Do you have a question? Post it now! No Registration Necessary. Now with pictures!
November 25, 2007, 6:08 am
rate this thread
There's many answers to this question but from my experience here's the
rules I generally use...
Firstly, One should keep up with exploits themselves and watch out for the
exploit(s) being actively used. One should never soley depend on
anti-malware or a countermeasure, because there will be always gaps in
their detection, especially that of which uses signatures.
Secondly, Users can generally be their own worse enemy, this is because many
of them assume that anything that looks legitamate is "Okay" and can be
accepted as such, thus defeating any sort of countermeasure that gives the
user the option wheather to execute code or not.
as i understand it, their technology is basically known-exploit scanning
so it would probably be as effective at stopping exploits as anti-virus
scanners are at stopping viruses...
"it's not the right time to be sober
now the idiots have taken over
spreading like a social cancer,
is there an answer?"