Removed my post. Reason: Giving EaseUS developers an oppurtunity to close this security hole.
Aigle, No, you are not right. You can try the following test I performed: Make a copy of notepad.exe on the C: drive, rename it into...
Aigle, Problem is the same as with network access you have reported here:...
It connects to unknown.hostforweb.com to see if there are updates.
101% agree with aigle.
No wonder you can't find it. You ask a question about Geswall and you get answers for Defensewall. So, here the answer for Geswall: All...
Try this (read it all till the end): http://gentlesecurity.com/board/viewtopic.php?t=260
1. Say you suspend Geswall for a moment, what happens to the malware, is it let go? If malware has been downloaded by an isolated application, it...
Nothing crashed with GesWall. Geswall simply blocked the messages that test.exe tried to send to the applications.
PC Armor (http://www.datadrivethru.com/pcarmor_product.asp), previously known as Spyberus, tracks installations in real time as its happening and...
Try this: http://gentlesecurity.com/board/viewtopic.php?t=256
MagisDing, Geswall's logs tell me: notepad.exe ISOLATE on start from iexplore.exe I am also still using Tiny Firewall 2005, telling me that...
In addition to the answers already given: 2] If I manage to terminate GeSWall, will all the resitrictions imposed on applications by it, be...
Chrome sturmen, Some remarks with respect to what you experienced: 1. It is possible that you have a newer version of the bat with different...
Hi Kees, If you look careful you will see that %ANYHKU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Startup% Deny Create...
Just a note: Isolated applications will not be able to change or add anything to the registry (default is that every operation with the...
Thise are exactly the rules I use and it works.
http://www.wilderssecurity.com/showpost.php?p=1202946&postcount=24
Seems not, see: http://www.krysstal.com/spoken.html
Normal apps that want to write/read something on you disk use high level disk access mechanisms (like folder/file) and do not actually want and/or...
I made my Address Book confidential in Resources and only created a rule for msimn.exe which allows it full access to the Address Book.
If you are using the Pro version, you can also export/import the rules of any particular application: Right click on application Select:...
I have the same rules for Outlook Express as the ones given by Kees1958. These rules did however not allow me to send emails by other...
Happy to contribute. Henk1956
On a USB you can not label individual files as trusted or untrusted. However, you can add USB devices as Threat Gates, meaning that any...
Separate names with a comma.