COVERT Pro 3.0.9

Discussion in 'privacy technology' started by zmechys, Mar 18, 2015.

  1. zmechys

    zmechys Registered Member

    Joined:
    Dec 29, 2012
    Posts:
    471
    Location:
    usa
    COVERT Pro 3.0.9 - Giveaway of the Day
    http://www.giveawayoftheday.com/covert-pro-3-0-9/
    Has anyone heard about that program?

    "COVERT Pro – an innovative solution to ensure total privacy while working at the computer. It protects against spyware. When working in secure platform, all user’s actions in all applications (browsers, email clients, office software, messengers, etc.) are safely hidden. Capturing data from keyboard input and monitor screen is blocked. Using special features of COVERT Pro (Network monitor, Driver monitor, System processes, System services) allows you to detect and remove all hidden applications.

    To protect against spyware, COVERT Pro uses the masking method. It is the most reliable method against spyware — masking action of user. It means creation of secure platform, inside which user can run any applications, while remaining invisible to the spies."

    Interesting comments about that program.

    "A Czech company with address: The address of european office COVERT Prague Ltd. is located at: 15800 Prague 5, Stodulky, Běhounkova 2344th
    The software is digitally signed Kumerasoft in Russian language."

    About tests:
    https://covert-pro.com/examples-of-protection/
     
  2. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    7,267
    Location:
    England
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    8,010
    Location:
    The Netherlands
  4. Lagavulin16

    Lagavulin16 Registered Member

    Joined:
    Nov 26, 2014
    Posts:
    83
    Location:
    Emerald City
    @Rasheed187 Nice posting amigo. I will definitely be staying with MBAM and Spyshelter Firewall.
     
  5. Umbra

    Umbra Registered Member

    Joined:
    Feb 10, 2011
    Posts:
    2,135
    Location:
    in your mind ^^
    bashing well-know product is common practice to hype your own product, nothing special there.

    the discussion should be more about "what it does" rather that "what they said"
     
  6. Umbra

    Umbra Registered Member

    Joined:
    Feb 10, 2011
    Posts:
    2,135
    Location:
    in your mind ^^
    I tested the apps:


    It seems like a on-demand Secure Desktop with detailed monitoring features. While in "Covert Mode" only the allowed apps are able to be launched (processes opened prior still continue in the background but aren't accessible)

    I launched zemana test tool , went in covert mode then opened notepad and typed some words; once back in normal mode , zemana didn't recorded the keystrokes , so Covert has done the job it was supposed to do.
    also while in Covert Mode, no screenshots could be made.
     
    Last edited: Jan 6, 2016
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    8,010
    Location:
    The Netherlands
    That's true, and thanks for the testing. So it does have proactive capabilities? I had the impression that it was basically a simple system monitor, that relies on the users knowhow. So that's why I was a bit skeptical. Or does it also alert about active threats?
     
  8. Umbra

    Umbra Registered Member

    Joined:
    Feb 10, 2011
    Posts:
    2,135
    Location:
    in your mind ^^

    kinda proactive , you will be alerted by the various monitors (that will highlight via colors ) and a sound about hidden processes/services.

    from what i figured "platforms " could be described as "secure desktops", you can create many of them (by giving a different ID to each) ; if one is compromised , you just need to close it and open another "virgin" one.

    For prevention, it relies by highlighting unwanted child processes

    For detection, it relies on a database:


    i just started to use it, so some features/bugs aren't been tested/discovered yet :D

    by the way you have a USB version so you can use it on other "not-sure-to-be-safe" computers
     
    Last edited: Jan 6, 2016
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    8,010
    Location:
    The Netherlands
    I've quickly checked it out running it sandboxed, but I still remain sketical. It has a small database, and the question is, if it only looks at file name. And on Win 64 bit it's not as easy to hide processes if I'm correct. I doubt if it is any better than Process Explorer.
     
    Last edited: Jan 10, 2016
  10. Umbra

    Umbra Registered Member

    Joined:
    Feb 10, 2011
    Posts:
    2,135
    Location:
    in your mind ^^
    at least you are not keylogged :p

    about the monitoring, it pinpoint hidden services in Svchosts, can be useful.