If I have Sandboxie running and have my browser,Flash player, PDF viewer, etc confined to the sandbox will it help against Poison Ivy, buffer...
Is it better at some things that the others aren't and what are they and what are its limitations?
Interesting. So does this mean it is a false positive?
It is my understanding that Trusteer Rapport communicates with Trusteer multiple times as well as has the ability to detect whether I am using a...
I was running Firefox. The scan was completed using the latest version of GMER. Again, sorry am not in front of my PC but I believe it was 3.4.8....
Yes I have. Seems odd that GMER would consider Sandboxie as malware or a rootkit.
I ran GMER without any application being sandboxed and it was absolutely fine however what does this mean? Why does it return the message when I...
Is there a list of files that SandBox hooks into?
Sorry no as I haven't been able to get in front of my PC due to work commitments. I'll definitely give it a go today. I also ran a scan using...
Thanks Tomazyk. I don't have the PC in front of me but have included the results below. I'll give your suggestion a go but would be keen why GMER...
I ran GMER today and it returned a list of files in path %systemdrive%\sandboxie\windows\*.* that GMER detected as possible malware and rootkit....
Requires an account to view the content. Any way you can copy and paste what is there or provide a page that doesn't require users to login? Thanks
Thanks rudyl. Can you please elaborate on what you meant by 'In order for others to initiate connections through a VPN tunnel, your machine must...
traxx would you mind elaborating what you meant by 'even though they can no longer attempt to connect to you (unless your VPN service has port...
I am in the midst of setting up a new PC and would like to know what software I should have and what each software does. So far I have only...
That's true that it wouldn't make sense for anonymity.
I was wondering how hard it would be to set up a VPS and VPN through it. Has anyone tried it considering that logging of usage is a severe putoff?
Thanks traxx75. Very helpful to understand how I can check on any leaks. I was however curious what the difference between DNS entropy and a leak...
So how do you place faith it the security of the server short of performing a penetration test? Surely there must be some way to test the...
How would you test the exist node's security? Also does anyone know if a unique port is assigned when connecting to iVPN as opposed to it being...
Thanks. How did you find them with their no logging policy especially with servers in the US? What are the EU laws regarding logging?
I came across several threads regarding CryptoClound and wanted to get an objective view of what their service was like, security and the like in...
Has anyone used iVPN? How would you rate them in terms of serviceability and responses to any questions? Where are their server located?
Thanks. What is the best source to learn the basics of the technologies employed?
Thanks DasFox. I did have a read of what was posted however most of the information is over my head and seeing that no provider is going to answer...
Separate names with a comma.