Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

Computer programmers do it byte by byte.


computers / alt.comp.os.windows-10 / Re: VulnDetect

SubjectAuthor
* VulnDetectT
+* Re: VulnDetectPaul
|+- Re: VulnDetectT
|`- Re: VulnDetect...w¡ñ§±¤ñ
+* Re: VulnDetectwasbit
|`- Re: VulnDetectT
+* Re: VulnDetectAllanH
|`* Re: VulnDetectT
| `* Re: VulnDetectVanguardLH
|  `* Re: VulnDetectT
|   `* Re: VulnDetectVanguardLH
|    `* Re: VulnDetectT
|     +- Re: VulnDetectT
|     `* Re: VulnDetectFrank Slootweg
|      +- Re: VulnDetect...w¡ñ§±¤ñ
|      `* Re: VulnDetectVanguardLH
|       `- Re: VulnDetectFrank Slootweg
+* Re: VulnDetectVanguardLH
|`- Re: VulnDetectT
`- Re: VulnDetectT

1
VulnDetect

<ur1p29$2dp3h$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78532&group=alt.comp.os.windows-10#78532

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: T@invalid.invalid (T)
Newsgroups: alt.comp.os.windows-10
Subject: VulnDetect
Date: Tue, 20 Feb 2024 00:49:13 -0800
Organization: A noiseless patient Spider
Lines: 10
Message-ID: <ur1p29$2dp3h$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 20 Feb 2024 08:49:13 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="139ffd288770a75cc3d13eee7207e6ae";
logging-data="2548849"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18hVS66tGC75bdU5L9LmgnsT9MzCetSq+M="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:Rj3ZQBIc6lvgtK0M01Wwo5nczys=
Content-Language: en-US
 by: T - Tue, 20 Feb 2024 08:49 UTC

Hi All,

Is https://vulndetect.com a dead program?

I can find no place on their web site to order.
I have written them several times and they ghost me.
Is this company out of business?

Many thanks,
-T

Re: VulnDetect

<ur1qgt$2e4mf$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78533&group=alt.comp.os.windows-10#78533

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: nospam@needed.invalid (Paul)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 04:14:03 -0500
Organization: A noiseless patient Spider
Lines: 45
Message-ID: <ur1qgt$2e4mf$1@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 20 Feb 2024 09:14:05 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6eb83475a0758b3257289bd794910222";
logging-data="2560719"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/JHLbuGyBwbvKL3QlecBot31oG8Gk+g1g="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:fU0Le+ZmjjS7z2fw2S8N8vsWHpY=
In-Reply-To: <ur1p29$2dp3h$1@dont-email.me>
Content-Language: en-US
 by: Paul - Tue, 20 Feb 2024 09:14 UTC

On 2/20/2024 3:49 AM, T wrote:
> Hi All,
>
> Is https://vulndetect.com a dead program?
>
> I can find no place on their web site to order.
> I have written them several times and they ghost me.
> Is this company out of business?
>
> Many thanks,
> -T

https://secteer.com/

"Contact us

Univate - Njalsgade 76, 4th Floor
DK-2300 Copenhagen Denmark
+45 70 707 759
contact@secteer.com
DK38330462

VulnDetect stored on servers by: Hetzner

*******

"The addresses of SecTeer services are:

https://*.vulndetect.com/ (port 443/tcp)

The above should be whitelisted in the Firewall/Proxy configuration
"

I would guess some engine component is stored on the thing needing
a firewall opening. The part that does the billing, likely
has a working email.

While at one time, there was the notion that some part
of this was free, it's really hard to tell from the Archive.org
breadcrumbs.

There is vulndetect.com and vulndetect.org and at some point
secteer enters the picture.

Paul

Re: VulnDetect

<ur1sq2$2edj3$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78535&group=alt.comp.os.windows-10#78535

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: wasbit@nowhere.com (wasbit)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 09:53:06 +0000
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <ur1sq2$2edj3$1@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 20 Feb 2024 09:53:06 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="59f3eb5027db4880a500074594cec891";
logging-data="2569827"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18NraRP93d9Tcck6wBJsrzK"
User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:5.0) Aura/20220608
Interlink/52.9.8194
Cancel-Lock: sha1:oCGzPCYQJiU/BZCJ8pq7axNyVJI=
In-Reply-To: <ur1p29$2dp3h$1@dont-email.me>
Content-Language: en-US
 by: wasbit - Tue, 20 Feb 2024 09:53 UTC

On 20/02/2024 08:49, T wrote:
> Hi All,
>
> Is https://vulndetect.com a dead program?
>
> I can find no place on their web site to order.
> I have written them several times and they ghost me.
> Is this company out of business?
>
> Many thanks,

This one?
- https://vulndetect.org/

--
Regards
wasbit

Re: VulnDetect

<op.2jfp2rmubh2i3ropera@paganini.bofh.team>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78536&group=alt.comp.os.windows-10#78536

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!paganini.bofh.team!not-for-mail
From: nospam@unokix.invalid (AllanH)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 04:00:17 -0600
Organization: To protect and to server
Message-ID: <op.2jfp2rmubh2i3ropera@paganini.bofh.team>
References: <ur1p29$2dp3h$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Injection-Info: paganini.bofh.team; logging-data="1978398"; posting-host="Yx07avIBSk+BmNQj8nu0Fw.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: Opera Mail/1.0 (Win32)
Cancel-Lock: sha256:hNG2a1DSCg1e/WTkt7bFKNzm/QxoCnkX7lLVf8ESHNk=
X-Notice: Filtered by postfilter v. 0.9.3
 by: AllanH - Tue, 20 Feb 2024 10:00 UTC

On Tue, 20 Feb 2024 02:49:13 -0600, T <T@invalid.invalid> wrote:

> Hi All,
>
> Is https://vulndetect.com a dead program?
>
> I can find no place on their web site to order.
> I have written them several times and they ghost me.
> Is this company out of business?
>
> Many thanks,
> -T
>

It's not a dead program in my book.
It's my favorite Updater program currently.
It's free for personal use. It does require registration with an email address.
Their Forum and the Download link are at https://vulndetect.org/

--
Using Opera's mail client:
https://web.archive.org/web/20130226002115/http://www.opera.com/mail/
https://web.archive.org/web/20130709005515/http://help.opera.com/Windows/12.10/en/mail.html
https://web.archive.org/web/20130223015023/http://www.opera.com/browser/tutorials/mail/

Re: VulnDetect

<ur1uoe$2eutp$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78537&group=alt.comp.os.windows-10#78537

