Dustin Cook wrote:
> "Jenn"<nope@nowayatno.howanyday> wrote in
> news:iv8bdg$41n$1@dont-email.me:
>
>> Dustin wrote:
>>> "Jenn"<nope@nowayatno.howanyday> wrote in
>>> news:iv5ig4$9qd$1@dont-email.me:
>>>
>>>> ... just curious .. who's the 3rd party independent analysis done
>>>> by?

>>
>>
>>> I'm not going to play semantics. What I said stands.

>>
>> You said it .. I was just asking who you were talking about...
>> don't you know?

>
> Yep. I know. Jenn, the Malwarebytes software is routinely tested by virus
> scanners when people submit the executable; Like you did with David
> Lipmans program. That is independent, 3rd party. [g] A clean bill of
> health is always provided.



That answer is inadequate and does not answer the original question.

<q/p>

Rootkit detection is difficult because a rootkit may be able to subvert
the software that is intended to find it. Detection methods include
using an alternate, trusted operating system; behavioral-based methods;
signature scanning; difference scanning; and memory dump analysis.
Removal can be complicated or practically impossible, especially in
cases where the rootkit resides in the kernel; reinstallation of the
operating system may be the only alternative.

<q>

http://en.wikipedia.org/wiki/Rootkit

Do you dispute this, Dustin?

So, I repeat my question. Which independent body has actually checked
the software in the manner I suggested earlier? i.e. Downloaded the
software onto a known clean computer and then forensically examined said
machine.