XP is architecturally obsolete. No, seriously. The progress made in computing power and programming techniques over the past decade is...
So, bad news: as of right now, Corgi Linux is obsolete. The live CD utility it depended on has been obsoleted and replaced in Debian Testing. But...
@Rasheed187: I've yet to see other HIPS hooking those syscalls, but then last time I seriously looked at one was a few years ago. PrivateFirewall...
@CloneRanger: I didn't "test" it. There are other (safer) ways of doing so than live malware (e.g. Metasploit and other such frameworks) but I...
You're posting to fast for me to keep up :) If you don't trust some app the logical thing to do is to not run it. :)
Only if the malware in question is of the most simplistic kind. Against e.g. TDSS, forget it. That's actually what I really take issue with......
Okay, wow. The free version appears to work exactly how they say it does, and also exactly how I expected it might. Color me disappointed. It...
@Rasheed187, it's the free version I'm skeptical of, due to the seemingly magical claims about how it works. Re the pro version, that's a HIPS,...
Right, but that is wholly different from claiming to "encrypt keystrokes between the keyboard and your applications" or whatever.
Hmm interesting. So they might just be blocking DLL injection, etc., and it got mistranslated by the marketing team or something. I'll still give...
From their homepage: http://www.zemana.com/product/antilogger-free/overview/ Keylogger attacks from identity thieves and criminals...
To be honest I'm extremely skeptical of such claims. You can't have your data 100% encrypted, it has to be decrypted somewhere in RAM. You can...
... On which note, the description on the MBAE page ("Malwarebytes Anti-Exploit is a small, specialized shield designed to protect you against one...
@Sempei Nihira: in enterprise situations it's often unavoidable. A lot of companies still use Java applets for vitally important stuff, including...
So I posted something about this on Mozillazine 10 days ago, and still no reply... Looks like that was the wrong place? And Mozilla has no...
So... a backdoor shell used to backdoor servers is itself backdoored? With a backdoored backdoor? ;)
Maybe I'm not understanding this, because I really don't see the need; and also because, on the desktop, systemd has utterly failed to deliver....
This time around the answer is "no" ;) - Text segments do not have to be modified for an attack to work if you can execute stuff from elsewhere....
Might have to do with "multimedia keys" on many keyboards, which do not have standard keycodes (or whatever the terminology is, I probably have it...
(1) can already be done, with shell scripts no less. If you want to use it as a security feature you're barking up the wrong tree anyway, you...
[Disclaimer: I work with Linux professionally, but don't consider myself a true expert at this point. Don't assume I know what I'm talking about.]...
Sorry, this kind of fell through yesterday what with the firewall testing. There is other stuff I have to do so I will probably postpone it until...
A dozen failed exploits later, I think I see the picture... Interactive firewalls are *interactive*, even when arguably "locked down." The reason...
Interesting - after a few tentative prods with Metasploit (and some clicks on "Deny" buttons on the netbook), PrivateFirewall has either filtered...
PrivateFirewall, with network security on "High": Starting Nmap 6.40 ( http://nmap.org ) at 2014-06-21 22:47 EDT Nmap scan report for...
Separate names with a comma.