dSupportSuite – Foolish IT https://www.foolishit.com Computer Repair Software - PC Tech Utilities - Malware Prevention Thu, 15 Feb 2018 21:48:20 -0500 en-US hourly 1 https://wordpress.org/?v=4.9.4 42914034 CCleaner (Piriform) Malicious Code Breach! d7x/d7II/dSupportSuite Users Take Notice! https://www.foolishit.com/2017/09/ccleaner-piriform-malicious-code-breach-d7xd7iidsupportsuite-users-take-notice/ https://www.foolishit.com/2017/09/ccleaner-piriform-malicious-code-breach-d7xd7iidsupportsuite-users-take-notice/#comments Wed, 20 Sep 2017 14:51:01 +0000 http://www.foolishit.com/?p=12907 Sept 26th, 2017 Update:  Yesterday this appeared on Bleeping Computer:

Avast Publishes Full List of Companies Affected by CCleaner Second-Stage Malware

Bleeping also put out a nice article from the 22nd, containing a nice summary if you’re just catching up on the news (because of course more has emerged since our last update, and we shouldn’t just assume you read it elsewhere):  

Info on CCleaner Infections Lost Due To Malware Server Running Out of Disk Space

Sept 21st, 2017 Update:  These articles also came out yesterday, unfolding some plot twists to this story.  If you get your news here, you could do better!  

It seems a new backdoor was discovered and … you just need to read these:

CCleaner Command and Control Causes Concern

CCleaner Malware Infects Big Tech Companies With Second Backdoor

Original post is below, but be aware some details may no longer be accurate as the story unfolds.

This came out two days ago on the CCleaner blog:  Security Notification for CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows users.

It seems that CCleaner has had malicious code bundled into their 32bit binaries (along with their “Cloud” version) and the tampering occurred prior to distribution.  The infected binaries were provided for download from their official site/update servers and distributed legitimately for about a month, silently infecting users to send data back to the ethers.  It also occurred completely under the nose of their new parent company Avast, the anti-virus software maker who acquired Piriform (the makers of CCleaner) as recently as July.  In fact, yesterday Avast released their own blog post about it, Update to the CCleaner 5.33.6162 Security Incident.

For the consumers who’ve used any of their products, you need to know this, but I’ve got ZERO advice for what you do with that information (other than maybe call a tech if you aren’t tech oriented, because you have software on your PC that is sending bits of your data elsewhere.)  On second thought, I’m told that Malwarebytes says their software removes/fixes it, and I see they have a blog post here:  [Updated] Infected CCleaner downloads from official servers (they have the free/trial/paid user-level “scanner” software which I’m sure all editions take care of the issue quite effectively.)

With prevention, the damage is done and over for the most part unless you’re still running the infected CCleaner, but that person isn’t reading this article…  By next update at least all of our CryptoPrevent users who haven’t noticed or heard should have detection sigs for the affected binaries, and Folder Watch can quarantine or the Program Filtering can pick it up on execution as well.  In fact from a few days ago when ClamAV was the only anti-virus engine to detect it (VirusTotal.com) today it lists 41/64 engines detecting it, and that’s just how it goes in this industry.  If you have the infection but you have any sort of security software, you won’t have the infection for long.

Finally the elephant in the room is trust.

I’m sure that the CCleaner developer could’ve been as shocked as anyone else to learn about the incident, but I just don’t know.  As for Avast, if checking CCleaner (and their other software) binaries with their own security staff, or even just a little software scan with their product, was not part of their decision to acquire Piriform/CCleaner, then I’d be very surprised (and maybe I should be…)

Regardless, if you use CCleaner or Piriform products, I don’t think that this is any reason to stop using them, or the parent company’s Avast’s products.  We should all now agree that malicious activity can breach even the most trustworthy, and we should also agree that when the incident is over it isn’t always a “trust” issue at all, maybe it’s more rare than we’d normally admit, but we just got burned.  So far that’s all anyone knows here, but the thing is it wasn’t just CCleaner users, but the people at Piriform got burned too, meaning whoever punches the clock there that isn’t involved in this (which is up to and including maybe everyone.)

I have no real advice here, and in fact I would like to explicitly offer no suggestion at all; but at this point in time, there are two points to understand:

1.  Piriform hasn’t entirely dealt with the issue until they know who did it, but that is a legitimate and long established “good” app and company, and you should have no doubt that Piriform (and their parent company Avast, the makers of that big anti-virus software product, I might reiterate) will be paying attention more closely from here on out.  That should be more comforting than it might sound to someone already burned.

