Just one small question about DefenseWall...

Discussion in 'other anti-malware software' started by CoolWebSearch, Mar 29, 2012.

Thread Status:
Not open for further replies.
  1. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247
    I jumped into another forum and I saw this:
    ...with DefenseWall you can't customize much, browser cache is left behind. Malware can exist in browser cache.
    hat part is familiar to me, however, now the important part:
    ...worse still if you have system restore on, despite you manually delete your browser cache, the malware will reside in your system restore).
    Is this true, should I worry about this?
    Thanks to all.
     
  2. Melf

    Melf Registered Member

    Joined:
    Sep 7, 2010
    Posts:
    105
    Browser cache?

    Hell, you can go to, say, 'www.viruses.com', and download 'really_bad_malware.exe'. Click to run it. It runs untrusted, because your browser was running untrusted, and so too does everything it spawns. Malware.exe will run.... with it's teeth taken out. Can't do anything worth worrying about.

    Anyway, system restore has nothing to do with your browser cache (it restores your OS, not your browser...). If you for some reason have malware that is saved in a system restore, it's because you ran it as Trusted under DW, thereby allowing it to potentially mess up the OS.
     
  3. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Malware can't exist in your browser cache. What it can do is put malicious entries into it and if you go to those entries with your browser you may be exploited or whatever.

    I don't get why system restore is relevant. I can keep a system restore of a malware infested drive and I'll be fine as long as I don't go back to it.

    If you're worried you can clear your cache.

    Open an administrative command prompt and type "ipconfig /flushdns" and that's it.
     
  4. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    I have hundreds and hundreds malware files at my hard drive. Should I worry about it? No, because they are inactive. Also, there is a little misunderstanding about the role of DW as it should be paired with traditional protection technologies, it's not a standalone tool.
     
  5. Victek

    Victek Registered Member

    Joined:
    Nov 30, 2007
    Posts:
    6,219
    Location:
    USA
    The fact that a System Restore point can harbor a virus which may inadvertently become active if you use that restore point is an inherent risk of all snapshot tools, and doesn't have anything to do with the security software you use. Part of cleaning malware from the system is deleting all restore points to eliminate this possibility.
     
  6. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247
    Big thanks to all but I still have some more questions.
    Is the following true:
    I picked this up from ssj100's website:
    I'm not an expert, but according to him:
    "Also, Sandboxie has the start/run restrictions, which are arguably on its own even more powerful than the containment it (and DefenseWall) primarily provides."

    "Also, Malware Defender's developer Xiaolin claims that if you let a program execute, it will be able to bypass your protection sooner or later. Furthermore, everything is allowed to take place on the REAL system with DefenseWall, and everything is allowed initial execution - there is no direct virtualisation or direct anti-execution at all. Without these 2 aspects, I feel that DefenseWall isn't as strong as many people suggest."

    I found it here:
    -http://ssj100.fullsubject.com/t21-defensewall-personal-firewall-300-released-

    Is this true or false? Yes, I do know this is version 3.00 discussed on the forum and right now DefenseWall's latest version is 3.17, so is it changed something?

    Also what about Sandboxie's issue with integrity levels-is this issue completely solved with start/run restrictions which completely disable all the malwares regardless of what integrity level each and any/every malware has?

    Also, can you block malwares from start/run in the first place in DefenseWall?

    Can you block malware's attempt to gain internet access in DefenseWall, like you can in Sandboxie?

    Big thanks to all.
     
    Last edited by a moderator: Apr 4, 2012
  7. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    yes you can configure DefenseWall to block run/start like sandboxie
     
  8. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247
    Do you recommend to me to block everything to access the internet except firefox.exe and iexplore.exe?
    What should I block to start/run, everything except firefox.exe and iexplore.exe?
    Thanks.
     
  9. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    even if you let it run it will be isolated in a sandbox container you can run what ever you want to run or restrict as DW will protect you in real time for sure dont be afraid i tested DW even againts rootkits and it is safe out the box configuration;)
     
    Last edited: Apr 3, 2012
  10. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    Ilya,Your being modest,most of us know DW can beat the snot out of Malware all by it self.Some people can have a bloat load of security and still manage to infest a system.;) Nothing wrong with traditional back up protection though.
     
