to this article. I don't see any post by the author of it, to which you are replying. Listing the different versions and what they do, is normal, for every software article the wikipedia has, and a reception section is found throughout wikipedia on many different types of articles. If you find reviews from anywhere that meets the notability standards, then add them. DreamFocus 13:23, 29 July 2009 (UTC)
Regardless of how many people contributed to this article, it reads like a press release. Every sentence written in this article is from Malwarebytes' POV. It clearly has no balance whatsoever. Cernansky (talk) 17:55, 22 September 2014 (UTC)

Why is how long he retained a lease for a website domain name mentioned?

As of March 2009, Klyecynski has retained the lease for the web-site through October 4, 2010.

Is there a reason that's there? I don't understand how that is relevant. I've never seen any other articles mention something like that. When it comes up for renew in 2010, he'd surely renew it then. DreamFocus 13:34, 29 July 2009 (UTC)

More importantly, it isn't sourced. I see you've junked it, which was the right call. Chris Cunningham (not at work) - talk 13:52, 29 July 2009 (UTC)
I would suggest that another look be taken at the Company section. I believe everything past "Malwarebytes was founded in 2004 by CEO Marcin Klyecynski." is simply not needed in this section and constitutes advertisement. How hard is it to just put factual information without any added marketing fluff? BTW: I am the same guy as before, I forgot my password. C2SP (talk) 02:35, 2 August 2009 (UTC)
Most of the verbiage in the Intro is unnecessary. I suggest it be changed to: Malwarebytes' Anti-Malware (MBAM) is a computer application designed by Malwarebytes Corporation. --The rest of the verbiage is like an AD and even is REPEATED in the Company section!! My final verdict is that most of the inside information such as when the company was started and in what city/state they reside is not quoted, thus the MalwareBytes Marketing Team must be the true authors of this entry. Because of that, I think this entry should be heavily scrutinized. And, if I am wrong, then the author or at least its current and lone editor is posting a lot of hearsay (as in things in need of citation). C2SP (talk) 02:35, 2 August 2009 (UTC)

Heavy editing gone too far

The current version [1] is ridiculous. You don't need a citation that there is a freeware and a paid version of it. You look at their website to confirm that information. And a lot of valid information was removed along with the rest. Why is it put in the category Malware, which is for viruses, while the categories for Antivirus software and spyware removal were removed? If those categories exist, and something fits them, they should be put in them. Why eliminate mentions of the Washington Post, and the link to that article? Its like someone working for their competition came through and tried to destroy them. There is not a single legitimate news source out there which said anything negative about it that I am aware of. If you find any, then post it. But don't go erasing all the good reviews from major sources like the Washington Post. DreamFocus 10:28, 2 August 2009 (UTC)

I went ahead and restored it, minus the pointless company information, and the redundant information in the lead. I looked around at other antivirus software in that category, to see how those pages were done, and they are far more commercial than this one is in any form. DreamFocus 10:36, 2 August 2009 (UTC)
I highly suggest you stop posting "fluff". Post just the facts. If you post something you deem to be a fact, make sure that you cite a non-affiliated party. For example, a quote from the author of this software is not creditable when the claim is about what the software can do. He or she could say anything they like about the effectiveness or ability of their software without any real factual evidence. It's called Advertising. C2SP (talk) 21:06, 6 August 2009 (UTC)
What fluff? I don't see any quote from the author, just quotes from notable third party media coverage. DreamFocus 10:44, 15 August 2009 (UTC)

Expand article

Found lots of sources using google news. See here. TechOutsider(talk • contribs) 16:02, 9 August 2009 (UTC)

All of the noteworthy references listed there have been covered. The other listings are to forum posts and blog entries, which are not considered creditable sources due to the lack of citation or verifiable expertise of those who participate in the discussions. Furthermore, forum posts and blog posts typically share a POV (and from what I saw, that was the general theme), thus the 80 or so other links are merely hearsay and in no way creditable nor factual on any level and should not be used as a reference. "Encyclopedic content must be verifiable." C2SP (talk) 10:16, 15 August 2009 (UTC)

freeware and paid version differences should be listed

If there are two versions of the software the article is about, then you need to list the differences. That isn't an AD. Stop removing that. Look at other software articles. DreamFocus 10:45, 15 August 2009 (UTC)

Bias misquote of what reviewer said

The quote from the article is:

The culprit was something identified by Anti-Malware as Trojan.Agent, but here's the odd thing -- I can't find a good description of what this thing actually does. Malwarebytes doesn't provide any useful details, and other companies seem to disagree on what the Trojan does and how it works. Of course, there's no guarantee that these various antimalware vendors are referring to the same piece of code as there is no identification method or naming scheme that all antimalware vendors agree on.

