Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Other security for Windows, Mac, Linux
NoVirusThanks OSArmor
Message
<blockquote data-quote="AtlBo" data-source="post: 733279" data-attributes="member: 32547"><p>Thanks [USER=65228]@Opcode[/USER]. Helps tremendously.</p><p></p><p>I tend to classify protections based on the scope of their coverage as in this covers script activity or this handles memory issues etc. or just consider X + Y + Z protections all covered when it comes to Comodo Firewall etc. Just trying to cover Umbra's layers. Well, OSArmor seems to cross so many barriers it's crazy. Normally, I would think of UAC bypasses as something MS would automatically patch, which adds to the puzzle for me. Anyway, OSArmor appears to cover so many potential vulnerabilities like these that it's hard for me to classify the program, because I guess I would expect MS to have fixed many of the issues that OSA protects against. Talking about W7 here, and I guess most of them are fixed in W10. Still, I would have expected MS to have fixed them in W7 too since it is still officially supported until 2020.</p><p></p><p>Could be I am off base about how to classify things like UAC bypasses, or it could be MS has patched most of the holes and others like MMC abuse and so on. I don't know much about MS patches that's for sure. Clearly not much was ever done in W7 about protection against wayward script activity.</p><p></p><p>If you have an opportunity, I would like to know if it's fair to say that memory exploitation is in its first stages always the result of malware abuse of a vulnerability in a program (i.e. browser etc.). Also, is exploitation always in the form of memory abuse? Thx for the helpful comments.</p></blockquote><p></p>
[QUOTE="AtlBo, post: 733279, member: 32547"] Thanks [USER=65228]@Opcode[/USER]. Helps tremendously. I tend to classify protections based on the scope of their coverage as in this covers script activity or this handles memory issues etc. or just consider X + Y + Z protections all covered when it comes to Comodo Firewall etc. Just trying to cover Umbra's layers. Well, OSArmor seems to cross so many barriers it's crazy. Normally, I would think of UAC bypasses as something MS would automatically patch, which adds to the puzzle for me. Anyway, OSArmor appears to cover so many potential vulnerabilities like these that it's hard for me to classify the program, because I guess I would expect MS to have fixed many of the issues that OSA protects against. Talking about W7 here, and I guess most of them are fixed in W10. Still, I would have expected MS to have fixed them in W7 too since it is still officially supported until 2020. Could be I am off base about how to classify things like UAC bypasses, or it could be MS has patched most of the holes and others like MMC abuse and so on. I don't know much about MS patches that's for sure. Clearly not much was ever done in W7 about protection against wayward script activity. If you have an opportunity, I would like to know if it's fair to say that memory exploitation is in its first stages always the result of malware abuse of a vulnerability in a program (i.e. browser etc.). Also, is exploitation always in the form of memory abuse? Thx for the helpful comments. [/QUOTE]
Insert quotes…
Verification
Post reply
Top