  11. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    It's true. And it's false. What takes malware from attacking users right within allowed sandboxed processes, without running more processes, like Duku has, for instance? Nothing. If, for example, Flash player has a security hole, your computer can be attacked right from the your browser's process instance. The strength of any sandboxing solution is about correct isolation techniques implementation, not about processes run restrictions.

    No, because DW is made for an average users, can't configure and use this functionality properly. There is only "Stop attack"/"Stop process" buttons with popup windows are about outbound firewall functionality.
     
  12. Melf

    Melf Registered Member

    Joined:
    Sep 7, 2010
    Posts:
    105
    ssj100 seems to have a personal like for SBIE and a personal dislike for DW. He has always come across as quite biased to me, in that he points at supposed holes in DW that I don't believe to exist (I suspect this might be why he started his own forums).

    Both programs offer, frankly, unbeatable levels of protection, *until* you want to install something on the 'real' system. At this point in SBIE you recover from the sandbox, in DW you choose to run something as trusted. Either way, you have to trust that the thing is safe. I believe that this is what Ilya means when he says DW is not stand-alone - e.g. if you have an AV on hand, you can scan the thing before you run it, etc.

    As for which program you choose, try them both and see which you like the best. The approaches and the feel of each program are different, but the end protection is the same despite what ssj100 claims. Personally I prefer DW because it's more 'set and forget'/grandma proof, but many others including obviously ssj100 prefer SBIE (it's quite configurable).

    If you're on 64-bit your hands are tied because there is no DW on 64-bit (hint hint @ Ilya).
     
  13. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    I remember, I remember. :)
     
  14. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247
    When can we expect 64 bit version, Ilya? Did you at least find half-way to the solution?
     
  15. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247
    If Sandboxie's protection on 64-bit systems is only 99% like Tzuk says, than does it mean Sandboxie cannot protect fully like it can on 32-bit systems? Sure you can set start/run restrictions to compensate this problem, but will it be 100% effective on 64-bit systems like it is on 32-bit systems?

    I wonder how can DW solve this problem?
    Hmmm...
     
  16. Melf

    Melf Registered Member

    Joined:
    Sep 7, 2010
    Posts:
    105
    I gather that Tzuk has figured out how to bypass PatchGuard, but since there's no documentation for it he's had to rely on reverse engineering and can't be sure that he's closed every loophole. So it might protect just as well as it does on 32-bit, or it might not. The more people that test it, the better we'll know :)
     
  17. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    Ask microsoft to lose patch guard.:D
     
  18. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247

    Hi, Ilya. If The strength of any sandboxing solution is about correct isolation techniques implementation, not about processes run restrictions, does it mean that this is some kind of weakness, since sandboxing is the only thing that stops malware from infecting the real system?
    I guess that means that DW's HIPS has the advantage here since it can/it will detect any malicious behavior that?

    You said:"The strength of any sandboxing solution is about correct isolation techniques implementation, not about processes run restrictions."
    But wouldn't start/run restrictions prevent any browser process that tries to break sandboxing protection?
    Cheers.
     
    Last edited: Apr 6, 2012
  19. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    Any? I believe, no sandboxing HIPS can prevent any malicious behaviour, but most of it- yes, sure.

    You simply didn't understand what I mean. Re-read my post oner more time. Run restrictions are not about preventing known processes from breaking sandboxing protection.
     
  20. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247
    I realized my mistakes way too late.
    Cheers.
     
  21. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247
    So, if I understood right (I'm not sure that I did), would you say that DefenseWall's hips can help against this at all?

    Would internet access restrictions protect against these kinds of attacks at all?
    Cheers.
     
  22. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    I say than DW can help against most of the cases.

    In most of the cases.
     
  23. CoolWebSearch

    CoolWebSearch Registered Member

    Joined:
    Sep 30, 2007
    Posts:
    1,247
    Thank you for your reply, I truly hope that I did not offend you, I admit that I needed more time to understand.
    I have to say that DW has options for restricting internet access for both trusted and untrusted processes, applications and etc... so I use this only to processes that are familiar to me.
    Cheers.
     
  24. Ilya Rabinovich

    Ilya Rabinovich Developer

    Joined:
    Sep 13, 2005
    Posts:
    1,543
    Absolutely not. :)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.