And then the article reads:

*Mark Gibbs also stated that Malwarebytes' Anti-Malware used generic naming schemes to identify malicious software and that it lacked an explanation of what it had found.
  • Rather misleading isn't it? He pointed out there is no agreed upon standard on what everything is named. The different software companies thus choose what to call it themselves. Does the other software of this type list what each virus does? Windows defender doesn't, and I don't know of anyone else that does either. No reason to have this misleading bit in the article. DreamFocus 11:17, 15 August 2009 (UTC)
No it wasn't misleading to place that quote. What is misleading is the fact that you want to delete all parts negative, yet you still linked to that ref as if it would go unchecked. I reverted the entry back to its original and most relevant and NON-AD like state. Now I hope that this will be your absolute last time trying to re-create this ridiculous Advertisement. C2SP (talk) 20:15, 17 August 2009 (UTC)
Furthermore, you CANNOT ref the source of a topic when the claim is about what the topic can do or should do, whatever. Developers of software can say anything they like about their products and that does not mean that what they said is fact. You think that because they say it can do all these things, then it must be true, but the fact of the matter is, at most that's wishful thinking and in no way FACT. C2SP (talk) 20:23, 17 August 2009 (UTC)
There is no reason to place information about the products ability to update or even where it updates from or how they build their update database. Why you insist on placing that verbiage is beyond me. It doesn't make sense and it doesn't belong anywhere in this entry. If you were using it as filler, then don't bother. C2SP (talk) 20:23, 17 August 2009 (UTC)
Lastly to say that *many* believe this or believe that is hearsay no mater where the ref comes from. I don't find this software useful, no one I know has even heard of it, thus not everyone found it useful and certainly not many. Thus, hearsay equals deleted. C2SP (talk) 20:26, 17 August 2009 (UTC)
First, your personal opinion of the software is irrelevant. Next: you just added "He also stated that MalwareBytes used generic naming schemes to identify malware and had also failed to provide detailed information about what it had found." to the article. On what quote in the article is that based? What you have written is wholly biased. Despite Gibbs giving the software 4/5, with "only the lack of a detailed explanation" taking off a point, your statement above mischaracterizes his review. So I'm going to remove it until you can justify what you wrote. — HelloAnnyong(say whaaat?!) 20:30, 17 August 2009 (UTC)
Mark Gibbs = "It does the job and only the lack of a detailed explanation of what it has found stops it from getting 5 out of 5.", "The full scan took 4 hours, 8 minutes, 16 seconds", "The culprit was something identified by Anti-Malware as Trojan.Agent" (generic naming scheme). Now, please put back the quote, it is relevant to its reception. C2SP (talk) 20:38, 17 August 2009 (UTC)
Now that is what was said and here is what I said: "*Mark Gibbs from NetworkWorld stated that MalwareBytes took more than 4 hours to complete a full disk scan. Mark also stated that MalwareBytes used generic naming schemes to identify malware and had also failed to provide detailed information about what it had found.[1]" I don't think what I said was misquoted or biased, etc. C2SP (talk) 20:43, 17 August 2009 (UTC)
OK, I put it back until someone proves I was misquoting the article I guess. C2SP (talk) 20:47, 17 August 2009 (UTC)
(edit conflict) Give people some time to respond on these talk pages; not everyone is sitting around constantly reloading their watchlist.
Anyway, it's your WP:OR that it's a generic naming scheme. Per WP:V, we can only state what is in the article. And if nothing else, we should state what score he gives the software; after all, it's only fair. How about this as a proposed rewording:

Mark Gibbs from Network World gave MalwareBytes 4 out of 5, saying that the software does its job well, but that it does not provide good explanations of its results. He also reported that the program took more than four hours to scan his computer.

Since that actually _does_ state what's in the article, I'm going to change to that. — HelloAnnyong(say whaaat?!) 20:51, 17 August 2009 (UTC)
Can't find a reason to edit that. Sounds good to me. Add it. C2SP (talk) 20:56, 17 August 2009 (UTC)
I took a real hard look at this again, due to its recent history of using bunk refs. I discovered that the opeing description is not cited. It may have a ref, but that ref did not even talk about the verbiage in question. It states that they are planning to move to a United States location, yet it does not specify if they are now currently in the United States. Furthermore, the ref did not even describe the ability of the program (as in what it does), plus it does not mention whether or not this topic is indeed the *flagship* product. I made edits until these claims can be cited. C2SP (talk) 23:47, 17 August 2009 (UTC)
I noticed yet ANOTHER misquoted ref!! Your claim that BleepingComputer stated that this product was preferred is POV, as it was not mentioned to be preferred anywhere in the ref. Are we supposed to assume they preferred it just because they used it? Unless he said, "I prefer this over everything else" or something along those lines (which he did NOT), then that is gone too until proven otherwise. C2SP (talk) 23:54, 17 August 2009 (UTC)
Finally, I would like to suggest a change of words regarding this line: "News organizations have also picked up on Malwarebytes' Anti-Malware, having mostly positive things to say about program's detection abilities.[3][4]", If you check the refs, neither are a *News Organization*. Maybe Technical Blogs, or Technical Sites, etc would be more appropriate? C2SP (talk) 00:16, 18 August 2009 (UTC)
You removed a source that is titled "MalwareBytes Corporation" and lists Anti-Malware as a product. I'm going to add that back into the header, as it actually says what the article says it does. I made no claims about BleepingComputer, but I'm going to add that ref back and clean it up. AS to the last one, that's fine, whatever. — HelloAnnyong(say whaaat?!) 00:41, 18 August 2009 (UTC)
  • Why would you mention how long it took him to run the scan? That is misleading to people. It takes the same amount of time as any such scan. [citation needed] And how many other programs like this, if any, give you any detailed information about what they are removing? DreamFocus 04:46, 18 August 2009 (UTC)