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!news.chmurka.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: T@invalid.invalid (T)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 02:26:22 -0800
Organization: A noiseless patient Spider
Lines: 50
Message-ID: <ur1uoe$2eutp$1@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me> <ur1qgt$2e4mf$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 20 Feb 2024 10:26:22 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="139ffd288770a75cc3d13eee7207e6ae";
logging-data="2587577"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19aB/1+GJm+xOx0uLs+14fcLgGH6wh72hc="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:2Ii8qTS+KkSzgr3MLvsKKEXdNMQ=
In-Reply-To: <ur1qgt$2e4mf$1@dont-email.me>
Content-Language: en-US
 by: T - Tue, 20 Feb 2024 10:26 UTC

On 2/20/24 01:14, Paul wrote:
> On 2/20/2024 3:49 AM, T wrote:
>> Hi All,
>>
>> Is https://vulndetect.com a dead program?
>>
>> I can find no place on their web site to order.
>> I have written them several times and they ghost me.
>> Is this company out of business?
>>
>> Many thanks,
>> -T
>
> https://secteer.com/
>
> "Contact us
>
> Univate - Njalsgade 76, 4th Floor
> DK-2300 Copenhagen Denmark
> +45 70 707 759
> contact@secteer.com

They ghosted me. Their fill in form ghosted me too.

> DK38330462
>
> VulnDetect stored on servers by: Hetzner
>
> *******
>
> "The addresses of SecTeer services are:
>
> https://*.vulndetect.com/ (port 443/tcp)
>
> The above should be whitelisted in the Firewall/Proxy configuration
> "
>
> I would guess some engine component is stored on the thing needing
> a firewall opening. The part that does the billing, likely
> has a working email.
>
> While at one time, there was the notion that some part
> of this was free, it's really hard to tell from the Archive.org
> breadcrumbs.
>
> There is vulndetect.com and vulndetect.org and at some point
> secteer enters the picture.
>
> Paul

Re: VulnDetect

<ur1upq$2eutp$2@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78538&group=alt.comp.os.windows-10#78538

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: T@invalid.invalid (T)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 02:27:06 -0800
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <ur1upq$2eutp$2@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me> <ur1sq2$2edj3$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 20 Feb 2024 10:27:07 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="139ffd288770a75cc3d13eee7207e6ae";
logging-data="2587577"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/tgscgthprreddv2/RZVh8QGvg/qHlpgY="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:cn5W4haje62p8VGqvX0YJSk1ptI=
In-Reply-To: <ur1sq2$2edj3$1@dont-email.me>
Content-Language: en-US
 by: T - Tue, 20 Feb 2024 10:27 UTC

On 2/20/24 01:53, wasbit wrote:
> On 20/02/2024 08:49, T wrote:
>> Hi All,
>>
>> Is https://vulndetect.com a dead program?
>>
>> I can find no place on their web site to order.
>> I have written them several times and they ghost me.
>> Is this company out of business?
>>
>> Many thanks,
>
> This one?
>  - https://vulndetect.org/
>

That is their support forum. I could
not figure out how to create an account.

Re: VulnDetect

<ur1us7$2eutp$3@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78539&group=alt.comp.os.windows-10#78539

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!news.furie.org.uk!pasdenom.info!nyheter.lysator.liu.se!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: T@invalid.invalid (T)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 02:28:23 -0800
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <ur1us7$2eutp$3@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me>
<op.2jfp2rmubh2i3ropera@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 20 Feb 2024 10:28:24 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="139ffd288770a75cc3d13eee7207e6ae";
logging-data="2587577"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/QyiqxUag1ZY//Lw+Ffbr6imIvLIUcfE4="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:wKSzs9IdiVMCpY5AuSmhAE6aEEk=
In-Reply-To: <op.2jfp2rmubh2i3ropera@paganini.bofh.team>
Content-Language: en-US
 by: T - Tue, 20 Feb 2024 10:28 UTC

On 2/20/24 02:00, AllanH wrote:
> On Tue, 20 Feb 2024 02:49:13 -0600, T <T@invalid.invalid> wrote:
>
>> Hi All,
>>
>> Is https://vulndetect.com a dead program?
>>
>> I can find no place on their web site to order.
>> I have written them several times and they ghost me.
>> Is this company out of business?
>>
>> Many thanks,
>> -T
>>
>
> It's not a dead program in my book.
> It's my favorite Updater program currently.
> It's free for personal use. It does require registration with an email
> address.
> Their Forum and the Download link are at https://vulndetect.org/

Downloading it is not a problem. But how do I purchase it?

Re: VulnDetect

<ur2osp$2ka64$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78556&group=alt.comp.os.windows-10#78556

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!news.chmurka.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: winstonmvp@gmail.com (...w¡ñ§±¤ñ)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 10:52:22 -0700
Organization: windowsunplugged.com
Lines: 61
Message-ID: <ur2osp$2ka64$1@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me> <ur1qgt$2e4mf$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 20 Feb 2024 17:52:25 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="b259d07b5e98ae42fbc9126e48391e6c";
logging-data="2762948"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/vmVnYdEKVOl3FX0gJVgUpif4PfRhhiaQ="
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.1
Cancel-Lock: sha1:2+ay+CZEQVDV5yzD/dqZH5awyFo=
In-Reply-To: <ur1qgt$2e4mf$1@dont-email.me>
 by: ...w¡ñ§±¤ñ - Tue, 20 Feb 2024 17:52 UTC

Paul wrote on 2/20/24 2:14 AM:
> On 2/20/2024 3:49 AM, T wrote:
>> Hi All,
>>
>> Is https://vulndetect.com a dead program?
>>
>> I can find no place on their web site to order.
>> I have written them several times and they ghost me.
>> Is this company out of business?
>>
>> Many thanks,
>> -T
>
> https://secteer.com/
>
> "Contact us
>
> Univate - Njalsgade 76, 4th Floor
> DK-2300 Copenhagen Denmark
> +45 70 707 759
> contact@secteer.com
> DK38330462
>
> VulnDetect stored on servers by: Hetzner
>
> *******
>
> "The addresses of SecTeer services are:
>
> https://*.vulndetect.com/ (port 443/tcp)
>
> The above should be whitelisted in the Firewall/Proxy configuration
> "
>
> I would guess some engine component is stored on the thing needing
> a firewall opening. The part that does the billing, likely
> has a working email.
>
> While at one time, there was the notion that some part
> of this was free, it's really hard to tell from the Archive.org
> breadcrumbs.
>
> There is vulndetect.com and vulndetect.org and at some point
> secteer enters the picture.
>
> Paul
>
Free Trial, Request Quote
- the latter likely for cost to deploy non-free version.

