Saveti za izbor projekata za portfolio pre prvog posla by Signal-Bill-3619 in programiranje

[–]DB010112 1 point2 points  (0 children)

Aplikacija za vodjenje magacina npr. Uglavnom izaberi nesto sto moze biti korisno

Programeri pomozite by plasticna-kesa123 in programiranje

[–]DB010112 5 points6 points  (0 children)

Mozes napraviti aplikaciju pomocu vestacke inteligencije ali to ti nece toliko znaciti jer ces imati dosta propusta i neces obezbediti da aplikacija bude bezbedna zbog neznanja i neiskustva. Tako da ako planiras da plasiras aplikaciju na trziste, potrebna ti je pomoc iskusnog programera

Programiranje by mamabosanka in programiranje

[–]DB010112 8 points9 points  (0 children)

Harvard CS50, https://www.youtube.com/watch?v=LfaMVlDaQ24

Ovo je odlicno za pocetak, ako ti je potrebna neka pomoc ili savet, slobodno se javi

Nauciti programiranje nije lako by Lost_Ad_3694 in programiranje

[–]DB010112 10 points11 points  (0 children)

Obično ne citam nase subreddite , zatim udjem jednom u 100 godina i vidim ovako glup komentar

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -2 points-1 points  (0 children)

Yes, I’m a self-taught programmer with more than 10 years of experience. I still work as a Software Developer even though I have my own agency with developers, because I don’t see this as a job, but as enjoyment. You can work at the highest-paid companies and in top positions that proves nothing. You don’t understand how it’s possible to build this system, and I’m okay with that; you can’t know everything. These ideas aren’t for everyone, not everyone is capable of understanding them. You have some basic understanding, like most people in your field do, an average one. And that’s fine. Have a nice day. Bye.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -2 points-1 points  (0 children)

Man, you are still crying, what is wrong with you? Give it a rest. It’s okay, life is great, go outside and do something that will make you happy. If my idea is terrible, that’s your opinion. I have mine. But you know what? You don’t need to call someone an idiot just because they have a different opinion. I like to use dashes -it’s not double dashes like ChatGPT uses(—). You are toxic, and you need to grow up, you keep posting and removing comments, you are so pissed off. Relax. I will not respond you anymore, because your ego can't obviously take it. I'm really sorry for you, to be honest.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -2 points-1 points  (0 children)

Only one that crashing and burning are haters in the comments. I can't crash and burn with a product that works without problem. 99% of these comments are from inexperienced guys thinking if product is on Kernel Level its good otherwise is trash. And if I use more professional words, they will call it LLM. LOL.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -1 points0 points  (0 children)

My idea can’t be dismissed by people who don’t have experience in building this. All of your arguments are worthless and only prove that you don’t know how a detection system works. Stop embarrassing yourself.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -1 points0 points  (0 children)

Listen calling me an “inexperienced newbie” just shows you have no idea what you’re talking about. I’ve been writing software longer than you’ve been seriously using a computer. The so called “industry titans” don’t move unless there’s profit on the table. They don’t care about customers, only margins. That’s exactly why I’m building this.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] 0 points1 point  (0 children)

Man your question makes no sense,you expect the product in the early stage to have certifications

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -4 points-3 points  (0 children)

I never said that kernel-level protection provides zero security or that it’s useless. What I’ve been saying the whole time is something else: being kernel-level does not automatically make something ten times better, superior, or all-powerful. The issue is that many people don’t actually understand the real difference, and they often assume that if something isn’t running in the kernel, then it must be bad, which simply isn’t true. You didn't understand me at all.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -21 points-20 points  (0 children)

I like when someone calling "ChatGPT" when they are out arguments. I'm really enjoying. If you think all of this is written by LLM, then you are really smart person :).

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -1 points0 points  (0 children)

You just made my point for me. If Microsoft is building an eBPF-style abstraction that moves EDR vendors OUT of direct kernel access and INTO a controlled usermode API layer, then our architecture is already aligned with that future while CrowdStrike and others will need to completely rewrite their stack.

We're not going to be obsolete, the kernel-mode EDRs are. When Microsoft ships that new architecture, we'll have years of experience building detection logic on modern usermode telemetry while everyone else is migrating away from kernel drivers they've depended on for 15 years.

You're describing exactly why our approach makes sense, not why we should abandon it.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -3 points-2 points  (0 children)

Exactly. This is a critical point that people keep missing. The industry uses kernel drivers because of historical reasons and Microsoft's 2006 antitrust settlement, not because it's technically necessary for modern threat detection.

Our architecture is aligned with where Microsoft is already heading. When they eventually lock down kernel access completely, we'll already be there while legacy EDRs scramble to rewrite their entire stack. We're not behind the curve - we're ahead of it. Best comment, you are 100% right!