The paid and free version, citation needed nonsense

I had replaced the citation needed with a link to their website, confirming they had a free and paid version, but this was replaced with the citation needed tag again. Do you doubt the primary source for this information? Is it not obvious that there is a paid and a free version? Why do you have a citation needed tag next to that one sentence? DreamFocus 04:53, 18 August 2009 (UTC)

A link to the about page does not confirm your claims. And, I see you have now reverted to digging up years old reviews. Are you looking for positive reviews only? Do you need me to help you find some negative ones? C2SP (talk) 08:21, 18 August 2009 (UTC)
If you find a negative one, as you are so determined to do, then add it. Just make sure it is a legitimate media source, not just a forum or blog. DreamFocus 14:58, 18 August 2009 (UTC)
I become more determined to find negative reviews (to balance out this travesty you call a wiki entry) the less you become determined to find them. And, what do you think your ref to CNET Blog was or BleepingComputer was, both blog posts. I guess I should go now and edit those out if you really think they don't belong here. Why don't you go ahead and do that since you placed them there, OK? C2SP (talk) 19:20, 18 August 2009 (UTC)
Those won't blog post, they were official reviews, from notable sites. The Network World one is fine, just not you mentioning the four hours it took, since they all take that long. And why would I want to find them at all? You want them in here, then you have to go search for them. I don't see as how the article really needs them. DreamFocus 20:40, 18 August 2009 (UTC)
Still posts made in a blog, so if you wont kill it then it must be fine to place other posts made in blogs here too, so I will start my search for the negative. I am sure that I could use audience reactions from those same refs since you find the ref so noteworthy. And, why wouldn't you want to find negative reviews for inclusion, are you affiliated to this MalwareBytes company? C2SP (talk) 22:00, 18 August 2009 (UTC)
Hey, I found two different and very creditable sources talking about some telemarketing scandal MalwareBytes was involved with, I'll go ahead and add a new section to cover that since it involved the topic of this entry. Should be an interesting read and could help to expand this article. C2SP (talk) 22:05, 18 August 2009 (UTC)

SoftPedia selective review

It did say the others didn't manage to wipe out the rootkits either, but Malwarebytes did manage to get everything else, picking up somethings that others did not. They praised it for running much faster, using far less RAM than any others. It was suggested that it be used with other things. The mention of the review should include everything, not just the negative part, and certainly not fail to mention that none of the other things tested were able to get all the root kits either. You can't criticize them for not doing something, which no one else could do either. Good find though. I suggest using cquote when quoting something though. DreamFocus 23:27, 22 August 2009 (UTC)

Well, I told you, since you are looking for ONLY positive reviews that I would be looking for ONLY negative reviews. I'm just getting started, there are many more to include. C2SP (talk) 23:37, 22 August 2009 (UTC)
I look for any reviews, just grabbing the first thing I found. But you can't take something out of context from a review, and imply something that isn't said. DreamFocus 23:52, 22 August 2009 (UTC)
I took out the POV part, but the other remains as it was a result of testing. I want to be fair, no POV's!! C2SP (talk) 23:31, 22 August 2009 (UTC)
You might add that if you like, how about user reviews/comments, are we using those? C2SP (talk) 23:33, 22 August 2009 (UTC)
BTW, I noticed your slick little change there. You can not assume that it will remove malware but it can be stated that it does at least scan for them, do not change that again. thanks C2SP (talk) 23:39, 22 August 2009 (UTC)
I didn't change anything. It always said that. Check the history. It formerly said a lot more.DreamFocus 23:51, 22 August 2009 (UTC)
perhaps we should nominate this entire page for deletion? I am seriously considering it for the following reasons:
  • Advertising or other spam without relevant content (but not an article about an advertising-related subject)
  • Articles whose subjects fail to meet the relevant notability guideline (WP:N, WP:BIO, WP:MUSIC, WP:CORP and so forth)
  • Any other content not suitable for an encyclopedia

Thoughts? C2SP (talk) 23:57, 22 August 2009 (UTC)

If you believe that, go for it. I'm sure reason will prevail, and it'll be a definite keep. DreamFocus 00:22, 23 August 2009 (UTC)
Yeah, I say go for it, too. -- Schapel (talk) 00:30, 23 August 2009 (UTC)
Would you like to go ahead and do it then. I would like to build a solid case first. C2SP (talk) 00:32, 23 August 2009 (UTC)
I don't understand why it is so important to include that it removes malware, when scanning for it should be good enough. That is like saying just because I turn the key in the ignition that my car will start. It might or might not, one can only ASSUME it will and an ASSUMPTION is not fact!! C2SP (talk) 00:38, 23 August 2009 (UTC)
The purpose of the software is to remove malware. Its what it exist for. And some programs give out free scanning, but you have to pay for a version that removes things. Its important to point out that this one has a free version that scans AND removes malware. DreamFocus 00:40, 23 August 2009 (UTC)
Thus my latest edit, it only attempts to remove them. Can you ensure that it will ALWAYS remove malware? No, then EDIT!! C2SP (talk) 00:42, 23 August 2009 (UTC)
It attempts to find them, and if it can find them, then it succeeds in removing them every single time. DreamFocus 00:45, 23 August 2009 (UTC)
Really? Citation? C2SP (talk) 00:47, 23 August 2009 (UTC)
Are you serious? Do you understand how software works? If it is able to find something, then obviously it can remove it. It isn't that difficult to erase it once you have identified it. DreamFocus 00:51, 23 August 2009 (UTC)
  • Three editors have reverted you. [2] HelloAnnyong, plus me and Schape a few times. Leave it alone already. DreamFocus 00:53, 23 August 2009 (UTC)
This page has been edited by a lot of people. Why don't you leave it alone? C2SP (talk) 00:55, 23 August 2009 (UTC)
We're talking about one sentence, which three editors have said you shouldn't mess with. Stop changing it back. DreamFocus 00:58, 23 August 2009 (UTC)
No, we are talking about cutting the fat. You see, the difference between me and you is, I am not affiliated with Malwarebytes and they aren't paying me to do this. C2SP (talk) 01:01, 23 August 2009 (UTC)
Against with your ridiculous accusation. I am not, and never have been receiving any payment, nor communications even, from Malwarebytes. DreamFocus 01:27, 23 August 2009 (UTC)
You sure do know a lot of insider information concerning Malwarebytes. Where did you get this insider information? C2SP (talk) 02:14, 23 August 2009 (UTC)