https://secteer.com/trial/
https://secteer.com/request-quote/

https://secteer.com/faq/
https://secteer.com/contact/

https://vulndetect.com/dl/secteerSetup.exe

--
....w¡ñ§±¤ñ

Re: VulnDetect

<14xmxpx58efwd.dlg@v.nguard.lh>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78575&group=alt.comp.os.windows-10#78575

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!usenet.network!news.neodome.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 20:34:03 -0600
Organization: Usenet Elder
Lines: 30
Sender: V@nguard.LH
Message-ID: <14xmxpx58efwd.dlg@v.nguard.lh>
References: <ur1p29$2dp3h$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net zIn6uFlR7EvVBqss4QYaMwEVv1jVxbQeSjSBD58BwBE7cEDOYh
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:GtlmQVkVdGKIDGmltJUq0U3Ru18= sha256:lby2TN6PnXbbFD+jCx30YRL6IF7fiFk7lYqq1MuNc8c=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Wed, 21 Feb 2024 02:34 UTC

T <T@invalid.invalid> wrote:

> Is https://vulndetect.com a dead program?
>
> I can find no place on their web site to order.
> I have written them several times and they ghost me.
> Is this company out of business?

Secunia PSI got sunsetted. VulnDetect was its substitute. The URL you
gave is to the .com login page. Their web site is at vulndetect.org
where there is a download link to their program (I didn't bother to see
when was the last update of it). Forum posts about their releases show
3.2.0.0 was released on 1/22/2024. Their download link points to a 2 MB
setup file with no version number in its name, so maybe they dump a stub
installer on your host, and it connects back to their server to decide
what to actually install. I downloaded their .exe file, and opened it
using Peazip. The version.txt file also says version 3.2.0.0. There
was nothing inside the .exe that would be large enough to be a
standalone (local) installer. I didn't see anything inside to run as an
executable, but maybe Peazip doesn't show the root level where the
executable code might reside. I've never used the program, so maybe it
really is only about 2 MB in size if it gets everything on which it
tests from there server.

If you're into social networks, they have a LinkedIn page at:

https://no.linkedin.com/company/secteer

There personal-use version is free. It's their business license that
costs money.

Re: VulnDetect

<gconckc6jz2r$.dlg@v.nguard.lh>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78576&group=alt.comp.os.windows-10#78576

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 20:43:10 -0600
Organization: Usenet Elder
Lines: 32
Sender: V@nguard.LH
Message-ID: <gconckc6jz2r$.dlg@v.nguard.lh>
References: <ur1p29$2dp3h$1@dont-email.me> <op.2jfp2rmubh2i3ropera@paganini.bofh.team> <ur1us7$2eutp$3@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net 6GwFLDe1C6Jwu3iV9PMsMgothg9jZzgOA8hxl34Z9SUBdIOP80
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:VTD/zQEPhiue0aWb2GIg6e8uKvE= sha256:s7iB68cfhEUDsWinVddAmYQQE4w69Ml3FnuGFSu1y0w=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Wed, 21 Feb 2024 02:43 UTC

T <T@invalid.invalid> wrote:

> AllanH wrote:
>
>> T <T@invalid.invalid> wrote:
>>
>>> Is https://vulndetect.com a dead program?
>>>
>>> I can find no place on their web site to order.
>>> I have written them several times and they ghost me.
>>> Is this company out of business?
>>
>> It's not a dead program in my book.
>> It's my favorite Updater program currently.
>> It's free for personal use. It does require registration with an email
>> address.
>> Their Forum and the Download link are at https://vulndetect.org/
>
> Downloading it is not a problem. But how do I purchase it?

Maybe at winston's cite of their price quote request page:

https://secteer.com/request-quote/

Since they won't divulge prices at their web site, quoting a price
depends on how deep is your pocket; i.e., charge what a customer is
willing to bear. They probably want to license by seats at the same
organization, so you probably can't use it as a toolbar utility wherever
you want. Your customers will have to buy it.

From https://pitchbook.com/profiles/company/515109-07#overview, I only
see investment of seed money back in Nov 2022.

Re: VulnDetect

<ur3uje$2uqr0$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78586&group=alt.comp.os.windows-10#78586

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!news.bbs.nz!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: T@invalid.invalid (T)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 20:35:58 -0800
Organization: A noiseless patient Spider
Lines: 60
Message-ID: <ur3uje$2uqr0$1@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me>
<op.2jfp2rmubh2i3ropera@paganini.bofh.team> <ur1us7$2eutp$3@dont-email.me>
<gconckc6jz2r$.dlg@v.nguard.lh>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 21 Feb 2024 04:35:58 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="c3db884153c3ba59eb7f2941b538b36b";
logging-data="3107680"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/aC0Uv08RQUvN6t2hK+Ip95Qcsm5k0Mv8="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:+cP17uU76gEjJhlu4/FGdsahYFM=
Content-Language: en-US
In-Reply-To: <gconckc6jz2r$.dlg@v.nguard.lh>
 by: T - Wed, 21 Feb 2024 04:35 UTC

On 2/20/24 18:43, VanguardLH wrote:
> T <T@invalid.invalid> wrote:
>
>> AllanH wrote:
>>
>>> T <T@invalid.invalid> wrote:
>>>
>>>> Is https://vulndetect.com a dead program?
>>>>
>>>> I can find no place on their web site to order.
>>>> I have written them several times and they ghost me.
>>>> Is this company out of business?
>>>
>>> It's not a dead program in my book.
>>> It's my favorite Updater program currently.
>>> It's free for personal use. It does require registration with an email
>>> address.
>>> Their Forum and the Download link are at https://vulndetect.org/
>>
>> Downloading it is not a problem. But how do I purchase it?
>
> Maybe at winston's cite of their price quote request page:
>
> https://secteer.com/request-quote/
>
> Since they won't divulge prices at their web site, quoting a price
> depends on how deep is your pocket; i.e., charge what a customer is
> willing to bear. They probably want to license by seats at the same
> organization, so you probably can't use it as a toolbar utility wherever
> you want. Your customers will have to buy it.
>
> From https://pitchbook.com/profiles/company/515109-07#overview, I only
> see investment of seed money back in Nov 2022.

The third time I did request a quote, a sale man
responded. A one to 20 seat license is 900 U$D a year.
Way out of my customer's range.

I asked the salesman what he could do for seven seats
of the personal edition. I am still waiting.

I see Vicarius wants $5 per seat per month
https://www.vicarius.io/pricing
or $420 /yr for seven seats. Much better.

