First of all, malware can easily detect the presence of debugger with various tricks.
Another fundamental problem is that because malware run in the same security domain with debugger, they can potentially tamper with the debugger, and prevent it from functioning correctly.
The most important tool for dynamic malware analysis is debugger.
However, because debuggers are originally built by software developers to debug legitimate software, they have some significant flaws against malware.
And because they don't know what the hell they're talking about -- 'fake it till ya make it' doesn't work -- they're making all of us look stupid.
Let's sit down for a little fireside chat and discuss all things SCADA and ICS with an eye towards increasing our knowledge to the point where we can confidently say: "I'm not an expert at everything, I can help some, may we work together on a solution?
The global telephone network is often an opaque and muddy environment where many false assumptions of privacy are made by its users.
Providers do their best to compartmentalize as much privacy-centric data as possible.
Many of these features can be used to enhance the security of third party applications, but not many developers or software architects know about them.
This talk will detail some of the technical underpinnings of Windows features like UAC, IE protected mode and Terminal Serivces and show how they can be used to defend your own software from attack.
" It's time to stop being a Cyber Douche and start being a positive contributor.
Learn some truth, look behind the curtain, bust some FUD, Oh - and make government agents have kittens. Microsoft has implemented lots of useful functionality in Windows that they use in their own products.
However, information must be shared for the sake of network interoperability.