2.  Realize that this can happen to any other legitimate and long established (“trusted”) software by the time you make the switch, if it didn’t happen already and it’s just undetected to date (as was the case here.)  

So the best I can offer for the time being is just a little food for your own thought, with the disclaimer that you take this information like anything else you read on the internets, with a grain of salt!  (That, and don’t forget you are likely infected, so get your PC looked at!)  


Now, speaking only to our IT Professional / Tech Shop customers, here’s what you need to know as a tech/IT pro who maybe uses CCleaner through a custom app profile with our software:

Malicious code has infected 32bit binaries of the 3rd party software CCleaner, which can be found as a default/included custom app profile in our more popular tech-oriented/non-consumer Foolish IT apps dating back to the original d7, so there’s a high probability that someone is using it in their tech work and repair scenarios…  64bit systems are unaffected, and there isn’t a “Cloud” version in our example profiles for 3rd party applications, so you should know if that’s an issue because you created and use the customized profile.

It’s worthy of note the malicious code was planted … ok I haven’t read it all (it would seem at least before digital code signing) which means it was an “inside job” and therefore changing your download links in the custom app profiles won’t matter, it wasn’t that kind of breach…

For more technicals on the CCleaner thing, the folks at Cisco’s Talos Intelligence Group have a nice technical analysis in CCleanup: A Vast Number of Machines at Risk and thanks to our own Brantley for the link, who pointed out the pic of ClamAV near the bottom with the very first detection, good job!  (ClamAV is an anti-virus engine which seems like the historical last to recognize or do much of anything, another fine example of how things shift quickly, frequently, and wildly in this industry.)


d7II and d7x (Alpha)

CCleaner (under the default custom app in d7II/d7x) should re-download itself every 7 days, so if the affected version exists in your d7II 3rd Party Tools directory, and for example you lived under a rock and didn’t know about the breach, then the infected version will be there for at most another 5 days before it is replaced by Piriform’s most recent version which we would all hope is still as clean as it should be right now.

In fact, you can disable the re-download option right now (d7II Config for the custom app, persistent settings tab, you want the check at the top I believe) and it won’t ever update unless it isn’t there, so in a bench / network / office / USB flash drive scenario you’re good to go with the download you have, still a very good program for what it does and more than likely legit/clean at the moment, and it won’t update anymore so you can use it without worrying about the profile updating it to a version you don’t trust yet.

Of course you’re reading this, and hopefully you clicked on the alert in the lower status bar, then please just go delete the entire “\3rd Party Tools\ccleaner” directory, and the “\3rd Party Tools\ccleaner.zip” file if they exist from ALL of your copies of d7II/d7x, and be done with it; the (hopefully) still clean versions will download automatically as usual, as you decide to use them.

If you made it this far and you are a d7II subscriber, please also check out the d7x Alpha info page to understand what is different and consider testing it, the download is found in the new d7x Manual.


d7 (original/free)

I do believe it is a default option for maintenance, and although I don’t recall the specific download rules in the final v10.something, I do not believe it updates much.  Anyone using this tool should seek to do the same as mentioned above and delete your CCleaner files, let them re-download and use that if you insist, for the time being.  Then look into d7II and the upcoming d7x first and step up.


dSupportSuite (and dMaintenance)

Owners of dSupportSuite may know the software includes example custom app profiles for CCleaner/Defraggler as 3rd party downloads, and those who’ve deployed dSS profiles to your clients using these apps are of course affected.

So with every maintenance cycle of dSupportSuite (weekly) by default when an internet connection exists it should attempt to download the latest 3rd party tools configured for use.  Good for the fix, not so much when it was a problem!  The same automated re-download on every maintenance also applies to the older dMaintenance stand-alone apps (both the original tech version and later home edition.)

Although the issue has been corrected (for the moment) on Piriform’s end, and we’re sure that they (and their parent company alike) will be keeping a close eye on future releases, you wouldn’t be wrong to push out a new profile that doesn’t include it, at least for a time.

Also, those machines have infected code possibly running on them right now, and as much as any fix (which will more than likely be present in their security product already on their system within the next few days, if it isn’t already neutralized) your clients need to be made aware of the breach itself.