All I need to know is when a program has a
vulnerability/critical update pending and
nothing else. Automatic patches, etc. is out.

So I am still looking.

My head is spinning that SUMo closed.

You guys know of anything that might fit the bill?

Re: VulnDetect

<ur3url$2uqr0$2@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78587&group=alt.comp.os.windows-10#78587

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: T@invalid.invalid (T)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 20:40:21 -0800
Organization: A noiseless patient Spider
Lines: 7
Message-ID: <ur3url$2uqr0$2@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me> <14xmxpx58efwd.dlg@v.nguard.lh>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 21 Feb 2024 04:40:21 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="c3db884153c3ba59eb7f2941b538b36b";
logging-data="3107680"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18TUMVrLl7y5kn51v+GdxsAdyRz0flGwow="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:a4dy+d+3MzB3plBVLDIPnNwUH9Y=
In-Reply-To: <14xmxpx58efwd.dlg@v.nguard.lh>
Content-Language: en-US
 by: T - Wed, 21 Feb 2024 04:40 UTC

On 2/20/24 18:34, VanguardLH wrote:
> There personal-use version is free. It's their business license that
> costs money.

After my third attempt on their request a quote page, a salesman got
back to me. They want $900 U$D per year for 1 to 20 seats.
Way, way to expensive for my customer.

Re: VulnDetect

<ur424g$2v5o0$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78589&group=alt.comp.os.windows-10#78589

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: T@invalid.invalid (T)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Tue, 20 Feb 2024 21:36:16 -0800
Organization: A noiseless patient Spider
Lines: 21
Message-ID: <ur424g$2v5o0$1@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 21 Feb 2024 05:36:16 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="c3db884153c3ba59eb7f2941b538b36b";
logging-data="3118848"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+Op3hIqHDqBs8K8YuXAPObv7ZjwnjUPQc="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:qaNpDNwYAjW3Ee+9cXHtY1FI1sI=
Content-Language: en-US
In-Reply-To: <ur1p29$2dp3h$1@dont-email.me>
 by: T - Wed, 21 Feb 2024 05:36 UTC

On 2/20/24 00:49, T wrote:
> Hi All,
>
> Is https://vulndetect.com a dead program?
>
> I can find no place on their web site to order.
> I have written them several times and they ghost me.
> Is this company out of business?
>
> Many thanks,
> -T

I am thinking that UCheck:
https://www.adlice.com/ucheck/
might be the only seasonably priced SUMo alternative
for my customer. It's down aside is that it does
not show what updates are critical, as does the
defunct SUMo and the expensive VulnDetect

Re: VulnDetect

<18no8uk3d7es4.dlg@v.nguard.lh>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78592&group=alt.comp.os.windows-10#78592

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!nntp.comgw.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Wed, 21 Feb 2024 01:07:11 -0600
Organization: Usenet Elder
Lines: 106
Sender: V@nguard.LH
Message-ID: <18no8uk3d7es4.dlg@v.nguard.lh>
References: <ur1p29$2dp3h$1@dont-email.me> <op.2jfp2rmubh2i3ropera@paganini.bofh.team> <ur1us7$2eutp$3@dont-email.me> <gconckc6jz2r$.dlg@v.nguard.lh> <ur3uje$2uqr0$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net KvoPwhMFbmsIJzwFf8sGgQqjH3kcBtFt+XKaBK7XT9SoX65jRO
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:L6VG9P4u+XVYQOqcXWd2aRD7/A4= sha256:9oftDiAS0qk5g64EWs4+bjpPXwa0HOtOz69AXsc+yUE=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Wed, 21 Feb 2024 07:07 UTC

T <T@invalid.invalid> wrote:

> On 2/20/24 18:43, VanguardLH wrote:
>> T <T@invalid.invalid> wrote:
>>
>>> AllanH wrote:
>>>
>>>> T <T@invalid.invalid> wrote:
>>>>
>>>>> Is https://vulndetect.com a dead program?
>>>>>
>>>>> I can find no place on their web site to order.
>>>>> I have written them several times and they ghost me.
>>>>> Is this company out of business?
>>>>
>>>> It's not a dead program in my book.
>>>> It's my favorite Updater program currently.
>>>> It's free for personal use. It does require registration with an email
>>>> address.
>>>> Their Forum and the Download link are at https://vulndetect.org/
>>>
>>> Downloading it is not a problem. But how do I purchase it?
>>
>> Maybe at winston's cite of their price quote request page:
>>
>> https://secteer.com/request-quote/
>>
>> Since they won't divulge prices at their web site, quoting a price
>> depends on how deep is your pocket; i.e., charge what a customer is
>> willing to bear. They probably want to license by seats at the same
>> organization, so you probably can't use it as a toolbar utility wherever
>> you want. Your customers will have to buy it.
>>
>> From https://pitchbook.com/profiles/company/515109-07#overview, I only
>> see investment of seed money back in Nov 2022.
>
> The third time I did request a quote, a sale man
> responded. A one to 20 seat license is 900 U$D a year.
> Way out of my customer's range.
>
> I asked the salesman what he could do for seven seats
> of the personal edition. I am still waiting.
>
> I see Vicarius wants $5 per seat per month
> https://www.vicarius.io/pricing
> or $420 /yr for seven seats. Much better.
>
> All I need to know is when a program has a
> vulnerability/critical update pending and
> nothing else. Automatic patches, etc. is out.
>
> So I am still looking.
>
> My head is spinning that SUMo closed.
>
> You guys know of anything that might fit the bill?

"Download SecTeer Personal VulnDetect - an alternative to the long lost
Secunia PSI"

Wasn't Secunia PSI free? If so, for Vulndetect (Personal) to be an
alternative means it should also be free.

Secunia's PSI got dropped, and users dropped it because it was free.
Secunia is still in the vulnerability analysis market. You might want
to get a quote from Flexera (they acquired Secunia in 2015) on their
Software Vulnerability Manager to see if it is cheaper or more expensive
than Vulndetect.

If you thought $900 (per year? per seat?) was expensive, vulnerability
analysis and protection isn't cheap often running $1000 to $4500 per
year. Take a look at Astra's prices:

https://www.getastra.com/pentest/pricing

With PSI, Sumo, and other freebies, all they were was software update
checkers. They'd see if you were missing updates. Since the OS and
most apps already have their own update checkers, PSI and the others
lost their importance. Vulnerability testing and analysis, on the other
hand, is a hell of lot more testing, and takes a lot more work on your
part to understand, and covers the high-tech support needed for those
products and services. They really aren't do-it-yourself-alone software
updaters.

