Yes it does
Ok here is my situation. I have a Belkin N Share router that allows a USB hard drive to be shared like a NAS over the network. I have it setup so...
What operating system are you running? So you think he is accessing shared folders on your computer? I would recommend disabling file and print...
Agree. With Malwarebytes and Superantispyware. Who needs Spybot? I remember when Spybot and Adaware were my choice tools. I cant even remember the...
I recommend you updating to the latest Tor browser bundle here: http://www.torproject.org/projects/torbrowser.html.en Also to me the best way...
Keyscrambler is good. If you get a keylogger on your computer it does a decent job of scrambling what you type so it can not be picked up. What it...
For me: Avira heuristics set on High. Firefox with cookies disabled by default and allowing them on a site to site basis. adblock,noscript,better...
I found out about this from: http://www.raymond.cc/blog/archives/2011/04/01/hidden-list-of-visited-websites-by-flash-player/ This is interesting....
If you find out how to do this I would love to know as well. Thanks for all the info as well.
True.. This will give the same effect as using more nodes though right? Also how can you setup Tor to use more nodes? Also how can you be specific...
I would assume running connected to JanusVM Via VPN + Torchat on top of it would also increase anonymity.
I have not called anyone names here or attacked anyone. I personally do not believe ANY piece of security software is 100% secure. My entire point...
You could use Returnil on your system. Enable it before mounting your truecrypt volume from your USB. Then set Returnil to wipe all disk changes...
He doesn't of course.. and all he has currently is malware that if ran in the sandbox will modify/delete files in the sandbox.. Not really sure...
So there must be a shared folder between the Host and VM. So the exploit only works on a VM that is not configured securely. I can totally...
Understand you are showing the progression in these papers which offer no POC but theory on what could happen. I guess we will see.. I think...
"A critical vulnerability in the virtual machine display function might allow a guest operating system to run code on the host." Interesting I...
I agree with this statement. I recommend using PeerBlock http://www.peerblock.com/
Not sure why speed would be that big of an issue as Usenet forums only host .nzb files which are like torrent files. They are very very small...
Im not sure what any of your links prove or how they are relevant to this discussion. Link0- Is a paper on VM-Aware malware. Which is malware that...
Sure did.. I found this thread: http://www.wilderssecurity.com/showthread.php?t=292397&highlight=Sandboxie+bypass Seems to be alot of speculation...
I have searched and searched online and different resources for POC of malware that bypasses virtual machines. I have yet to find any. I know some...
Is this something that JanusVm would take care of?
Re: SpyShelter 5.11 Awesome! 5.12 seems to have fixed the issue I pointed out in my previous posts. Good job Spyshelter! The only thing I...
I have been using Returnil for a couple of years now and it doesn't mess with the boot process. I use it all the time to test out software. When...
Separate names with a comma.