The same goes for many tech shops and repair guys out there, I think your customers need to hear it IF they can possibly be affected.  Probably most tech shops at one point in time or another have had at least one employee use CCleaner on a customer’s system, quite a few probably within the last month, world-wide…  That’s conservative, but my guess more than likely is that CCleaner is just part of the way things are done in many tech shops, by most if not all techs who are allowed to do their own thing, if not being some semi-to-official company mandate (depending on how large the company is they shy away from 3rd party apps without $$ agreements, but under 20 employees it’s completely possible.)  It surely is in the toolbox of most door to door guys, wouldn’t you think?

This wide-spread usage is for a good reason, let’s not forget.  I think most agree it’s also good at doing what it advertises.  Dispute the app’s necessity all you want (and I would personally do it in some other article to some degree) but I don’t ever recall finding fault with the company’s character, and we still have it in the custom app profiles our tech customers use for a reason.  As stated earlier it is a legitimate and long established “good” app and company, so don’t’ forget Piriform’s reputation and read up on how they are handling it well right now.

I’m sure since it’s so widely respected and used, a quick visit to your favorite tech forums and you’ll find plenty of tips and example scripts on what others are already saying to their customers.

I know it’s an ugly conversation with any client, depending on how one might view the situation, but if you approach it with honesty, it can be a good opportunity to reconnect with clients maybe you haven’t seen in a while, and show them some concern and care.  It’s good to build any of your client relationships through all seasons, and the integrity pays in good ways.


https://www.foolishit.com/2017/09/ccleaner-piriform-malicious-code-breach-d7xd7iidsupportsuite-users-take-notice/feed/ 1 12907
d7II and dSupportSuite Updates! (d7IIx Alpha and dSupportSuite Mgmt Console) https://www.foolishit.com/2017/03/d7ii-and-dsupportsuite-updates-d7iix-alpha-and-dsupportsuite-mgmt-console/ Fri, 17 Mar 2017 21:20:06 +0000 http://www.foolishit.com/?p=12455 For d7II subscribers / IT Providers:

Today we’ve released a new update for d7IIx Alpha, but also today we’re making the Alpha builds public to all d7II subscribers (a currently active d7II subscription is required.)  This release contains no new features (in fact it IS d7II as far as existing functionality) yet it has been ported to the underlying d7x Platform code, in order to make current updates once again available.

This release is NOT for production environments, rather it is only a TEST BUILD, so please do NOT use this in your production environment!  d7II subscribers may however use the new build for testing purposes, and to contribute by submitting bug reports on features that previously functioned as expected in d7II.

See the d7x Alpha page for more information, or skip straight to the d7II Alpha – Known Issues / Submit a Bug Report page for the download and instructions!  Users of the d7IIx Alpha during previous testing closed to the public should see their d7IIx.exe update itself to the latest version upon launch, but it may also be downloaded manually if there are any issues.  


For dSupportSuite owners / IT Providers:

Yesterday an update was released to dSupportSuite Mgmt Console!  This update brings some minor bug fixes to the app used in creating/deploying your custom configurations, as well as preparing it to be moved to the new d7x Platform code for a future release, which will enable new functionality!

To receive the update, use the top left options menu in dSupportSuite Mgmt Console to find and select “Check for Updates” — the new version should download and start automatically after notifying you of the update; if the update fails to start for any reason, simply launch the Mgmt Console again.  Note you also may be prompted for the update automatically upon starting the Mgmt Console, depending on how recently it has been used.

Among this releases notable improvements are:

  • Introduced a new launcher, enabling you to choose the version of the Mgmt Console to use from within the app, as well as view the revision notes on the new version prior to usage.  While this new release was tested well, the launcher makes switching back to a previous version extremely easy, should a future update fail to function as expected.
  • Introduced a new convenience feature:  when closing the Mgmt Console you will be prompted to “Sync all modified content to server before exit (please be aware that currently this prompt is presented even when no changes have been made, but this will be addressed in a future update.)
  • Corrects an issue where using the “Sort by Dateand Sort by Name” functionality in the the “List” button drop down menu will crash the app under most circumstances.
  • Removes the /Migrate command line parameter to a separate executable (for migrating from legacy dCloud accounts to a self-hosted FTP server.)  Please be aware the documentation for self-hosted FTP migration has yet to be updated as of this post has now been updated in the dSupportSuite Online Manual.


