Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Setup
PC Setup Configuration Help & Showcase
Itachi Sempai Security Config 2022
Message
<blockquote data-quote="Andy Ful" data-source="post: 971421" data-attributes="member: 32260"><p>My knowledge about CF may be outdated. I know that it has got a great firewall, strong sandbox, and strong protection against classic attack vectors via PE files. I am not sure about its protection against modern attacks via the fileless methods and .Net framework DLLs. These methods can be neutralized by adding scripting Interpreters and some LOLBins to the Unrecognized group (run in the sandbox).</p><p>If I correctly recall, CF has to be configured for maximum security to trust only essential vendors to avoid DLL hijacking via vulnerable legal programs.</p><p>There are some MT members that can know more about these factors.</p><p></p><p>You can tweak CF ([USER=7463]@cruelsister[/USER] settings)+ SWH to reproduce most of the H_C protection for the home computer. This could be recommendable in your case.</p><p></p><p>If you use CF without [USER=7463]@cruelsister[/USER] settings, then you can use it with the H_C (instead of SWH).</p><p></p><p>If you do not need a strong firewall, then you can also replace CF + SWH with H_C.</p><p></p><p>When choosing the H_C, you have to respect SmartScreen alerts when installing applications. The H_C uses Forced SmartScreen to bypass default-deny for EXE and MSI installers.<img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite130" alt="(y)" title="Thumbs up (y)" loading="lazy" data-shortname="(y)" /></p></blockquote><p></p>
[QUOTE="Andy Ful, post: 971421, member: 32260"] My knowledge about CF may be outdated. I know that it has got a great firewall, strong sandbox, and strong protection against classic attack vectors via PE files. I am not sure about its protection against modern attacks via the fileless methods and .Net framework DLLs. These methods can be neutralized by adding scripting Interpreters and some LOLBins to the Unrecognized group (run in the sandbox). If I correctly recall, CF has to be configured for maximum security to trust only essential vendors to avoid DLL hijacking via vulnerable legal programs. There are some MT members that can know more about these factors. You can tweak CF ([USER=7463]@cruelsister[/USER] settings)+ SWH to reproduce most of the H_C protection for the home computer. This could be recommendable in your case. If you use CF without [USER=7463]@cruelsister[/USER] settings, then you can use it with the H_C (instead of SWH). If you do not need a strong firewall, then you can also replace CF + SWH with H_C. When choosing the H_C, you have to respect SmartScreen alerts when installing applications. The H_C uses Forced SmartScreen to bypass default-deny for EXE and MSI installers.(y) [/QUOTE]
Insert quotes…
Verification
Post reply
Top