software182 Posted August 8, 2014 Share Posted August 8, 2014 Can you upload (or point a link to) the patch only - shall try it (I am running Windows Firewall, myself.) ;)//www.nsaneforums.com/topic/195054-sublime-text-3-build-3056/I couldn't really tell what was happening here anyway. :)edit: sorry, I posted wrong link :doh:edit2: I was trying to fix last dev version (3062) with keymaker CORE :PWhy do use keygen instead the serial key that has been posted by arion ? I'm using the serial key and it works with latest dev version without blocking it with firewall :think: Link to comment Share on other sites More sharing options...
dcs18 Posted August 8, 2014 Author Share Posted August 8, 2014 Can you upload (or point a link to) the patch only - shall try it (I am running Windows Firewall, myself.) ;)//www.nsaneforums.com/topic/195054-sublime-text-3-build-3056/I couldn't really tell what was happening here anyway. :)edit: sorry, I posted wrong link :doh:edit2: I was trying to fix last dev version (3062) with keymaker CORE :PI don't have Sublime Text installed on my systems - but, have a strong suspicion that r0lex is creating a Windows firewall rule through his KeyGen which wipes away existing rules (please check whether your IDM rules are still present):-- Link to comment Share on other sites More sharing options...
rach Posted August 8, 2014 Share Posted August 8, 2014 I don't have Sublime Text installed on my systems - but, have a strong suspicion that r0lex is creating a Windows firewall rule through his KeyGen which wipes away existing rules (please check whether your IDM rules are still present):--the rules are still there. well, gonna play with it again on next IDM release. thanks a lot. :DWhy do use keygen instead the serial key that has been posted by arion ? I'm using the serial key and it works with latest dev version without blocking it with firewall :think:because I want it registered by my chosen name :P Link to comment Share on other sites More sharing options...
dcs18 Posted August 8, 2014 Author Share Posted August 8, 2014 the rules are still there. well, gonna play with it again on next IDM release. thanks a lot. :DJust curious - which AntiVirus are you running? Link to comment Share on other sites More sharing options...
rach Posted August 8, 2014 Share Posted August 8, 2014 Just curious - which AntiVirus are you running? ESET NOD32 Antivirus 8.0.103.0 Beta :showoff2: Link to comment Share on other sites More sharing options...
dcs18 Posted August 8, 2014 Author Share Posted August 8, 2014 Just curious - which AntiVirus are you running? ESET NOD32 Antivirus 8.0.103.0 Beta :showoff2:Believe it or not - the EAV has got its own firewall which renders Windows Firewall (and most 3rd party firewall useless.). :tehe: Link to comment Share on other sites More sharing options...
kantry123 Posted August 8, 2014 Share Posted August 8, 2014 Just curious - which AntiVirus are you running? ESET NOD32 Antivirus 8.0.103.0 Beta :showoff2:Believe it or not - the EAV has got its own firewall which renders Windows Firewall (and most 3rd party firewall useless.). :tehe:yeah..even kaspersky antivirus which doesn't have a firewall still behaves as its integration is deep that's what makes windows firewall control uselessregards Link to comment Share on other sites More sharing options...
dcs18 Posted August 8, 2014 Author Share Posted August 8, 2014 Just curious - which AntiVirus are you running? ESET NOD32 Antivirus 8.0.103.0 Beta :showoff2:Believe it or not - the EAV has got its own firewall which renders Windows Firewall (and most 3rd party firewall useless.). :tehe:yeah..even kaspersky antivirus which doesn't have a firewall still behaves as its integration is deep that's what makes windows firewall control uselessregardsYes (not only ESS and KIS - but even) the EAV and KAV have a tight integration into the system wherein a tunnel is created and applications & programs are then routed through that tunnel for a more effective scanning. Unfortunately, this kind of implementation results in bypassing other firewalls - fortunately, have found a way around this issue (many years ago.) Link to comment Share on other sites More sharing options...
