- Jun 8, 2016
- 171
As long as you can boot with Acronis and access the Secure Zone data/it hadn't been touched to be modified then I'd assume it would work, would make sense.Let's say I get infected with Petya, if I'm backing up my entire ssd drive which consists of the C:\ partition, the EFI system partition and the recovery partition, to Acronis Secure Zone, I'll be able to easily recover it with an acronis boot usb, right? Nothing besides acronis is supposed to be able to access the secure zone, which also has a password protection option, so I should be safe right?
lets say i wrote sentence on my HDD "i love you ana" after encryption you can imagine that sentence will transform to "hfkwerfW*f2-fP" so that nobody will understand what is written there but they still can delete itIsn't this what encryption does? No one has access to the encrypted thing unless they can decrypt it? Based on your answer I'd say no, but I still wonder
What a Dev! Now that's support and a Dev who's open to suggestions. Good for you.There's not many Dev's like that no matter the customer base they have. I think Emsisoft and VoodooShield are the only other 2 I've seen offer such support on forums.I'm the author of MBR Filter, upnorth sent me an email asking for me to comment on the thread.
I appreciate the feedback, just wanted to give some context and explanation. MBR Filter is purely meant as something to prevent writing to the MBR. It's a prototype and I didn't want to be too intrusive if something went wrong so no self protections are currently in place. As such it doesn't prevent writing to the registry keys that it uses, but that could be easily fixed by registering a callback as was mentioned in the thread.
I like the idea of adding the process name and path when reporting that the MBR was accessed. Also reporting in a log message besides the message box is a good idea. I definitely don't want to terminate the process accessing the MBR as there are valid tools that require access, which I would prefer to fail correctly, which is why I display the message to reboot to safe mode.
I'll add the better messaging and logging when I do a next revision (I opened issues Add process name/path to message · Issue #14 · Cisco-Talos/MBRFilter · GitHub and Log denial requests (not just the message box) · Issue #15 · Cisco-Talos/MBRFilter · GitHub) and might consider some self-protection along with an easier install / uninstall (in safe mode). I'm still getting scattered reports of boot problems from some users which I've been unable to replicate. It takes a bit of time to get things signed when releasing, so I've been delaying any updates until I could pinpoint that problem. My current suspicion is that people might have accidentally installed the wrong version (32 vs 64) for their operating system, if that's the case then an installer could fix that problem.
I don't think that could be it because Windows should automatically block the installation. The 32-bit compiled driver isn't compatible with 64-bit Windows so it simply won't be allowed to load, and the same applies for 64-bit compilation on a 32-bit environment.My current suspicion is that people might have accidentally installed the wrong version (32 vs 64) for their operating system, if that's the case then an installer could fix that problem.
Also add a proper uninstall. Most boot problems are from people not removing the correct registry values.I'm the author of MBR Filter, upnorth sent me an email asking for me to comment on the thread.
I appreciate the feedback, just wanted to give some context and explanation. MBR Filter is purely meant as something to prevent writing to the MBR. It's a prototype and I didn't want to be too intrusive if something went wrong so no self protections are currently in place. As such it doesn't prevent writing to the registry keys that it uses, but that could be easily fixed by registering a callback as was mentioned in the thread.
I like the idea of adding the process name and path when reporting that the MBR was accessed. Also reporting in a log message besides the message box is a good idea. I definitely don't want to terminate the process accessing the MBR as there are valid tools that require access, which I would prefer to fail correctly, which is why I display the message to reboot to safe mode.
I'll add the better messaging and logging when I do a next revision (I opened issues Add process name/path to message · Issue #14 · Cisco-Talos/MBRFilter · GitHub and Log denial requests (not just the message box) · Issue #15 · Cisco-Talos/MBRFilter · GitHub) and might consider some self-protection along with an easier install / uninstall (in safe mode). I'm still getting scattered reports of boot problems from some users which I've been unable to replicate. It takes a bit of time to get things signed when releasing, so I've been delaying any updates until I could pinpoint that problem. My current suspicion is that people might have accidentally installed the wrong version (32 vs 64) for their operating system, if that's the case then an installer could fix that problem.
When you remove MBR Filter in the wrong way, it wrecks your system. So goodluck uninstalling MBRfilter with Revo (create an emergency disk/usb and make an image backup and backup all your data before doing so).Proper uninstaller in 2017 . I can't remember the last time I uninstalled something and there were no leftovers in Revo Uninstaller Pro with maximum scanning mode, at this point of time it's expected that a program has to be uninstalled with an advanced 3rd party uninstaller if you want to make sure it's fully uninstalled, but yeah it won't hurt too much if he does that