![]() |
#16 |
Wizard
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 3,305
Karma: 10259306
Join Date: May 2016
Device: kobo forma, Kobo Libra, Huawei media Tab, fire HD10, PW3 HDX8.9,
|
|
![]() |
![]() |
![]() |
#17 |
null operator (he/him)
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 21,733
Karma: 29711016
Join Date: Mar 2012
Location: Sydney Australia
Device: none
|
↑ ↑ ↑ ✔️
@FrustratedReader - I'm a volunteer for a community service provider that targets the disabled and elderly. As such, I have probably eradicated at least a 100 malware infestations on various computers. I'd say 70% came from email attachments, and 20% from software downloads - I can't recall ever tracing one to a USB stick or direct intrusion. BR |
![]() |
![]() |
Advert | |
|
![]() |
#18 | |
Well trained by Cats
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 31,064
Karma: 60358908
Join Date: Aug 2009
Location: The Central Coast of California
Device: Kobo Libra2,Kobo Aura2v1, K4NT(Fixed: New Bat.), Galaxy Tab A
|
Quote:
The only on not mentioned is 'drive by' type (no click or open needed). Most modern browsers do stop these, but there are folk running W9x that might be vulnerable as their browser is so out dated (no basic support). |
|
![]() |
![]() |
![]() |
#19 |
Still reading
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 14,058
Karma: 105092227
Join Date: Jun 2017
Location: Ireland
Device: All 4 Kinds: epub eink, Kindle, android eink, NxtPaper
|
" Most modern browsers do stop these,"
No they don't unless you have a script blocking plugin such as noScript or uMatrix. Indeed Never open any email attachment without being 100% sure who sent it. The From address doesn't count. Make sure file endings are enabled (Windows) and you know which files are safe to open. Infected SD cards USB sticks are a common corporate attack vector. Make sure no autorun repartition any recycled or new one. They are not a likely source of malware for people not in the work force and not in youth culture. Unprotected browsers are the problem. All the many PCs I've removed viruses, trojans and root kits from had working AV software. All were used with unprotected browsers and by people that had never been told about spoofed From in Emails, turning off remote content in emails and assuming you can click on email attachments. Many fooled by filename.txt<loads of spaces>.exe etc. Some of the PCs had vital system files "quarantined" by AV software by mistake and thus would not reboot or would crash. Education, a script blocker, no remote content in email viewer (don't use Web mail), no autorun is FAR better than any AV and won't break Calibre or other programs. |
![]() |
![]() |
![]() |
#20 | ||
Junior Member
![]() Posts: 5
Karma: 10
Join Date: Dec 2017
Location: Wales
Device: Android - Google Play Books
|
Quote:
Frankly, I'm not particularly worried at all but if I am going to have ransomware protection on my system... my ebook library of 2893 books is pretty high up my list of directories I would like protected. Quote:
In fact this very topic was a source of another issue I had with Windows Defender, you see I am a Unix Admin and I work with security so a good portion of the aforementioned ebooks are about Programming, Shell Scrips, Pen Testing, Blockchain that kind of thing and it seems that books about computer security triggers Defender and it gets, well... defensive, I fixed that issue although I didn't bother posting it here as it wasn't an issue with Calibre per se, but if you're curious here is my post. However, I am also not worried about getting ransomware from any of my ebooks. Again not sure why you would think that? In the event I do get ransomware on my system though... it would be nice if my ebook library wasn't the only directory that is actually vulnerable to attack. Obviously I backup my system frequently so even if I was foolish enough to run something I shouldn't (and I never have been so far), it wouldn't really be an issue... that is not the point. The point is a built in part of system is not working as it should. I am familiar with the third party options... I have third party options, I am happy with my setup, it is just bugging me that this isn't working as it should. I'm pretty sure I mentioned I had a workaround sorted already in my initial post. I only posted here to see if anyone had a regedit, shell command or even a group policy edit that might remedy the situation. Not because I'm worried... just because it isn't working and it should be and that is annoying! As I said I am not particularly concerned, I was just curious if anyone here had a solution, you know since this is the main Calibre forum, I thought it was worth posting here as well as the Microsoft forums, don't worry though I won't make that mistake again ![]() To be honest I sincerely doubt I will ever bother posting another thread here. You're such a lovely, welcoming group... the snarky, patronising comments, telling me to do the things I explained in my first post, it's given me such a warm fuzzy feeling, definitely not in a good way. |
||
![]() |
![]() |
Advert | |
|
![]() |
#21 | |
null operator (he/him)
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 21,733
Karma: 29711016
Join Date: Mar 2012
Location: Sydney Australia
Device: none
|
MS seemed to have changed the message
With the Ransomware feature enabled, if I try to switch to a folder in Documents, I get this as a right bottom corner notify message, I don't know what calibre-file-dialog.exe is or where it is, so I can't add it to the exclusions list. I also noticed this in the CFA settings Quote:
BR Last edited by BetterRed; 04-12-2019 at 04:27 AM. |
|
![]() |
![]() |
![]() |
#22 | |
Fanatic
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 518
Karma: 2268308
Join Date: Nov 2015
Device: none
|
Quote:
Because people like to do more in their browser than reading and sending forms. Because people like automation in their routine office tasks. Because file extensions are confusing for most people, and they will delete them inadvertently when renaming their files. What do you propose looks like a certain 'secure' OS enjoying <2% of the market share. |
|
![]() |
![]() |
![]() |
#23 | ||
Bibliophagist
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 46,273
Karma: 168983734
Join Date: Jul 2010
Location: Vancouver
Device: Kobo Sage, Libra Colour, Lenovo M8 FHD, Paperwhite 4, Tolino epos
|
Quote:
In theory, you could embed malicious javascript in an epub3 ebook. After seeing one item titled "Security Diligence Required to Prevent ePub or Mobi Javascript Hacks", I did some playing with the idea. I could not find an ebook renderer that would execute those malicious code snippets on my ereaders. Blasted programmers who limit the functionality of their code. ![]() Last edited by DNSB; 04-12-2019 at 01:17 PM. |
||
![]() |
![]() |
![]() |
#24 |
Wizard
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 3,305
Karma: 10259306
Join Date: May 2016
Device: kobo forma, Kobo Libra, Huawei media Tab, fire HD10, PW3 HDX8.9,
|
The threat to book libraries from ransomware really is miniscule. 99% of all book libraries will backup to on a cheap removable usb stick or we card, which cannot be infected and held for ransom if stored offline. 64 Or 128gb storage probably costs less than single years subscription to a paid for anti ransomware solution and an offline backup is easy to update.
