12.11.2013, 14:21
@-Prodigy-:
I've written custom thingy to check all registry /run-like folders, so I manually check if anything wants to run on startup without my consent. Also I've got whitelist of programs allowed to run and I'm using EMET. Enough for normal consumer. As you can read in that article it was working on BSD and *nix flavoured systems as well.
I'm sort of whitehat (so far only fixing XSS'es and SQLi's in bug bounties) and I should know better to use some linux distro, but I like my windows too much
@Sublime: It spreads further via pendrives, cd-roms, internet and (supposedly) computer speaker. And what's funny, it doesn't do anything harmful, but is constantly connected to some operator on the other side - I'd say it's botnet-y like behaviour.
I've written custom thingy to check all registry /run-like folders, so I manually check if anything wants to run on startup without my consent. Also I've got whitelist of programs allowed to run and I'm using EMET. Enough for normal consumer. As you can read in that article it was working on BSD and *nix flavoured systems as well.
I'm sort of whitehat (so far only fixing XSS'es and SQLi's in bug bounties) and I should know better to use some linux distro, but I like my windows too much
@Sublime: It spreads further via pendrives, cd-roms, internet and (supposedly) computer speaker. And what's funny, it doesn't do anything harmful, but is constantly connected to some operator on the other side - I'd say it's botnet-y like behaviour.