Featured Post

Consumer Electronics for the 21st Century

There can be no doubt that one of the defining characteristics of the 21st century is the seemingly insatiable thirst for more and more advanced technology. Consumers are willing to wait on long lines for endless hours for the privilege of spending hundreds of dollars on the latest iPad, iPhone or other...

Read More

Robust Mobile Cash

The gastro-Funkkassensytem PosBill mobile Pro offers an unbeatable price / performance ratio the handy wireless funds offer an intuitive control concept and high reliability by the IP degree of protection IP65. With the new mobile office including POS software, each employee carries the entire menu and...

Read More

Internet Explorer

Posted by Wii-Wii | Posted in General | Posted on 21-11-2015

Tags:

0

Such actions trying to deceive the firewall leak tests, hoping that one would think that with connect a legal application, and, consequently, to allow such action. One of the first well-known leak tests was a product of Steve Gibson of grc under the simple name? Leak Test '. This program simulate attacks, in which the pernicious application renames itself into Internet Explorer, try to enter the network and identify, notice whether the firewall is installed such substitution. Since then much has changed, and today likstesty much stronger and harder than their progenitors, they use much more sophisticated techniques of inspection programs. These techniques, unfortunately, are also used by the authors of malicious programs, such as keystroke loggers, to capture the target user's data. Leak tests verify the ability of preventive protection, testing, as a security solution react to a specific technique of invasion, sometimes called "Vector of attack." This is different from the tests at catching viruses, where the test is the ability of anti-virus solutions to identify a specific signature code.

Techniques included in the arsenal liktestovLiktesty too diverse to give them a common classification according to their actions, they use different techniques to test the ability of protective programs. Their actions are constantly growing and improving, and as Typically, the more leak tests exist, the better – more complete security solution to be tested. In summary, it should be noted that the leak tests based on one or more methods of testing, the following: – attempts to counterfeit the name of a trusted application, located on the computer.

Comments are closed.