Re: Unable change firewall settings
"Chappy" <Chappy@discussions.microsoft.com> wrote in message
news:F0DB430D-0F4E-41DD-9B31-E3EDCCC14998@microsoft.com...
>
> Mr Arnold
>
> I'm a HijackThis teacher and an Independent Malware tester for new &
> unknown
> varients.
> I was awarded a Lifetime membership to Virus Bulletin for my work. In case
> you don't know what Virus Bulletin is...well, if you don't know then that
> says it all about your security knowledge.
>
Ooo we, I am happy for you.
> I have personally tested and written solutions for over 1000 Windows
> Security Vulnerabilities. I currently have over 750 Trojans and Virus in
> my
> testbed machine that I've fully decompiled and written signature files
> for...what's your security experience? Running an AV scan weekly?
> I also was a Beta tester for Eset with their Eset Security suite (Firewall
> mostly), and Comodo V3 Firewall for 64bit.
I am happy for you.
>
> Before you go shooting your wad again, maybe you should stop & think that
> there are True security experts out there.
I don't think you're one off them, and if you must show your wares, then I
think I could beat you if I choose to do so.
And I am a programmer, and I have been doing it since 1980, and I came to
the MS platform in 1996. Everything you're talking about, I could probably
beat it. All it takes is the user with the happy fingers that will point and
click on everything under Sun, which is not that hard to do.
http://www.foxnews.com/story/0,2933,274314,00.html
Detection software using signature files must know about the signature that
it must detect. If the signature is unknown, then the signature file is
useless on zero day exploits. And on top of that, a serious malware threat
is going to hide itself and most likely have itself hosted by a legitimate
process running on the machine such as SVChost.exe or DLLhost.exe.
I had a poster come into the FW and Security NG talking about the small
company she was consulting at had an exploit running on the MS O/S Small
Business server that was affecting IIS that circumvented all that stuff
you're talking about, which even the experts were indicating to toss at it,
and she tossed the kitchen sink at it and could find nothing. I gave her
the proper tools and showed her how to find the exploit when even the
security experts in the NG couldn't do it, which was because of my
programming expertise that I could help her.
It was due to the knowledge I passed on how to find it, and the ability to
use the proper tools and go look.
<http://www.windowsecurity.com/articles/Hidden_Backdoors_Trojan_Horses_and_Rootkit_Tools_in_a_Windows_Environment.html>
But if I had known what I do now, I would just told her to flatten the
drive. If the O/S can be fooled then anything that runs with the O/S like
detection software that you're harping about can be fooled to with exploits
still left undetected on the machine.
http://technet.microsoft.com/en-us/library/cc512587.aspx
I use Eset, and if you have anything to do with Eset, then I might be
kicking Eset to the curb and finding something else.