In the last entry of Security Through Process Isolation – Part 3, I covered more of the details in the area of Copy on Write processing of files and directories as well as some of the aspects of handling file modifications such as delete and rename processing. In this entry, I’ll dive into the details… Continue Reading …
Security Through Process Isolation Part 3
In Part 2 of Security Through Process Isolation, I started to dive into the file system isolation aspects of Process Isolation. In this post, I’ll dig a little deeper covering some of the details in implementing items such as How to process Copy on Write (CoW) for files and directories How to merge directory views… Continue Reading …
Security Through Process Isolation Part 2
In the last entry I started to outline the high level components of implementing a Process Isolation framework. In this entry, I’ll dive a little deeper into the file system aspects of Process Isolation including: Processing file opens … or creates, or overwrites, or supersedes How to handle deleted files But first let’s talk a little about… Continue Reading …
Security Through Process Isolation
Security through Process Isolation … What does it mean? Over the next few months, I’ll be posting several entries on Process Isolation covering the various aspects of what is required, the problems you will encounter and how to get around them … mostly. In this first post, I’ll cover some of the main sub-systems needed… Continue Reading …
Kernel Drivers Addresses BadUSB Exploit
With the advent of the newly discovered BadUSB exploit which can reprogram your USB thumb drive to take over your system, Kernel Drivers has come up with a solution to protect against this attack. While it won’t protect your thumb drives from becoming infected, it will recognize suspicious USB devices and either notify the user… Continue Reading …