flipping it around, having your my documents folder protected from ransomware is little comfort if the rest of your machine gets encrypted.. you would probably have to wipe the hard drives and rebuild it all anyway if that happened. Anyway multiple solutions and workarounds have been offered. The OP seems to have thrown her toys out of the pram and moved on. Maybe we should all do the same - move on that is , not throw toys ![]() |
![]() |
![]() |
![]() |
#25 | |
null operator (he/him)
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 21,733
Karma: 29711016
Join Date: Mar 2012
Location: Sydney Australia
Device: none
|
Quote:
So, I'll try to figure out why I don't need to exclude C:\Program Files\Calibre2\ebook-viewer.exe from CFA checks to view epubs in Documents; but -- assuming it gets rid of the CFA message -- I do have to exclude C:\Program Files\Calibre2\app\DLLs\calibre-file-dialog.exe to use calibre to manage libraries in Documents. I do not have CALIBRE_NO_NATIVE_FILEDIALOGS set, so .... ? BR Moderator Notice
Just a gentle reminder - this thread is about Defender's protection against ransomware via its Controlled Foider Access mechanism, and its affects on calibre. We might have lost sight of that. The fact that the OP has departed doesn't mean there not issues to be discussed. Last edited by BetterRed; 04-12-2019 at 06:15 PM. Reason: clarity |
|
![]() |
![]() |
![]() |
#26 |
creator of calibre
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 45,363
Karma: 27230406
Join Date: Oct 2006
Location: Mumbai, India
Device: Various
|
calibre-file-dialog.exe is a helper program calibre uses to show file dialogs -- it was needed because there are idiot applications like spideroak that write explorer extensions in python and you cannot have multiple python interpreters in a single process. Therefore to work around them I had to write a dedicated helper program in C just for selecting files.
|
![]() |
![]() |
![]() |
#27 | |
Junior Member
![]() Posts: 5
Karma: 10
Join Date: Dec 2017
Location: Wales
Device: Android - Google Play Books
|
Quote:
I doubt anyone is targeting ebook readers themselves (the hardware I mean) as there isn't much to be gained from doing so (possibly your Amazon login from Kindles) but people who read on their computers or tablets using a browser, or even using a ereader program that supports scripts could be vulnerable. Browsers themselves have a lot of personal info about people from the autofill alone and if they can get at the saved passwords well that would be the kind of thing they might want to target, without considering anything outside of the browser. Browsers can often access your filesystem too. I will add that Chrome and Firefox don't seem to be willing to open them so perhaps it's just Edge that is vulnerable. Perhaps when it switches to Chromium it will no longer work. Just to be clear I don't think anyone is suggesting ransomware is being embedded in an ebook but some malicious scripts could be and if opened using a program that supports scripts (Adobe Acrobat for PDF, Edge for EPUB, as two examples) then you could be vulnerable to attack. Like I said I am not concerned about my ebooks containing anything untoward, I was just responding to someone who seemed to think I was... but your post was interesting so I thought I would respond ![]() |
|
![]() |
![]() |
![]() |
#28 |
Wizard
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 3,305
Karma: 10259306
Join Date: May 2016
Device: kobo forma, Kobo Libra, Huawei media Tab, fire HD10, PW3 HDX8.9,
|
I think we are all on the same page here: the only people at risk from e-books are those who get them from very dubious sources. I for one have little sympathy if they suffer unexpected consequences.
|
![]() |
![]() |
![]() |
#29 | |
Still reading
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 14,058
Karma: 105092227
Join Date: Jun 2017
Location: Ireland
Device: All 4 Kinds: epub eink, Kindle, android eink, NxtPaper
|
Quote:
Go to Browser "Applications". Set anything not a "Web Page" to be prompting to Save. Install a real PDF reader (Summatra, Foxit, PDF express, even Ghostview). Linux comes WITH two real PDF readers as default. Install Calibre and use its ePub & Mobi ebook reader standalone. Add a script blocking plugin such as uMatrix or NoScript. Don't use Edge or Internet Explorer unless mandated by your company as MS has lost the Plot on Browser and Windows design. Use Safari, Firefox, Waterfox etc. Chrome is Google Spyware. |
|
![]() |
![]() |
![]() |
Tags |
error, windows defender |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Windows Defender flags 2.71 calibre-file-dialog.exe | Bookee | Calibre | 4 | 11-03-2016 09:02 PM |
Calibre 2x Blocked on Windows XP | Enigmaesq | Calibre | 5 | 09-26-2014 07:08 PM |
Windows Defender crashing Calibre! Help! | clearlakeoakie | Devices | 8 | 07-09-2011 11:22 AM |
v0.6.34 Calibre keeps prompting Windows Defender | scub | Calibre | 5 | 01-20-2010 02:28 AM |