Jump to content

Anti Virus Recommendations Needed


astral

Recommended Posts

My recommendation is iObit Security 360 (CNET download link).

Boy that was dumb.

I'm using McAfee now after iObit and Trend Micro and MS Security Essentials all failed to do what I was ostensibly paying them for. McAfee have 6 months free promotion for their main product on FB at the moment. No strings that I can see.

But McAfee have been shaky also of late, catching some trojans but letting some through to the keeper along with a non-negligible % of false positives. I'm thinking about going back to ESET but last time I used them, a whole stack of unauthorised Firewall exceptions occurred one day that kinda freaked me out.

I honestly don't think there is any product that is an 'effective' solution against the fairly advanced malware going around now; or maybe I'm just unlucky.

I also have a 'conspiracy' theory; that the anti-virus/malware/spyware/rootkit crowd....are the ones generating the viruses, malware, spyware and rootkits. If you think about it, it's almost a conspiracy theory to assume they aren't.

Link to comment
Share on other sites

My experience. been running McAfee from circa 1999 till 2010. Lisence paid on 4 machines. Then it allowed a virus (fakeav) to penetrate my system. Done.

WIN XP only

Installed AVAST. Very very happy with it. It has a feature that McAfee doesn't. Bootscan. Very useful feature. And AVAST is 100% free. Perfect.

btw. These miscreants that design viruses have figured out that the one folder that will not be scanned is C:Restore.

So to get a good scan you have to turn off RESTORE. MS is gonna squawk that you will lose all your restore points if you "disable it" Morons. Just turn restore off, run a full scan & then turn it back on.

Hope this helps someone. btw A good friend of mine refers to NORTON as "bloatware" Good description.

You can run McAfee stinger from the net to check a suspect machine. Agaun for free. I also use Ad-Aware free version which I like a lot.

Link to comment
Share on other sites

  • 4 weeks later...

if you are using window 7

install window security essential

and remove all antivirus

Then practices your user behavior

1 never click on advertisement that have a keyword FREE

2 Click here to download doesn't mean if you click you will get but it's mean if you click it you're <deleted>

3 Be clam if your computer not working reinstall the whole things is only 30 mins

4 importan stuff ..... Do you really need it? is it that importan ? i use to lose data for 2 TB ( you know what kinds of data lol ) after that i never have any problem anymore

ps that 2 TB data was not damage by virus but i drop it :(

Link to comment
Share on other sites

I'm using McAfee now after iObit and Trend Micro and MS Security Essentials all failed to do what I was ostensibly paying them for.

You paid for MSE ?

Genuine Advantage Windows 7 Ultimate, so yes I paid for it.

And I really PAID for it. When it was patched by the malware so easily, it would be laughable were it not so outrageous.

And everyone adores Malwarebytes. I've never understood why. I've always thought it was a piece of crap, that never detected anything. But everyone loves it like the Emperors New Clothes.

Well, I'm the kid who's calling out the Emperor as being a naked farce.

Here's some proof. Cute little silently deployed patch incoming. Not that it bothered me none, the perfectly functional and updated Malwarebytes was saying my systems were clear, as they have ALWAYS done, no matter how many viruses, malware, root-kits or hidden deployed code existed.

The only AV/M/R solution I give the time of day to, is RegRun. In all seriousness, that Russian coder is a genius. You really need the CD though, unless you can burn your own CD from a ISO downloaded and burned on a clean system. His anti-Stuxnet add-on found half my floppy discs were infected with that auto-play exploitability.

A6JDQ.png

And if you'll permit me one final dig at the jokes (arguably criminal, more provable than arguable) that are Microsoft....they've been releasing ActiveX patches for over a decade AFTER they claimed to have patched the vulnerability that should not even exist, and cannot be patched because silently deployed Active signed code, IS THE VULNERABILITY.

People have NO IDEA how many exploitabilities are pre-packaged as default, huge security holes sitting there active in almost every Windows OS installation. Something like 25% ? of the world's PCs are botnets now. This is all Microsoft's sheer greed and criminal incompetence. And now, hacker capabilities have increased exponentially with Active Directory. Thank you Microsoft! Well played. There's just no f justifiable reason for no-prompt install function - which is really what creates all the problems, SILENT unattended deployment. I don't care if you are a Systems Administrator of a 5000 endpoint network, there are solutions for deployment which do not give the hackers of the world all home user's PCs almost on a platter.

I'm tired, so will forget maybe 5 times as many as I can remember right now, but the smörgåsbord of attack vectors, which are SIMPLY UNNECESSARY for home users not running Virtual Drives, not deploying system images, remotely, silently or otherwise...who have no real use for Junction points, or sneaky subtle "library" dynamic links or hardlinks (your little Libraries in Vista are not as innocent or as frustratingly recursive as they may seem - they're far more dangerous), home users who couldn't possibly ever want to upload recovery files from hidden / virtual partitions and offline registry hives, or trigger entire OS deployments with code which is located in a hidden (virtual?) partition, all remotely. ENCRYPTED. Just a few kb of code stored innocuously in some all-but-undetectable, encrypted, secretive virtual partition. Heck it doesn't even need to be on your hard drive. Everything is going SATA now. I think it's ridiculous.

Microsoft patches for the IDIOTIC vulnerability which is Active signed content, have been released going as far back as 1999. This should give you a clue about how moronic these people really are. It's quite literally criminal, it's staggering.

http://www.microsoft..../ms00-042.mspx

Why is Microsoft-signed content trusted by default?

