Subscribe to this list via RSS Blog posts tagged in Bypassing Comodo internet security

Bypassing Comodo Internet Security

Posted by on in Reverse Engineering
This post discusses the issues that arise from the reliance on user-mode control flow monitoring techniques for the implementation of systems such as Host Based Intrusion Detection Systems, Sandboxes, Function Tracers, etc. It focuses on a single HIPS product offered by Comodo [1], a well respected ...
Last modified on Continue reading
Hits: 3121 Comments
Rate this blog entry:
0

Silensec Cyprus HQ

Silensec Africa

Feel free to contact us if you have any problems.

Silensec UK

Feel free to contact us if you have any problems.