pe guard

Discussion in 'other anti-malware software' started by simisg, Sep 19, 2009.

Thread Status:
Not open for further replies.
  1. opaida

    opaida Registered Member

    Joined:
    Sep 25, 2009
    Posts:
    161
    You got this error becuase the driver PEG2.sys is not signed.
    To install it you must use "Disable Driver Signature Enforcemen" tool.
     
  2. Kingmax

    Kingmax Registered Member

    Joined:
    Aug 9, 2010
    Posts:
    5
    ok mate :) i saw u didn't get the signature. i hope u'll get soon
     
    Last edited: Sep 4, 2010
  3. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    @ Pedersen and Opaida

    Teamwork, all the best :thumb:
     
  4. Triple Helix

    Triple Helix Specialist

    Joined:
    Nov 20, 2004
    Posts:
    13,458
    Location:
    Ontario, Canada
    I got my paid version but will wait to see the Driver signed before installing on Win 7 x64 but working well on 32bit! :thumb:

    TH
     
  5. Pedersen

    Pedersen Registered Member

    Joined:
    May 4, 2010
    Posts:
    234
    Thanks CloneRanger :)

    We are searching the signing possibility right now, any of you who know some cheap places?
     
  6. shadek

    shadek Registered Member

    Joined:
    Feb 26, 2008
    Posts:
    2,538
    Location:
    Sweden
    As sad as it may sound, especially since I want to support this program (and quite obviously use it), I want to install it on my x64 system without some workaround method. :(
     
  7. opaida

    opaida Registered Member

    Joined:
    Sep 25, 2009
    Posts:
    161
    Hope you don't wait more than 2 days ;)
     
  8. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,123
    Location:
    Hawaii
    Hmmmmm :ouch:
     
  9. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    they are working very hard as a team maybe:D
     
  10. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    i am currently testing the new registry protection feature againts couple of malware(rouges and fake antivirus);) :)
     
  11. Pedersen

    Pedersen Registered Member

    Joined:
    May 4, 2010
    Posts:
    234
    Sound interesting jmonge.
    Please keep me posted :D
     
  12. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    i noticed in a pop up when applying terminate it's way stronger than just apply denny:) it will even kill the bad process,what about just getting a pop up that displayed terminate and block:):)
     
  13. Thankful

    Thankful Savings Monitor

    Joined:
    Feb 28, 2005
    Posts:
    6,871
    Location:
    New York City
    For example, if you use Firefox to download a new executable and select 'Terminate Process', all open Firefox browsers will be terminated (closed). I like the way the
    program currently works.
     
    Last edited: Sep 4, 2010
  14. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    yes and it will be nice to kill and block process once per all from the process list when implemented,so this way if you noticed a malware currently runnig you are able to terminat and block;)
     
  15. Thankful

    Thankful Savings Monitor

    Joined:
    Feb 28, 2005
    Posts:
    6,871
    Location:
    New York City
    So you want to create an 'UnTrusted List', a list of processes that will always be blocked?
     
  16. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    yes,like let's say you made a mistake by allowing a trojan and it is running then you decide to block it and for sute it will not start again and you know it is block for sure:D
     
  17. opaida

    opaida Registered Member

    Joined:
    Sep 25, 2009
    Posts:
    161
    thank you for suggestion jmonge :)
    But let me discuss this:
    How do you want me to identify the trojan process? by its PID? by its exe path?
     
  18. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    let see if i see a process name: hacker.exe running i know what to do;) block and terminate:) from the process active list feature:) very important just in case we made a mistake and allowed a piece of malware and it is running:)
    exe path:)
     
  19. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    also it will be a nice idea to have some thing silent mode so it blocks all new programs without any pop ups;) this way we dont get disturb when we are bussy doing other task;) what do you guys think?thanks for listening:thumb:
     
  20. opaida

    opaida Registered Member

    Joined:
    Sep 25, 2009
    Posts:
    161
    ok.
    but what about identify the trojans by the folder they resident in.
     
  21. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
  22. opaida

    opaida Registered Member

    Joined:
    Sep 25, 2009
    Posts:
    161
    silent mode?
    do you suggest to use this mode in Anti-Executable?
     
  23. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    why not:D good idea for me it is very nice to have maybe for others not:D
     
  24. opaida

    opaida Registered Member

    Joined:
    Sep 25, 2009
    Posts:
    161
    yes I suggest to identify by folder, becuase I think any HIPS tester will put all his trojans in single folder and call it "trojans", "viruses",..etc :D.
    So, it'll be easier to not modify the untrasted list each time HIPS tester change his trojans.. what do you say about this? ;)
     
  25. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    true;) some people are very tricky too when it comes to rename a malware:) :)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.