RasheedHolland:
Use SpyShelterās powerful āRulesā system to see how the executables on your PC are behaving, then block problematic behavior. For example, executables injecting into other executables , or unexpected changes to sensitive parts of the Windows Registry, and much more. You can even make rules based on publisher, for example you could allow all executable activity from Mozilla, or another publisher you trust.
This was changed/removed. Thanks for reporting the issue so we could get it corrected!
SpyShelterCarl:
No, I think it only checks the first time SpyShelter runs.
Why did we develop such a feature?
Well, in our Activity list we found it frustrating to see the list of executables and if one had weird behavior weād have to paste the hash to VT, so instead we made our own system (not VT) so we could easily glance and see if something was marked as āsafeā by our own system, or notā¦
OK cool, so it only checks files once. And itās basically a second opinion if I understand correctly.
BTW, make sure to check this stuff out about code injection. Itās of course in certain cases a bit hard to protect against all types of code injection, but itās not impossible to implement detection, without causing many false positives.
RasheedHolland:
OK cool, so it only checks files once. And itās basically a second opinion if I understand correctly.
BTW, make sure to check this stuff out about code injection. Itās of course in certain cases a bit hard to protect against all types of code injection, but itās not impossible to implement detection, without causing many false positives.
Our team will review this. Thanks for sharing this information so we can improve!
I think we do check the hashes on every launch, not just once. I will double check with our team.