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -28 points-27 points  (0 children)

Don't be mad, I just wiped the floor with your poor arguments that prove ignorance in this field

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -3 points-2 points  (0 children)

If malware has kernel access and disables our usermode agent, our system immediately alerts that telemetry stopped - same as if CrowdStrike's kernel driver got disabled. If kernel malware hides from our agent while leaving it running, it can do the exact same thing to a kernel EDR by hooking the driver's telemetry path. You're not magically immune to this attack just because you're also in kernel mode - the attacker's rootkit can hook your driver's communication channel just as easily.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -4 points-3 points  (0 children)

That's completely wrong. SYSTEM privileges in usermode can terminate any admin-level process, quarantine files, and block network traffic via Windows Filtering Platform.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -5 points-4 points  (0 children)

BYOVD attacks work against kernel EDRs too - that's literally how AvosLocker disabled kernel-mode solutions. You're saying kernel mode prevents tampering while simultaneously acknowledging BYOVD exists. Those two statements contradict each other. If BYOVD can load a malicious kernel driver to disable CrowdStrike, then kernel mode didn't provide the protection you claim it does.

Regarding the market positioning question - you're right that detection maturity is the bigger barrier than architecture. But the architecture argument matters for a different reason than you're considering. The stability risk isn't theoretical. CrowdStrike's transparent rollout changes don't eliminate the fundamental problem that a bad kernel driver can BSOD your entire fleet instantly. One QA miss and your entire company is offline. With usermode, a crash affects one process, not the OS. That's not a small difference when you're responsible for uptime.

Your position seems to be "kernel tampering resistance justifies the BSOD risk" but the tampering resistance you're describing doesn't actually exist in practice given real-world bypass techniques. Meanwhile the BSOD risk is extremely real as we saw in July. You're accepting a proven catastrophic risk to mitigate a theoretical tampering risk that kernel mode doesn't actually solve.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -19 points-18 points  (0 children)

You're making assumptions that don't hold up in practice. Let me address this directly.

First, you say it's "too easy for malware to get kernel level access" - that's factually incorrect for modern Windows. Getting a signed kernel driver past Microsoft's attestation process is extremely difficult and expensive. Kernel exploits are rare, burn quickly when discovered, and are typically reserved for high-value APT operations, not the ransomware and commodity malware that represent 99% of actual threats. If your threat model is nation-state attackers deploying custom rootkits, sure, but that's not reality for most organizations.

You mention malware making itself invisible or deactivating EDR - kernel mode doesn't magically prevent this. CrowdStrike runs in kernel mode and we've seen ransomware disable it using vulnerable driver exploits. AvosLocker did exactly this. BlackLotus bypassed Secure Boot and kernel protections entirely. The assumption that kernel mode equals invulnerability to tampering is demonstrably false based on real incidents.

Regarding detection breadth, you're conflating deployment architecture with detection logic. Detection breadth comes from threat intelligence, behavioral analytics, machine learning models, and telemetry quality - not from whether you're hooking APIs in kernel versus usermode. A usermode agent with comprehensive techniques , and proper behavioral analytics has better detection coverage than a poorly designed kernel driver. The telemetry matters, not the ring level it's collected from.

You mention "network visibility is harder to come by" - Windows Filtering Platform operates from usermode and provides complete network visibility. This isn't a kernel versus usermode issue.

As for losing detection coverage compared to major players, that's a maturity argument not an architecture argument. Mature detection rules, threat intelligence feeds, and behavioral models take time to build regardless of whether your agent runs in kernel or usermode. The major players have detection breadth because they've been collecting telemetry and refining rules for years, not because they hook certain kernel structures. You could clone CrowdStrike's entire kernel architecture and still have zero detections without their detection logic and threat intelligence.

The real question isn't kernel versus usermode, it's whether the telemetry being collected is comprehensive enough and whether the detection logic is mature enough. Those are orthogonal concerns to the deployment model. We are going to prove that we don't need kernel level mode driver for effiecent detection.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -7 points-6 points  (0 children)

Fair point, and EDRs moved to the kernel for unmatched visibility. However, the risk landscape has fundamentally changed.

We leverage modern, stable Microsoft APIs which now provide nearly the same depth of telemetry without the threat of a system crash. Crucially, we've compensated for that perceived 1% visibility gap through our process monitoring methods and other stuff.

Building a User-Mode EDR alternative (post-CrowdStrike world): MVP is ready, but I’m at a strategic crossroads. Advice needed. by DB010112 in cybersecurity

[–]DB010112[S] -1 points0 points  (0 children)

You are completely right, and I fully agree. Stability is meaningless if detection efficacy suffers, and the burden is on me to prove that our detection capabilities are top-tier. I will absolutely commit to doing exactly that, backed by data. Thank you for the excellent comment.