By design, Microsoft-signed files are trusted by default. At first blush, this would seem appropriate - after all, the user has chosen to install a Microsoft product, so they've already made the decision to trust the content that Microsoft provides.

The security problem this raises is that there's nothing to prevent other people from hosting Microsoft-signed files (after all, Microsoft-signed files are freely available from various pages on the Microsoft web site) and using them inappropriately.

Yes, Microsoft. The person asking the question would already know that - which is why they asked the QUESTION YOU DID NOT ANSWER.

Secondly, I mean...what. How can these people be walking free? Trusting someone in 1999, doesn't mean you trust them for...ever? No one is this stupid.

But it's okay, because 11 years ago, they fixed it!

What is Microsoft doing about this issue?

Microsoft has developed a procedure that eliminates the vulnerability.

Oh what a relief.

Of course, the innumerable patches which cannot hope to fix a vulnerability that is silent deployment of Actively signed code, have been regularly released by Microsoft for a decade. They won't be released for a decade more, I assure you of that.

They are finished. I'm completely serious. Google Chrome OS has eliminated all the Microsoft commercialism / greed criminal flaws, and it's gonna hit us all in months or within a year. And computing will never be the same. THANK GOD ~= GOOGLE.

I could rant for pages about why WFP and SFC are too stupid a concepts to actually be real, but I'm bored now. The problem with those two trojan horses is if you're facing unattended installations, WFP is your enemy when any attempt to replace the corrupted system files is deemed by WFP to be an unauthorised installation. How cute! I'm an idiot so it took me a fortnight of SFC /scannow cleaning of corrupted files, and WFP silently corrupting them all again immediately with the 'correct' system files...before I finally figured out the joke. And I was not laughing. My Genuine Advantage OS was 'corrupting' the unattended silent deployments of OS's I had the nerve to want to replace. WFP put paid to my attempts to hack my own systems! Mark down a W for Microsoft and the hackers they support.

As for SFC, lol. When command lines don't function...well, it's time for Linux I guess. lol @ SFC /verifyonly ORRLY?

Link to comment
Share on other sites

How can these people be walking free? Trusting someone in 1999, doesn't mean you trust them for...ever? No one is this stupid.

But it's okay, because 11 years ago, they fixed it!

What is Microsoft doing about this issue?

Microsoft has developed a procedure that eliminates the vulnerability.

Oh what a relief.

Of course, the innumerable patches which cannot hope to fix a vulnerability that is silent deployment of Actively signed code, have been regularly released by Microsoft for a decade. They won't be released for a decade more, I assure you of that.

They are finished. I'm completely serious. Google Chrome OS has eliminated all the Microsoft commercialism / greed criminal flaws, and it's gonna hit us all in months or within a year. And computing will never be the same. THANK GOD ~= GOOGLE.

I could rant for pages about why WFP and SFC are too stupid a concepts to actually be real, but I'm bored now. The problem with those two trojan horses is if you're facing unattended installations, WFP is your enemy when any attempt to replace the corrupted system files is deemed by WFP to be an unauthorised installation. How cute! I'm an idiot so it took me a fortnight of SFC /scannow cleaning of corrupted files, and WFP silently corrupting them all again immediately with the 'correct' system files...before I finally figured out the joke. And I was not laughing. My Genuine Advantage OS was 'corrupting' the unattended silent deployments of OS's I had the nerve to want to replace. WFP put paid to my attempts to hack my own systems! Mark down a W for Microsoft and the hackers they support.

As for SFC, lol. When command lines don't function...well, it's time for Linux I guess. lol @ SFC /verifyonly ORRLY?

Disclaimer / caveat / disclosure: Earlier in this post, I made the claim that no one could actually be this stupid. I may have been wrong, as I ponder on whether or not a certain PROFESSIONAL with an arrogant insulting manner which really only embarasses himself when he's wrong, who may or may not post on this forum, might have an opinion on what I've just posted above and perhaps a warranted explanation for why he defends what is INDEFENSIBLE about Microsoft's business practices. After ridiculing my valid concerns and my polite questions, and providing very close to zero help aside from wasting time with foolish time-wasting 'advice', he has ignored all direct questions posed to him - so I won't hold my breath for so rudely requesting he share his views and opinions on matters on which his opinions and views are provably questionable (and that's being diplomatic).

----------

But more directly to the OP, if you're unhappy with RegRun http://www.greatis.com/security/, I'd be STUNNED. If they can't fix your systems, I'd be STUNNED. They couldn't fix mine, but then I'm still impressed with them for getting god-awful close - before I moved to Linux (which is infected now as well, and I've reinstalled Ubuntu and Mint about a dozen times). On a more positive note, Ubuntu 11.04 beta is glorious. Full of bugs, as it's beta, but a HUGE improvement on 10.10. Check it out if you're a Linux user...!

Link to comment
Share on other sites

BRB, Off to make a tin foil hat.

Be sure to provide some evidence that you have. You know, like the evidence I endlessly provide (some of which is only evidence of my ignorance, like thinking netstat unix nodes were malicious network activity in another thread...but just because I'm ignorant as a result of the industry's COLOSSAL ignorance, I assure you that one of us will educate ourselves over time. One will remain ignorant beyond capacity to believe.

But yes, I want to see a picture of that hat. quid pro quo etc

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.










×
×
  • Create New...