Thank You in advance!!
cutting_edgetech
Best answer by Kit
View originalBest answer by Kit
View original@cuttingedgetech wrote:Emphasis above is mine.
Thank You Wkit! My appoligies for taking up your time for QA! I'm well aware that a threat can cause no damage until it is run in the memory or written to the disk. I understand the protocols I mentioned above are only entry points to transport data to the system.. Its my own belief that when possible the threat should always be blocked before it has a chance to run in the memory or be written to the disk. I also understand that the method used by WSA has been designed to have the least amount of overhead on system performance, and to achieve compatibility with other AV's. So I believe what you have informed me is that executable are only checked upon execution, and if they exhibit malicious behavior then they are blocked from executing. The threat is then deleted or quarantined depending on the user''s configuration. I thought this was the way in which WSA operated, but I wanted to make sure I understood correctly. If i'm misunderstanding then just point out my misconceptions in another post, but I believe you have answered my questions for the most part. I would like to learn more about identity shield though.
Thank You,
cuttingedgetech
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.