So, hardening ones OS can provide the following benefits?

• Preventing and logging write attempts to the system’s interrupt
descriptor table (IDT) and the system service dispatch table (SSDT)
• Stopping changes to the processor system transitioning table

* *

*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Tue, Dec 13, 2011 at 3:12 PM, Kurt Buff <[email protected]> wrote:

> Same answers as always: Harden the OS, impose separation of abilities and
> limit administrator access. Whitelisting apps, too, for that matter.
>
> On Tue, Dec 13, 2011 at 08:15, Andrew S. Baker <[email protected]> wrote:
>
>> Rootkits are largely already invisible to the end user.
>>
>> Of course, there is an element of risk to this, but doing nothing is not
>> a valid response to the existing threats, and you have yet to substantiate
>> any specific weakness that would allow malware writers to have a "field
>> day" with this.
>>
>> Allowing the end user to install or deploy technology early enough that
>> it can circumvent a rootkit is highly desirable, is it not?      If you
>> disagree, please feel free to offer some viable alternatives...
>>
>> * *
>>
>> *ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
>> Technology for the SMB market…
>>
>> *
>>
>>
>>
>> On Tue, Dec 13, 2011 at 8:42 AM, Kurt Buff <[email protected]> wrote:
>>
>>> Because once they corrupt it, it will be at least as invisible to the
>>> end user as a rootkit. And you know it's going to be a big fat target.
>>>
>>>
>>> On Tue, Dec 13, 2011 at 04:41, Andrew S. Baker <[email protected]>wrote:
>>>
>>>> Why would they have a "field day" with this?
>>>>
>>>> * *
>>>>
>>>> *ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
>>>> Technology for the SMB market…
>>>>
>>>> *
>>>>
>>>>
>>>>
>>>> On Mon, Dec 12, 2011 at 5:13 PM, Kurt Buff <[email protected]> wrote:
>>>>
>>>>> Yes, it will be very effective for malware writers, who are going to
>>>>> have a field day with this. It's just another layer of abstraction to
>>>>> obfuscate functionality, and make it even harder to troubleshoot
>>>>> problems.
>>>>>
>>>>>
>>>>>
>>>>> Kurt
>>>>>
>>>>> On Mon, Dec 12, 2011 at 11:27, David Lum <[email protected]> wrote:
>>>>> > Anyone care to comment on this?
>>>>> > http://www.mcafee.com/us/resources/data-sheets/ds-deep-defender.pdf
>>>>> >
>>>>> >
>>>>> >
>>>>> > Note the requirements and specifications on the left. Looks like the
>>>>> Intel
>>>>> > purchase of McAfee is responsible for this one, the questions is
>>>>> will it
>>>>> > really be effective?
>>>>> >
>>>>> > David Lum
>>>>> > Systems Engineer // NWEATM
>>>>> > Office 503.548.5229 // Cell (voice/text) 503.267.9764
>>>>> >
>>>>>
>>>>
>>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to