edit warring reported

I reported the violation of the three revert rule here: I see he did it again though. Be careful not to revert him more than three times. DreamFocus 01:23, 23 August 2009 (UTC)
I reported you, where you reverted 8 times. And, who are you talking to, your team members? C2SP (talk) 02:12, 23 August 2009 (UTC)
Not sure if you noticed this, but you reported the same revert TWICE!! This is probably why you get reverted so much. Try to pay more attention next time. Thank you. C2SP (talk) 02:33, 23 August 2009 (UTC)
Um.. not everything you reported was a revert. It should also be noted that WP:3RR applies only to edits in the past twenty-four hours, so your first three reverts of Aug 15 don't really count. — HelloAnnyong(say whaaat?!) 02:35, 23 August 2009 (UTC)
Tell me how many I included will stick? I am too new to get this perfect. C2SP (talk) 02:37, 23 August 2009 (UTC)

Speedy Deletion

This page shows no chance for improvement. ==Speedy deletion nomination of Malwarebytes' Anti-Malware==

A tag has been placed on Malwarebytes' Anti-Malware, requesting that it be speedily deleted from Wikipedia. This has been done under the criteria for speedy deletion, because the article seems to be blatant advertising that only promotes a company, product, group, service or person and would need to be fundamentally rewritten in order to become an encyclopedia article. Please read the general criteria for speedy deletion, particularly item 11, as well as the guidelines on spam.

If you can indicate why the subject of this article is not blatant advertising, you may contest the tagging. To do this, please add on the top of Malwarebytes' Anti-Malware and leave a note on the article's talk page explaining your position. Please do not remove the speedy deletion tag yourself, but don't hesitate to add information to the article that would help make it encyclopedic, as well as adding any citations from independent reliable sources to ensure that the article will be verifiable. Feel free to leave a note on my talk page if you have any questions about this. C2SP (talk) 02:44, 1 September 2009 (UTC)

You really ought to have a look at the types of articles which are typically tagged with {{db-ad}} to get an idea of what constitutes blatant advertising. This isn't it. I have no idea what your "looks dead" comment was about, but the software itself is obviously still being updated. We don't delete articles on the basis of the current content unless there's reason to believe that it's beyond salvage. Chris Cunningham (not at work) - talk 18:16, 1 September 2009 (UTC)

As a user I found this article mildly helpful so I oppose deletion.Burressd (talk) 01:21, 17 September 2014 (UTC)

recent negative additions

I see someone else has reverted it while I was reading through the new sources added. [3] After reading the review linked to at SoftPedia, and reading what was quoted from it, the selected quote did rather bias. The other freeware bits couldn't detect those rootkits either, which should've been mentioned. It did fine against other forms of viruses though, and received praise for being able to pick up things that other software could not, running fast, and using fewer resources. By only stating it failed to detect any root kits, it makes the software seem rather horrid. Unless you find a free malware scanning program that gets all or even most of the rootkits, you can't go criticizing any of them for something that none of them are able to do. DreamFocus 17:44, 24 October 2009 (UTC)