I don't remember PSI *ever* performing vulnerability testing, just
software updating. Well, hell, there are lots of software update
checkers. Even CCleaner has a very basic Software Update checker (as
long as you don'g disable outbound connections through a firewall as I
did to eliminate Avast's addition of their adware platform to CCleaner).

https://www.lifewire.com/free-software-updater-programs-2625200

You mentioned uCheck. Yep, just another software update checker.
Nothing to do with vulnerability testing and analysis. Between Windows
having its own update checking (which I disable until I prepare, like
assigning the time, saving an image backup, and having initiative to
bother changing the state of the OS), and almost all programs I've
installed having their own update checker (although some just alert
there is a new update rather than downloading and installing it), I have
found no need for a software update checker tool. Those promote you to
make more changes than really needed for your setup.

You don't let your customers do the software updates themselves, right?
That's what they pay you for. If you give them software updaters,
they'll fuck up their setups, and you'll have to undo their screwups.
Or maybe that's your covert agenda to generate more work and revenue.

Re: VulnDetect

<ur5lhf$3bf3c$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78629&group=alt.comp.os.windows-10#78629

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!news.furie.org.uk!pasdenom.info!nyheter.lysator.liu.se!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: T@invalid.invalid (T)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Wed, 21 Feb 2024 12:13:35 -0800
Organization: A noiseless patient Spider
Lines: 145
Message-ID: <ur5lhf$3bf3c$1@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me>
<op.2jfp2rmubh2i3ropera@paganini.bofh.team> <ur1us7$2eutp$3@dont-email.me>
<gconckc6jz2r$.dlg@v.nguard.lh> <ur3uje$2uqr0$1@dont-email.me>
<18no8uk3d7es4.dlg@v.nguard.lh>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 21 Feb 2024 20:13:35 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="c3db884153c3ba59eb7f2941b538b36b";
logging-data="3521644"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/HT9dIN16h++VHE+u9fHKyq9Vos1yQflE="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:MLi99ddrz4MPF5mRTlhl2+JA03k=
Content-Language: en-US
In-Reply-To: <18no8uk3d7es4.dlg@v.nguard.lh>
 by: T - Wed, 21 Feb 2024 20:13 UTC

On 2/20/24 23:07, VanguardLH wrote:
> T <T@invalid.invalid> wrote:
>
>> On 2/20/24 18:43, VanguardLH wrote:
>>> T <T@invalid.invalid> wrote:
>>>
>>>> AllanH wrote:
>>>>
>>>>> T <T@invalid.invalid> wrote:
>>>>>
>>>>>> Is https://vulndetect.com a dead program?
>>>>>>
>>>>>> I can find no place on their web site to order.
>>>>>> I have written them several times and they ghost me.
>>>>>> Is this company out of business?
>>>>>
>>>>> It's not a dead program in my book.
>>>>> It's my favorite Updater program currently.
>>>>> It's free for personal use. It does require registration with an email
>>>>> address.
>>>>> Their Forum and the Download link are at https://vulndetect.org/
>>>>
>>>> Downloading it is not a problem. But how do I purchase it?
>>>
>>> Maybe at winston's cite of their price quote request page:
>>>
>>> https://secteer.com/request-quote/
>>>
>>> Since they won't divulge prices at their web site, quoting a price
>>> depends on how deep is your pocket; i.e., charge what a customer is
>>> willing to bear. They probably want to license by seats at the same
>>> organization, so you probably can't use it as a toolbar utility wherever
>>> you want. Your customers will have to buy it.
>>>
>>> From https://pitchbook.com/profiles/company/515109-07#overview, I only
>>> see investment of seed money back in Nov 2022.
>>
>> The third time I did request a quote, a sale man
>> responded. A one to 20 seat license is 900 U$D a year.
>> Way out of my customer's range.
>>
>> I asked the salesman what he could do for seven seats
>> of the personal edition. I am still waiting.
>>
>> I see Vicarius wants $5 per seat per month
>> https://www.vicarius.io/pricing
>> or $420 /yr for seven seats. Much better.
>>
>> All I need to know is when a program has a
>> vulnerability/critical update pending and
>> nothing else. Automatic patches, etc. is out.
>>
>> So I am still looking.
>>
>> My head is spinning that SUMo closed.
>>
>> You guys know of anything that might fit the bill?
>
> "Download SecTeer Personal VulnDetect - an alternative to the long lost
> Secunia PSI"
>
> Wasn't Secunia PSI free? If so, for Vulndetect (Personal) to be an
> alternative means it should also be free.

It is only free to non-business use. My customer is a business.

> Secunia's PSI got dropped, and users dropped it because it was free.
> Secunia is still in the vulnerability analysis market. You might want
> to get a quote from Flexera (they acquired Secunia in 2015) on their
> Software Vulnerability Manager to see if it is cheaper or more expensive
> than Vulndetect.
>
> If you thought $900 (per year? per seat?) was expensive, vulnerability
> analysis and protection isn't cheap often running $1000 to $4500 per
> year. Take a look at Astra's prices:
>
> https://www.getastra.com/pentest/pricing
>
> With PSI, Sumo, and other freebies, all they were was software update
> checkers. They'd see if you were missing updates. Since the OS and
> most apps already have their own update checkers, PSI and the others
> lost their importance. Vulnerability testing and analysis, on the other
> hand, is a hell of lot more testing, and takes a lot more work on your
> part to understand, and covers the high-tech support needed for those
> products and services. They really aren't do-it-yourself-alone software
> updaters.
>
> I don't remember PSI *ever* performing vulnerability testing, just
> software updating. Well, hell, there are lots of software update
> checkers. Even CCleaner has a very basic Software Update checker (as
> long as you don'g disable outbound connections through a firewall as I
> did to eliminate Avast's addition of their adware platform to CCleaner).
>
> https://www.lifewire.com/free-software-updater-programs-2625200
>
> You mentioned uCheck. Yep, just another software update checker.
> Nothing to do with vulnerability testing and analysis. Between Windows
> having its own update checking (which I disable until I prepare, like
> assigning the time, saving an image backup, and having initiative to
> bother changing the state of the OS), and almost all programs I've
> installed having their own update checker (although some just alert
> there is a new update rather than downloading and installing it), I have
> found no need for a software update checker tool. Those promote you to
> make more changes than really needed for your setup.
>
> You don't let your customers do the software updates themselves, right?
> That's what they pay you for. If you give them software updaters,
> they'll fuck up their setups, and you'll have to undo their screwups.
> Or maybe that's your covert agenda to generate more work and revenue.

