- May 14, 2016
- 1,597
What mode are you using on your Voodoo ?i don't know about that.This is only for Voodoo or for all softwares I recommend?
What mode are you using on your Voodoo ?i don't know about that.This is only for Voodoo or for all softwares I recommend?
I don't us Voodoo.I have SecureAPlus xDWhat mode are you using on your Voodoo ?
So what you are saying, is this setting here is null and void..VS won't protect against a browser exploit that abuses whitelisted Windows processes to bypass application whitelisting. A ransomware *.tmp will inherit whitelist status from the trusted Windows process run sequence and run unrestricted...
It's only a mistake, I though you were using VoodooShield, after one of your post, and was curious to see what mode you usedI don't us Voodoo.I have SecureAPlus xD
But way you asking ?
So what you are saying, is this setting here is null and void..
View attachment 117577
I will recommend you auto pilotIt's only a mistake, I though you were using VoodooShield, and was curious to see what mode you used
Im sure the Developer doesI have no idea what that setting does. Does anyone really know?
AppGuard was not bypassed in Protected Mode...
With that last sentence, the rest is history with me... 1 + 1 = 2
Im sure the Developer does
It would be my understanding that it protects against exploits, how long this has been applied to the product im not sure, as i just started using it roughly over a month ago.
They have strengths and weaknesses, all products do. Appguard in protected mode, will let any signed application walk in, how far depends on what it does of course.
I know that i have hammered VS with tons of malicious website links, as well as samples placed strategically through out the system, and i have not bypassed it.
Can you fine video what you watch about bypassing NVT ERP, VS, SpyShelter, Bitdefender,... ?I have no idea what that setting does. Does anyone really know? All I know is that I watched the video on kafan.cn about 6 months ago and application whitelisting bypass was used after the IE exploit. I watched carefully and saw it with my own two eyes - and that's all the proof I need. NVT ERP, VS, SpyShelter, Bitdefender,... I can't remember them all... were bypassed. AppGuard was not bypassed in Protected Mode...
With that last sentence, the rest is history with me... 1 + 1 = 2
Can you fine video what you wach about bypassing NVT ERP, VS, SpyShelter, Bitdefender,... ?
It is on ChineseSearch for it on kafan.cn.
It is on Chinese
It was a joke Not good. But sorry I can fine video.I will love to fine and post on video reviews.Use Google translator browser plug-in (Chrome), navigate to kafan.cn, translate kafan.cn to English, then search for Voodooshield, NVT ERP, etc.
They use English names of softs in the threads.
It was a joke Not good. But sorry I can fine video.I will love to fine and post on video reviews.
It is a mistake to think that experience and knowledge will save your skin every time 100%, this is because nothing ever stays the same in cyber security, always evolving, meaning there is always more to learn, and sometimes the hard way.... Back ups are the solution, your fail safe, should anything ever happen.Never got a ransomeware attack EVER. Haven't really used an adblocker and not really going to start. I shouldn't be worried about ransomeware but more inexperienced people should.
It was with this sample, 5/53 at this moment ( and 40/54 now)It was a joke Not good. But sorry I can fine video.I will love to fine and post on video reviews.
It was with this sample, 5/53 at this moment ( and 40/54 now)
https://www.virustotal.com/en/file/...34f271da8432c338fa446d9c/analysis/1453695171/