Sunday, February 8, 2026

Advanced Mismatch Quotes Detector


Advanced Mismatch Quotes Checker

Analysis Results

Click "Check Quote Balance"
Your analyzed text will appear here with highlighted quotes...
Summary: Click "Check Quote Balance" to analyze your text for mismatched quotes.
Balanced double quotes
Balanced single quotes
Unexpected double quote
Unexpected single quote
Mismatched quote type

Adnvanced Quote Mismatch Detector © 2026 metadataconsulting.ca

Mismatch Quotes Checker 2026


Mismatch Quotes Checker

Analysis Results

Click "Check Quote Balance"
Your analyzed text will appear here with highlighted quotes...
Summary: Click "Check Quote Balance" to analyze your text for unbalanced quotes.
Balanced double quotes
Balanced single quotes
Unbalanced double quotes
Unbalanced single quotes

Saturday, February 7, 2026

Intact Insurance Phishing Email with subject Selected drivers claim your free dash cam


For the record, this is a generic Intact Insurance 
phishing email attempt that is recently going around, with subject line "Selected drivers claim your free dash cam". 

What to do?  
Report them, goto bottom of page. 


From:  Intact-Insurance Auto Team <service.HYMX@crnnjxdy.cloudone.vn>

Subject: Selected drivers claim your free dash cam










PHISHING LINKs;

1. http://xn--2l4gykuhbr4-odb60k.eduresfoundation.org/xxxx


How to tell this is a Phishing email?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the company's website then forget it.
  3. The best way is to 

How to examine Email Message Source?

Now let's look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from source domain, like apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing to Google

If you have received this email, take further action by

  1. https://www.google.com/safebrowsing/report_phish/

Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Thursday, February 5, 2026

Sephora Phishing Email with subject Final Reminder: Claim Your Lancôme Beauty Box


For the record, this is a generic Sephora 
phishing email attempt that is recently going around, with subject line "Final Reminder: Claim Your Lancôme Beauty Box". 

What to do?  
Report them, goto bottom of page. 


From:  Sephora <newsletters.JtCD@coolwave5996.peta.web.id>

Subject:  Congratulations You’ve Just Hit the Jackpot!








PHISHING LINKs;

1. http://xn--rktl52u6xkk-odb60k.yiaap.com/xxx?xxx


How to tell this is a Phishing email?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the company's website then forget it.
  3. The best way is to 

How to examine Email Message Source?

Now let's look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from source domain, like apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing to Google

If you have received this email, take further action by

  1. https://www.google.com/safebrowsing/report_phish/

Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Tuesday, February 3, 2026

Open supply chain hack of VS Code extensions

Be warned the following VS Code extensions are again subject to a supply chain hack, these extensions are reported to have  GlassWorm malware. Extensions named are VSCode Mindmap, FTP/SSH Sync Toy, I18n Tools and Scss to CS.

New GlassWorm attack targets macOS via compromised OpenVSX extensions (bleepingcomputer.com)

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm (thehackernews.com)





Monday, February 2, 2026

Delete Long Path Tool - Delete paths over 260 characters in length Windows

After a brutal over-heat of my hard-drive, I have had to recover my hard-drive using a recovery tool, which also failed. It however left many incorrect recovered long paths to my 16T drive. I had to delete these and could not find a good tool to-do it, so I made my own. 




Download
  del260Personal.7z (you need  https://www.7-zip.org/ to unpack). For personal use only. Will open this page on each run. Copy into c:\Windows\System32 to use from cmd.exe.


License: 

del260Personal.7z personal use only, commercial license required. Contact as validated today,    available for license request. 


=== Long Path Deleter (del260.exe) ===
Supports deleting long paths > 260 characters.
Features double confirmation prompt and runtime log.

Warning: No recycle bin, this is a permanent delete.


Usage: del260.exe <directory_path> [options]

Options:
  /force    Force delete read-only files
  /hidden   Delete hidden files
  /system   Delete files with system file attribute (use with caution!)
  /norecursive  Don't delete subdirectories, stop recursive delete

  /help or /?

Examples:
del260.exe "C:\Long Path\Directory" /force /hidden
del260.exe "\\server\share\long path" /force
del260.exe "C:\Temp" /force /hidden /system

For full license read EULA.txt.

