Pages:
Author

Topic: [ANN] LevelNet : The First Distributed Cyber Security Platform - page 34. (Read 48655 times)

full member
Activity: 334
Merit: 107
Easy peasy japanesey
sorry i have sent 2 applications for bounties (facebook and twitter compain)but you have not confirmed if you accept me or not


Have you checked the spreadsheets?

yes i find my accounts there that mean that you accept me?

i lost time waiting "ok" behind my acounts hhhhhhhh loool
so good i have shre posts an retweet coool
full member
Activity: 378
Merit: 100
Great to get a look at the team!
sr. member
Activity: 476
Merit: 251
COINECT
Hello everyone!

We have published today a new blog post about LevelNet ICO. Our Team.

Read more abut it on Medium: https://medium.com/@LevelNetwork/levelnet-ico-our-team-4fd3de4e2967


Wow, that's a huge team! Great to know so many people are working on this project!
no doubt I am sure many people will be interested in this ICO, and hopefully ICO success
member
Activity: 324
Merit: 10
Truth about ICO - ICOnow.net
LevelNet ICO listed on ICOnow.net


http://iconow.net/ico-549/
full member
Activity: 770
Merit: 101
fLibero.financial
Cyber security is a huge threat on the other side of the coin, it could a billion dollar market. I read about rivetz and many platform trying to find a solutions to issue of security online! What special advantage does your token has over others.
hero member
Activity: 1274
Merit: 646
Hello everyone!

We have published today a new blog post about LevelNet ICO. Our Team.

Read more abut it on Medium: https://medium.com/@LevelNetwork/levelnet-ico-our-team-4fd3de4e2967


Wow, that's a huge team! Great to know so many people are working on this project!
full member
Activity: 308
Merit: 100
LevelNet Official
Hello everyone!

We have published today a new blog post about LevelNet ICO. Our Team.

Read more abut it on Medium: https://medium.com/@LevelNetwork/levelnet-ico-our-team-4fd3de4e2967
hero member
Activity: 1274
Merit: 646
sorry i have sent 2 applications for bounties (facebook and twitter compain)but you have not confirmed if you accept me or not


Have you checked the spreadsheets?
full member
Activity: 334
Merit: 107
Easy peasy japanesey
sorry i have sent 2 applications for bounties (facebook and twitter compain)but you have not confirmed if you accept me or not
hero member
Activity: 1274
Merit: 646
https://www.youtube.com/watch?v=fDLfvA9EqNU

Looking very promising this. The more connected the greater and more powerful the product becomes.

Yeah, the demo looks great, and it looks like it's nearly instant that it updates the rest of the network to it being Malware/Virus.
full member
Activity: 378
Merit: 100
https://www.youtube.com/watch?v=fDLfvA9EqNU

Looking very promising this. The more connected the greater and more powerful the product becomes.
full member
Activity: 308
Merit: 100
LevelNet Official
We got a good question from the next branch.

And what if a user from an already infected device connects to the system?

Good question!

Functions will be available in the second version of LevelNet. the treatment of active infection is highly dependent on malware.
At the first stage of development, the main goal that faces LevelNet is a preventive measure, that is, Do not allow the device to be infected.

Option 1:
Your system is infected with malware with a function (kernel level rootkit / self-defense module). antivirus or our solutions removed malware objects
are installed by the malware protection module after uninstallation.

Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Our solution proposes to install an antivirus package of the company that can heal the device. It installs it in a silent mode then
initializes the function of treating infected objects or deleting them.

Option 2:
Your system is infected with a malicious program without a rootkit or a user-level rootkit.
Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Similar to option 1

Option 3 *: Your system is infected with a malicious program that is executed in memory, i.e. Does not have objects on the disk and it is launched through
shell code of exploit.
Solution: suspend and kill processes, reboot the device.

* In fact, this threat is not removed by any antivirus package and they are all silent about this fact, or they kill the process in which there is
malicious code. This is due to the fact that the projected code in memory is hard to update by signature.

did you have a working demo. it looks very promising

Now we are at the stage of a functional prototype. During the year we tested various functionalities using Google Cloud and MS Azure. We can make you a private demonstration, because. the product is not ready for scaling. Watch the video so we will show it to you: https://www.youtube.com/watch?v=fDLfvA9EqNU
When watching a video, imagine that each virtual machine is users in different parts of the world
member
Activity: 97
Merit: 10
We got a good question from the next branch.

And what if a user from an already infected device connects to the system?

Good question!

Functions will be available in the second version of LevelNet. the treatment of active infection is highly dependent on malware.
At the first stage of development, the main goal that faces LevelNet is a preventive measure, that is, Do not allow the device to be infected.

Option 1:
Your system is infected with malware with a function (kernel level rootkit / self-defense module). antivirus or our solutions removed malware objects
are installed by the malware protection module after uninstallation.

Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Our solution proposes to install an antivirus package of the company that can heal the device. It installs it in a silent mode then
initializes the function of treating infected objects or deleting them.

Option 2:
Your system is infected with a malicious program without a rootkit or a user-level rootkit.
Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Similar to option 1

Option 3 *: Your system is infected with a malicious program that is executed in memory, i.e. Does not have objects on the disk and it is launched through
shell code of exploit.
Solution: suspend and kill processes, reboot the device.

* In fact, this threat is not removed by any antivirus package and they are all silent about this fact, or they kill the process in which there is
malicious code. This is due to the fact that the projected code in memory is hard to update by signature.

did you have a working demo. it looks very promising
full member
Activity: 308
Merit: 100
LevelNet Official
We got a good question from the next branch.

And what if a user from an already infected device connects to the system?

Good question!

Functions will be available in the second version of LevelNet. the treatment of active infection is highly dependent on malware.
At the first stage of development, the main goal that faces LevelNet is a preventive measure, that is, Do not allow the device to be infected.

Option 1:
Your system is infected with malware with a function (kernel level rootkit / self-defense module). antivirus or our solutions removed malware objects
are installed by the malware protection module after uninstallation.

Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Our solution proposes to install an antivirus package of the company that can heal the device. It installs it in a silent mode then
initializes the function of treating infected objects or deleting them.

Option 2:
Your system is infected with a malicious program without a rootkit or a user-level rootkit.
Solution A: Our solution overloads the device in debug mode (before OS boot) and deletes objects.
Solution B: Similar to option 1

Option 3 *: Your system is infected with a malicious program that is executed in memory, i.e. Does not have objects on the disk and it is launched through
shell code of exploit.
Solution: suspend and kill processes, reboot the device.

* In fact, this threat is not removed by any antivirus package and they are all silent about this fact, or they kill the process in which there is
malicious code. This is due to the fact that the projected code in memory is hard to update by signature.
full member
Activity: 308
Merit: 100
LevelNet Official
Hello everyone!

We have published today a new blog post about LevelNet ICO. LevelNet`s legal structure.

Read more abut it on Medium: https://medium.com/@LevelNetwork/levelnet-s-legal-structure-8eca1ced84d6
full member
Activity: 308
Merit: 100
LevelNet Official
Maybe it is stupid question, but where i can create Levelnet personal account? Can't find on website, thanks.

We are updating the site this week. Registration will be available from October 15
full member
Activity: 490
Merit: 105
Maybe it is stupid question, but where i can create Levelnet personal account? Can't find on website, thanks.
hero member
Activity: 1274
Merit: 646
Let me ask a question
ever campaign started? What is the reward?
I no see the exchange address wallet

Hey, you can checkout the bounty information here: https://medium.com/@LevelNetwork/levelnet-bounty-campaign-afefc57009ff Rewards are stakes decided on the total amount of people that enter, and your forum rank.
full member
Activity: 294
Merit: 100
Let me ask a question
ever campaign started? What is the reward?
I no see the exchange address wallet
jr. member
Activity: 224
Merit: 1
Hello guys can I still join facebook bounty? Cant find link to register on bounty tread.

Hello! Yes of course, you can register here: https://medium.com/@LevelNetwork/levelnet-bounty-campaign-afefc57009ff
Pages:
Jump to: