Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Other security for Windows, Mac, Linux
MAX AI Based Korean AV
Message
<blockquote data-quote="cruelsister" data-source="post: 721913" data-attributes="member: 7463"><p>A fine definition, but a bit vague. A typical way a system can get infected is by connecting infected removable storage (Flash Drive) to a system- the worm will activate immediately and do whatever nastiness it is programmed to do. If the newly infected system is on a network it will connect out and spread that way quite easily. Some place too much emphasis on how a file is run in tests. The emphasis instead should be placed on whether or not a Security application can detect an initial run, or at least remediate infection on an already compromised system.</p><p></p><p>To that end my next 2 videos will speak to both points- this weekend will be remediation of an infected system by 2nd opinion scanners, and the second (around April 13th) will be how an application the developers of that product asked me never to test will deal with it.</p></blockquote><p></p>
[QUOTE="cruelsister, post: 721913, member: 7463"] A fine definition, but a bit vague. A typical way a system can get infected is by connecting infected removable storage (Flash Drive) to a system- the worm will activate immediately and do whatever nastiness it is programmed to do. If the newly infected system is on a network it will connect out and spread that way quite easily. Some place too much emphasis on how a file is run in tests. The emphasis instead should be placed on whether or not a Security application can detect an initial run, or at least remediate infection on an already compromised system. To that end my next 2 videos will speak to both points- this weekend will be remediation of an infected system by 2nd opinion scanners, and the second (around April 13th) will be how an application the developers of that product asked me never to test will deal with it. [/QUOTE]
Insert quotes…
Verification
Post reply
Top