Jump to content

mattxd00

Members
  • Content Count

    6
  • Joined

  • Last visited

Community Reputation

0 Neutral

About mattxd00

  • Rank
    New Member
  1. What would you recommend instead of Avast! then. I just need real time protection instead of a whole AV. I pay for the subscription and get extras like a firewall and all that which I don't need. They market it as if I'm going to get hacked, nobody is going to hack a random person they don't know anything about. If i turn off my firewall it's not like my money from my bank account is going to disappear in an instant. I just want some sort of AV that offers real time protection without the heavy load of extra stuff I will never use. Like for example the secure-line VPN, anti-spam, sandbox,
  2. Someone recently who works in the computer industry as a programmer told me that antiviruses aren't really needed and he thought they were a waste of space for users who know what they're doing. He added that all they do is take processing power and that if a virus is going to infect you it will do so without the AV doing anything. I just want to raise this point because I am considering removing my Avast subscription and if it actually would be ok to do so. Before launching any suspicious files I test them in various online/local sandboxes to ensure they do not infect my system sinc
  3. Thanks, I've heard of reverse engineering however there were not many useful resources I could find online to help me learn it. From what I know, reverse engineering is taking for example a crypted stub that is encrypted and houses the payload, decrypting it and then having a look at it's source code to see what it actually does and for example, manipulating the payload so you somehow maybe pull information from the attacker. I believe cracked software is also made possible by reverse engineering. Its a topic I am interested in but I have no idea how to start or where to learn it.
  4. Thanks for the explanation. I just really have a huge interest in software development particularly in malware, I think the methods each malware uses is interesting. I mean malware is kind of like an art in my opinion but limited to the point you cannot do everything you might want. I understand it's bad but I don't have an interest in it to profit or whatever, just general like the ways worms use to spread and we've seen many examples over the years. One that stands out(unsure if it's a worm) is the virus called Chernobyl which spread to exe files on the pc, wiped hard drives and overwrote th
  5. Ok so they can use a time bomb which I've heard of before, and reboots but how do they do all this without the user knowing. I'm assuming since it's a time bomb it would have to have a process running counting down or simply add a task to activate it in the scheduler. I never really understood how the time bomb worked. Neither rootkits. If you were to activate a root kit, it cant get into the boot manager without rebooting anyways I think. But how does it then do that on restart. Maybe link me some sources if you can't explain???
  6. I understand there's tricks/exploits certain malware use to fool the user who is running an infected application sandboxed that it is safe. But how does it do that? I recently came across a file I scanned in an online sandbox which upon execution, launched 2 RATs that installed themselves along with adware applications that bombed the sandbox with downloads to millions of ads. I know developers can 1. Put out a fake warning to make it seem like the application errored and nothing malicious has launched 2. Use exploits to break out of the sandbox and infect the PC(rarely seen this myself)
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.