- Jul 14, 2015
- 741
- Content source
- https://www.youtube.com/watch?v=f30KvcIrHag&t=217s
Another shocking result ??? Comments welcome !!
To be fair though, I do the same with windows. I can open a windows laptop with nothing but default security and an ad blocker in the browser and just use the device as intended. I used to run my windows machine this way for a long time just fine. I kept analysis tools on hand to manually check the system from time to time, but other then, I did not focus on it as much as I used to when I did all the security/application testing here. I would keep Process Explorer/Autoruns both with VT enabled, PeStudio and TCPview on the device for checking from time to time. I of course always checked files and applications "downloads" ect in VT or PeStudio before execution, I always cross referenced websites before proceeding, I "verified" everything as I was never in too big a hurry to not be cautious and thorough. I kept everything backed up and on external devices should something happen, never storing personal important items on the system directly. No infections in all that time. It was not tons of security that kept my system clean, it was habits.
You remind me, I need to find a free imaging backup program. I do weekly personal files backup but need to find one for quarterly disk imaging.Not to mention Imaging software to restore the whole system should something like this bypass "ANY" security you may have in place, oh and do not forget offline backups of personal files ect so as to not lose those during any process.
I didn't note that Controlled Folder Access was addressed one way or another in this video, but perhaps this one may clarify:Indeed shocking result even with controlled folder access on
Nice edit, that I can acknowledge, LikeI use Defender. Ask me if I care about this video?
It can't be that hard to make a video of any AV being breached if you know what you are doing. Some do it because they have a bias against a certain software. ( Not saying that is the case in this video.)
The guy who made this video is a member here at MT ! @NB InfoTechI use Defender. Ask me if I care about this video?
It can't be that hard to make a video of any AV being breached if you know what you are doing. Some do it because they have a bias against a certain software. ( Not saying that is the case in this video.)
I didn't know that, thanks. Nothing against him or his videos, I just could care less about the results of these types of videos, I even occasionally watch them.The guy who made this video is a member here at MT ! @NB InfoTech
Not using Malware Defender?Why am I not impressed or shocked by this video? What's the point?
Only built-in Windows Security. These videos never (rarely?) discuss how users are initially infected via all the various attack vectors.Not using Malware Defender?
I agree Simple Windows Hardening blocks 99,99% of these attacks.Only built-in Windows Security. These videos never (rarely?) discuss how users are initially infected via all the various attack vectors.
Usability, if I had to guess. They're fine for us techies that are able to deal with any false positives that crop up, but good luck guiding your 60-year old mother through adding a file path to exclusions via powershell.Meanwhile, why isn't Microsoft turning on these hidden settings by default?
Nope but they ensure you don't lose anything. Data theft is as simple as what you divulge, since no one can guarantee it's safety.Backups help in restoring systems but don't help reverse any data theft.