THIS SOFTWARE IS PROVIDED “AS IS” AND “AS AVAILABLE,” WITHOUT ANY WARRANTIES OF ANY KIND.
To the fullest extent permitted by law, the provider expressly disclaims all warranties, whether express, implied, statutory, or otherwise, including but not limited to any implied warranties of merchantability, non‑infringement, and fitness for a particular purpose.
The user assumes all risks associated with the installation, configuration, use, or performance of this software. No guarantee is made regarding accuracy, reliability, security, or suitability for any specific task or environment. In no event shall the provider be liable for any damages arising from or related to the use of this software.


Long Path Deleter (del260.exe) Version 1.26.202.1020
Copyright © 2026, MetadataConsulting.ca

			

Friday, January 30, 2026

Lottery Phishing Email with subject Congratulations You’ve Just Hit the Jackpot!


For the record, this is a generic Lottery 
phishing email attempt that is recently going around, with subject line "Congratulations You’ve Just Hit the Jackpot!". 

What to do?  
Report them, goto bottom of page. 


From:  The Winning Desk <newsletters.Qtdx@intelligentgem8337.ivvanamurillo.com>

Subject:  Congratulations You’ve Just Hit the Jackpot!






PHISHING LINKs;

1. http://xn--i4fw9jrd58s-odb60k.vipleyo.com/xxxx?xxx


How to tell this is a Phishing email?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the company's website then forget it.
  3. The best way is to 

How to examine Email Message Source?

Now let's look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from source domain, like apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing to Google

If you have received this email, take further action by

  1. https://www.google.com/safebrowsing/report_phish/

Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Tuesday, January 27, 2026

RTL Tool - Remove Right-to-left characters from filenames for Windows

 


Malware writers can trick you in 2 ways into thinking your file is a "PDF looking" file using the Right-to-Left embedded characters. 


Firstly, maliciously constructed “.exe” can be built to display an PDF icon, so it looks like PDF default reader will open this file. If the filename is really long then, you can't see the extension (see image below). 

2ndly and may not be so obvious, malicious PDF filename is constructed as with a right-to-left override character is such a way that the file ends ".pdf" extension, but really is an ".exe".  


So in example below, the 2nd file looks like a ".txt" file, but is really a ".docx" file (the 1st file). The 1st file has been cleansed of the RTL Unicode character, and ends in ".docx". 

The PDF file is actually an ".exe" file, but looks like it will open with default PDF reader. 


Download RTLExample.7z ( it includes the above files with PDF ".exe" example. The files contain no viruses or malware. The PDF is safe ".exe", and just opens this page in Chrome). The "PDF" is safe ".exe", and just opens this page in Chrome. But GDrive marks these examples "Sorry, this file is infected with a virus", which good because they are detecting the RTL character and exe. But it a false positive, since there is no virus in the files. You can create you own examples by inserting the RTL character into the filename, see this video https://youtu.be/n2kV3Q2eTCY). 


Here's the same files as viewed from the command (cmd.exe) line. The box character represents the RTL character.


Note: Detection of malicious file is never done by a filename alone, so a good antivirus will flag the contents of this file, for known signatures. BUT you can remove the annoying RTL character with the free tool below! 

How is RTLO being abused by malware writers?

In apps that support Unicode like Window Explorer, the right-to-left override malware method uses  a RTL Unicode character, that will reverse the order of the characters that follow it. It's used mainly for Middle Eastern/Asian languages that you read right-to-left.

RTLO can be used to spoof fake extensions. To do this we need a hidden RTL Unicode character in the file name.

What is “Right-to-Left Override” RTLO?
The RTLO method is used to hide the true type of a file, so it might trick you into open text file (.txt) which really is a Word file (.docx) with malicious malware. More recently this file could hide a .wav file. Audio files such .wav file are being embedded with malware, is on the forefront of malware maliciousness. Read about that on my post here.
The method exploits a feature built into Windows Explorer. Since Microsoft Windows does a great job of supporting different languages from around the world, some of those languages that are written from right-to-left (RTL). 
Let’s say you want to use a right-to-left written language, like Hebrew or Arabic, on a site combined with a left-to-right written language like English or French. In this case, you would want bidirectional script support.
Bidirectional script support is the capability of a computer system to correctly display bi-directional text. In HTML we can use Unicode right-to-left marks and left-to-right marks to override the HTML bidirectional algorithm when it produces undesirable results:
left-to-right mark: ‎ (U+200E) Unicode character
right-to-left mark: ‏ (U+200F) Unicode character
How do you fix files that have the RTLO or other bad characters ? 

