DefenseWall question

Discussion in 'other anti-malware software' started by trjam, Nov 21, 2008.

Thread Status:
Not open for further replies.
  1. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,057
    Location:
    North Carolina
    when my daughter plays the Sims, Defensewall isolates the game. How do I exclude it so she can save her games in My Documents, where EA stores the games.
     
  2. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857

    Go to resource protection

    Add the simms program ato the left panel, next add the directories in the right panel. Better to include the registry keys of SIms also (look at HKU Software and HKLM Software)

    Cheers Kees
     
  3. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    Use "Untrusted applications"->"Excludes" dialog to exclude certain apps from runing untrusted.

    But it's very strange indeed as "My Documents" floder shouldn't be isolated.
     
  4. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    Trjam problably choose to run programs from removable sources as untrusted.

    Some games require the CD to be inserted, even when program is already installed.

    According to DW policy the games stats are created by an untrusted source (the CD), so the saved documents are untrusted.

    But hey you are the author of this amazing piece of software, so I am not argueing with you on this topic :)
     
  5. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    Yeah, but it's strange the game can't save it's data files. I already sent my question to trjam and, with DW's logs I'll be able to find out the reason of the issue. Any case, untrusted applications exclusions works as they should. :)
     
  6. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    How is the new skin proceeding :cool: :D :p
     
  7. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    Well, it is proceeding, but veeeeeeeeeery slow. I'm trying to speed this process up as much as I can.
     
  8. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,057
    Location:
    North Carolina
    think I got it. I moved the game to trusted and it seemed to work. Thanks Ilya and Kees. So how is the outbound protection proceeding. lol:thumb:
     
  9. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    It's not proceeding as I need to provide 2.46 version first. When it will be done, I move further.
     
  10. Hugger

    Hugger Registered Member

    Joined:
    Oct 27, 2007
    Posts:
    1,003
    Location:
    Hackensack, USA
    The above explanation is one of the few things I wish were easier in DW.
    Rather than having to add something in one panel and then add directories in another panel why not just be able to specify the name of the program to be excluded or trusted?
    Seems to me that that would be simpler and quicker. Keeping with the idea of 'Keep it simple'.
    Just a thought.
    Hugger
     
  11. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    Hugger,

    DW has two options

    A) the simple exclude Ilya pointed out
    B) resource protection (what I explained)

    Resource protection was Ilya's answer to the fine granular control of GesWall Pro. Nice thing of Resource Protection is that it comes fully preconfigured.

    The play scheme of DW is

    a) Seperate Trusted from Untrusted appplications with the untrusted programs/file screen
    b) Seperate Untrusted from each other (so one untrusted program is not allowed to access untrusted resources to of another program) with resource protection.

    On top of that DW has some build in (user friendly) feautures, like:
    a) auto clean of roll back list
    b) auto protect untrusted files from being attacked by untrusted processes after some time (but they still keep the status untrusted)
    c) exclude programs/files from DW defense mechanisme
    d) etc.

    I agree that the access of these functions could be more straight forward. Ilya will be implementing a new skin next version, next outbound control.
    Ilya shuld provide a configuration wizzard with version 3. On it self the user frienliness of the induvidual screens is okay. I think the sequence of the screens and assistance/explanation in this process could improve.
     
  12. Hugger

    Hugger Registered Member

    Joined:
    Oct 27, 2007
    Posts:
    1,003
    Location:
    Hackensack, USA
    Kees,
    Thanks. I agree with you about the user friendliness.
    I wasn't complaining. DW is the base of my security and will probably be there for a long time.
    Hugger
     
  13. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,057
    Location:
    North Carolina
    well i am sold on it and using nothing else.;)
     
  14. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    12,883
    Location:
    Canada
    nice avatar:D similar to mine:D hey me too when i got defensewall i ditched alot of staff i dont really need,cause defensewall is strong and capable of protecting you in real time,even your usb devices as untrusted,good idea:thumb: no more antivirus here after i got defensewall and when i scan pc whith one all they found is tracking cookies:cool:
     
  15. GES/POR

    GES/POR Registered Member

    Joined:
    Nov 26, 2006
    Posts:
    1,490
    Location:
    Armacham
    Wich av's scan for cookies?
     
  16. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,057
    Location:
    North Carolina
    F Secure will and I think Norton will.
     
  17. emperordarius

    emperordarius Registered Member

    Joined:
    Apr 27, 2008
    Posts:
    1,218
    Location:
    Who cares
    BitDefender too I think...What a waste of time.
     
  18. GES/POR

    GES/POR Registered Member

    Joined:
    Nov 26, 2006
    Posts:
    1,490
    Location:
    Armacham
    Ok thanks, whenever im hungry i will use one of those :thumb:
     
  19. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    12,883
    Location:
    Canada
    spyware terminator or superantispyware free:thumb:
     
  20. emperordarius

    emperordarius Registered Member

    Joined:
    Apr 27, 2008
    Posts:
    1,218
    Location:
    Who cares
    He was talking about Antiviruses, not Antispywares, because it's rather strange for an av to scan for them.;)
     
  21. GES/POR

    GES/POR Registered Member

    Joined:
    Nov 26, 2006
    Posts:
    1,490
    Location:
    Armacham
    Any tools that scan for White Castle burgers?
     
  22. Hugger

    Hugger Registered Member

    Joined:
    Oct 27, 2007
    Posts:
    1,003
    Location:
    Hackensack, USA
    My stomach.
    It can detect a castle from miles away.
     
  23. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,057
    Location:
    North Carolina
    And Castles have walls, for defense. :rolleyes: ;)
     
  24. Subgud

    Subgud Registered Member

    Joined:
    Nov 6, 2008
    Posts:
    151
    Location:
    Norway
    I have some questions about DF and what applications you should run as trusted. Outlook? Firefox? IE7? My AV? My FW? Mamutu?

    This is the one thing i dont understand about DW. And i use vista. In vista there is a download folder. When i have downloaded things, installed them, and then want to move them to thrash i get the message that i dont have permission.

    Why is this? And what should i do about it? As you see i use GDATA AV, Comodo FW and mamutu. Is it necessary for my to use DF at all?
     
  25. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    Could you, please, clarify what and how exactly you move to trash?

    As about untrusted things- it's the threat-gates applications (browsers, e-mail, IM, IRC, P2P and multimedia clients).
     
Thread Status:
Not open for further replies.