Site has a roguish feel with pre selected options and pop-ups, product seems to be CA related. The email address I received for the free...
Hi FanJ, I know you are familiar with gratis tools, for some of the rootkits such as TDL3,4 am I right that UnHackMe does the finding and then...
It's surprising no suggestions of : autoruns process explorer tcp viewer ark ...
As long as Trusteer keeps up with attacks, 'continuous' update is needed.
How vms work, it has to, although that's a simplification. VMI's work on this to log and interact vms, there are some forensic tools that work...
Hello, Just set up a small vm, any OS that you prefer, that restores the VM to a clean state (nonpersistant mode) and only use it for that one...
This was the email addy I used for rootkit.com - remember the HBGary security fail, all the members emails and passwords were available. Use...
Pwned! ;D
nice analysis at the bottom of that page Rmus posted or white paper. wealth of links over at SCADAhacker.
Royale Noir with xp.
This is MaxSS branch of TDL which as you can see from the link now uses VBR.
Playing with QubesOS for awhile, a project I admire immensely because of my own affinity with security through isolation, virtualization. Beta 2...
:) False positive, cureit flagged it's own log.
A secure system, whatever that maybe we know will stop malware in the first instance, the trouble is not everyone is a security researcher or...
RIP Dennis Ritchie. What an influence he had on all of us.
Cisco white paper Commercial Off the Shelf (COTS)
addendum
I work from one Windows 7 disk unlocking all the versions like Vista was, then re-burning an aio iso. You could re-arm to 120 days.
The hidden volume is used for storage and works with the driver and although an interesting approach isn't to important in the removal of the...
Yup they do, linuxforall sums it up above nicely. Involved in hardware and software re for clients of this nature, you'll also see a lot of...
String inside :) Backdoor:W32/R2D2.A
A bit more interesting this time.
Portable application virtulization or streaming, with encryption and a secure password manager or boot to usb or cd.
Killswitch looks like a cross between process explorer and autoruns but wait for evidence before jumping the gun, saying that the gui is a...
Uses System Management Mode below ring0 and ring-1, holy grail :)
Separate names with a comma.