EDIT:  I forgot to mention the new Emsisoft a2cmd profiles for dSupportSuite maintenance routines, which were also released last week (following new releases for the same in d7II custom apps) and are currently available for download at the bottom of the page in the dSupportSuite Online Manual.


There’s plenty more to talk about, but it’ll have to wait for next week!  

Have a great weekend!  

50% off ALL Products SALE with announcement of CryptoPrevent v8 Bulk Release https://www.foolishit.com/2017/01/50-off-all-products-sale-with-announcement-of-cryptoprevent-v8-bulk-release/ Tue, 17 Jan 2017 22:39:08 +0000 http://www.foolishit.com/?p=11946

v8 Bulk License Packs


Click Here for Coupon Codes!

What you’ve been waiting for is here!

CryptoPrevent Version 8 was released October 31st with exciting new features like our new FolderWatch Protection and HoneyPot Detection, We also beefed up the number of Software Restriction Policies from around 400 to over 3500 with the higher protection levels, added a QuickAccess SystemTray Notification,updated the filter module with d7x technology, updated malware definitions, and integrated KillEmAll v5.

Exciting News! Until now you’ve only been able to purchase CPv8 in single quantities or our White-Label reseller packs.  Starting today you will be able to get bulk packs of CPv8 in quantities of 10, 25, 50, 100, 250, and 500.

CryptoPrevent v8 Bulk License Packs
Available Here!

New Features Included in Version 8

FolderWatch Protection
Going past just Software Restriction Policies and improving on what Filter Module provides in protection. FolderWatch will allow CPv8 to monitor and protect folders from items that match the new and improved malware definitions included with CPv8.  Customize which folders are protected (beyond standard user folders) with the Premium Version (including CPv7 lifetime licenses).

HoneyPot Detection via Folder Watch Protection
This is the feature we are most excited about providing in CPv8.  If ransomware does manage to get through your other defenses, the HoneyPot Detection feature will limit or even prevent the encryption of files on a computer.  This feature will be one of our first Premium Only Protection options in CryptoPrevent.  (Because we feel it is that good, but CPv7 lifetime licenses will have it included!)
How does it work:
-creates and monitors honey pot files on selected FolderWatch folders
-when malicious activity is detected all processes are terminated and user is prompted to shutdown or reboot (customizable options will be provided in the White-Label Edition!)

Updated Filter Module
Filter Module has also been completely re-written from the ground up using the d7x technology platform Nick has been working on.  Improved performance, improved compatibility and  more updates to come as the d7x platform continues to evolve. This will also take advantage of the new and improved malware definitions being included with CPv8.

Updated Malware Defintions
The malware hash definitions have been completely redesigned and a significant number of hashes have been added including hashes of samples we have found or have been submitted to us.  There is also a new Expanded Definition set that includes even more definitions although these may carry a risk of having a higher false positive rate.  The malware definitions backend has also undergone improvements on our side to provide a more regularly scheduled release ability automatically.

QuickAccess SystemTray Notification
Providing the ability to review or quickly change CryptoPrevent protections (like when you need to lower protections to install certain software or run backup operations.  Convenient access to KillEmAll and balloon notifications of when files execution is prevent, files are quarantined or when HoneyPot Detection has been activated.  This feature will be Premium Only option.  (CPv7 lifetime licenses will have this included)

KillEmAll v5
KillEmAll v5 will be integrated into CPv8.  Based on the d7x technology platform, this feature provides quick, efficient process termination when you can’t trust the “X-button” to close a window.  From malicious pop-up windows, to sites that display unmovable windows, to programs that just won’t exit…KillEmAll stops them dead in their tracks.  This can be accessed from the main CPv8 interface for all edtions (including the free version) but comes in handy the most from the QuickAccess SystemTray feature (which is Premium Only) and plays a major role in the HoneyPot Detection feature as well (which is also Premium Only) (CPv7 lifetime licenses will have these premium features included)

Updated Software Restriction Policies
The protection that started it all has been vastly updated to attempt to protect your system even more.  With over 2500+ just on minimum protection level with up to 3500+ on higher protection levels, new extensions will be blocked as well as new preventions of certain windows features/applications that can be used maliciously against your files.  Even more software restriction protections options are in planning/internal testing phases, so there is still even more to come after CPv8 is released.

Click Here for Coupon Codes!

