Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Of LoLBins, 0-Days, ESET, and Microsoft Defender
Message
<blockquote data-quote="Practical Response" data-source="post: 1083241" data-attributes="member: 109138"><p>Wanting to see if a product is triggered by actions that mimic behaviors leading to what you have described is a false positive, it is certainly not the same as a benign file with no payload waltzing out and back into the front door initiated by the user. I was not exact in my wording and it appears loosely translated although my meaning I know you understand, as the file in this case is not performing a malicious action nor contains malicious code. It is being used to demonstrate a way that file could be used to carry that out, but not actually doing so. </p><p></p><p>Thank you though for placing what is necessary here in a extra disclaimer that users understand the product is not failing because its not actually being tested by its design and abilities. It is literally a concept. Personally I would not want to use a security system that is so aggressive. Its like having a dog that barks at everything around your house, how would you know what is a legitimate threat or not, especially for those average users.</p></blockquote><p></p>
[QUOTE="Practical Response, post: 1083241, member: 109138"] Wanting to see if a product is triggered by actions that mimic behaviors leading to what you have described is a false positive, it is certainly not the same as a benign file with no payload waltzing out and back into the front door initiated by the user. I was not exact in my wording and it appears loosely translated although my meaning I know you understand, as the file in this case is not performing a malicious action nor contains malicious code. It is being used to demonstrate a way that file could be used to carry that out, but not actually doing so. Thank you though for placing what is necessary here in a extra disclaimer that users understand the product is not failing because its not actually being tested by its design and abilities. It is literally a concept. Personally I would not want to use a security system that is so aggressive. Its like having a dog that barks at everything around your house, how would you know what is a legitimate threat or not, especially for those average users. [/QUOTE]
Insert quotes…
Verification
Post reply
Top