An anon IP, probably Cupids wings (talk ·contribs) just not logged in, reverted me. I'm glad that we're in agreement on this, though. Anon, perhaps you'd like to discuss your edits a bit more? — HelloAnnyong(say whaaat?!) 17:48, 24 October 2009 (UTC)
Special:Contributions/ new editor, 6 edits, three of which directly related to this article. DreamFocus 18:07, 24 October 2009 (UTC)
Not anon - it was me! (I've just fixed my sig on your talk page as well)
We're certainly not in agreement here though.
All I did was:
  • Reorder the existing references such that reviews raising issues were listed together
  • Remove a nebulus reference to "News organizations have..." to specify which ones (see Wikipedia:Avoid weasel words) - one of which was effectivly redundant, as already mentioned in the same section (Network World site)
  • Remove further weasel words about 3rd party sites
  • Add the highly relevant fact to the previous references where it stated it missed 67 rootkits, that that was out of 67 rootkits! - it missed all of them!
  • Removed two links to redirects of MS Antivirus (malware) under different names, which served no purpose other than to suggest they were two separate problems, not just the one (see the MS Antivirus (malware) page for aliases it uses)
If (for example) you feel other programs are similarly useless (100% failure rate, 42% failure rate), this should be stated in the article - not have it reverted back to something which is deliberatly misleading
Incidently, I've still not read anything in this article to suggest why it's notable enough to be included in the Wikipedia - which is a key problem with the article atm! I'm not actually sure why it would be notable either, there's a lot of products available which do thte same thing. Clearly you have an interest in it though - please could add something in to clarify this and ensure it conforms to WP:NOTE, otherwise the next guy to come along is just going to mark it again!
As it happens, the article's already been marked as an advert, and nominated for speedy deletion on at least two occasions. It's pretty clear there's a problem with the article; reverting my edits try to address this issue doesn't help. I'll leave the page as-is for now, though unless anyone can put in something better to make it more objective, I'll revert my edits back in. Cupids wings (talk) 18:12, 24 October 2009 (UTC)
Everything is notable according to the suggested guidelines, if it has been reviewed by reliable sources, which this software of course has. I know one of the other attempts to delete it was by a new editor who was warned about his inappropriate behavior at this article. So I don't the fact that someone suggested deleting it before you, and that the majority of people were against that, really matters. And you have been reverted by two different editors now, no one stating they agree with your edits. Follow Wikipedia procedures and form a consensus on the talk page, diving the content of what you did into sections, and discussing each bit perhaps. DreamFocus 18:40, 24 October 2009 (UTC)
You seem to have ignored the points I've made. Perhaps you'd like to go back and review each of them? Or, to cut things shorter, Which specifically don't you agree with? What exactly is the problem with the above, or are you seriously suggesting that the article as it is, is accurate, objective, not in the least bit misleading, and shouldn't be corrected?!! Cupids wings (talk) 19:58, 24 October 2009 (UTC)
What weasel words are you referring to? And why remove Both versions scan a user's computer and remove any malware that is found. You have to tell what the software does. DreamFocus 20:13, 24 October 2009 (UTC)
I covered two examples above - "News organizations have..." - which news organizations? The two listed (one of which is a duplicate - as described above) can be named explicitly.
"3rd party sites" - which "3rd party sites"? Be explicit, not vague with the use of weasel words. Why do you have any problem with this? Cupids wings (talk) 20:35, 24 October 2009 (UTC)
One of the overarching guidelines for notability is coverage in multiple secondary sources. There was an article in the Washington Post and LINK REMOVED PER SITE BLACKLIST. That's two, and that satisfies the basic version of WP:N. Perhaps the article in its current form doesn't contain enough information, but that can be remedied. 71 gnews articles and > 1 million ghits makes it somewhat more notable. — HelloAnnyong(say whaaat?!) 20:30, 24 October 2009 (UTC)
I think it'll be best instead of saying "news organizations" and "3rd party sites", to actually list some of them instead. That makes sense. You can't say that most news sites say its great, unless you look at all of them, and then count them up after all. I went ahead and removed that wording. DreamFocus 20:53, 24 October 2009 (UTC)
Sorry, I should have made my comment separate. I was responding to Cupid's question about proving notability. — HelloAnnyong(say whaaat?!) 21:46, 24 October 2009 (UTC)
Whoops! So was I. He mentioned those two things in his complaint, so the wording I did remove. DreamFocus 21:54, 24 October 2009 (UTC)

reliable sources

Anyone know where the list of reliable sources is at? I can't find it. I was wondering if Bright Hub would count as a reliable source.DreamFocus 18:07, 24 October 2009 (UTC)

If it's any use, Bright Hub's got a Wikipedia article, so presumably it's noteworthy enough to use?
Having said that though, it's debatable how noteworthy the Bright Hub article is itself - it's little more than a stub, with no claim of notability beyond that any other of thousands of similar sites could claim, and is practically an orphaned article - it's only got two links to it! Could you add/flesh it out a bit as well while you're looking at it? Cupids wings (talk) 18:19, 24 October 2009 (UTC)
Reading about it at places, and apparently almost anyone can sign up to post reviews, they putting it up there, no one checking for accuracy, and you get money from the ads on that page. People are thus encouraged to make as many articles as possible, to thus get more ad revenue. I don't think this would count as a reliable source. If anyone can remember where that page is that they list websites to add to the approved or rejected list of reliable sources, please post here or my user page and I'll get it reviewed there. DreamFocus 19:01, 24 October 2009 (UTC)
  • I'm curious if SoftPedia is a reliable resource. I Googled earlier and found some mention that they weren't. On their site I see celebrity gossip [4] written like a personal blog filled with opinions without facts, and other things that don't make it seem too credible. Opinions please. DreamFocus 21:42, 24 October 2009 (UTC)
Avoid Softpedia if you can. It's just an indexer of information, and not particularly reliable. — HelloAnnyong(say whaaat?!) 21:45, 24 October 2009 (UTC)

Added back Add tag

Anyone who reads this "entry" can see it is an AD. Plain and simple. You take out the negative remarks and post only the positive remarks and for what reason? Why is it so important that all references are positive? This is not a fair and balanced "entry" and it should not be allowed to stay the way it is now; it must be changed and dramatically. Or else, I think this thing should be nominated for the THIRD time to be deleted. C2SP (talk) 20:45, 27 October 2009 (UTC)

