Yeah, neil is really good, he does his homework. Bots and their many, many variations are the tools of choice at the moment for the bad guys who...
NAB doesn't clean file infecting virii, MBR infecting malware, macro virii, and some kinds of rogue antispyware/av. Sometimes the marketing for...
sorry, i wasn't clear and the analogy was a bit strained--using legit methods to do damage to data has been around for as long as computers have...
The short answer is Yes. The longer answer is 'It usually depends on who is there first' :) When you are in ring 0 it's really just the...
It absolutely could be used in a real life attack--CIH did the same sorta thing ten years ago :) http://en.wikipedia.org/wiki/CIH_virus
Destructive malware frankly is tough to deal with effectively while keeping a security product usable by most mere mortals. When a person sits...
The rules, heuristics, behaviors, characteristics, and so on are the 'secret sauce' behind any of the behavior based anti malware products. Since...
It is actually entirely feasible for a behavior based security system to also have signatures for detection, naming (classification), and/or...
Just out of curiosity, did you run any other tool like blacklight or rootkit revealer after detection to make sure the rootkits were removed?...
Memory usage for prsc/nab are affected by two things, how many processes are currently running and how long the prsc/nab service has been up. The...
can i ask what problems you encountered? thanks!
Separate names with a comma.