Click Here for Coupon Codes!

We’re having a 50% off SALE on ALL PRODUCTS!! [Expired] https://www.foolishit.com/2017/01/were-having-a-50-off-sale-on-all-products/ https://www.foolishit.com/2017/01/were-having-a-50-off-sale-on-all-products/#comments Tue, 17 Jan 2017 21:42:57 +0000 http://www.foolishit.com/?p=11932 This Sale Has Expired Codes Are No Longer Valid

To celebrate the release of CryptoPrevent v8 Bulk Edition (completing the availability of all CryptoPrevent v8 product types) we’re having a huge sale!

Get 50% off ALL Foolish IT products by using the coupon codes below at checkout!

Hurry this sale could end at anytime so don’t miss your chance to take advantage of this amazing opportunity!!

Make sure to use the following coupon codes during checkout:
  • CryptoPrevent Premium Sub
  • Use coupon code:  2pasjb  for 50% off purchase price!
  • CryptoPrevent Premium 1-Year
  • Use coupon code:  gtbxg6  for 50% off purchase price!
  • CryptoPrevent Premium Bulk Packs
  • Use coupon code:  ww1yaz  for 50% off purchase price!
  • CryptoPrevent Premium White-Label Packs
  • Use coupon code:  yg9wyw  for 50% off purchase price!
  • d7II
  • Use coupon code:  fmxrqm  for 50% off purchase price!
  • dMZ Add-On for d7II
  • Use coupon code:  jrbluy  for 50% off purchase price!
  • dSupportSuite
  • Use coupon code:  wukhpd  for 50% off purchase price!
  • dSupportSuite 3-Month
  • Use coupon code:  pxcyf5  for 50% off purchase price!
  • All Other Foolish IT Products
  • Use coupon code:  wukhpd  for 50% off purchase price!
  • ]]>
    https://www.foolishit.com/2017/01/were-having-a-50-off-sale-on-all-products/feed/ 1 11932
    Foolish Tech Show 01/04/2017 has been posted to our YouTube channel! https://www.foolishit.com/2017/01/foolish-tech-show-01042017-has-been-posted-to-our-youtube-channel/ Thu, 05 Jan 2017 14:40:05 +0000 http://www.foolishit.com/?p=11868 If you missed the show from yesterday (01/04/2017) or just want to review it again, we’ve got it edited and posted to our YouTube channel!

    On this episode we go over a demo of all the amazing features and options you have to increase your recurring revenue opportunities with dSupportSuite.

    We’ll be back on the air today (01/05/2017) at 4pm EST! Join us at http://www.foolishtechshow.com to join our live chat and talk with us directly!

    Merry Christmas! d7 Premium is Now FREE! https://www.foolishit.com/2015/12/merry-christmas-d7-premium-is-now-free/ Sat, 19 Dec 2015 13:54:46 +0000 http://www.foolishit.com/?p=9630  

    Ho, Ho, Ho!

    d7 Premium is now FREE, get yours NOW before we come to our senses!

    www.foolishit.com/getd7     < – – – – TELL YOUR FRIENDS!

    Merry Christmas to EVERYONE!


    Also, just in case you already have d7 Premium and didn’t know about our upgrade offer, we started promoting earlier this year that d7 Premium users who also have the old “dCloud” subscription, even the lifetime ones, can get complementary d7II (and soon d7x!) so long as your dCloud subscription remains active/current.  For currently paying subscribers, this basically means you’re getting the whole d7II package for the same price you are already paying for d7 Premium’s dCloud service.  For the folks who purchased the lifetime dCloud, you also get the d7II deal for the same price you are already paying for d7 Premium’s dCloud service, which was already paid in full in your case, so you’re good.


    To be clear, the upgrade deal ONLY available for CURRENT (ACTIVELY PAYING or LIFETIME) SUBSCRIBERS, and carries NO additional cost to anyone.

    The big caveat is that you must relinquish your old dCloud account, which isn’t just used for the original d7 Premium, but also could be used for dSupportSuite hosting.  If you’re in that boat we can help you migrate to your own self-hosted solution, or just don’t take the deal and continue using the old dCloud service as always, it’s entirely up to you!

