- Feb 15, 2012
- 2,128
AG, NVT ERP and VS have all been bypassed.
Find bypass, report it, it gets fixed.
Bypassed by what?
@hjlbx,
Good to know that even VooDooShield was bypassed. Wondering what above the turnaround
time-frame was of each Anti-EXE/Application White-listing software? Of how long before the fix was taken care of between each Anti-EXE/Application White-listing software?
Also, this link: NVTE, not recommended for use with VPN's?
I'm still waiting for a genius malware author who can bypass all security softwares with just one or many connected malware. hahahaha...
What if there's an Albert Einstein in the dark cyberworld? What could possibly happen? hahahaha...
What could possibly happen? hahahaha...
I'm still waiting for a genius malware author who can bypass all security softwares with just one or many connected malware. hahahaha...
What if there's an Albert Einstein in the dark cyberworld? What could possibly happen? hahahaha...
Try WinPrivacy from Winpatrol "scotty" or SpyShelter
WinPatrolToGo, Ruiware, LLC.
SpyShelter | Anti-Keylogger Numer 1 na Świecie
SpyShelter have HIPS features also Sandbox and Keystore encryption which work better than alternative soft "KeyScrambler" you can also buy version with Firewall module
WinPatrol is OK. I'm not sure Ruiware worked out 64-bit system bugs yet...
SpyShelter does not provide full protections on 64 bit systems due to Patch Guard... plus the GUI is clumsy, tedious.
Both are OK, dependable softs...
Is WinPatrol also an anti-exe?
In your opinion which Anti-EXE/Application software of 2015 work with
Sandboxie?
If Sandboxie is using a folder C:\Sandbox, add this as an “Exception” folder on the Guarded Apps Tab. Make sure to change the type to Read/Write.
Open Sandboxie and follow these easy steps:
- Click on Configure -> Edit Configuration
- Add the following line under each of your sandboxes:
OpenPipePath=*\mailslot\NVTInj\*
- Open Sandboxie window
- Click on Configure -> Edit Configuration
- Add these lines under the sandbox name (example [DefaultBox]):
OpenPipePath=*\mailslot\NVTInj\*
OpenIpcPath=*\BaseNamedObjects*\IOB_DLL_IPC*
OpenIpcPath=\RPC Control\mchIpcIOB_DLL_IPC
OpenIpcPath=$:SmartObjectBlocker.exe
InjectDll=C:\Program Files\NoVirusThanks\Smart Object Blocker\iobDLL32.dll
InjectDll64=C:\Program Files\NoVirusThanks\Smart Object Blocker\iobDLL64.dll