Please provide comments and solutions that are helpful to the author of this topic.
But all modification still present on your system till you don't restart system so if you got infection such like keyloger can still steal your data even if cant modify it for forever.Ok, thanks
It was before when the malware infected the MBR, not anymore.I just look at the statements, which disturbed me. If using Shadow Mode on all disks, running malware, is it possible for the malicious file to remain on the system after reboot?
How did it fail you?I've had Shadow for years. It's my test bank. It has never failed me until now. And it ran malware from everything from Wacript to Petia. etc
You probably know it, but those points should be extended:I mean exactly the procedure when:
- I run Shadow Mode on all disks
- I run a malicious file and check the behavior of av
- I restart the system after the test.
Yes you need know yet how this program work what can do for you and what cant do... than you can instal rest software to protect rest part of your system/dataI understand, you can not trust the program completely and you have to be careful...
Thank you all for your advice.
Yes you need know yet how this program work what can do for you and what cant do... than you can instal rest software to protect rest part of your system/data
Yea but some programs put deep drives in to system and otther services which require to restart your system than SD will wipe data so sometimes cant test some soft so in this case full virtual system will be better..
Well if you run all the disks and partitions that are connected to your computer in shadow mode then nothing will remain after a restart.Sorry...but I found that I can say about one more way of "baypassing" SD...actually not only SD but every LV software like TTF, WTF or Returnil. It's not connetced to SD's commmit or exclusiuon feature but to specific feature of some particular apps - I'm saying about saving/synchronisation of settings/config files that are located not on system disk but on other local not virtualised. In such situation info/data are saved wile Shadow Mode on non virtualised disk and than after reboot and entering to normal mode are still accesible for that app...this could be potentialy used in some cases to bypass protection of vulnerable apps that are using described mechanism.
Such case on SSM exeample was describet some time ago on Wilders in that thread
System Safety Monitor and Shadow Defender
Except, network disks like Google Drive or OneDrive, etc.Well if you run all the disks and partitions that are connected to your computer in shadow mode then nothing will remain after a restart.