Lotuseclat79, thank you for posting a link to this video. For those who haven’t viewed it, please do! While the message is serious, the...
TonyW, my prior post was made in jest. :)
Toby75, can you kindly elaborate upon the operational goal/objective (rather than the result) that you are attempting to achieve? That...
I have hardware-based DEP enabled for everything on a Windows Vista Business workstation, and all works well. One exception was a prior edition...
Perhaps the “missed threats” statistics on the Prevx website should display a separate count for DOS-based malware? Hey, inquiring minds want to...
Is “plausible deniability” only of practical importance to citizens of countries that can compel an individual to reveal the password of an...
PrevxHelp, kudos on your professionalism and sportsmanship! When anti-malware companies compete, all users eventually win. PrevxHelp, how does...
SafetyFirst, for the PGP Desktop product, the answer is “both:” you can purchase a perpetual license or an annual license. With the former, Dantz...
To verify that an encrypted virtual volume appears as “random data,” simply open the associated storage file (e.g., “<volume_name>.PGD” for PGP)...
Some early evidence by PC Magazine related to this performance issue has emerged...
PGP documentation is available from here. I recommend that you start by reading “An Introduction to Cryptography” and then glance through the...
McAfee has recently been gaining market share, suggesting that the product has improved - see For Symantec and McAfee, ‘Arms Race’ for Security.
Norton Internet Security 2010 adds "vulnerability protection” (see screen image and here) to detect applications that need to be patched (updated)...
Readers of this thread might find a white paper by Kaspersky to be of interest: Malicious Code Detection Technologies. It’s a nice overview of...
Commentary from PC Magazine... And some impressive results...
Blackcat, while I sincerely appreciate the input of PrevxHelp and do hope his presence will continue, please note that this thread was not...
PrevxHelp, this is an interesting architectural difference between the products about which I would like to learn more. However, if the net...
Raven211, that’s a good catch. Upon reading the Symantec forum comment again, it says: “We place our signatures in the cloud, and our reputation...
PrevxHelp, I am not aware that Norton Internet Security 2010 performs scanning in-the-cloud, if we define “scanning” as the process by which a...
PrevxHelp, that is intriguing. Are you saying that “behaviors” are the fundamental, atomic (most granular) unit in the database that is queried...
Ah, PrevxHelp, that comment was most helpful. I too am not a Symantec employee and am also basing my comments on publically available...
Justin, that’s a troubling report. Suppression of free speech is incongruous with the core philosophical underpinnings of privacy. From my own...
PrevxHelp, I am perplexed. On the one hand, you have discussed the variables that are uploaded into the cloud to allow Norton Internet Security...
PrevxHelp, also note that Symantec hasn’t disclosed a complete listing of the parameters collected and used in the computation of the reputation...
And, PrevxHelp, I could be wrong -- it wouldn’t be the first time, unfortunately! :) However, what you are suggesting is so bizarre that I can’t...
Separate names with a comma.