Loading...
  OR  Zero-K Name:    Password:   

Post edit history

zero k virus

To display differences between versions, select one or more edits in the list using checkboxes and click "diff selected"
Post edit history
Date Editor Before After
11/14/2020 1:35:24 PMFirepluk before revert after revert
11/14/2020 1:34:19 PMFirepluk before revert after revert
11/14/2020 1:30:58 PMFirepluk before revert after revert
11/14/2020 1:28:44 PMFirepluk before revert after revert
11/14/2020 1:28:22 PMFirepluk before revert after revert
11/14/2020 1:26:02 PMFirepluk before revert after revert
11/14/2020 1:24:11 PMFirepluk before revert after revert
11/14/2020 1:23:51 PMFirepluk before revert after revert
11/14/2020 1:23:26 PMFirepluk before revert after revert
Before After
1 [quote]Please use the defender/your antivurs system to report that this is a false positive. 1 [quote]Please use the defender/your antivurs system to report that this is a false positive.
2 The only way to prevent it from labeling it. 2 The only way to prevent it from labeling it.
3 [/quote] 3 [/quote]
4 \n 4 \n
5 Read about code signing, all those AV alarms are -heuristical- analysis because executable comes from an -untrusted- source(interwebs) and -unknown- publisher. When publisher is known thru a chain of trusted CA all heuristical analysis usually shuts down and only classical signature search stays which has nothing on chobby/spring 5 Read about code signing, all those AV alarms are -heuristical- analysis because executable comes from an -untrusted- source(interwebs) and -unknown- publisher. When publisher is known thru a chain of trusted CA all heuristical analysis usually shuts down and only classical signature search stays which has nothing on chobby/spring
6 \n 6 \n
7 They also state there is extended validation available for 800$/3 years(200$/year) to bypass windows SmartScreen... not sure if it worths it, even basic signing should alleviate most of those problems 7 They also state there is extended validation available for 800$/3 years(200$/year) to bypass windows SmartScreen... not sure if it worths it, even basic signing should alleviate most of those problems
8 \n 8 \n
9 Basically when executable is signed it allows to 9 Basically when executable is signed it allows to
10 - verify publisher's identity 10 - verify publisher's identity( which gets recorded by CA that gives u the certificate)
11 - ensure that executable has not been modified since the time it's been signed by publisher 11 - ensure that executable has not been modified since the time it's been signed by publisher
12 \n 12 \n
13 Those 2 are enough to ensure it's not a malware, and if it is means certificate been stolen/publisher went rogue and certificate can be blocked. 13 Those 2 are enough to ensure it's not a malware, and if it is means certificate been stolen/publisher went rogue => certificate can be blocked/revoked.
14 Reduces malware spread by 99.99% 14 Reduces malware spread by 99.99%