anakin206 Posted August 8, 2014 Share Posted August 8, 2014 What method were you guys using to fix your IDM - I don't see either of you, anywhere on this thread using the firewall trick?If you were using the firewall trick - which one was it (please post with complete details.)I always use patchs to register IDM. Last week I decide to give a try to the firewall trick. What I had commented happens when blocking IDM IPs.OS Windows 8.1 x64; Eset AV v7; Windows Firewall Control following the captures you posted in first page. Link to comment Share on other sites More sharing options...
dcs18 Posted August 9, 2014 Author Share Posted August 9, 2014 What method were you guys using to fix your IDM - I don't see either of you, anywhere on this thread using the firewall trick?If you were using the firewall trick - which one was it (please post with complete details.)I always use patchs to register IDM. Last week I decide to give a try to the firewall trick. What I had commented happens when blocking IDM IPs.OS Windows 8.1 x64; Eset AV v7; Windows Firewall Control following the captures you posted in first page.Check out my previous remark at post # 637 - you might be unknowingly running your ESET EAV as an independent firewall tunnel proxy that renders your WFC useless. Let me know if you ESET EAV Users want to find out how to surmount this issue. Link to comment Share on other sites More sharing options...
JAPONE Posted August 9, 2014 Share Posted August 9, 2014 What method were you guys using to fix your IDM - I don't see either of you, anywhere on this thread using the firewall trick?If you were using the firewall trick - which one was it (please post with complete details.)I always use patchs to register IDM. Last week I decide to give a try to the firewall trick. What I had commented happens when blocking IDM IPs.OS Windows 8.1 x64; Eset AV v7; Windows Firewall Control following the captures you posted in first page.Check out my previous remark at post # 637 - you might be unknowingly running your ESET EAV as an independent firewall tunnel proxy that renders your WFC useless. Let me know if you ESET EAV Users want to find out how to surmount this issue. Care to share? :D Link to comment Share on other sites More sharing options...
dcs18 Posted August 9, 2014 Author Share Posted August 9, 2014 Oh yes, if you are an ESET EAV User - you need use the following illustration, to disable Protocol Filtering in order to prevent your AntiVirus from behaving like a bloody firewall (there is another method - that is just a workaround, though):-- Link to comment Share on other sites More sharing options...
anakin206 Posted August 9, 2014 Share Posted August 9, 2014 I did the changes and after restart I don't get the nag screen. Seems that the problem is solved now. Link to comment Share on other sites More sharing options...
rkkdjb Posted August 9, 2014 Share Posted August 9, 2014 Oh yes, if you are an ESET EAV User - you need use the following illustration, to disable Protocol Filtering in order to prevent your AntiVirus from behaving like a bloody firewall (there is another method - that is just a workaround, though):--is there something like a before and after test, i mean how do i know it was behaving like a firewal before and not now, how to see it ? Link to comment Share on other sites More sharing options...
dcs18 Posted August 9, 2014 Author Share Posted August 9, 2014 Oh yes, if you are an ESET EAV User - you need use the following illustration, to disable Protocol Filtering in order to prevent your AntiVirus from behaving like a bloody firewall (there is another method - that is just a workaround, though):--is there something like a before and after test, i mean how do i know it was behaving like a firewal before and not now, how to see it ?You will find that the applications which you firewalled, are able to call home as they use a different IP from the one you block - the ESET EAV behaves like a proxy in between the 2 endpoints. Link to comment Share on other sites More sharing options...
rkkdjb Posted August 9, 2014 Share Posted August 9, 2014 You will find that the applications which you firewalled, are able to call home as they use a different IP from the one you block - the ESET EAV behaves like a proxy in between the 2 endpoints.its not happening here thats why i asked and i have both the options enabled in my protocol filtering, yet all my apps are as they should be, working fyn Link to comment Share on other sites More sharing options...
