Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Malware Analysis
Self-Made Fortran Malware Analysis
Message
<blockquote data-quote="bazang" data-source="post: 1112724" data-attributes="member: 114717"><p>The entire point of the lesson with gdi_shaka . e x e is the following:</p><p></p><p>1. Even when you have antivirus or internet security installed on a system, if you execute code then you run the risk of compromise; and</p><p>2. The only effective protection is not to execute code on the system in the first place.</p><p></p><p>i) It does not matter if you are a "user that wants to use stuff."</p><p>ii) The system must be locked-down 24/7/365.</p><p>iii) Good/Bad notifications and users making the decision to Allow/Block have a predictable outcome of infected or compromised systems.</p><p></p><p>I don't want to get into the debate "But computers are made for users to use stuff." No. They were not. Read the device EULA and any related OEM Terms of Service. The content of those documents will quickly dispel the wide-spread notion that OEMs produce systems with the intent that users can do whatever they wish on them.</p><p></p><p>PS - Since we got the whole flag thingy going, I am joining in.</p></blockquote><p></p>
[QUOTE="bazang, post: 1112724, member: 114717"] The entire point of the lesson with gdi_shaka . e x e is the following: 1. Even when you have antivirus or internet security installed on a system, if you execute code then you run the risk of compromise; and 2. The only effective protection is not to execute code on the system in the first place. i) It does not matter if you are a "user that wants to use stuff." ii) The system must be locked-down 24/7/365. iii) Good/Bad notifications and users making the decision to Allow/Block have a predictable outcome of infected or compromised systems. I don't want to get into the debate "But computers are made for users to use stuff." No. They were not. Read the device EULA and any related OEM Terms of Service. The content of those documents will quickly dispel the wide-spread notion that OEMs produce systems with the intent that users can do whatever they wish on them. PS - Since we got the whole flag thingy going, I am joining in. [/QUOTE]
Insert quotes…
Verification
Post reply
Top