PCI-DSS-v4-0-SAQ-C-r1, 6.3.3, pg 32
6.3.3. pg 32: All system components are protected from
known vulnerabilities by installing applicable security
patches/updates as follows:

• Critical or high-security patches/updates (identified
according to the risk ranking process at Requirement
6.3.1) are installed within one month of release.

I "only" have to install "Critical or high-security patches/updates".

An update checker, such as the now defunct SUMo which
also shows "Critical" security updates, is exactly
what I am after.

And the market is blurring "Vulnerability" with "Critical or
high-security patches/updates" and "Exploits". Those big
packages are much different than update checkers, which only tell
you what is out of date. The big packages also check for
"Exploits", which they also call "vulnerabilities".
And make a Google search a nightmare.

But SUMo and the non-business version of VulnCheck tell
you if there is also a security (blurring the word
"Vulnerability") update pending. And that is what I
am after.

Ucheck only tells you if there is an update, which does
also cover security and feature updates. For the
extraordinary price, I will have to just live with it.

I do not like wasting my customer's money on updates that are
not required by PCI. But it is going to be way cheaper
that VulnCheck, so I should stop being a perfectionist.

Re: VulnDetect

<ur5lva$3bf3d$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78631&group=alt.comp.os.windows-10#78631

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: T@invalid.invalid (T)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Wed, 21 Feb 2024 12:20:57 -0800
Organization: A noiseless patient Spider
Lines: 164
Message-ID: <ur5lva$3bf3d$1@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me>
<op.2jfp2rmubh2i3ropera@paganini.bofh.team> <ur1us7$2eutp$3@dont-email.me>
<gconckc6jz2r$.dlg@v.nguard.lh> <ur3uje$2uqr0$1@dont-email.me>
<18no8uk3d7es4.dlg@v.nguard.lh> <ur5lhf$3bf3c$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 21 Feb 2024 20:20:58 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="c3db884153c3ba59eb7f2941b538b36b";
logging-data="3521645"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+OpieKmn4Zk72SpxOFckuDqu+aVZ5K1Gg="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:/hygtDj5Cz4+b5DaSgivfnatY1M=
Content-Language: en-US
In-Reply-To: <ur5lhf$3bf3c$1@dont-email.me>
 by: T - Wed, 21 Feb 2024 20:20 UTC

On 2/21/24 12:13, T wrote:
> On 2/20/24 23:07, VanguardLH wrote:
>> T <T@invalid.invalid> wrote:
>>
>>> On 2/20/24 18:43, VanguardLH wrote:
>>>> T <T@invalid.invalid> wrote:
>>>>
>>>>> AllanH wrote:
>>>>>
>>>>>> T <T@invalid.invalid> wrote:
>>>>>>
>>>>>>> Is https://vulndetect.com a dead program?
>>>>>>>
>>>>>>> I can find no place on their web site to order.
>>>>>>> I have written them several times and they ghost me.
>>>>>>> Is this company out of business?
>>>>>>
>>>>>> It's not a dead program in my book.
>>>>>> It's my favorite Updater program currently.
>>>>>> It's free for personal use. It does require registration with an
>>>>>> email
>>>>>> address.
>>>>>> Their Forum and the Download link are at https://vulndetect.org/
>>>>>
>>>>> Downloading it is not a problem.  But how do I purchase it?
>>>>
>>>> Maybe at winston's cite of their price quote request page:
>>>>
>>>> https://secteer.com/request-quote/
>>>>
>>>> Since they won't divulge prices at their web site, quoting a price
>>>> depends on how deep is your pocket; i.e., charge what a customer is
>>>> willing to bear.  They probably want to license by seats at the same
>>>> organization, so you probably can't use it as a toolbar utility
>>>> wherever
>>>> you want.  Your customers will have to buy it.
>>>>
>>>>   From https://pitchbook.com/profiles/company/515109-07#overview, I
>>>> only
>>>> see investment of seed money back in Nov 2022.
>>>
>>> The third time I did request a quote, a sale man
>>> responded.  A one to 20 seat license is 900 U$D a year.
>>> Way out of my customer's range.
>>>
>>> I asked the salesman what he could do for seven seats
>>> of the personal edition.  I am still waiting.
>>>
>>> I see Vicarius wants $5 per seat per month
>>> https://www.vicarius.io/pricing
>>> or $420 /yr for seven seats.  Much better.
>>>
>>> All I need to know is when a program has a
>>> vulnerability/critical update pending and
>>> nothing else.  Automatic patches, etc. is out.
>>>
>>> So I am still looking.
>>>
>>> My head is spinning that SUMo closed.
>>>
>>> You guys know of anything that might fit the bill?
>>
>> "Download SecTeer Personal VulnDetect - an alternative to the long lost
>> Secunia PSI"
>>
>> Wasn't Secunia PSI free?  If so, for Vulndetect (Personal) to be an
>> alternative means it should also be free.
>
> It is only free to non-business use.  My customer is a business.
>
>> Secunia's PSI got dropped, and users dropped it because it was free.
>> Secunia is still in the vulnerability analysis market.  You might want
>> to get a quote from Flexera (they acquired Secunia in 2015) on their
>> Software Vulnerability Manager to see if it is cheaper or more expensive
>> than Vulndetect.
>>
>> If you thought $900 (per year? per seat?) was expensive, vulnerability
>> analysis and protection isn't cheap often running $1000 to $4500 per
>> year.  Take a look at Astra's prices:
>>
>> https://www.getastra.com/pentest/pricing
>>
>> With PSI, Sumo, and other freebies, all they were was software update
>> checkers.  They'd see if you were missing updates.  Since the OS and
>> most apps already have their own update checkers, PSI and the others
>> lost their importance.  Vulnerability testing and analysis, on the other
>> hand, is a hell of lot more testing, and takes a lot more work on your
>> part to understand, and covers the high-tech support needed for those
>> products and services.  They really aren't do-it-yourself-alone software
>> updaters.
>>
>> I don't remember PSI *ever* performing vulnerability testing, just
>> software updating.  Well, hell, there are lots of software update
>> checkers.  Even CCleaner has a very basic Software Update checker (as
>> long as you don'g disable outbound connections through a firewall as I
>> did to eliminate Avast's addition of their adware platform to CCleaner).
>>
>> https://www.lifewire.com/free-software-updater-programs-2625200
>>
>> You mentioned uCheck.  Yep, just another software update checker.
>> Nothing to do with vulnerability testing and analysis.  Between Windows
>> having its own update checking (which I disable until I prepare, like
>> assigning the time, saving an image backup, and having initiative to
>> bother changing the state of the OS), and almost all programs I've
>> installed having their own update checker (although some just alert
>> there is a new update rather than downloading and installing it), I have
>> found no need for a software update checker tool.  Those promote you to
>> make more changes than really needed for your setup.
>>
>> You don't let your customers do the software updates themselves, right?
>> That's what they pay you for.  If you give them software updaters,
>> they'll fuck up their setups, and you'll have to undo their screwups.
>> Or maybe that's your covert agenda to generate more work and revenue.
>
>
> PCI-DSS-v4-0-SAQ-C-r1, 6.3.3, pg 32
>      6.3.3. pg 32: All system components are protected from
>      known vulnerabilities by installing applicable security
>      patches/updates as follows:
>
>      • Critical or high-security patches/updates (identified
>      according to the risk ranking process at Requirement
>      6.3.1) are installed within one month of release.
>
> I "only" have to install "Critical or high-security patches/updates".
>
> An update checker, such as the now defunct SUMo which
> also shows "Critical" security updates, is exactly
> what I am after.
>
> And the market is blurring "Vulnerability" with "Critical or
> high-security patches/updates" and "Exploits".  Those big
> packages are much different than update checkers, which only tell
> you what is out of date.  The big packages also check for
> "Exploits", which they also call "vulnerabilities".
> And make a Google search a nightmare.
>
> But SUMo and the non-business version of VulnCheck tell
> you if there is also a security (blurring the word
> "Vulnerability") update pending.  And that is what I
> am after.
>
> Ucheck only tells you if there is an update, which does
> also cover security and feature updates.  For the
> extraordinary price, I will have to just live with it.
>
> I do not like wasting my customer's money on updates that are
> not required by PCI.  But it is going to be way cheaper
> that VulnCheck, so I should stop being a perfectionist.

