Jump to content

Emptycloud

Members
  • Posts

    2
  • Joined

  • Last visited

    Never

Everything posted by Emptycloud

  1. Should have put this in my original post but for those who don’t want to read the article I linked above or don’t care to understand the exploit and just want a solution: “ahmadmbaghdadi April 7, 2021 at 3:07 pm The following steps work for Windows 10: Click the Windows logo on the bottom left corner and select Settings. Select Network & Internet. Select Proxy from the list on the left. Make sure “Automatically Detect Settings” is disabled. The following steps work for Windows XP, Windows Vista and Windows 7: Click Start or the Windows logo and then find Control Panel. In the control panel select Network & Internet and then Internet Options. Go to the Connections tab and select LAN Settings. Make sure “Automatically detect settings” is disabled.” Alternatively/additionally you can rename your domain name to something other than “domain.name” in your router’s settings. (Run Ipconfig /all from a command prompt and you’ll see it listed as the DNS suffix.)
  2. Hello, I also had this problem recently and resolved it. My new router set the name of my home network to “domain.name” by default and the website that Kaspersky is blocking for everyone here was created to exploit routers which do so. This article explains everything and further solutions for Windows users can be found in the comment section: https://nakedsecurity.sophos.com/2016/05/25/when-domain-names-attack-the-wpad-name-collision-vulnerability/. Cheers!
×
×
  • Create New...