hi,
Today, we reveal even more serious problem of the Windows desktop security products that can be exploited to bypass a big portion of security features implemented by the affected products. The protection implemented by kernel mode drivers of today’s security products can be bypassed effectively by a code running on an unprivileged user account. If you ever heard of SSDT hooks or similar techniques to implement various security features such as products’ self-defense.
go here http://www.matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php
thanks…