    Trouble downloading from us? https://www.foolishit.com/2015/08/trouble-downloading-from-us/ Wed, 26 Aug 2015 17:53:03 +0000 http://www.foolishit.com/?p=8837 Please accept my apologies, but to fess up, I did it…

    Recently I continued a project started earlier before summer, to move our download server to a more capable host, while splitting it into separate servers for different applications/updates so one failure wouldn’t affect all of our apps download/update capabilities, and also to pave the way for some new redundancy.

    Well between yesterday and today, we’ve had the usual download and update issues due to slow DNS propagation to various parts of the world, and a host of other issues finally ending with I just simply neglected to ensure I created a certain login account on one of the servers — that last one affecting only d7II trying to check for updates wasn’t resolved until around 1pm ET just over an hour ago, however since that has nothing to do with DNS the fix is instant for everyone.

    To our knowledge all of these issues should be resolved completely, although DNS changes typically warn 48 hours to propagate, our last DNS change was made little over 12 hours ago and we rarely see any issue beyond 2-3 hours, with most servers getting the new addresses within minutes.

    If you are having any trouble downloading or updating our applications at this point, please be patient (DNS) and try again if it’s been a few hours even, and let us know if the problems persist at http://support.foolishit.com so we can track it and assist ASAP.

    Thanks, and again I apologize for the inconvenience!

    New CryptoPrevent Edition Coming Soon… https://www.foolishit.com/2015/05/new-cryptoprevent-edition-coming-soon/ https://www.foolishit.com/2015/05/new-cryptoprevent-edition-coming-soon/#respond Wed, 06 May 2015 22:39:35 +0000 http://www.foolishit.com/?p=6804 I recently wrote about new positions and Foolish IT expansion, and just before that upcoming CryptoPrevent releases and new designs for our flagship software d7II.

    I have several important CryptoPrevent related announcements after this, but first I would like quote myself from one of these recent posts:

    CryptoPrevent was created in late 2013, on suggestion from an existing d7 customer, in order to help his customers shortly after the outbreak of the original CryptoLocker. It was quickly developed and soon released to the public, with the intention of protecting as many people as possible from this new and dangerous threat. It should also be stressed that the tool’s protection functionality has always been free of charge, so that increased its user base very quickly. Soon after release, its effectiveness won the attention of some major media outlets where it received quite a bit of attention; this is a trend that continues to this day.

    Fast forward to the present, where new Crypto-related ransomware is coming out with increasing frequency. Every time a new threat emerges an article is written where CryptoPrevent is mentioned (with links to our website) either in the article itself or within the comments. As a result people flock to the download links, and we can’t estimate the sheer number of downloads from all the 3rd party download sites (both major and minor) and their mirrors, much less our website where the counters have been reset numerous times between server migrations and plugin changes.

    While we don’t have the numbers, the truth is that a LOT of people put faith in CryptoPrevent, and yes it is significantly more than our paid d7II subscribers. These people are seeking a solution and they believe in our product, so it is IMPERATIVE that we maintain software updates for CryptoPrevent, to keep it relevant against these emerging threats.

    In short, we feel that maintaining updates to CryptoPrevent is an important responsibility that cannot be taken lightly, and as a result when we get a good tip on a new prevention idea or technique, we feel obligated to get that update out to the users as quickly as possible. This is actually a frequent scenario for two reasons: 1. our media exposure, which occasionally lands us in sight of independent security researchers looking to pass along a new solution to as many people as possible.  Reason 2. is our massive customer base of great PC technicians, mostly d7II subscribers who frequently contribute ideas and solutions to the d7II project, and either directly or by proxy, also contribute to projects like CryptoPrevent!  Your feedback and support actually provide concepts and code advancements which are used in all of our software, not just d7II!  So yes, you are extremely important!

    I wanted to quote that to highlight the need for this.  Recently we have expanded our family to bring CryptoPrevent a dedicated development team, rather than sharing development time with our flagship PC repair software, d7II.

    As the CEO of Foolish IT and sole developer until this point, I am very excited to have some new and talented help! This allows me to focus my energies on new research, ideas, and writing new code for both products, while being supported by an energetic team to focus on keeping the software operating smoothly, providing updates, and making the user experience the best it can be.  Cutting to the chase, here’s the big news:

    Foolish IT will be introducing a new low cost subscription based edition of CryptoPrevent.  Customers of the existing Premium Edition will continue to enjoy all of the benefits and features they are used to, with additional benefit from the continued software updates provided by our new development team.

