Yes. Maybe tomorrow.Andy, could you do this test with MKS_Vir?
It's a VBS script run by Windows, with system privileges. It will not be blocked by SRP or by ReHIPS, because it is run by SYSTEM
But Appguard at default settings would let it do its thing, right? Just for the record...That's how your SYSTEM gets spanked. You can thank Microsoft for it.
And just a FYI, that script does not need to run for Windows to function correctly.
AppGuard will block it.
Because Windows 10 is now a perpetual beta, breakages and conflicts are Microsoft's doing and not anyone else's.
.....However, for other 3rd-party softs such as Sandboxie, it is an ongoing struggle.
There is no default-setting in Appguard (and other SRPs) , you are supposed to implement your own policy right away when you use it, those that let it at default missed the whole point of SRPs.But Appguard at default settings would let it do its thing, right? Just for the record...
You are right, but nevertheless, the default config does a lot. Slap that on a system, and it is much better protected than before.There is no default-setting in Appguard (and other SRPs) , you are supposed to implement your own policy
For rehips change sub program to alert for script you wish to block on system account. Though if the malware has system privileges it's already game over normally if the malware is not terrible or you are targetted.Indeed, after running the Hard_Configurator tool to reveal autoruns, I got this result, on Windows 10 1809:
SCRIPT AUTORUNS REPORT DATE (Y:M H:M): 2018:11:05 10:35
@@@@@ Script Autoruns:
c:\windows\system32\gathernetworkinfo.vbs
It's a VBS script run by Windows, with system privileges. It will not be blocked by SRP or by ReHIPS, because it is run by SYSTEM, but it will be blocked by some other solutions.
Right. I like the ReHIPS default settings, in which SYSTEM allows it to run, and inspects children.Though if the malware has system privileges it's already game over
Everyone has his favorite cup of tea, mine is ReHips on Expert + Lockdown mode, for unexpected but legit blocks, i modify the rule via the interactive logging tab.Right. I like the ReHIPS default settings, in which SYSTEM allows it to run, and inspects children.
People don't need security software in home security, they need safe habits.Guys you talk like suddenly people from AV's will switch to SRPs, it's not going to happen. Security geeks can run whatever they want, while McAfee will still be automatically recharging from elder credit cards every year. Nothing in home security industry will change if people will not be willing to change themselves.
I would say yes and no.People don't need security software in home security, they need safe habits.
if your usually safe site/program/mail contact is compromised, only a security soft will save you.
I can assure you it's not a myth, as I ran Windows without any security software for over 10 years, and never got infected nor accounts stolen.I wonder if the safe habits argument is a myth, do you remember the ccleaner case? I think that in a scenario like that, only post-exploit security software could save us, e.g. OSArmor.
Situations like the one with CCleaner are impossible situations.I wonder if the safe habits argument is a myth, do you remember the ccleaner case? I think that in a scenario like that, only post-exploit security software could save us, e.g. OSArmor.
Let me guess... you then changed the password after the notifications/news and any other necessary account information, and it didn't put any of your other accounts for other services in danger, because you don't re-use the same password across services?In fact the closest I got to accounts stolen, is when the websites themselves are exploited and hacked. Not that worries me, as I use 64-bit different passwords in all the websites
Safe habits is just one part of a proper security strategy, like a good driver in a well maintained car is less prone to create accidents.I wonder if the safe habits argument is a myth, do you remember the ccleaner case? I think that in a scenario like that, only post-exploit security software could save us, e.g. OSArmor.