@BoerenkoolMetWorst thank you for the response. This is what I had thought too. @TairikuOkami thank you for the response. So what you're saying...
I need to know when a Patchguard bypass comes out such as ByePg and GhostHook etc.. for Windows 10 and Microsoft releases a fix/patch for it yes ?...
Your welcome. I've discovered from one source that Application Virtualization makes use of hooking a fair bit but that's coming from just one source.
I've read here that there are layering associated with virtualization but then my next question is how is the layering implemented ?...
@Rasheed just for sheer knowledge.
I'd like to know does virtualization make use of a virtual machine (such as guest/host OS) but still deploys hooking in its implementation (just...
Oh I see, thanks for the in depth and informative response. I would like to point out that I have a read an article where Windows PG can be...
Are you saying that user mode applications loaded and executing in RAM can be scanned by AV Scanners then but not kernel mode applications or...
Thanks for the reply. But how can kernel mode AV Scanners scan user mode or kernel mode space belonging to another process ? I thought that it was...
Can modern day AV Scanners scan for viruses in RAM on computers running Windows 7/8/8.1/10 ?
Thanks and boy do I feel dumb. I found out later that anyone can sign up for a Outlook.com email
Hello all. I contacted Microsoft out the email and they said it was a false email. The question the email address was using a Microsoft domain...
Thanks TheKid7. I will give that a link a read. Thanks
As the title states I would like to study many techniques that malware make use of to call home ? Furthermore I would like to research the...
Thanks to everyone I appreciate the replies. Victor.
Would anyone know of any on-line sites that give full details of what the rootkit does ? I would like to search for all rootkits that are in...
Does anyone know whether Eset AV performs a signature scan of the in memory image of these two Window files or does it scan the disk file image ?...
Thank you for the reply. That is what I believe and AFAIK I don't believe the SHA-1 algorithm has been cracked even though there is plans for a...
Thank you for your reply. I understand the part of checking to see if the file is authentic by Right Click File -> Select Properties->Choose...
Does anyone know if the algorithm used for creating a digitally signed file has been circumvented (broken/cracked) ? I'm asking only to find out...
I was hoping there might be someone who is keen on this subject since I have no clue on how this done. Well this is based on the premise that...
Thanks Magnus. Yes that is what I mean, an executable A gets executed via whatever legit method i.e window service or autorun or patching a...
Hello. I would like to know whether its possible for an executable (i.e. malware) to load itself into memory and execute without going through the...
I am considering trying out Nod32 4.x for 30 days and would like to know if someone can confirm that Nod32 download engine scans all downloads for...
Separate names with a comma.