Home | Blog | Software | Reviews and Features | Forum | Help | Donate | About us
topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • December 04, 2016, 04:23:40 AM
  • Proudly celebrating 10 years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Author Topic: ExploitShield  (Read 900 times)

Giampy

  • Participant
  • Joined in 2009
  • *
  • Posts: 428
    • View Profile
    • Read more about this member.
    • Donate to Member
ExploitShield
« on: October 16, 2012, 04:02:15 PM »
What do you think about this?
http://www.zerovulne...abilitylabs.com/home
"A refrigerator without beer is like a body without soul"

eleman

  • Spam Killer
  • Supporting Member
  • Joined in 2009
  • **
  • default avatar
  • Posts: 393
    • View Profile
    • Donate to Member
Re: ExploitShield
« Reply #1 on: October 16, 2012, 04:38:18 PM »
Legal scareware?

Curt

  • Supporting Member
  • Joined in 2006
  • **
  • Posts: 7,089
    • View Profile
    • Donate to Member
Re: ExploitShield
« Reply #2 on: October 16, 2012, 06:01:21 PM »
Quote from: ExploitShield
Current version: 0.7 beta
This beta 0.7 expires December 1, 2012. Check back to download a new version once expired.

I have no idea if it is a useful program or not, but the report from VirusTotal is fine:

click thumbnails to enlarge:


2012-10-17_005435.gifExploitShield


2012-10-17_005613.gifExploitShield


Quote
WHAT NOT TO TEST: ExploitShield blocks exploitation of vulnerabilities by shielding applications. We do not intend to replace the antivirus or security suite but rather to complement and enhance it. Therefore manually downloading and executing a PE file (EXE, DLL, etc.) is not a valid test as it is the job of the antivirus to detect malicious binaries. The only exception are maliciously crafted PDF/DOC/XLS/PPT/etc documents that do exploit vulnerabilities in the host application (Acrobat Reader, Microsoft Word, Excel, etc.) and which should be blocked by ExploitShield Corporate Edition upon execution.