Site hosted by Angelfire.com: Build your free website today!

Home Up

Worm Guard
 

 

Home
Up
Downloads
News
Links
My Forum

 

From the creator:

DiamondCS WormGuard is the future of scanning. It is an advanced heuristic file analyzer that will protect your computer from accidental execution of a hostile script or malicious application - and specifically, worms. Being transparent, you won't even know WormGuard is there until the day comes when you run something that perhaps you shouldn't.
WormGuard acts as an anti-worm front-line system on your machine. It will generically and heuristically detect worms before they are allowed to execute, and is a vital component of any Microsoft Windows system.

When WormGuard is installed and you try to execute a file, the operating system will ask WormGuard if the file is ok to run. For the file to run, WormGuard must answer with "yes". There is no time limit for WormGuard to do this - the operating system will simply wait until WormGuard has responded with yes or no. This type of low-level hooking means that when a file is executed, WormGuard has the power to block the execution if the file is deemed hostile.
When a file is executed, WormGuard will be asked by the operating system to test the file. At this point, WormGuard must determine what sort of file is being asked to execute, in order to perform the appropriate tests. When the file type has been established, WormGuard will activate an internal subsystem which begins a serious of tests that are related to that file type.

WormGuard uses three core systems for the initial testing sequence, which are file type-specific tests.
- Advanced Script Analysis Engine (ASAE), used against .VBS, .JS, .HTA, .HTM/L, .WSH files. This engine will actually analyse the script source code to determine what it is capable of doing, and compile a human-readable report of it's findings.
- Macro Detection/Interpretation (MD/I)
Used to test all Macro-capable file types, such as .DOC, .MDB, .XLS and many others.

- Command File Interpretation (CFI), used to test .COM, .BAT, .PIF and .CMD files before the are passed to the DOS-subsystem for processing.
After the core testing is complete, global subsystems are activated to test the file at a deeper level.
- Global Macro Interpretator (GMI) - activated when a macro of any type is detected, to check for hostile code that is common across all macro formats.
- Advanced Deep Search & Interpretation (ADSI) Engine is capable of identifying IRC worms as being "probable" or "near-definite". It is capable of detecting some key-loggers, programs that automatically start on Windows load, password-stealers, and more.

- Filename test, to make sure the filename doesn't contain any excessive spaces or multiple extensions (common vulnerabilities that worms exploit to make files appear of a different nature).
The testing is usually complete in the blink of an eye.

Download Now (1,518 KB)

 

Send mail to SuffDogg@hotmail.com with questions or comments about this web site.
Last modified: 03/22/02