Thanks for the testing ichito. Very interesting results indeed. I'll be monitoring this thread in case you come up with similar testing of...
VulnDetect has now launched an early tech preview of their PSI 2 alternative. :-) https://vulndetect.com/topic/14/tech-preview
@xxJackxx I could not agree more. I have not been recommending PSI, nor using it myself, since version 2. That’s why I’m so exited about...
So today the Secunia PSI closed down completely. But for those interested, VulnDetect is about to offer an early beta of their PSI 2 alternative,...
A PSI alternative is under way from VulnDetect. :)...
VoodooShield fans (I'm one of them!) will probably find this interesting....
Interestingly, what Enigma Software is doing is pretty much the same thing the danish AV company MySecurityCenter did against spywarefri.dk after...
It depends on the definition of the term "bypass". But I believe we have already covered that debate.
Basically yes, except Metasploit Meterpreter does not need any actual malware. Hence there is no file being executed and nothing for an...
Just a fun observation: There are so many well established and well known AV vendors out there. They have tons of users all over the world, tons...
No problem. ;-) It was a drive-by attack, so a router or any normal network-firewall would make no difference. The malicious URL (just an IP...
I believe this is an essential part of the debate. It is claimed that VoodooShield has never been "bypassed". This is true if you use the...
Hi Rich Thanks for your comments. If I did the test as you assume, I would absolutely agree with you. But metasploit was run on the attacking...
Not correct, actually. We did not "whitelist metasploit". That would not even be technically possible as it was only running on the attacking...
Interesting thread! I think you guys will find this debate interesting as well....
I fully understand that VoodooShield is not designed to block this kind of attack. The fact still is, that the computer got hacked despite having...
Thanks for your replies Dan. I think your approach makes sense and perhaps the only reason I feel a bit disappointed, is all this talk about...
I did! Details as follows. We set up a virtual PC with a vulnerable version of Adobe Flash Player. We went to a website set up to exploit the...
Thanks for the explanation. In all respect, I think calling what is basically an anti-executable technology an anti-exploit technology, is a bit...
I'm having this exact issue too when connecting to my VPN, same command line. It shows up in the Command Line tab in VS, but I continue to get...
@VoodooShield This is interesting. Your replies make sense and I actually have a hard time thinking of any realistic way to bypass VoodooShield....
Okay, so everything in certain Windows folders are allowed by default. That looks to me like a (probably reasonable) compromise between security...
I'll admit it, I did not read all 310 pages in this thread prior to posting, so perhaps my questions have already been covered. Feel free to...
I haven't heard previously of a behavior blocker using signatures, or needing updates anywhere near as often as an AV. Obviously it needs to be...
What I am hoping for is that the behavior blocker becomes as effective now as it was in the old version (so it can once again stop the described...
Separate names with a comma.