Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Other security for Windows, Mac, Linux
NoVirusThanks OSArmor
Message
<blockquote data-quote="Windows_Security" data-source="post: 728028" data-attributes="member: 50782"><p><strong>WHY USE OS_ARMOR?</strong></p><p></p><p>Malware writers only use a limited number of hacking techniques (when we exclude user errors like phishing and social engineering). They always try to gain access to Windows build in shells to acquire higher priveledges, drop code, survice re-boot and connect/redirect internet traffic to a controlled server.</p><p></p><p>Some say it is impossible to fight exploits, because exploits are based on progam errors of which the vendors did not know their software had them. But with the improvemenst in Memory hardening, code control and (C++) compilers Windows 10 is a tough cookie to beat. Windows 10 with all Windows Defender features enabled is pretty hard to break in.</p><p></p><p>Luckily (for malware writers) Microsoft thought of a way to nullify all these security improvements by providing (new or enhanced) command and script interpretators in Windows itself. When old dynamic code platforms were abondanned (Active-X, HTML application, NTVDM) new ones are quickly introduced (dotNet, Powershell, Windows Management Instrumentation) to give hackers access to your PC.</p><p></p><p>Malware tend to use what is already there (from exploit-kits to windows build-in shells), so OS-Armor blocking access to command shells and script interpretors and filtering command lines on known exploit tricks reduces the chances of being victim of malware using an exploit to near zero. The beauty of OS_Armor is that it does not try to prevent exploits, but limits gaining access to Windows build-in shell after an exploit is applied.</p><p></p><p>That is why I recommend using OS_Armor in default settings</p></blockquote><p></p>
[QUOTE="Windows_Security, post: 728028, member: 50782"] [B]WHY USE OS_ARMOR?[/B] Malware writers only use a limited number of hacking techniques (when we exclude user errors like phishing and social engineering). They always try to gain access to Windows build in shells to acquire higher priveledges, drop code, survice re-boot and connect/redirect internet traffic to a controlled server. Some say it is impossible to fight exploits, because exploits are based on progam errors of which the vendors did not know their software had them. But with the improvemenst in Memory hardening, code control and (C++) compilers Windows 10 is a tough cookie to beat. Windows 10 with all Windows Defender features enabled is pretty hard to break in. Luckily (for malware writers) Microsoft thought of a way to nullify all these security improvements by providing (new or enhanced) command and script interpretators in Windows itself. When old dynamic code platforms were abondanned (Active-X, HTML application, NTVDM) new ones are quickly introduced (dotNet, Powershell, Windows Management Instrumentation) to give hackers access to your PC. Malware tend to use what is already there (from exploit-kits to windows build-in shells), so OS-Armor blocking access to command shells and script interpretors and filtering command lines on known exploit tricks reduces the chances of being victim of malware using an exploit to near zero. The beauty of OS_Armor is that it does not try to prevent exploits, but limits gaining access to Windows build-in shell after an exploit is applied. That is why I recommend using OS_Armor in default settings [/QUOTE]
Insert quotes…
Verification
Post reply
Top