    Finally, users of the Free Edition will continue to enjoy the same comprehensive protections of the newer releases, from which ALL editions benefit.

    We strongly believe that the core malware prevention features, which are a vital complement to existing anti-virus software protection, should remain FREE to all who desire an extra layer of security.

    https://www.foolishit.com/2015/05/new-cryptoprevent-edition-coming-soon/feed/ 0 6804
    d7 and dSupportSuite now integrate with RepairShopr! https://www.foolishit.com/2013/12/d7-dsupportsuite-now-integrate-repairshopr/ https://www.foolishit.com/2013/12/d7-dsupportsuite-now-integrate-repairshopr/#comments Fri, 06 Dec 2013 16:14:22 +0000 http://www.foolishit.com/?p=4154 What is RepairShopr?

    RepairShopr is an all-in-one system integrating tickets, CRM, invoices, and marketing in a simple, easy-to-use platform designed specifically for computer repair shops. The streamlined workflow allows you to increase shop efficiency while powerful leads and marketing tools help you build customer relationships to grow your business.

    d7 Integration

    Currently RepairShopr can receive reports from d7’s email reports feature (including the system information report, activity logs, malware logs, etc.) and save / display all of the various reports under your customer / ticket number in RepairShopr’s console.  This requires the ticket number to be prompted for within d7, the word ‘d7’ to appear in the email subject (as it does by default), and reports should be emailed unzipped from d7 to your ticket reply email configured in RepairShopr.

    dSupportSuite Integration

    Currently RepairShopr has a powerful integration for receiving dSupportSuite’s daily Heartbeat emails.  The really neat thing about this feature is that you can have RepairShopr configured to receive all of your daily Heartbeats instead of having to receive them and filter through them yourself, then it can email you an alert only when necessary.  Not only will you receive the reports through RepairShopr’s console, but RepairShopr can be configured to alert you when the Heartbeat emails fail to be received for xx number of days.  Also if the Heartbeat email contains certain terminology/phrases (completely configurable) RepairShopr can alert you automatically in this event, ex. “virus detected, failing, disk error” etc. etc.   dSupportSuite must be configured to email the Heartbeats to your ticket reply email configured in RepairShopr.


    I will be following up soon with a Youtube video on configuration of both products for these features, and what to expect from usage.

    Also note that this is just the beginning of my collaboration with the folks at RepairShopr.  While nothing specific is currently planned for future integrations and collaboration, we are leaving discussions open as to what more can be done to add value to both of our product lines, while making your life easier as a tech.  If you are a user of both of our products and you have a neat idea for an integration between them, please let us know!

    Click here for the Setup KB from RepairShopr


    https://www.foolishit.com/2013/12/d7-dsupportsuite-now-integrate-repairshopr/feed/ 1 4154
    dCloud Self-Hosted Now Live! https://www.foolishit.com/2013/07/dcloud-self-hosted-now-live/ https://www.foolishit.com/2013/07/dcloud-self-hosted-now-live/#respond Mon, 08 Jul 2013 22:02:13 +0000 http://www.foolishit.com/?p=2643 A self-hosted option for operating your own cloud environment, dCloud Self-Hosted (dCSH) is now available for users of dSupportSuite!

    Utilizing your own cloud reduces security risks and increases speed of cloud operations within dSupportSuite, as the information is on YOUR server and not mine (which shares bandwidth and processor power with other users of dSupportSuite and d7.)

    The only requirement for dCloud Self-Hosted is an internet exposed FTP server capable of FTP Passive mode.  This can be a any OS, but Windows is preferred for future functionality which may require server side software that would only be compatible with Windows.  A server OS is not required, a workstation OS will work just fine.  You may use Windows Server’s IIS for the FTP component, or preferably FileZilla Server for Windows.

    See the subsection FTP Server Setup for an idea of just how easy it gets.  For existing users of dSupportSuite and dCloud, you will need to also visit the Migrating from dCloud subsection.

    dCloud Self-Hosted is included when you purchase a dCloud Lifetime Subscription either by itself or as part of a bundle.  If you have already purchased a dCloud Lifetime Subscription prior to the release of dCloud Self-Hosted, you may contact me for a product key that will allow you usage of dCloud Self-Hosted.

    Sorry, d7 functionality for dCloud Self-Hosted is not yet available.

    https://www.foolishit.com/2013/07/dcloud-self-hosted-now-live/feed/ 0 2643