Greetings. Searched the forum before posting, found nothing on this topic. TIA. Problem: PG not preventing AOL Instant Messenger from being terminated by external booters when visiting chat rooms though PG is supposed to be protecting it from termination, modification and reading. To date, this is the only instance am aware of where PG fails to provide adequate protection. Anyone else have this problem?
Do you have any logs of this activity? Im assuming this external booters are using aim code to do their bidding. Remember, PG only protects your computer from programs that you run locally. If the external booters uses legitmate aim functions, then i see this as an aim security flaw and not pg. However, I do not have any info on these aim booters. Do you know more on them?
No, no logs. As far as AIM booters go, next to no information is published anywhere. Sure would like to be able to defeat them though. Thanks for the reply.
Tried Window message handling just in case ? Does sound like an AIM issue, perhaps their support team could shed some more light on it ? as noted above, PG currently doesn't really exist to protect processes from THEMSELVES
There's a vaguery in your post... did they shut down AIM on your machine or did they terminate your session in a chat without shutting down AIM on your computer ? <there's a difference>
They do both - terminate public chat sessions and shutdown the running AIM process on the box at the same time. .