VulCheck just sent me this:

For just scanning and vulnerability insights you will be
looking at 400 USD per year.

UCheck would be $84 / yr.

The difference would be made up in less than 3-1/2 hours
of my labor install unnecessary updates.

So hhhhhhhmmmmmm.

Re: VulnDetect

<ur7kla.ov4.1@ID-201911.user.individual.net>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78652&group=alt.comp.os.windows-10#78652

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: this@ddress.is.invalid (Frank Slootweg)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: 22 Feb 2024 13:11:01 GMT
Organization: NOYB
Lines: 24
Message-ID: <ur7kla.ov4.1@ID-201911.user.individual.net>
References: <ur1p29$2dp3h$1@dont-email.me> <op.2jfp2rmubh2i3ropera@paganini.bofh.team> <ur1us7$2eutp$3@dont-email.me> <gconckc6jz2r$.dlg@v.nguard.lh> <ur3uje$2uqr0$1@dont-email.me> <18no8uk3d7es4.dlg@v.nguard.lh> <ur5lhf$3bf3c$1@dont-email.me>
X-Trace: individual.net KANLeO6NhWGoBLxHejxcAACHS4ygLeTujyYL5UYuu8XNXEpu52
X-Orig-Path: not-for-mail
Cancel-Lock: sha1:0jUNpZGXUIIVdTxOdAqmif+Ip30= sha256:Ib786por0qx5AsNCMKxtoBQAlvpxEY0y+VgvljQsAaM=
User-Agent: tin/1.6.2-20030910 ("Pabbay") (UNIX) (CYGWIN_NT-10.0-WOW/2.8.0(0.309/5/3) (i686)) Hamster/2.0.2.2
 by: Frank Slootweg - Thu, 22 Feb 2024 13:11 UTC

T <T@invalid.invalid> wrote:
[...]

> An update checker, such as the now defunct SUMo which
> also shows "Critical" security updates, is exactly
> what I am after.

I haven't used them, but someone mentioned Avast, which made me
remember that Avast had some kind of update checker.

So I went to the 'For business' section on avast.com and as I
understand it, you could get/use 'Avast Business Patch Management' at
$16.42 per seat per year (discount for higher numbers of seats).

'Patch Management'
<https://www.avast.com/en-us/business/products/patch-management#pc>

AFAICT, you do not need to run/use/buy the Antivrus product, but you
need to have it installed:

"Avast Business Antivirus is required to be installed as part of your
Patch Management installation. Avast Business Antivirus will be placed
into expired mode. You can start a trial or purchase Avast Business
Antivirus within the Business Hub."

Re: VulnDetect

<ur83g9$t7p$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78664&group=alt.comp.os.windows-10#78664

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: winstonmvp@gmail.com (...w¡ñ§±¤ñ)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Thu, 22 Feb 2024 11:24:08 -0700
Organization: windowsunplugged.com
Lines: 37
Message-ID: <ur83g9$t7p$1@dont-email.me>
References: <ur1p29$2dp3h$1@dont-email.me>
<op.2jfp2rmubh2i3ropera@paganini.bofh.team> <ur1us7$2eutp$3@dont-email.me>
<gconckc6jz2r$.dlg@v.nguard.lh> <ur3uje$2uqr0$1@dont-email.me>
<18no8uk3d7es4.dlg@v.nguard.lh> <ur5lhf$3bf3c$1@dont-email.me>
<ur7kla.ov4.1@ID-201911.user.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 22 Feb 2024 18:24:09 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="e422feb4398e8386269553ba27839873";
logging-data="29945"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX186dgT4Y5UCZZwxUY2jaH47VIolCe5cSLY="
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.1
Cancel-Lock: sha1:/Hf3p23Xdpi9CAQ93HSAGr+FI7s=
In-Reply-To: <ur7kla.ov4.1@ID-201911.user.individual.net>
 by: ...w¡ñ§±¤ñ - Thu, 22 Feb 2024 18:24 UTC

Frank Slootweg wrote on 2/22/24 6:11 AM:
> T <T@invalid.invalid> wrote:
> [...]
>
>> An update checker, such as the now defunct SUMo which
>> also shows "Critical" security updates, is exactly
>> what I am after.
>
> I haven't used them, but someone mentioned Avast, which made me
> remember that Avast had some kind of update checker.
>
> So I went to the 'For business' section on avast.com and as I
> understand it, you could get/use 'Avast Business Patch Management' at
> $16.42 per seat per year (discount for higher numbers of seats).
>
> 'Patch Management'
> <https://www.avast.com/en-us/business/products/patch-management#pc>
>
> AFAICT, you do not need to run/use/buy the Antivrus product, but you
> need to have it installed:
>
> "Avast Business Antivirus is required to be installed as part of your
> Patch Management installation. Avast Business Antivirus will be placed
> into expired mode. You can start a trial or purchase Avast Business
> Antivirus within the Business Hub."
>
The current approach is akin to operating in the dark ages.
Business customer's device being managed by an outside source should be
treated as endpoints allowing patch management and vulnerability software
to provide the features to update the devices.
e.g. Action1 free for the first 100 endpoints.
<https://www.action1.com/free-edition/>

