| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Bad developers whine over Windows kernel security |
From: black.hole.4.spam{at}gmail.com (Don Hills)
In article , "Rich" wrote:
>> "Geo" wrote in message
news:44cd150c$1{at}w3.nls.net...
>> What trojans or malware are known to modify the kernel or other kernel =
>>mode components?
>
> I don't know names but I would suspect all rootkits plus more.
>Beyond that some bad software does, apparently including the crap sold
>by the company the sales and marketing guy shills for.
Rich, you said:
> "Rich" wrote in message news:44cac451$1{at}w3.nls.net...
> ... The protection present in x64 systems protects against trojans
>and other bad code that attempt to modify the kernel or other kernel
>mode components. Well behaved code that calls system APIs is not
>affected in any way.
Does this mean that the "protection code" is sufficient to
prevent malicious code from installing itself within "the kernel or
other kernel mode components"? If not, can "well behaved code
that calls system APIs" detect and remove the malicious code?
--
Don Hills (dmhills at attglobaldotnet) Wellington, New Zealand
"New interface closely resembles Presentation Manager,
preparing you for the wonders of OS/2!"
-- Advertisement on the box for Microsoft Windows 2.11 for 286
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.