D
Deleted member 178
Thread author
well done Hjlbx, i can safely say that you brilliantly took over my seat of best MT written reviewer 
My laptop is Win 7 64
4GB RAM & 500GB HDD
Intel
I installed BIS.
Its running light here, boot is good too. For me its running as light as Avast AV Pro.
Users running BIS 2015 can shed some light here.
I tested with 2 harmless sample trojansimulator.exe from testmypcsecurity & eicar from amtso.
BIS detected trojansimulator as PUP & doesn't quarantine/deletes but the file remains on the location inaccessible.
BIS detected eicar as threat & said quarantined but was actually deleted as sample was not in quarantine.
Rightclick scan detected threats on the sameples above but no quarantine option in action. Delete deletes & take appropriate action too deletes the files.
What is search advisor in Web protection?
I thought those safe/malicious, etc... icons on search links but nothing on the search links.
So I liked its running light.
But the prob is ---
Deleting threats instead of quarantine (just a sample test).
PUP are blocked & remains in the location...dont know bug or design?
Rightclick scan detected threats no quarantine option.
Search advisor but nothing on the search links.
BIS 2015 users plzz give some info here.
UPDATE - Only vsserv process is on high side on task manager. Initially around 220,000 K & after sometime settles around 120,000 K but system is running light.
well done Hjlbx, i can safely say that you brilliantly took over my seat of best MT written reviewer![]()
I like quite a few users here who post excellent security review, knowledge readings, etc... And if you have any query & you see they are online then you dont go offline coz you know within a moment they will reply to your post. And you are one of them.@Umbra
Whoaaa now, don't use them big words... I get confused. My head might swell up and explode.
Thank you... thank you very much.
So all of you experts helping average/novices, etc... thanxx from the bottom of my heart. I will skip I love you for now![]()
You exemplify well MT's repututable credo well through your enlightened & entertaining testimonials. Oops,That is what MT is all about... helping others.
I don't know how it gets the top spot in every website.They are very slow updating new definitions.
Thanks for the kind InfoCorrect me if I am wrong here @Malware1. Much thanks...
If you've designed a good scan engine it will detect whatever you feed it - but - it's the whole process of feeding it that's the real issue. Feed a scan engine consistently accurate signatures at a very high rate and it's detection results are high; feed a scan engine inaccurate signatures at a variable or low rate and it's detection results will be dismal.
Accuracy, volume and speed of signature creation by AV vendors is the key.
A lot of the AV test lab results are dependent upon when and where they get their samples. In other words, the origin and age of the samples.
Malware signatures might be created en masse for those coming out of country X during time period Y - Z. If you have samples that aren't from country X - or - are not from the collection and submission period Y - Z, then it is likely you will have no detection. It also depends upon whether or not the AV vendor participates in VirusTotal or uses some other method(s) to create signature databases (e.g. Comodo).
Some vendors use hashes (MD5s, etc) short-term and then go with generic signatures long-term. Some vendors perform these actions quickly (Avira, Bitsy, Emsi, ESET, Kasper), others are slow (Comodo).
Think of it this way - the existence of malware signatures is highly dependent upon where (the origin), when and how they are fed to, received and processed by the AV vendors.
The above activities are not uniform - they vary over time. There might be a lot of malware sample collecting in country A during a certain time period, but none in B. So malware from country A will have a high detection rate - country B will not.
This is simplistic... but it makes sense.
There are a whole range of factors that affect signatures other than vendor collection methods and policies: server reliability, signature distribution, agreements with other AV vendors, staffing, etc, etc, etc.
That's why I chuckle when I see various AV test lab and PC Mag reviews. They are a crock to some degree... more useful as a general (relative) indicator of detection than an absolute indicator.
Thanks for the kind Info.That is why my home grown antivirus gets an applaudable review instead of poor projection of scores in different websites & has good demand to
ther than the virus issue Bitdefender seems to be really buggy for me.Browser doesn't seem to get loaded properly,most of the time it crashes & loads very slow.In the same place norton or kis performs very well..
![]()
"Paid advertising" is how; it's these sites' livelihood. I mean, SimCity was, like, the best game ever according to those guys.Bitdefender is a nightmare while web browsing & most of the recent viruses are not even getting detected.I don't know how it gets the top spot in every website.They are very slow updating new definitions.Shifted back to KIS & in future I hope I would go for Norton.
To say "detection is useless...because of daily new..." has a few flaws:
- This ignores the fact that most malware isn't new
- Even most new malware is based on older, recognisable malware
- Scanners don't only rely on a strict hash alone but on permutations/heuristics
- Scanners typically include more, such as BB, HIPS/HIDS, browser/mail session scanning to aid detection/heuristics
Oh, how AV vendors wished this was the way it worked in reality - it would make them all superstars.
To say "detection is useless...because of daily new..." has a few flaws:
but real serious damaging FUD malwares are new, i don't talk about scriptkiddie's stuff or wannabe hackers
- This ignores the fact that most malware isn't new
as i said above, those are used by kiddies or pseudo-criminals.
- Even most new malware is based on older, recognisable malware
heuristic are based on malware they know, once again we go back to point 1
- Scanners don't only rely on a strict hash alone but on permutations/heuristics
false, scanners are just scanners, they include nothing. BB/HIPS are components that complement the antivirus not the scanner; their very existence is a proof that detection is obsolete and easily bypassable. If detection with heuristics was strong enough, HIPS/BB/sandboxes will never be created.
- Scanners typically include more, such as BB, HIPS/HIDS, browser/mail session scanning to aid detection/heuristics
Messiah complex? hehei replied in red obviously