Can you give us some actual concrete examples of how it's an advertisement? And this article was nominated three days ago for CSD and was declined, so stop trying to have it removed just because you don't like it. — HelloAnnyong(say whaaat?!) 20:52, 27 October 2009 (UTC)
You're kidding right? I actually have to point it all out to you? Just read the entry yourself. And, I wont stop trying to delete this entry, and not because I don't like it (which I don't), but because it's the most obvious attempt to AstroTurf I have ever seen. You really have to be in denial not to see it. So, I don't know what to say: I'm not going to waste my time explaining it to you (AGAIN). C2SP (talk) 21:04, 27 October 2009 (UTC)
You were told last time not to add information back in without consensus. Other editors have told you in the past they were against that, and now HelloAnnyong and me are telling you again. If not a single person states they agree with you, and multiple editors say they are against it, then keep the tag out. Also, the only things taken out were from unreliable sources, or were quoted out of context in a misleading way to the reader. DreamFocus 22:00, 27 October 2009 (UTC)
  • Saying you won't stop until you delete the article, sounds like vandalism. If you want to nominate it for an AFD, then go to: [5] and read how to nominate something for deletion. I assure you, it will be kept. Its the same as all other software articles. Why not look at other software articles, and see what information they have, and why. DreamFocus 22:07, 27 October 2009 (UTC)
    • Just to point out, C2SP is very much a single purpose account. Nearly all of their edits have been about this page, and is something that might be taken into account during an AfD. — HelloAnnyong(say whaaat?!) 22:54, 27 October 2009 (UTC)
      • I would appreciate it if you would stop trying to label me with all these ridiculous terms. I could just as well call you a TOOL, but I wont. Anyway, I work on one article at a time, WHEN I HAVE THE TIME. This article is nowhere near complete, it backslides everyday. Until it is balanced or deleted, I wont stop making edits. I am NOT the only one voicing an opinion about this, check the history. You will see, once this gets fixed, I will be working JFK next. You'll see it. C2SP (talk) 01:02, 28 October 2009 (UTC)

how long the scan took the guy isn't relevant

I removed the [6] it took four hours to scan bit again. CNet describes the software is "relatively speedy malware remover". Everywhere I see reviews, talks about its speed compared to others. You can't mislead people by quoting the guy out of context, saying it took him 4 hours to do the scan. Unless you show a comparison of how long it took the same people to run other scans, then that information shouldn't be in there. Everyone please post Agree or Disagree, and state why if you feel like it. DreamFocus 01:35, 28 October 2009 (UTC)

Having the quotation on its own line like that adds way too much WP:WEIGHT to what is just one of several reviews. Ideally the reception should be in paragraph form (not a list) but to have the quote on its own line like that just makes it worse. Having said that, I suppose it is cherry-picking to point out the time that it takes to run. — HelloAnnyong(say whaaat?!) 02:56, 28 October 2009 (UTC)
It's a 6-year old argument, but still worth noting to non-participants that the idea of how long a scan takes is completely irrelevant to the anti-malware software, and "speed" doesn't mean much if it's detection rate is poor. There are numerous factors that will affect scan times, such as hardware (hard drive data transfer rate, available memory, memory speed, number of CPU's, CPU speed) and software (other applications running at the time, how much data is actually on the hard drive). Any mention of scanning times is completely misleading, and has no place in the article.Jonny Quick (talk) 06:20, 3 August 2015 (UTC)

Should the number of downloads for this software be in the article?

[7] I believe mentioning how many millions of people have downloaded the software, to be a relevant fact, and it clearly referenced. One editor keeps trying to remove that information though. Articles for television shows list how many people watched it. Same thing here. It belongs in the article. Please state if you Agree or Disagree, so we can form consensus and not end up with another edit war like last time. DreamFocus 01:39, 28 October 2009 (UTC)

This is a hard one. It's kinda funny that in the previous section you complain about how it's misleading to say the scan took four hours, but you want to include how many times it's been downloaded. To say that the software has been downloaded 24M times is technically true, but doesn't accurately represent the source - it should say that it's been downloaded from CNet that many times. But my bigger problem here is the source as a whole. It's one thing to use that page to say that it's an Editor's Choice program, and quite another to use a relatively trivial counter on the side. So I would support its removal until we can get a better source. For example, the Ubuntu article has a line saying that it was downloaded a bunch of times - but it references the New York Times. — HelloAnnyong(say whaaat?!) 03:04, 28 October 2009 (UTC)
FWIW, I believe both the number of downloads, and the scan time are contextless and useless. As has been pointed out, without comparison, the scan time tells nothing. And with the number of downloads, there is no indication of how many failed downloads, web spiders, upgrades, etc. are included. And it tells nothing of downloads from other sites. --HamburgerRadio (talk) 02:07, 4 November 2009 (UTC)
Okay. I'm fine with leaving out the number of downloads and the length of the scan. Way better solution. — HelloAnnyong(say whaaat?!) 02:26, 4 November 2009 (UTC)

Question about removal of Washington Post article

  • I'm have a question about the recent edit which removed a link to the Washington Post article. [8] Cupids Wings states in the edit summary "(WP "review" is actually generic review which applies equally to *any* malware and antivirus scanner)". The review [9] reads:
Malwarebytes' Anti-Malware (free demo, $25 to unlock all features) is a worthwhile addition to anyone's anti-spyware arsenal, because unlike some overly complex programs, it's easy to configure and use.

