- May 11, 2014
- 1,639
My brother is terrible, he clicks on everything and anything and has had loads of infection(s) 


My brother is terrible, he clicks on everything and anything and has had loads of infection(s)![]()
In that case..no security suite can save him![]()
.
Shadow Defender or/and Sandboxie , even he click on everything , nothing will be kept on the system when the computer is rebooted.
*Laughing*Very true, he's 31 and thought he would have learnt his lesson by now. See, even doctors are stupid![]()
if my memory is good; my only infection was on Win98 SE with Avast 4 or 5...then i switched to WinXP without Avast and never looked at it again , i installed Comodo FW and never got infected anymore.
Shadow Defender or/and Sandboxie , even he click on everything , nothing will be kept on the system when the computer is rebooted.
That's an interesting story my friend, the way you described it make me feel like I was watching this scene by me self, unlike reading it from a post![]()
I remember as well, the incident in which I got 'hacked', analysed a suspicious looking file, unpacked it, reverse engineered it even, it was a nasty password stealer, copy and paste code... Knowing exactly what it did, I opened up sandboxie for the first time just to try it out... Checked the log.. Hmm, yes it does seem to have gathered my passwords and sent them off somewhere . . . uh oh... And from that day forward I vowed never to play with malware using the default sandboxie settings
![]()
in fact many people misunderstand Sandboxie (in default settings) , it doesn't block malwares , it just contain them from infecting the system.
For example , in the scenario above, a keylogger will be contained but it will STILL run and call home, unless you start tweaking Sbie to block it correspondingly.
Only using windows os for gaming no other downloads and im not broswing the net with windows os(only official game sites from what im playing). for all the other stuff im using linux maybe thats the right way to goI've probably been infected seven or eight times over about 10 years, hacked once (dumb mistake by me), so I take my hat off to you, enviousWhat's your secret? (having to ask is probably a clue as to why I've been infected so much right..)
u have some layer of protection after the sandbox? these days u can easly buy a crypter with antisanbox etc on some popular forums like hf. antisandox/antihips and all this stuff becoming more widespread in the near future.it is why i don't believe in AVs , i prefer full virtualization , at least nothing is kept when i close my sandbox or reboot.
Only using windows os for gaming no other downloads and im not broswing the net with windows os(only official game sites from what im playing). for all the other stuff im using linux maybe thats the right way to go![]()
u have some layer of protection after the sandbox? these days u can easly buy a crypter with antisanbox etc on some popular forums like hf. antisandox/antihips and all this stuff becoming more widespread in the near future.
true, hackers/"bad" coders are always 1 steep further. av vendors need to catch them but its going harder and harder with all that stuff out there.. like cat and mouse play..Gotcha, seems the perfect way to go
Yeah anti-sandboxie/vmware etc code has been flying about for years, way back when VB6 was the virus writers language of choiceSome of the anti-sandboxie codes can be bypassed by executing scripts in your sandbox (ones that check hwid's, user behaviour etc), it gets more complicated to bypass the more advanced malware.
To be honest though, I'd much prefer a piece of malware to detect my sandbox and alter it's behaviour to be non malicious than to not detect it and through some unhappy misconfiguration end up breaking out![]()
true, hackers/"bad" coders are always 1 steep further. av vendors need to catch them but its going harder and harder with all that stuff out there.. like cat and mouse play..
It's always been that way, right back so far as viruses go. AVs started out using signature detection, and then 'behaviour monitoring' basically monitoring interrupts and the like on DOS. So virus writers adapted and found ways to tunnel under the detection, go under the radar. The point being the AVs were always reacting to threats. They let the virus writers reverse engineer the system and then they leapfrogged on that and patched it up.
And unfortunately it's still that way today, virus writers stopped being motivated by fame and the desire to impress with their coding skills and started to be motivated by money. With a simple rogue antivirus setup for example you can create an undetectable exe (just with byte patching and some string encryption) and that is a new threat, which for the cost of a couple of servers can make you anything upwards of $450,000 per month.
There is just no way the AV company can prevent it, all they can do is be on the lookout but just as you can't keep track of a wild bore until you plant a tag on it, the same is true of any new virus threat, and that is the unfortunate truth of why the bad guys always win.
dont know how it was in old days. only 22. luckly i was brained enough even in young years to not click on anything on the net and never put a usb stick from other ppls into my usb adapter. but from what i have read avs 1990 around are way better(effectiver) dont know how to say that than avs out there in this time and with all the technologie,programms,code lounges etc that exist. im loving it to see when a vendor have something new to prevent something that comes new out. dont know why im so fascinating from that
First thing ill do is test it lol
u have some layer of protection after the sandbox? these days u can easly buy a crypter with antisanbox etc on some popular forums like hf. antisandox/antihips and all this stuff becoming more widespread in the near future.