![]() ![]() Remedium uses to much memory and my Linux box is swapping to disk, so I stopped it.It indexes files on lots of 500 so you only allowed it to process two cycles. For example, if a kernel32.dll file is modified by a malicious process, we should be able of detecting that no similar file from Microsoft existed before and that this be treated as a suspicious event (more details on this algorithm will be explained later). The idea is to assign a score on files that are considered of trust or not.Īfter enough information is gathered, we can run metrics on the collected information. In the future, it is intended that this information can be merged with the information from other workstations on a given network. The indexing of files allows to create a database of files that are found on your machine. If some problem is output on the log, please do let me know on this topic. On this test you should be able of completing the index process. When launching from command line you get access to the log messages, please use the command line when testing remedium. ![]() ![]() For other operative systems you should launch the executable from command line using "java -jar remedium.exe". exe file that can be run directly from explorer. Remedium works across Windows, Linux (tested in Ubuntu) and MacOSX. Immunize USB flash drives when inserted in the computerīelow is a screenshot of remedium in action. This is the initial beta, at this moment you can only see two demonstrations of the sentinel application in place: If you have some time to help with feedback, I would be deeply grateful. This platform hosts different applications that expose and prevent malicious activities. I am working on a security platform called "remedium" and would like to share it with the community at reboot. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |