Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Malware Analysis
Python Ransomware
Message
<blockquote data-quote="ForgottenSeer 58943" data-source="post: 762249"><p>Also some other things to remember;</p><p></p><p>Trend Housecall doesn't share signatures with Trend Micro.</p><p></p><p>Some engines at online scanning places actually use linux command line scanners. Impacting results even further. Some companies 'manipulate' online scanners. (Kaspersky) Either to show better results, or trigger false results with other products.</p><p></p><p>I know people get all up in arms if their pet product missed something. Then they start looking for something anew and the endless security charade starts again like spring after a long winter. Try not to get too wound up about these matters. The fact is, while this or that blackhat, or magical superstar harlem globe trotter coder could code something to bypass your AV, the capability to deliver it is probably almost zero. That's a handy little thing all of these people leave out from their videos, never showing actual, real world delivery into a system from outside of the WAN factoring all of the technologies, updates, system variables, URL scanners, extensions, safety DNS, ISP filtration, blah blah blah. Much less implanting someone stupid enough behind the keyboard to start script executions. Then they are also assuming the person is using Windows and these days, that's a bad assumption. (Linux, BSD, Debian, macos, android, iOS, Chromeos, etc) Where they'd not even have a chance to implant.</p><p></p><p>It's mostly security theater IMO.</p></blockquote><p></p>
[QUOTE="ForgottenSeer 58943, post: 762249"] Also some other things to remember; Trend Housecall doesn't share signatures with Trend Micro. Some engines at online scanning places actually use linux command line scanners. Impacting results even further. Some companies 'manipulate' online scanners. (Kaspersky) Either to show better results, or trigger false results with other products. I know people get all up in arms if their pet product missed something. Then they start looking for something anew and the endless security charade starts again like spring after a long winter. Try not to get too wound up about these matters. The fact is, while this or that blackhat, or magical superstar harlem globe trotter coder could code something to bypass your AV, the capability to deliver it is probably almost zero. That's a handy little thing all of these people leave out from their videos, never showing actual, real world delivery into a system from outside of the WAN factoring all of the technologies, updates, system variables, URL scanners, extensions, safety DNS, ISP filtration, blah blah blah. Much less implanting someone stupid enough behind the keyboard to start script executions. Then they are also assuming the person is using Windows and these days, that's a bad assumption. (Linux, BSD, Debian, macos, android, iOS, Chromeos, etc) Where they'd not even have a chance to implant. It's mostly security theater IMO. [/QUOTE]
Insert quotes…
Verification
Post reply
Top