COVERT Pro 3.0.9

Discussion in 'privacy technology' started by zmechys, Mar 18, 2015.

  1. zmechys

    zmechys Registered Member

    Joined:
    Dec 29, 2012
    Posts:
    1,155
    Location:
    usa
    COVERT Pro 3.0.9 - Giveaway of the Day
    http://www.giveawayoftheday.com/covert-pro-3-0-9/
    Has anyone heard about that program?

    "COVERT Pro – an innovative solution to ensure total privacy while working at the computer. It protects against spyware. When working in secure platform, all user’s actions in all applications (browsers, email clients, office software, messengers, etc.) are safely hidden. Capturing data from keyboard input and monitor screen is blocked. Using special features of COVERT Pro (Network monitor, Driver monitor, System processes, System services) allows you to detect and remove all hidden applications.

    To protect against spyware, COVERT Pro uses the masking method. It is the most reliable method against spyware — masking action of user. It means creation of secure platform, inside which user can run any applications, while remaining invisible to the spies."

    Interesting comments about that program.

    "A Czech company with address: The address of european office COVERT Prague Ltd. is located at: 15800 Prague 5, Stodulky, Běhounkova 2344th
    The software is digitally signed Kumerasoft in Russian language."

    About tests:
    https://covert-pro.com/examples-of-protection/
     
  2. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    23,935
    Location:
    UK
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,546
    Location:
    The Netherlands
  4. Lagavulin16

    Lagavulin16 Registered Member

    Joined:
    Nov 26, 2014
    Posts:
    195
    Location:
    Emerald City
    @Rasheed187 Nice posting amigo. I will definitely be staying with MBAM and Spyshelter Firewall.
     
  5. guest

    guest Guest

    bashing well-know product is common practice to hype your own product, nothing special there.

    the discussion should be more about "what it does" rather that "what they said"
     
  6. guest

    guest Guest

    I tested the apps:


    It seems like a on-demand Secure Desktop with detailed monitoring features. While in "Covert Mode" only the allowed apps are able to be launched (processes opened prior still continue in the background but aren't accessible)

    I launched zemana test tool , went in covert mode then opened notepad and typed some words; once back in normal mode , zemana didn't recorded the keystrokes , so Covert has done the job it was supposed to do.
    also while in Covert Mode, no screenshots could be made.
     
    Last edited by a moderator: Jan 6, 2016
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,546
    Location:
    The Netherlands
    That's true, and thanks for the testing. So it does have proactive capabilities? I had the impression that it was basically a simple system monitor, that relies on the users knowhow. So that's why I was a bit skeptical. Or does it also alert about active threats?
     
  8. guest

    guest Guest


    kinda proactive , you will be alerted by the various monitors (that will highlight via colors ) and a sound about hidden processes/services.

    from what i figured "platforms " could be described as "secure desktops", you can create many of them (by giving a different ID to each) ; if one is compromised , you just need to close it and open another "virgin" one.

    For prevention, it relies by highlighting unwanted child processes

    For detection, it relies on a database:


    i just started to use it, so some features/bugs aren't been tested/discovered yet :D

    by the way you have a USB version so you can use it on other "not-sure-to-be-safe" computers
     
    Last edited by a moderator: Jan 6, 2016
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,546
    Location:
    The Netherlands
    I've quickly checked it out running it sandboxed, but I still remain sketical. It has a small database, and the question is, if it only looks at file name. And on Win 64 bit it's not as easy to hide processes if I'm correct. I doubt if it is any better than Process Explorer.
     
    Last edited: Jan 10, 2016
  10. guest

    guest Guest

    at least you are not keylogged :p

    about the monitoring, it pinpoint hidden services in Svchosts, can be useful.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.