<% Option Explicit %> <% Dim strPageTitle, strPageHeaderImg, strPageNavInclude strPageTitle = "pivx_ security research" strPageHeaderImg = "head_security.gif" strPageNavInclude = "security.asp" %>
Threat Samples

Many of the fixes and methods preEmpt 2.0 uses for protecting your Windows system against threats is a technique known as "System Hardening". System Hardening includes a "best practices" approach to changing key Windows settings to ensure it is operating in the most secure mode possible. System Hardening also deploys security fixes which block and report actual attacks on your system.

preEmpt 2.0 is very effective at blocking dangerous worm and exploits on your system. Other security products such as Antivirus and Spyware removal programs generally treat the symptoms of the security attack, but preEmpt blocks them at the core of Windows.

To help you see the impact that desktop intrusion prevention can have on your system, we have posted a couple of exploits on this page for you to test your system against. These exploits are "safe". We have cleaned them up from their original dangerous payloads and have put them in a state where you can test to see if your current security programs can protect against these exploits. These examples are just a few of the hundreds of "System Hardening" fixes PreEmpt provides to validate and protect your systems.

The following tests will allow you to identify if the security software installed on your system protects against this sample threat. When you run the test you'll either see your security program display a protection message or nothing will happen on your screen. If no protection message is displayed then it is likely you are vulnerable to this threat. Loading preEmpt 2.0 on your system WILL protect you against the tested threat and all of the variants associated with that threat.

   
Please read each exploit test description carefully before beginning any tests.

Vulnerability Description  
LoadImage Computers running Windows XP are vulnerable to a remote integer overflow known as the load image vulnerability. This issue is due to a failure of Microsoft windows operating systems to properly ensure that malformed images do not result in the overflowing of set values.
Please run both of the tests to ensure that you are fully protected.
Launch Test