Using Malwarebytes' Anti-Malware is simplicity itself.

I'd like other people's opinions please. Is this not a valid review? DreamFocus 09:45, 4 November 2009 (UTC)

I reverted its edits myself, the edit summaries were simply untrue, and I am slightly concerned at a user that tried to delete this article once removing references like that. --UltraMagnusspeak 10:33, 4 November 2009 (UTC)
That's very selective quoting by User:Dream Focus.
I removed the reference - the "Washington Post review" is:
  1. A duplicate of the PCW review and not written by the Washingon Post, so it shouldn't even be referencing the Washington Post in the first place. If anything, the original PCW "review" should have been referenced as otherwise this misrepresents the source.
  2. There is no need to splatter the article with a total of 5 references to the exact same WWW site content on two separate (and at first glance seemingly unrelated) WWW sites. From User:Dream Focus's quote, the only place where it may be acceptable is in the "reception" section (which is really nothing more than a spam section as it's one sided, and only serves to promote the product, but that's separate issue).
  3. It is nothing more than a generic "review" which applies equally to any similar software product (as I clearly stated in the earlier edit summary) - thereby adding nothing to the article.
Cupids wings (talk) 16:10, 8 November 2009 (UTC)

Well, here is another reason to kill the washington post link, It is an exact copy of the PC World review. C2SP (talk) 23:50, 4 November 2009 (UTC)

They do say that at the top, and down below it says that's one of their partners. What's your point though? They don't have the staff to handle software reviews themselves, so they reprint articles from those they trust. DreamFocus 05:03, 5 November 2009 (UTC)
Well, I suppose you outta trust your PARTNERS. And, since you asked for it, I'll tell you my point. Since the Washington Post didn't actually print them, that all it was, was nothing more than an echo (a legal copy) of something printed by a source not a newspaper passed to them by a PARTNER. I think we might have a reason now to drop this article altogether, now that we know the nature of the reviews and how they were obtained. This means, at least in my eyes, that in fact Malwarebytes Anti-Malware is not noteworthy after all. Unless you want to give credit to any guy/girl with a website, I think we may have a problem here. You know software like Ubuntu or Windows, McAfee or Norton, only they are noteworthy, because they HAVE actually been printed in newspapers and everywhere else; they are well-known, people know what they are, etc. There is no question about their worth. However, you see this MBAM as it is so called, is just another Ad-Aware or Spybot rip-off, that will be here today and gone tomorrow. Why are we reserving space for such nonsense? Saying that, I say we reconsider the deletion of this article based on its lack of being noteworthy. C2SP (talk) 08:37, 5 November 2009 (UTC)
Wow, seriously? You're still trying to delete this article? Notability is defined by coverage in at least two secondary sources. The PCWorld/WaPo article is one, and NetworkWorld is two. Here's a third and a fourth. Stop trying to push your POV and move on. — HelloAnnyong(say whaaat?!) 13:11, 5 November 2009 (UTC)
Yeah seriously, because you know what, Network World is also a partner of PC World. How many PC World partners are we going to use here? Are we just going to keep referencing the exact same news/review as many times as we can find it on the Internet? I hope not. And, to be honest, I don't think you have shown enough evidence that any of these sources are truly creditable. You have the one PC World that I will agree with, but the others are either echoing the PC World Review or are not even themselves creditable resources. I think it's time you came to grips with this and realize that this article is about as noteworthy as yesterdays bowel movement and about as interesting as the flush that followed. C2SP (talk) 21:50, 5 November 2009 (UTC)
There is plenty of mention of it in legitimate sources. You can easily find them. Plus, over 25 million people have downloaded it. There is no question that large numbers of people use it, and know what it is. DreamFocus 22:14, 5 November 2009 (UTC)

Cannot remove viruses?

The latest allegation is that MBAM cannot remove viruses. One problem is that the term virus means different things to different people. Many people use the term to refer to all malware, so in this sense MBAM removes viruses. Perhaps MBAM does not remove a single true virus, meaning programs that replicate themselves from computer to computer. If someone wants to say that MBAM does not remove true viruses, it should be made clear that MBAM does not remove true viruses but removes other malware, and a reliable source should be cited. -- Schapel (talk) 23:17, 25 December 2009 (UTC)I looked through the references and could not find one that makes this statement.

