This is just a link to their front page. Is it suppose to explain. I’ve seen corporate laptops which do not allow a boot from a USB stick so you are lucky. Don’t give this idea to your admins.
It sounds too simple for AV companies, like Kaspersky et al, to only rely on a hash to ID malware. In about 15 seconds I can change the hash for any file. I did an experiment with tor.exe and changed Tor to ToR in some message. Below are the before and after SHA256 hashes.
Size: 8972800 bytes (8762 KiB)
SHA256: c3b431779278278cda8d2bf5de5d4da38025717630bfeae1a82c927d0703cd28
Size: 8972800 bytes (8762 KiB)
SHA256: d17954e78c9256eda7138500bab275c6657f33bac7b058f45b2fec48a8dee71c
If a new tor.exe comes out and is seen for the first time anywhere it will be unknown to any AV. Does this make it safe? OR a known malware has one bit changed in a message, like I did, does it now fool the AVs.
Too easy.
I remember a post in 2022 about Norton 360
It clearly only complained when executed and not the hash.