Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Jeffrey Walton
April 19, 2011, 10:52 pm
rate this thread
In 2009 we examined the effects of manipulating synchronization
objects in security software suites frequently found on personal
computers running Windows XP and Vista. The synchronization objects
were mutexes and events, and the security software included products
from AVG, Avast, Avira, BitDefender, BullGuard, CheckPoint, Eset,
F-Prot, F-Secure, Kaspersky, McAfee, Microsoft (Security Essentials),
Norman, Norton, Panda, PC Tools, Quick Heal, Symantec, and Trend
The examinations revealed that nearly all suites suffered non-trivial
faults originating from both standard and administrator accounts. The
faults ranged from simple denial of service affecting the UI console
and definition update service to scanner crashes and surreptitious
- » Re: CAUTION / POTENTIAL SECURITY RISK / WARNING: Anyone want to try this?
- — Previous thread in » General Computer Security
- » ssh on command line: force using a group size (prime size) of 1024 (and no...
- — The site's Newest Thread. Posted in » Secure Shell Forum