Here's a tool I built to clean up Right-to-Left Mark (and many others) and Unicode Control Characters from your files. It's super fast, small and written in native C++.

Updated Thu 21-Apr-22 - new build, fixed many recursive issues




Download
 touchRTL.7z (you need https://www.7-zip.org/ to unpack). For personal use only. Will open this page on each run. Copy into c:\windows to use from cmd.exe.


License : 

touchRTL.7z personal use only, for commercial use buy touchLTRPRO. Contact as validated today available for license request. 

touchRTLPRO.7z, has flags to remove Unicode spaces and punctuations (math symbols, currency, open closing braces, and accent marks).  

Just run this command and it will recursively rename filenames to remove those characters under the specified directory name. If directory name, contains spaces you need quotes.


touchRTL -v -R -l -y "directory name"

where


Usage: touchRTL [-aclmpRuvxy] [-r REFFILE | -d DATETIME] PATH...

UNIX touch mimic, updates files access, modification and creation times of file(s) in PATH to the current time,
If PATH argument does not exist, creates corresponding new empty file or directory (using -y), unless -c or --n
Supports directory recursion and time stamping!
Supports Right-to-Left (RTL) character removal for files.
PATH argument can represent a filename(s) or directory. Double quote if it contains spaces. eg "c:\as is.txt"

  -a, --access-time        change only the file access time
  -c, --no-create          do not create any new files - If the file exists, touch will update the access time,
  -l, --RTL                remove Unicode control & format characters (esp. infamous right-to-left) from filena
  -m, --modif-time         change only the file modification time
  -p, --pause-exit         pause on exit (non-GNU extra)
  -R, --recursive          recursively touch files in specified directory and all subdirectories (non-GNU extra
  -u, --unicntrl           remove Unicode control characters only - https://www.fileformat.info/info/unicode/ca
  -v, --verbose            output the result of every file processed (non-GNU extra)
  -x, --creation-time      change only the file creation time (non-GNU extra)
  -y, --directory          specify directory, instead of default file
  -r, --reference REFFILE  use this file's times instead of current time
  -s, --spaces (PRO edtn)  remove Unicode spaces from filename
  -!, --puncs  (PRO edtn)  remove Unicode punctuations & symbols (math & modifiers) from filename

  -d, --date DATETIME      use YYYY-MM-DDThh:mm:ss[.ms] instead of current time (non-GNU, does not parse string
                           accepted "2033-04-01T07:07:07", "2033-04-01 07:07:07"

  -h, --help               Display this help and exit.

      --version            Display version information and license information.

For personal use only. Commercial license required for business use and removes page open. See --version for al
Copyright © 2019-2022 M. Pahulje <metadataconsult@gmail.com> - https://http://metadataconsulting.blogspot.com/

Saturday, January 24, 2026

iCloud phishing email with subject Mise à jour de votre activité Cloud


For the record, this is an 
iCloud copy phishing email attempt that is recently going around, with subject "Mise à jour de votre activité Cloud" that made it through spam filters.



What to do?  Report them, goto bottom of page. 


FromÉquipe de Mise à Jour Cloud <newsletters.RzPy@tropicalrabbit9954.pesantrenpersis27.com>
Subject
Mise à jour de votre activité Cloud




PHISHING LINKs;


1. 
http://xn--jawrvuzxehkd-3rakc13flad80s.supremachez.com/x.xxxx.xxxx.xxxx...

How to tell this is a Phishing email?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the company's website then forget it.
  3. The best way is to 

How to examine Email Message Source?

Now let's look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from the original domain, like apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing

If you have received this email take it further at 

  1. https://www.google.com/safebrowsing/report_phish/


Report phishing at Microsoft and subsequently government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx
  2. Report Phishing Sites | CISA
  3. Home - Canada's Anti-Spam Legislation (fightspam.gc.ca)