dcs18 Posted August 9, 2014 Author Share Posted August 9, 2014 Want to TeamView - I will show you the workaround mentioned briefly, at post # 641 (your system seems to be insulated under that workaround?) Link to comment Share on other sites More sharing options...
rkkdjb Posted August 9, 2014 Share Posted August 9, 2014 Want to TeamView - I will show you the workaround mentioned briefly, at post # 641 (your system seems to be insulated under that workaround?)yes open PM Link to comment Share on other sites More sharing options...
dcs18 Posted August 9, 2014 Author Share Posted August 9, 2014 Done!!! Link to comment Share on other sites More sharing options...
iih1 Posted August 10, 2014 Share Posted August 10, 2014 Block anchorfree.net Hotspot shield? credits goes to clubhouseI checked some IPs: >>> used tools online >>>> http://ip-lookup.net/domain.php74.115.0.774.115.0.51and other107.1.93.20074.115.4.11174.125.193.2674.125.129.2774.125.196.26 127.0.0.1 to 127.0.0.8www.anchorfree.net Link to comment Share on other sites More sharing options...
dcs18 Posted August 10, 2014 Author Share Posted August 10, 2014 Block anchorfree.net Hotspot shield?I checked some IPs: >>> used tools online >>>> http://ip-lookup.net/domain.php74.115.0.774.115.0.51and other107.1.93.20074.115.4.11174.125.193.2674.125.129.2774.125.196.26 127.0.0.1 to 127.0.0.8www.anchorfree.netIt is a matter of honor, respect and also good manners to have the courtesy of giving credit to the original innovator. Link to comment Share on other sites More sharing options...
dorsh83 Posted August 10, 2014 Share Posted August 10, 2014 Post # 2 updated with Zarko's confirmation that the activation trick works on the ESS, too - great job, Zarko!!! did the ip can be used on eset endpoint security too? just curios.. thanx ^_^ ^_^ Link to comment Share on other sites More sharing options...
dcs18 Posted August 10, 2014 Author Share Posted August 10, 2014 Post # 2 updated with Zarko's confirmation that the activation trick works on the ESS, too - great job, Zarko!!! did the ip can be used on eset endpoint security too? just curios.. thanx ^_^ ^_^Oh yes, why not - please give it a try and let us know. Link to comment Share on other sites More sharing options...
koko baidu Posted August 10, 2014 Share Posted August 10, 2014 i used your method using windows firewall and i got fake registration massage it doesn't wooooooooorkhelp please Link to comment Share on other sites More sharing options...
dcs18 Posted August 10, 2014 Author Share Posted August 10, 2014 Which AntiVirus are you using?Did you use the following instructions?Example only – Windows Firewall:Users of Windows Firewall need to create two separate rules (one Block rule + another Allow rule) for IDM as per the following instructions:–Ensure that the Windows Firewall service is on Automatic and that it is running.Create two rules - one Allow rule and another Block rule as per the following instructionsCreate The Allow Rule:–Control Panel >> Windows Firewall >> Advanced Settings >> Outbound Rules >> New Rule.... >> Program >> Next >> This program path: >> Browse (to your Internet Download Manager directory path at IDMan.exe) >> Next >> Allow the connection >> Next (check / tick all the three) Domain, Private & Public >> Next >> (fill) Name & Description >> Finish.Create The Block Rule:–Control Panel >> Windows Firewall >> Advanced Settings >> Outbound Rules >> New Rule.... >> Custom >> Next >> This program path:>> Browse (to your Internet Download Manager directory path at IDMan.exe)>> Next >> Protocol and Ports (don't make any change/s, here) >> Next >> Scope >> Which remote addresses does this rule apply to? >> These IP addresses >> Add >> This IP address or subnet >> (add the 24 IPs addresses from the first post – one at a time) >> OK >> Next >> Action >> Block the connection >> Next >> Profile (check / tick all the three) Domain, Private & Public >> Next >> (fill) Name & Description >> Finish. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.