Security without AV Software
Results 1 to 4 of 4

Thread: Security without AV Software

  1. #1
    T̙͓̞̣̯ͦͭͅͅȂͧͭͧ̏̈͏̖̖Z̿ ͆̎̄
    Join Date
    Dec 2004
    Posts
    3,171

    Security without AV Software

    Researchers at IBM's (Profile, Products, Articles) Almaden Labs have developed a way to keep those nasty worms and viruses from running on computers, without the use of antivirus software.

    The project is the brainchild of researcher Amit Singh, who has been working for several years on techniques to simplify PCs. Two years ago, Singh could see that computers were being choked by the growing amount of security and management software they were using, and he and fellow researchers Anurag Sharma and Steve Welch set about developing software that would make PCs more easy to use.

    The solution? A research project called the Assured Execution Environment, (AXE) which takes a very strict approach to controlling what is run on the computer.

    Thanks to a patented IBM (Profile, Products, Articles) technique, AXE loads special "AXE runtime," software into the central part of the operating system, called the kernel, every time the PC is booted up. It then polices every piece of software that is run on the machine, making sure that only authorized code gets used.

    Unlike antivirus software, AXE doesn't do this by policing for dangerous software. It simply prohibits any code from running unless it has been pre-configured into a special AXE-friendly format, something the IBM researchers say they can make it virtually impossible for spyware and virus writers to do.

    "We are making every machine a unique OS," said Singh, who added that, at present, AXE works with both the Windows and Mac OS operating system kernels.

    Users or administrators could use a variety of techniques, including encryption, to ensure that unauthorized software could not be run without their permission. They could also use AXE to make sure that certain programs were only run on specific machines, or even use AXE techniques to make data unreadable, to keep Word or PowerPoint documents away from prying eyes.

    The AXE developers say that because some users may not want to have every piece of software they run on their machine "blessed" by a central IT administrator, they've built some flexibility into the software's design. PCs can be configured to allow unknown software to run, but only when approved by the user, or they can set unknown software to run only in a virtual machine environment, where it can't do as much damage to the base operating system.

    This idea of creating a "whitelist" of authorized applications is going to be more widely adopted by security vendors, because the traditional antivirus technique of blocking known malware is simply becoming too unwieldy, said Yankee Group Senior Analyst Andrew Jaquith. "Whitelists are probably the way to go in the future," he said.

    Other companies, such as SecureWave and Bit9, have taken a similar approach to security, he said.

    The downside of whitelists, however, is that they can create a management headache because administrators have to get involved every time any software is updated. "If Microsoft (Profile, Products, Articles) sends out a hotfix, you're probably going to have to re-register those applications," he said. "The real question is not whether the technology works, but whether it's manageable."

    IBM should have a better understanding of how manageable AXE really is by next year. That's when Welch, the project's manager, hopes to have the software in the hands of an early pilot customer.

    Users who "really never wanted the openness and complexity of the operating environment that they're running," would benefit most from the AXE security model, he said. Point-of-sale computers or stock-trading machines would be ideal pilot projects, according to Welch.

    Whether AXE will ever become part of a shipping product is unknown, but Welch has some experience turning R&D technologies into IBM brands. He was on the team that developed a lot of the ThinkVantage system management technologies that IBM eventually brought to market.
    http://www.infoworld.com/article/05/...Nibmaxe_1.html
    IBM researchers take AXE to computer security | InfoWorld | News | 2005-10-28 | By Robert McMillan, IDG News Service

  2. #2
    Senior Member
    Join Date
    Oct 2003
    Posts
    394
    hmm.. "White list" those features are not for normal home users.

    Intresting....

    I googled few links for this or something may be like this
    http://www.wholesecurity.com/documen...s_Brochure.pdf
    http://www.secureworks.com/techResou...anagement.html

    //#::<!--'("like spy(protector) monitoring and blocking, total control")'-->
    // too far away outside of limit

  3. #3
    Banned
    Join Date
    Nov 2003
    Posts
    1,161
    I don't use AV, or a firewall for that matter on NT. I guess you could say I balling on "r00t" playboy. I don't want that stupid crap running on my machines. As far as I'm concerned they'd be the viruses eating up my resources. If you incombine, I'll let the TFM deal with you.

  4. #4
    Senior Member
    Join Date
    Oct 2003
    Posts
    394
    I running linux+firefox+not_as"root" and traing to feel me safe.....

    knowlenge is also some kind of protection...
    if "knowlenge" is an animal and "internet" is field so "information" is what "knowledge" eating. So it is depends on how good "stomach" "knowledge" have....
    // too far away outside of limit

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •