There's more than one way to skin a cat. I use ZAP's mobile code control to block flash (which is active X), Java applets, scripts etc, but I'm...
I don't know about 'failsafe', according to AVComparatives KAV's Heuristics finds about 40% of new stuff - so what about the other 60%? KAV's...
I think so, but it may be a special key, I can't find it on my XP Home system using Regedit or Registrar Lite. According to this old thread the...
I'm completely new to this tool, just giving 1.6.1.0 a spin. I've a couple of questions though:- 1) Why is it that SSM's running process...
The information was extracted from the Process Monitor tab of SSM. Of course it is referring to the relative times at which protection...
How fast are kerio and jetico etc? On my system ZA is, and always has been, extremely fast at boot up. The True Vector service starts up before...
Anyone thinking of installing the Spyblocker feature may care to look at this thread:-...
Hmm! I looked up the CLSID for that BHO, I didn't get a hit so I suspect it relates to the SpyBlocker toolbar - there's something on that here:-...
So you do not consider it relevant that a scripted exploit, embedded in a website, can cause Rundll32.exe to launch a malware .dll? You appear...
I can't answer your question as to whether ST can be used to block execution of rundll32.exe, though if it runs a white list it probably does not,...
It doesn't just catch known threats as such. It is a behaviour blocker, looking for suspicious activity - which could include known or unknown...
For what it's worth, I noticed that, in the past, everytime you ran CCleaner it would delete the typedurls Key (depending on configuration) and...
You can do the same thing with the Tools section of AVG-AS, if you don't want to do it manually. Personally, I have execution protection for...
I can't really see your screenshot, but you can see from mine that, by clicking the 'Change' button, you can configure startup scan times. Edit...
I don't think that is correct. The startup scan is equivalent to a demand scan that occurs every system startup. It also has a realtime component...
True, but you can have a second AV as a pure demand scanner for right click scanning of downloaded files etc. The OP is wondering if he can...
That can happen when a file is in use by the system - eg if you are erasing TIFs and your browser is still open. You can configure Eraser not to...
With KAV 7.0.0.125 (with PDM fully enabled) I get the first pop-up, indicating that the Keystrokes are captured; it is only when I click the...
SSM Pro 2.3.0.612 passes the GetRawInputData test on my system, but KAV allows the keystrokes to be captured and only alerts when I shut down AKLT...
It's all working now, that's a relief, I was worried for a moment. It's a pity the installer for the standalone version of RD does not contain...
I sure wish I'd seen this post earlier, because I just finished uninstalling/re-installing RD and find I cannot update the product to reinstate...
That is what a Hosts file does. Spybot/SpywareBlaster doesn't prevent you visiting the site, it just ensures the site is in the Restricted zone...
What you are showing are Registry entries located at, for example:- HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Run The...
Do you mean you have TM set to run once in the Security tab? Or perhaps you mean you have denied TM the right to Terminate in the Protection tab?...
If you were going to Vista, or you had the paid version, you would need support. Changes in platform or advances in malware technique (such as...
Separate names with a comma.