If you run Comodo with all the bells and whistles there's quite a bit of redundancy. If you switch protocol analysis off but leave application &...
I opted for the combination Rootkit Unhooker & Rootkit Revealer. The latter because it looks for hidden registry entries, which Rootkit...
Happens with other firewalls too. ZoneAlarm is a notorious example. The problem is the large amount of inbound UDP packets. The workaround...
Is there a way to make AVG do the same? I looked in all the config sceens, but I couldn't find any option to make it scan the entire file.
If not, you'll release the source code?
I'm running AVG Free on one computer, and Avast on another. Today I also tried Comodo AntiVirus. All three are configured to do on-demand scans...
Alcohol 120%, one of the more popular drive emulator apps, hides itself from overly intrusive DRM by using a rootkit. RootkitRevealer detects it,...
That's like requiring (the software in) a router to stop an outside attacker from sabotaging your software firewall. If a one-way firewall is...
Maybe you have some kind of security app that deletes the entries Comodo writes to HKLM\SYSTEM\Software\Comodo ?
Thanx again. Zero Footprint Crypt is a bit closer to what I want. But there are two things... - Right-clicking and encrypting/decrypting a...
True for a one-way firewall that only blocks unwanted incoming traffic. However, most firewalls out there claim they can block undesired...
Sure. Just get 'em from ~Link removed - Not recommended by this forum - Ron~ The updates themselves come straight from M$, but you don't need...
Thanx for the links. Unfortunately, both apps lack: To which I should have added: "...and restores the original name upon decryption." A...
I'm looking for a new file encryption app to replace ShellCrypt. Preferably something that works like ShellCrypt, looks like ShellCrypt, but locks...
It encrypts them (but not by standard XP EFS ecryption) and hides them. It doesn't do a good job at hiding them, though. You can still see them...
Fair enough. The good news: my rootkit detectors didn't find any suspicious Acronis entries. So you're either don't use rootkits to hide the...
It's not necessary at all to load any ATI processes at startup or to keep 'em running when ATI is asleep. You can start and stop ATI from a...
ATI itself should be able to move image files from the secure zone to a non-hidden partition. If it can't do that yet, your programmers should do...
Re: Sharing copies of TrueImage: EULA vs. law and a good reason for self-mounting ima Any disk with an image file, created by ATI or burned...
From the Acronis TI EULA: 2. The Original Purchaser may use the Software on a single computer owned or leased by the Original Purchaser. You...
Separate names with a comma.