Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Any real-time software that uses non-traditional ways to find malware?
Message
<blockquote data-quote="danb" data-source="post: 916922" data-attributes="member: 62850"><p>You have used 5+ accounts.</p><p></p><p>As you have noted, your "evidence" is not from Microsoft, even though you have insisted on multiple occasions that permanently disabling vulnerable processes is included in Microsoft's recommended best practices. Find evidence where Microsoft recommends disabling vital parts of their OS, and please post links instead of screenshots so I do not have to spend 5 minutes looking them up.</p><p></p><p>First of all, it is a very bad idea simply because Tickle was experiencing a block over and over and over again, so he probably believed his system was infected, as would any user. Blocking macros is certainly a great idea because it is not going to break anything, but permanently blocking ANY part of a driver update is not because there is not a chance that the driver will work 100% as the vendor intended... if you do, something is not going to function correctly as the vendor intended. In this case, even Intel probably cannot determine what all this block might break without a close examination. </p><p></p><p>AG and other similar products can be tailored to block or allow whatever you want, so really it is a non-issue. If you want to lock everything down to potentially make your system more secure, but take a risk of blocking items that should not be blocked, then by all means please do.</p><p></p><p>I did not send him on a wild goose chase... my first response was correct.</p><p></p><p>The Norton and Emsisoft blocks were false positives, not intentional blocks. It happens.</p></blockquote><p></p>
[QUOTE="danb, post: 916922, member: 62850"] You have used 5+ accounts. As you have noted, your "evidence" is not from Microsoft, even though you have insisted on multiple occasions that permanently disabling vulnerable processes is included in Microsoft's recommended best practices. Find evidence where Microsoft recommends disabling vital parts of their OS, and please post links instead of screenshots so I do not have to spend 5 minutes looking them up. First of all, it is a very bad idea simply because Tickle was experiencing a block over and over and over again, so he probably believed his system was infected, as would any user. Blocking macros is certainly a great idea because it is not going to break anything, but permanently blocking ANY part of a driver update is not because there is not a chance that the driver will work 100% as the vendor intended... if you do, something is not going to function correctly as the vendor intended. In this case, even Intel probably cannot determine what all this block might break without a close examination. AG and other similar products can be tailored to block or allow whatever you want, so really it is a non-issue. If you want to lock everything down to potentially make your system more secure, but take a risk of blocking items that should not be blocked, then by all means please do. I did not send him on a wild goose chase... my first response was correct. The Norton and Emsisoft blocks were false positives, not intentional blocks. It happens. [/QUOTE]
Insert quotes…
Verification
Post reply
Top