{"id":1339,"date":"2004-10-21T00:00:00","date_gmt":"2004-10-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/21\/exe-vaccine-neutralizes-untrusted-executables\/"},"modified":"2021-12-30T11:39:11","modified_gmt":"2021-12-30T11:39:11","slug":"exe-vaccine-neutralizes-untrusted-executables","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/21\/exe-vaccine-neutralizes-untrusted-executables\/","title":{"rendered":"Exe Vaccine neutralizes untrusted executables"},"content":{"rendered":"<p>Horizon DataSys announced on Wednesday the availability of Exe Vaccine, a filter that stops users from installing untrusted executables in real time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The product takes aim at keyloggers, spyware and other malware that may be transparently installed while an unsuspecting user is downloading files.<\/p>\n<p>Designed to run as a companion to the company&#8217;s Drive Vaccine product, Exe Vaccine is particularly useful for public-access environment computers such as those in schools, libraries, and public areas, Horizon Datasys said.  Exe Vaccine is a monolithic kernel-mode driver that scans the system to detect all current executable files and places them on a write-protected list of allowed executables.<\/p>\n<p>The Exe Vaccine control panel applet offers password access so that users cannot see the whitelist.  There is no need for updates or definition files to keep the product current.  The administrator can interrupt filtering from a control panel in order to install new software.<\/p>\n<p>Once Exe Vaccine is installed and configured, it can be remotely installed on other computers in the network.  It is compatible with Windows NT, 2000 and XP and with all anti-virus applications.  The current version of Exe Vaccine is free to all users and comes with purchases of Drive Vaccine.<\/p>\n<p>If Exe Vaccine is used separately, software support must be purchased to receive updated versions.<\/p>\n<p>http:\/\/news.zdnet.com\/2110-1009_22-5420891.html?part=rss&#038;tag=feed&#038;subj=zdnet<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1339","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1339"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1339\/revisions"}],"predecessor-version":[{"id":3826,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1339\/revisions\/3826"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}