Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
VoodooShield
VoodooShield Review by PCMag India
Message
<blockquote data-quote="danb" data-source="post: 867120" data-attributes="member: 62850"><p>Instead of going through each post and confusing everything, I am just going to reply to this one. Before I forget, the "Automatically allow items that match a digital signature in the whitelist snapshot" does not apply to Microsoft sigs. We excluded Microsoft sigs until we are certain that they are not forged. I do not believe they are, but until we know for sure, we had to exclude them from this option. As far as the block goes, it is a very odd one, but we will certainly find a safe way to auto allow it, and that will in turn safely fix other potential blocks we would otherwise encounter down the road. It is the long way to go about it, but it is the only safe way.</p><p></p><p>I hear what you guys are saying about the prompts, and here is my take...</p><p></p><p>First and foremost, new, non-whitelisted items should never be able to automatically execute when the user is engaging in risky activity. Some people say "well, the user might just click allow and infect the computer." I guess that is true to a certain extent, but that is much better than the alternative, which is that the file auto executes. By prompting the user, you at least are giving the user a chance and some pause in order to make the correct decision. How many novice or average users do you think would click the Allow button on a Red prompt? Also keep in mind, using the golden rule, pretty much all of the attacks not initiated by the user clicking on the file are resolved before the main prompt is even shown.</p><p></p><p>In all of the years that VS has been around, there have been only 2 reported infections from the user clicking the allow button, and one of those was a bug in VS that did not deal with the .scr file type correctly, which has been fixed since then. VS has a lot more users than you would guess, and to have that low of an infection rate is remarkable. I could go into a long story about how I work directly with some of our novice and average end users / beta testers and refined the usability throughout the years, but that does nothing for the discussion, simply because no one has seen what I have seen. My hope is that with your suggestions we can refine VS's usability even more to create an even better usability / protection balance.</p><p></p><p>When it comes to endpoint protection, there are only a few options, and each has a valid use case.</p><p></p><p>1. Do not lock the endpoint at all and only rely on detection</p><p>2. Lock the computer full time</p><p>3. Lock the computer when it is at risk with VS</p><p></p><p>If there is another option I am missing that we can implement into VS, I would love to discuss the possibilities.</p><p></p><p>Thank you guys, have a great weekend, talk to you soon!</p></blockquote><p></p>
[QUOTE="danb, post: 867120, member: 62850"] Instead of going through each post and confusing everything, I am just going to reply to this one. Before I forget, the "Automatically allow items that match a digital signature in the whitelist snapshot" does not apply to Microsoft sigs. We excluded Microsoft sigs until we are certain that they are not forged. I do not believe they are, but until we know for sure, we had to exclude them from this option. As far as the block goes, it is a very odd one, but we will certainly find a safe way to auto allow it, and that will in turn safely fix other potential blocks we would otherwise encounter down the road. It is the long way to go about it, but it is the only safe way. I hear what you guys are saying about the prompts, and here is my take... First and foremost, new, non-whitelisted items should never be able to automatically execute when the user is engaging in risky activity. Some people say "well, the user might just click allow and infect the computer." I guess that is true to a certain extent, but that is much better than the alternative, which is that the file auto executes. By prompting the user, you at least are giving the user a chance and some pause in order to make the correct decision. How many novice or average users do you think would click the Allow button on a Red prompt? Also keep in mind, using the golden rule, pretty much all of the attacks not initiated by the user clicking on the file are resolved before the main prompt is even shown. In all of the years that VS has been around, there have been only 2 reported infections from the user clicking the allow button, and one of those was a bug in VS that did not deal with the .scr file type correctly, which has been fixed since then. VS has a lot more users than you would guess, and to have that low of an infection rate is remarkable. I could go into a long story about how I work directly with some of our novice and average end users / beta testers and refined the usability throughout the years, but that does nothing for the discussion, simply because no one has seen what I have seen. My hope is that with your suggestions we can refine VS's usability even more to create an even better usability / protection balance. When it comes to endpoint protection, there are only a few options, and each has a valid use case. 1. Do not lock the endpoint at all and only rely on detection 2. Lock the computer full time 3. Lock the computer when it is at risk with VS If there is another option I am missing that we can implement into VS, I would love to discuss the possibilities. Thank you guys, have a great weekend, talk to you soon! [/QUOTE]
Insert quotes…
Verification
Post reply
Top