Short version I guess, securing individual hosts != securing the network. My own experience BTW is that this can also apply to Linux servers....
Well supposedly it doesn't work any more; the OP link indicates that Avast fixed it as of ~11 hours ago... I wonder what other sandboxes this...
On a possibly related note, CyberCoders' HTTPS is perhaps the worst quality I've ever seen....
@Baserk agreed on that much. Honestly, "have not disclosed" (as opposed to "do not yet know") does not inspire confidence.
@inka Hey, sorry for the overreaction on my part. Seriously. My bad. :( I'm not surprised, re: your experiences at staffing companies. I've seen...
Thee extension doesn't mean it's actually a Windows PE executable.
It's pfSense, and on further searching this turns out to be me being an idiot and not looking at the settings. pfSense uses circular log files...
a) Relax b) I get your point c) You don't have to be a jerk about it d) I find it fascinating that the one reply I get is borderline insulting...
My main question kind of comes from the opposite side - if the guy threatening his ex-girlfriend hadn't had a record of violence, would the police...
So today I took a look at CyberCoders, on my workstation. (Debian Stable x64, Iceweasel, uBlock Origin configured to block all third-party content...
What... wow. "Memory corruption protection" actually introduces memory corruption vulnerabilities. Amazing. Also I like how they use an...
@amarildojr I'm curious what this tracking activity looks like on a firewall and/or proxy, and how extensive and pervasive it is? And where...
Eww. Guess I was right to be skeptical about HTTPS MITM scanning, on e.g. Sophos UTM. :(
CHMOD(2) Linux Programmer's Manual CHMOD(2) NAME chmod, fchmod, fchmodat - change permissions of a file...
No, because chmod is also a library call; and the Metasploit interpreter process can tamper with a million other things. Firejail could probably...
Pointless, unfortunately. e.g. Metasploit will bypass this "feature" by spawning an interpreter process in memory only, and running commands from...
This is not really true. A properly made static binary can run out of the box on most Linux machines of a given architecture (at least for a...
Nothing even remotely interesting - just trying to run various already-setuid binaries with it. Don't assume there are no holes just because I...
Wow, this thing is awesome! It's like AppArmor in a 120 KB binary. Rockin'. I am a little concerned about the user-administered part though. IOW:...
@Fabian Wosar Got it, I just found the NW.js website. Kind of like py2exe for Javascript, I guess. (Mind, I read "Javascript ransomware" and...
@Secondmineboy Doesn't matter. It's social engineering, not an exploit. You have to actually download open the thing.
So this thing doesn't actually use a Chrome JS sandbox escape... Rather, it repackages the Chromium browser, in a 22 MB fake screensaver file,...
@Palancar Err... I mean without adding persistence. Persistence slows things down hugely. But thanks anyway...
So, an update: I'm biting the bullet here, and setting up a Linux USB stick, for her to do banking and purchasing with. I think it should be good...
Other - or rather, none. If you're still using XP for day-to-day stuff, then IMO you need to use a different environment for anything private....
Separate names with a comma.