I see someone put back the statement with a notice that the term virus is a catch-all is not a valid excuse. This completely ignores the main point: I looked through the references and could not find one that makes this statement.If someone wants to say that MBAM does not remove true viruses ... a reliable source should be cited. Remember that verifiability, not truth, is the threshold for inclusion in Wikipedia. Thank you. -- Schapel (talk) 02:04, 27 December 2009 (UTC)
The malware wouldn't get around, if it wasn't a virus. Contaminated files people download, are infected by the virus, and do in fact duplicate themselves under various conditions. There is no way possible so many people could be infected by something, if it was just one guy somewhere putting it out there time and again. That doesn't make any sense. DreamFocus 18:34, 5 January 2010 (UTC)

Intellectual property theft

"IOBIT initially denied the claim, but Malwarebytes presented the public with a whole bunch of proofs. IOBIT eventually removed the definitions without making any comment.[citation needed]" Why can't this be removed? It isn't cited and not even written properly yet I can't seem to edit it. —Preceding unsigned comment added by Theeonlyjbk (talk • contribs) 04:45, 2 February 2010 (UTC)

Odd. It seems to have changed now. Theeonlyjbk 04:25, 2 February 2010

Unbalanced tag

I'm going to remove the partisan tag from Reception, as it doesn't seem to make any sense. How are PC World and CNET not neutral sources? I'd like some clarification before it gets readded. — HelloAnnyong(say whaaat?!) 00:49, 3 June 2010 (UTC)

This section heaps nothing but "praise" for this product. It's not balanced and is nothing more than straight spam (which it clearly is) LinuxAngel (talk) 08:01, 3 June 2010 (UTC)
Then find some reliable sources that aren't so rosy. Previously we looked around for a bunch and didn't really find much, other than some people complaining on forums. — HelloAnnyong(say whaaat?!) 12:00, 3 June 2010 (UTC)
I found a new review at,2817,2363509,00.asp (not all the findings are good.) --HamburgerRadio (talk) 15:34, 3 June 2010 (UTC)
The reviewer rates the product as "good". The cons list includes "Must pay for real-time protection". Well duh! You should be reviewing the paid version primarily, companies not making things if they weren't making money from them. DreamFocus 15:41, 3 June 2010 (UTC)
Cons also include "Poor cleanup of rootkits and commercial keyloggers." The fact about having to pay for real-time is just reported without judgement in the heading anyway. --HamburgerRadio (talk) 15:47, 3 June 2010 (UTC)
(edit conflict) Good find. I've now changed the reception section over to using prose, as that's how the rest of Wikipedia does it. And I've added the new review. — HelloAnnyong(say whaaat?!) 15:42, 3 June 2010 (UTC)

I've semi-undone this edit, in that it doesn't accurately represent the source. If the product gets a 3.5 out of 5 and they say both good and bad things about the product, then we need to reflect that. To put an entirely negative spin on the review is inaccurate. — HelloAnnyong(say whaaat?!) 21:08, 3 June 2010 (UTC)

And I've modified this edit because of POV concerns. "the nastiest threats often use rootkit technology" doesn't need to be explained, and it's just making the one review seem more important than the others. This is getting rather tiresome... — HelloAnnyong(say whaaat?!) 21:55, 3 June 2010 (UTC)
  • In an attempt to balance it with some criticism, it listed the actual stats for what it failed at, but not the stats in the same review of how well it did with those it did good at. I removed this. [10] Also, the article referenced says
"Malwarebytes does attempt to remove keyloggers, but it's clearly not a priority for the app. In a separate test using commercial keyloggers, Malwarebytes detected just 29 percent of the samples compared to 86 percent for Norton and 92 percent for Spyware Doctor. Score-wise, Malwarebytes got 2.9 points, Norton 6.6, and Spyware Doctor 7.0."
  • Do we mention its not designed for that? These stats are for keyloggers ONLY. If its necessary to list stats for one thing, then you should list them for the other. Only listing the ones that show the negative is rather bias. It was tested for malware, scareware, keyloggers, and rootkits, separate scores for all, plus a total score already mentioned. Also, when the official website says its designed to remove malware, does that include scareware, keyloggers, and rootkits in the definition? Those things count as a type of malware. DreamFocus 22:19, 3 June 2010 (UTC)
Why did you go back to a list format? Nearly every other page on Wikipedia does reception in a prose format, and it's considered the standard these days. — HelloAnnyong(say whaaat?!) 00:08, 4 June 2010 (UTC)
Its easier to read. And who considers that the standard format? You can't put unrelated sentences together all shoved together in one paragraph because you want a prose format. DreamFocus 03:12, 4 June 2010 (UTC)
Um, take a look at every single article that has a reception section and is either FA or GA. Like here, today' FA was The Beatles: Rock Band. And just look at their reception section. It's prose, not a list. It's just a de facto standard. And I don't see how they're unrelated sentences; they're all reviews of the product displayed one after another. Would you prefer some flowery text that connects them together? — HelloAnnyong(say whaaat?!) 03:19, 4 June 2010 (UTC)
Don't jump on the bandwagon. Which is easier to read, to get and find information from? Textbooks and educational things do it like this for a reason. DreamFocus 18:35, 4 June 2010 (UTC)

This section is just promotional Gat101 (talk) 12:20, 4 June 2010 (UTC)

If you're either a sockpuppet or meatpuppet of LinuxAngel, you should probably avoid editing here - or anywhere else, really, as that sort of thing is not allowed on Wiki. — HelloAnnyong(say whaaat?!) 12:22, 4 June 2010 (UTC)
I was thinking the same thing. DreamFocus 18:35, 4 June 2010 (UTC)

Try addressing the issue and gaining consensus, instead of making ad hominem attacks against people just because they disagree with you and want to see the article be more neutral

Источник: []

What’s New in the malwarebytes anti malware license key Archives?

Screen Shot

System Requirements for Malwarebytes anti malware license key Archives

Add a Comment

Your email address will not be published. Required fields are marked *