Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Software Troubleshooting
Build Security around ReHIPS 2.3 on a System?
Message
<blockquote data-quote="shmu26" data-source="post: 708208" data-attributes="member: 37647"><p>You mentioned earlier about PDF . Each PDF reader, such as Adobe, Foxit, etc, has its own separate isolated environment, so it can't spy on your Word documents or Excel documents, or vice versa, even if the docs are open and you are working on them. This is because each isolated environment is a world unto itself. Note also that MS Outlook is separate from the other MS Office apps. </p><p></p><p> If malware exploits an isolated app, it still won't gain permission to modify system files or to read data in real user space. But you are right that malware could scan to gain info about the system.</p></blockquote><p></p>
[QUOTE="shmu26, post: 708208, member: 37647"] You mentioned earlier about PDF . Each PDF reader, such as Adobe, Foxit, etc, has its own separate isolated environment, so it can't spy on your Word documents or Excel documents, or vice versa, even if the docs are open and you are working on them. This is because each isolated environment is a world unto itself. Note also that MS Outlook is separate from the other MS Office apps. If malware exploits an isolated app, it still won't gain permission to modify system files or to read data in real user space. But you are right that malware could scan to gain info about the system. [/QUOTE]
Insert quotes…
Verification
Post reply
Top