New Antiexecutable: NoVirusThanks EXE Radar Pro

Discussion in 'other anti-malware software' started by sg09, Jun 3, 2011.

  1. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    :confused: ;) Following my post #5339 and similar from @rpsgc in #5347, with @Peter2150's responses in #5340 and above #5349, I am still unsure which one should be used:
    1. 'Do not check if a process is signed (save bandwidth)' or
    2. 'Do not allow signed processes'
    I have checked 1, as I understand it to mean signed or unsigned processes are treated equally and not trusted.
    I do not understand 2. It almost sounds as if unsigned processes are allowed.
     
  2. hjlbx

    hjlbx Guest

    What does help file say about those settings ?
     
  3. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    I did look there but could not find anything. It seems geared to the earlier stable version.
     
  4. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Just leave #1 checked and relax. You are over thinking it.
     
  5. @rpsgc

    Signed malware FUD
    This is caused by security programs allowing signed malware without actually checking whether the signature is valid. When the validity of a signature is checked, all forged signatures will be revealed (hash incorrect). This is also the reason why Microsoft co-signes drivers in W10 and from W10AU requires new (more advanced) hashing to make a clean start with signed software again. These improvements will be pushed to windows 7 and 8/8.1 next year also.

    There are a few cases of Comodo (who else) selling valid signatures to cybernet criminals. Those cybernet criminals had piggy backed their software with some shareware and freeware offerings. The point is that those signed programs were from a fantasy named vendor (because they can't use patented names like Microsoft, Intel, AMD, etc). So when you tailor your trusted vendor list, you reduce the chance of running into such a malware with a valid signature (simply because the malware vendor is not on the trusted vendor's list).

    My guess/advice
    Do not check if a process is signed (save bandwith), probably checks the validity of a program signature (which costs bandwith). So when you keep "Do not allow signed processes" on the default (meaning NVT auto-allows signed processes), you should also keep "Do not check if a process is signed" on the default value (so NVT checks the validity of signature). When you keep those two settings on the default and tailor the "trusted vendors list" to the ones you have on your PC, the chance of signed malware intruding your system is zero.

    Food for thought
    The developer of NVT is a well known security specialist. Do you seriously think that a man with such deep knowledge of security would develop and release a security program which would have serious security issues and would be vulnarable by default?
     
    Last edited by a moderator: Aug 17, 2016
  6. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Thanks for clarifying re signed malware.
    Regarding the Signed Processes setting: one can only select one or the other i.e. it is not a question of multi-selection, at defaults ...
     
  7. rpsgc

    rpsgc Registered Member

    Joined:
    Dec 29, 2005
    Posts:
    312
    Location:
    Portugal
    So you're saying that I should leave all settings at default values?
     
  8. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    I discovered that if you have a short vulnerable processes list, the easiest way to rebuild it after a major windows update is to right click and choose set to default (last option at the bottom)
    This will reset all the default processes to the new hash value. Then you can add or subtract as you wish, but at least the basic list will work.
     
  9. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    what if you chose to block a file, and then you clicked on "ignore"? how to undo the ignore?
     
  10. iammike

    iammike Registered Member

    Joined:
    Jun 13, 2012
    Posts:
    345
    Location:
    SE Asia
    Settings - Notifications - "Manage Excluded Processes"
     
  11. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    NVT easily doing it's usual bang up job on my 8.1 just as it is and will be resident for the remainder of my 8.1 until something gives out.
     
  12. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    when installing a new program, which of the default vulnerable processes can I expect to see?
    I already know that I will see a lot of regsvr.
    what other processes are not suspicious during installation?
     
  13. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Assuming you trust the program just use install mode. Otherwise that is a question that can't be answered. It just depends on the program
     
  14. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    I heard that some programs now use powershell during installation. ever hear of that?
     
  15. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    allow me to clarify my question.
    if you trust the program, and you use install mode, you aren't really gaining any protection from ERP.
    and if you don't trust the program, and don't install it, you don't need to be protected from it.
    So, aside from those browser exploits that use unpatched vulnerabilities in java and flash, and they will rarely affect you if you have a good browser that is up to date, how does ERP actually help you?
     
    Last edited: Aug 25, 2016
  16. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Okay, let me clarify. There is a middle road to your two sides. Say there is a program that I don't have a sure reason to distrust, but I want to install. Then I won't use install mode, I will stay in alert mode. If I was installing and saw powershell, I'd block it and abort the install.

    Also given the conditions you cite you are right, but what happens if I am tired and miss something. Then when ERP challenges it there is another opportunity to catch it.
     
  17. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    thanks, that makes sense
     
  18. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    That's the whole point of ERP, to mainly protect against exploits. It can also be used to prevent other people from installing apps on shared PC's.
     
  19. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    It should be effective also in stopping the payload, which often arrives delayed, or after a reboot
     
  20. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    There is another big use for me, and that is watching installers. I've installed things that had open candy in them and just block the executables from open candy. It's also interesting to see how some valid, but bloated programs install way to much stuff. Just gives me a look at what is going on my system. If I end up not liking it hello macrium
     
  21. act8192

    act8192 Registered Member

    Joined:
    Nov 9, 2006
    Posts:
    1,789
    Question - does ERP ever go out to the internet? Does it ever check any network traffic? I don't think so, but would like an expert answer because I'm investigating something else unrelated.
     
  22. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    I tried that out, it's good!
     
  23. guest

    guest Guest

    ERP doesn't block dlls (and todays it is one of the biggest threats) , which it is why SOB was created for. So ERP is quite useless to me as main protection, i see it now only as a complementary anti-exe. The softs is outdated, underdeveloped (not to say abandoned) and in the actual days , it can't keep the pace with others like Appguard and co.
     
  24. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    what blocks the DLLs?
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.