This is definitely a good idea. Holding down the domain for one more year until Tony hopefully returns. My guess if it is lost the potential for...
Since you are from China, its easier for you to sift throught the forums there and give us a clue about Tony's whereabouts?
VBoot sounds like rollback/snapshot sotware, am I right?
You would be wise to utilize blocked access settings for commonly exploited programs such as java and flash. That should take care of about 90% of...
The real source code isn't leaked. Dont worry phantom armor is only a lookalike ripoff from the sd interface (and a bad one at tht). Even if the...
There isn't one that I know of that has what your're looking for. Using sandboxie with SD should guarantee excellent Fort Knox-like pc...
bump! -- LUA users get in here 8)
Hi, I am curious as to how sbie dropmyrights acts as a backstop on windows64.
1. I know it's a company name 2. I also know of the different product lines 3. Couldn't agree more, which is why less components in a LV product...
The easiest way I found to keep important links is to simply copy paste them in an excluded text file. Remember that every potential exclusion...
instant system recovery - such softwares are not intended to be used for security and are targeted and easily bypassed, if used for that purpose....
Although this is not a far possibility given China's authoritarian government, I would say it is highly unlikely in his case. His software is...
Thanks for the heads up:thumb:
Art of Destruction:The Mechanics of Stuxnet A remarkable piece of malware indeed. See a security expert's dissection of the Industrially designed...
Start/Run restrictions my friend
To be precise, Tzuk never claimed both versions to be equal in security protection at any point in time. What was meant by that release news...
:thumb: This is by far the safest method of them all. Physical separartion of the drives Guarantees safety.
In reply to your question, there are 2 main ways even a VM can contaminate a real system.: 1- Shared folders, even if set to read only. There...
We all know Tony hasnt made an appearance or replied to anything sent to him around the early months of this year. When signing on the forum just...
Kees, after some research I found out that KACE is applciation virtualization rather than hardware virtualization -- which means it functions in a...
For a while now I have looked over the internet for some solid evidence as to the detection rates od either, without avail. I would like to know...
Since TDL4 is out could Buster or anyone test it against the products highlighted in this topic for confirmation that it doesnt bypass the latest...
Use sandboxie and never have to worry about any rootkits whatsoever
Thanks for your reply Kees, you have understood my question correctly. So what you are saying is that this is identical or similar to the firefox...
This is amazing. Good find bro
Separate names with a comma.