<https://www.action1.com/>

--
....w¡ñ§±¤ñ

Re: VulnDetect

<1qhmv67dfrh4r$.dlg@v.nguard.lh>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78671&group=alt.comp.os.windows-10#78671

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!usenet.goja.nl.eu.org!3.eu.feeder.erje.net!feeder.erje.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: Thu, 22 Feb 2024 15:34:34 -0600
Organization: Usenet Elder
Lines: 37
Sender: V@nguard.LH
Message-ID: <1qhmv67dfrh4r$.dlg@v.nguard.lh>
References: <ur1p29$2dp3h$1@dont-email.me> <op.2jfp2rmubh2i3ropera@paganini.bofh.team> <ur1us7$2eutp$3@dont-email.me> <gconckc6jz2r$.dlg@v.nguard.lh> <ur3uje$2uqr0$1@dont-email.me> <18no8uk3d7es4.dlg@v.nguard.lh> <ur5lhf$3bf3c$1@dont-email.me> <ur7kla.ov4.1@ID-201911.user.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net TlBjAJK8RgR0HhXpiAkgGweHiVPVRrwrR9EcF8C8ZB+rNdW2iX
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:pgVzFqDRErKrtdcxB1T81SRmZHM= sha256:QJRnhXx7NymB5feOaLEEGQxTDPy6hpAy3Z/Hjl3CJms=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Thu, 22 Feb 2024 21:34 UTC

Frank Slootweg <this@ddress.is.invalid> wrote:

> T <T@invalid.invalid> wrote:
>
>> An update checker, such as the now defunct SUMo which also shows
>> "Critical" security updates, is exactly what I am after.
>
> I haven't used them, but someone mentioned Avast, which made me
> remember that Avast had some kind of update checker.
>
> So I went to the 'For business' section on avast.com and as I
> understand it, you could get/use 'Avast Business Patch Management' at
> $16.42 per seat per year (discount for higher numbers of seats).
>
> 'Patch Management'
> <https://www.avast.com/en-us/business/products/patch-management#pc>

They also have a driver update checker, too.

https://www.avast.com/en-us/driver-updater#pc
($44/year subscriptionware)

I don't use 3rd-party update checkers, so I have no idea how this one
works other than it focuses on drivers, not apps. They have a separate
app update checker noted at:

https://www.avast.com/c-software-updater-tool

They mention it is an integrated feature in their Avast One product, but
it might be available separately. Couldn't tell if it is integrated
with their Essential (free) or payware version of Avast One. The
download link point to a file called:

avast_one_free_antivirus.exe

So, I suspect to get their software update checker has you get their
free Essential edition of Avast One.

Re: VulnDetect

<uraf3b.ses.1@ID-201911.user.individual.net>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=78681&group=alt.comp.os.windows-10#78681

  copy link   Newsgroups: alt.comp.os.windows-10
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: this@ddress.is.invalid (Frank Slootweg)
Newsgroups: alt.comp.os.windows-10
Subject: Re: VulnDetect
Date: 23 Feb 2024 14:54:29 GMT
Organization: NOYB
Lines: 46
Message-ID: <uraf3b.ses.1@ID-201911.user.individual.net>
References: <ur1p29$2dp3h$1@dont-email.me> <op.2jfp2rmubh2i3ropera@paganini.bofh.team> <ur1us7$2eutp$3@dont-email.me> <gconckc6jz2r$.dlg@v.nguard.lh> <ur3uje$2uqr0$1@dont-email.me> <18no8uk3d7es4.dlg@v.nguard.lh> <ur5lhf$3bf3c$1@dont-email.me> <ur7kla.ov4.1@ID-201911.user.individual.net> <1qhmv67dfrh4r$.dlg@v.nguard.lh>
X-Trace: individual.net /ihuxjijt1iapnWeTJ4rEQz1zjc6vA9UpkD5h8XQk9/UhXjKUM
X-Orig-Path: not-for-mail
Cancel-Lock: sha1:0gnECRL9Q0YXBWIJTk4UcFXbGmA= sha256:Zt5CJJaWulXXtZzKLs9cLkmj4fOR9/FTRY+lwR8nqbE=
User-Agent: tin/1.6.2-20030910 ("Pabbay") (UNIX) (CYGWIN_NT-10.0-WOW/2.8.0(0.309/5/3) (i686)) Hamster/2.0.2.2
 by: Frank Slootweg - Fri, 23 Feb 2024 14:54 UTC

VanguardLH <V@nguard.lh> wrote:
> Frank Slootweg <this@ddress.is.invalid> wrote:
>
> > T <T@invalid.invalid> wrote:
> >
> >> An update checker, such as the now defunct SUMo which also shows
> >> "Critical" security updates, is exactly what I am after.
> >
> > I haven't used them, but someone mentioned Avast, which made me
> > remember that Avast had some kind of update checker.
> >
> > So I went to the 'For business' section on avast.com and as I
> > understand it, you could get/use 'Avast Business Patch Management' at
> > $16.42 per seat per year (discount for higher numbers of seats).
> >
> > 'Patch Management'
> > <https://www.avast.com/en-us/business/products/patch-management#pc>
>
> They also have a driver update checker, too.
>
> https://www.avast.com/en-us/driver-updater#pc
> ($44/year subscriptionware)
>
> I don't use 3rd-party update checkers, so I have no idea how this one
> works other than it focuses on drivers, not apps. They have a separate
> app update checker noted at:
>
> https://www.avast.com/c-software-updater-tool
>
> They mention it is an integrated feature in their Avast One product, but
> it might be available separately. Couldn't tell if it is integrated
> with their Essential (free) or payware version of Avast One. The
> download link point to a file called:
>
> avast_one_free_antivirus.exe
>
> So, I suspect to get their software update checker has you get their
> free Essential edition of Avast One.

Yes, I know about Avast's free Software Updater, etc., but 'T' needs a
solution for commercial businesses, so that's why I looked at the 'For
business' section on avast.com.

FTR, I also don't use 3rd-party update checkers for my private
systems, not for software/programs/'apps'/<whatever> and certainly not
for drivers.

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor