NoVirusThanks Smart Object Blocker Review: Is It Worth Installing?

NoVirusThanks Smart Object Blocker — Complete Protection for Unsafe Objects

NoVirusThanks Smart Object Blocker is a lightweight, rule‑based Windows security tool that prevents execution or loading of suspicious processes, DLLs and drivers at a low (kernel) level without relying on signature updates. Key points:

How it protects

  • Rule engine: Blocks objects by name, path, hash, publisher, file description, version, timestamps and more.
  • Command‑line filtering: Blocks specific command‑line patterns (e.g., destructive vssadmin commands) while allowing legitimate uses.
  • Parent/process context: Can block objects launched by specific parent processes (stop exploits launched via PDF readers, Office, etc.).
  • Lockdown (whitelist) and blacklist modes: Choose strict whitelisting that blocks everything except allowed processes, or selective blocking of specific items.
  • Kernel‑level monitoring: Observes process, DLL and driver loading to stop injections, unauthorized drivers and many common exploit techniques.

Notable rules/examples

  • Block vssadmin deleting shadow copies:

    Code

    [%PROCESSCMDLINE%:vssadmin*DeleteShadows/All/Quiet]
  • Block REGEDIT when importing .reg files:

    Code

    [%PROCESSCMDLINE%: regedit.reg*]
  • Block anything launched by Adobe Reader:

    Code

    [%PARENTPROCESS%: *\AcroRd32.exe]

Strengths

  • No signatures needed — effective against novel/silent exploit techniques.
  • Highly configurable for advanced control (power users, system admins).
  • Small footprint; integrates with existing AV solutions.

Limitations & cautions

  • Rule creation/editing is manual (text files); misconfiguration can break legitimate functionality.
  • Requires care with Lockdown mode — whitelist must be comprehensive.
  • Not a full antivirus replacement; best used as a complementary mitigation layer.

Compatibility & distribution

  • Windows (supports older versions through modern Windows; check vendor site for current builds).
  • Freeware from NoVirusThanks; available for download from the vendor and reputable download sites.

If you want, I can:

  • generate a starter rule set for typical ransomware/office‑exploit protections, or
  • produce step‑by‑step instructions to create and test rules on a Windows ⁄11 system.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *