It is inside :) Now you can move or copy untrusted files with any file manager and it will keep its untrusted state (older versions of DW...
DW is perfectly working with restricted rights policy as its defense doesn't rely on it. So, if you have some work configuration you used to use-...
More certain, DefenseWall blocks those types of keyloggers that are possible to block without huge compatibility issues and warns about those of...
I have to pay my bills- so, if you like software you should buy it. 30 days of the full-featured trial is more then enough to make the decision, I...
Defensewall IS a sandbox. Yes, I think so. I see no problem if you choose SBIE over DW, I just wanted to know what exactly was a problem in...
We all must say "thank you very much" to Chachazz for such the great help file.
Because it is a normal, standard user's activity. Many "good" sites are requires ActiveX installation, for example, online anti-virus check...
The problem with CMF is that it do not make stack and heap areas non-executable.
I can say only for DefenseWall- yes, untrusted BHO/extension installation is forbidden. Pete, did you check it with DefenseWall? Do I need check...
Hi! Very interesting why you couldn't trust yourself with DW and what exactly you didn't understand with it?
PS is a classical-style HIPS, it is using confirmation dialogs in case it detects some kind of potential dangerous actions. DefenseWall is a...
What kind of? Blacklisting, whitelisting or sandboxes?
Virtual Machines are very usefull for the kernel-level software development.
Non of the anti-viruses can catch all the malware in the wild. You should read less computer's magazines.
The first action this trojan do is attempt to set up its driver. If it fails, trojan stops its job.
Windows NT OS family is very complex from the point of view of different possible attack vectors and completely undocumented functions and data...
Can somebody send me this "Robodog" malware sample with a short description of it and its job- I haven't tested it?
Hi Kurt! Sorry, missed your post- definitely I need get more sleep. In fact, anomalies detectors are both blacklisting (for the behaviours...
I don't see any "ranges" for the sandboxes. The only "non-beta" sandbox here is BufferZone. No SandboxIE, DefenseWall, GesWall, SafeSpace?
Yes, sure.
Virtualization is just one of the isolation mechanisms of the sandbox HIPS. Other one is based on a policy-based restrictions.
Neither. They are based on "isolate everything what is potentially dangerous from the rest of the system". So, sandboxing is a sandboxing, not...
Yes, not of them, surely, but most...
Almost useless staff: read this small research blog post and its update Maybe, it is a little bit offtopic, but very useful one...
Executable malware- can't. Interpretated malware may.
Separate names with a comma.