Discussion in 'other anti-malware software' started by Mops21, Jul 30, 2015.
It's been a few days , no hints yet ?
SpyShelter Silent released
Wondering if this will wreak havoc with and/or is even beneficial with a sandboxed (via Sandboxie) browser...??
Well, we were both wrong sadly enough, major buzzkill. To answer your question, I'm running AppCheck together with SS without any problems. Normally you should make other security tools trusted by SS, to avoid any problems. BTW, AppCheck scores quite good in most tests, but don't expect a protection of 100%.
No I don't think so. It's basically a stripped down version of SS Premium/Firewall, and both work just fine with SBIE.
Thanks, @Rasheed187. Appcheck is good.
Oh, it is too late to mention it but they are offering a 30% discount until 28th of November
I believe SS is getting too expensive, I wouldn't pay 42 euro a year for HIPS only.
SpyShelter version 10.9.6 has been released.
Thanks for the update ,
@ Rasheed , not worth 42.00 , well not much else to choose from that is lightweight , easy on resources and seems to work well . I hope they keep offering it .
I'm just saying a price of 20 euro would be more suitable for a 1 year license, especially because it's not a full AV security suite. But I do agree it is very stable and lightweight, it never seems to be causing any problems and seems to work correctly. I have to give the developers kudos for that. BTW, I did recently test the Zemana SSL-Logger against SS, and it blocked it.
I bought long time ago lifetime for 5$ aurond
SpyShelter version 10.9.7 has been released.
Thanks ! Was wondering hen the next update would be released .
You are most welcome ...
@BlackBox Hacker I want to thank you for always sharing your great explanations & knowledges with us bro and for answering my questions I wish you a very good luck.
Based on what our respected member @shmu26 posted here, I was wondering if SpyShelter Firewall has the following features of AppGuard or not? also How effective exactly is?
1. Block unsigned files executing anywhere in user space, not just in appdata (and with lockdown mode, it blocks even signed files).
2. Memory Protection
3. Privacy Protection
Thank you very much for your good assistance bro.
I suspect that @BlackBox Hacker knows Spyshelter better than I do. I don't even have it installed now.
But I will venture to say that SpyShelter Firewall edition, if you run it in "ask user" mode, will give you all of that -- provided you configure it properly and you are educated enough and disciplined enough to answer the prompts correctly.
SSFW will not do the thinking for you. All it can do is ask you lots of questions, and you have to provide the answers.
Thank you for your informative answer bro. Based on your what I've read from your reply; it seems that SpyShelter Firewall is not user-friendly and it's asking a user lots of questions in order to proceed anything happening on the system, correct me if am wrong.
By the way, Do you recommend SpyShelter Firewall for a normal users with a low level of computer knowledge? Thanks
You understood me right. SSFW produces a real lot of prompts, and this is not user-friendly, because only an advanced user will know what to do. However, I am talking about SSFW in "ask user" mode.
If you run it in one of the lower levels, you get less prompts. At the "medium security" level, it is suited to most security-oriented users. But the protection is much less strong.
Better than all three Software AppGuard and EXE Radar Pro and OSArmor Software, because one of the reasons for this is SpyShelter Firewall has the full security including firewall as well not just application rule blocking very cool, this means what I was doing with OSArmor making is much better to block 'Windows' and System32 folder plus unknown UAC exploits and other exploits. I then could do the same thing with Spyshelter Firewall's HIPS or System Protection security modules sweet really! I had to create all the exploit rules for SpyShellter Firewall 10.0 and then pentest the hell out of the software! This also has memory protection as well such as protection against Spyware code and any other forms of code injection. SpyShelter HIPS does all the hard work really also detecting what's called 'file dropping' exploits when application drop files to hard drive locations, SpyShelter should show the prompts for 'appdata' folders 'windows' and 'system32' folders plus Perl binary exploits etc. and that 'calc' process test also blocked! I've already sent a user the exploit blocking rules and screenshots for SpyShelter Firewall settings etc. and he really was shocked. I have found out the HIPS can block friendly Windows GUI applications, I had this problem last night. But fixed this issue or work around by keeping all of the other security modules enabled while only disabling when using block Windows applications and when done enable security module 'System Protection' again after yay!
POC Video: https://www.youtube.com/watch?v=40AbzL7wiao
I only run it in 'ask mode' very cool!
When using each prompt you can add remember for each process 'allowed' or 'blocked' prompts to limit it and yes 'ask mode' can be very hard to use and for advanced user, but still recommend for the basic user as well.
Yes, this is right just mastered SpyShelter Firewall and exploit blocking last few days. When I imported my exploit rules in SpyShelter Firewall I even lowered UAC rules and still UAC exploits couldn't bypass Windows Operating system WOW. I found out that one exploit will bypass such as 'password dumping software' is not detected, but keyloggers are, because of the code detection dissects Spyware Software. And I know what user prompts to block as well.
I will be still pentesting SpyShelter Firewall Software on one more exploit that could still bypass security? It's a USB exploit that loads code using explorer process very cool!
Does SpyShelter truly have memory protection in that it can prevent read and write to and from memory by an application? The website is weak on this point.
Lockdown says that Datpol says yes, if you add the application to the restricted apps list.
Separate names with a comma.