© 2017 by Asterion DB Inc.

  • Grey Twitter Icon
  • Grey Facebook Icon

May 18, 2017

September 23, 2016

Please reload

Recent Posts

DB Streamer: New Patent Granted!

August 26, 2017

Please reload

Featured Posts


July 9, 2015

How is it that there are so many hacks and intrusions into computer systems? The reason is that hackers have a powerful weapon for these attacks -- 'Malware'. The term refers to all kinds of hostile software such as viruses, worms, trojan horses and spyware among others. In many cases, the malevolent code enters the system disguised as, or embedded in, non-malicious files such as PDFs.  Database Plugins has a new strategy to blunt these attacks.


While their mode of entry varies, most malware exploits the same vulnerability, the file system. The standard file system provides an environment that allows malware code to navigate, conceal and then propagate its attacks on a system or network. Database Plugins' architecture, by storing files and logic inside a database, is way “outside the box” and unknown to malware toting coders. There is no standard file system to exploit and there’s no deep layer in a file system for the bad code to hide. Typically, the unauthorized code finds a home in a predetermined location in a user's file tree.  Professional "malware detectives" advise looking in these places for culprits: Application Data, Local, Roaming, Temp directories, temporary internet cache directories, file download locations,  and even the root level of system drives or program file directories. If malware is activated from within the Database Plugins' framework, on the other hand, it will search for a file system in order to hide itself..and come up short. The malware attack is stopped in its tracks. Furthermore, when the malware tries to access a "file system," Database Plugins can alert the system administrator of unauthorized queries and point the way to the offending code.

In addition to hardening a system with enhanced and powerful database tools, Database Plugins also helps existing systems in a less obvious way by “diversifying”  the operating environment to blunt any one kind of attack on an entire network.  Avoiding “homogeneity” so that all computers in a network don’t run the same operating system can avoid the possibility that one worm could exploit them all.  System diversity, on the other hand, deters the potential total shutdown of a network,

Malware, embedded in files, designed to exploit a file system, is involved in nearly every major data breach and is a growing problem for corporations, government and the public at large. Database Plugins is a new and powerful weapon for the good guys!

Share on Facebook
Share on Twitter
Please reload

Follow Us

I'm busy working on my blog posts. Watch this space!

Please reload

Search By Tags
Please reload

  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square