Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Death of Windows7?
Message
<blockquote data-quote="Fuzzfas" data-source="post: 854779" data-attributes="member: 4553"><p>I stand corrected. Still, i will take any day Win7 with 3rd party software, than Win10 with the ordinary configuration that most people use. Because i can make Win7 much safer than that.</p><p></p><p></p><p></p><p></p><p></p><p>Ok, forgive me for not replying line to line, but i 've grown too old for that. If you want to me say that Win10 is more secure than Win7, i will say it. But i will repeat once more, that with 3rd party programs and tweaks, Win7 is safer than any common Win10 installation. If there was 1 layer of security that i had to remove and be safe, it would be OS patches. Because some 3rd party software will always not only protect from the same hole, but most likely does so BEFORE MS releases a patch.</p><p></p><p>The car analogy is flawed however, because nobody wants to kill your car or you. In malware on the contrary, there is an interested party, where its ONLY concern is to infect your OS and contrary to 2017, where Win7 was still majority, now Win10 is the majority, which means, you will always be reacting AFTER THE EVENT.</p><p></p><p>As for the infamous NSA Eternal Blue, here's the antidote even for XP since 2000. It was working BEFORE the MS Patch and will work even WITHOUT MS Patch. Even if you don't have a NAT router. Beating NSA's 2017 since 2000 and while MS has been sleeping for 17 years:</p><p></p><p></p><p>[ATTACH]232568[/ATTACH]</p><p></p><p>As to why i am here, i will give you a hint. I registered in 2013 and i have 92 posts. What gives? I came again because of SecureAplus. And after 7 years of blissful, malware free existance, i don't intend to go back to extreme paranoia, that's for sure.</p><p></p><p></p><p></p><p></p><p>A kernel exploit, must be somehow delivered. Of course it's better if you have your OS patched, but when the malware is 0 day, one this is for sure: a 3rd party software might stop it. Several antiviruses and antiexploits were blocking Eternal Blue before even MS knew what hit her. The OS NO WAY, because it's unpatched and you don't know how many years the vulnerability existed (NSA was using the Eternal Blue probably for ages and every hacker can keep his special holes for personal use for as long as he likes).</p><p></p><p>A google search for "AppContainer vulnerability", easily shows, that Appcontainer isn't safe either, like NOTHING made by Microsoft. Simply, the average Joe doesn't even use that, so they don't bother to open every single hole they can, when they can find other, easier ways to make Win10 like a Swiss cheese.</p><p></p><p>Since you have a malware test center and you have also a policy of "security labels", why don't you take a Win10 + WD installation (which i presume you label as "Secure Basic" in the forum and one with unpatched Win7 + Comodo with D+ manual for example and run against 0 day and see if the Win7 + Comodo is more at risk?</p><p></p><p>Anyway, it's just my opinion. But if you talk to a malware writer, the first thing he tells you is "of course i try my own malware before i release it". And he has patched Windows too (surprise!). Just like, once Eternal blue was made common domain, some new malware writers, made it work on Win10 too!</p><p></p><p>Anyway, when Eternal blue was out, i don't remember what i had, but my brother had just MSE and Tinywall, with anything related to filesharing/remote desktop/assistance/registry/management disabled and firewall set to "public". He never saw it. He has never been infected by anything actually. And he doesn't know how to open the task manager. This as a story of a "very lucky man" if you want.</p><p></p><p>I used to be paranoid too. But after years where the only malware i was seeing was malware i was downloading on my own from "malware sample sites", i thought it was time to enjoy my computer for myself, rather than having it being dragged down by "Fort Knox" configurations. Obscure defenses work well too. Besides, the game of "making the impregnable defense", died for me, when i started using regularly images. I don't have anything that i can't replace. I only want to be able to tell that i got infected. If i do, i will format , because i don't trust my "impregnable" system even after a "successful block". I can extract what i want from image or blu ray backup and go on... If you have valuable things and you think there is no way to protect them, by all means, patch your OS too and pray you are not 0 day victim.</p></blockquote><p></p>
[QUOTE="Fuzzfas, post: 854779, member: 4553"] I stand corrected. Still, i will take any day Win7 with 3rd party software, than Win10 with the ordinary configuration that most people use. Because i can make Win7 much safer than that. Ok, forgive me for not replying line to line, but i 've grown too old for that. If you want to me say that Win10 is more secure than Win7, i will say it. But i will repeat once more, that with 3rd party programs and tweaks, Win7 is safer than any common Win10 installation. If there was 1 layer of security that i had to remove and be safe, it would be OS patches. Because some 3rd party software will always not only protect from the same hole, but most likely does so BEFORE MS releases a patch. The car analogy is flawed however, because nobody wants to kill your car or you. In malware on the contrary, there is an interested party, where its ONLY concern is to infect your OS and contrary to 2017, where Win7 was still majority, now Win10 is the majority, which means, you will always be reacting AFTER THE EVENT. As for the infamous NSA Eternal Blue, here's the antidote even for XP since 2000. It was working BEFORE the MS Patch and will work even WITHOUT MS Patch. Even if you don't have a NAT router. Beating NSA's 2017 since 2000 and while MS has been sleeping for 17 years: [ATTACH alt="Kerio.png"]232568[/ATTACH] As to why i am here, i will give you a hint. I registered in 2013 and i have 92 posts. What gives? I came again because of SecureAplus. And after 7 years of blissful, malware free existance, i don't intend to go back to extreme paranoia, that's for sure. A kernel exploit, must be somehow delivered. Of course it's better if you have your OS patched, but when the malware is 0 day, one this is for sure: a 3rd party software might stop it. Several antiviruses and antiexploits were blocking Eternal Blue before even MS knew what hit her. The OS NO WAY, because it's unpatched and you don't know how many years the vulnerability existed (NSA was using the Eternal Blue probably for ages and every hacker can keep his special holes for personal use for as long as he likes). A google search for "AppContainer vulnerability", easily shows, that Appcontainer isn't safe either, like NOTHING made by Microsoft. Simply, the average Joe doesn't even use that, so they don't bother to open every single hole they can, when they can find other, easier ways to make Win10 like a Swiss cheese. Since you have a malware test center and you have also a policy of "security labels", why don't you take a Win10 + WD installation (which i presume you label as "Secure Basic" in the forum and one with unpatched Win7 + Comodo with D+ manual for example and run against 0 day and see if the Win7 + Comodo is more at risk? Anyway, it's just my opinion. But if you talk to a malware writer, the first thing he tells you is "of course i try my own malware before i release it". And he has patched Windows too (surprise!). Just like, once Eternal blue was made common domain, some new malware writers, made it work on Win10 too! Anyway, when Eternal blue was out, i don't remember what i had, but my brother had just MSE and Tinywall, with anything related to filesharing/remote desktop/assistance/registry/management disabled and firewall set to "public". He never saw it. He has never been infected by anything actually. And he doesn't know how to open the task manager. This as a story of a "very lucky man" if you want. I used to be paranoid too. But after years where the only malware i was seeing was malware i was downloading on my own from "malware sample sites", i thought it was time to enjoy my computer for myself, rather than having it being dragged down by "Fort Knox" configurations. Obscure defenses work well too. Besides, the game of "making the impregnable defense", died for me, when i started using regularly images. I don't have anything that i can't replace. I only want to be able to tell that i got infected. If i do, i will format , because i don't trust my "impregnable" system even after a "successful block". I can extract what i want from image or blu ray backup and go on... If you have valuable things and you think there is no way to protect them, by all means, patch your OS too and pray you are not 0 day victim. [/QUOTE]
Insert quotes…
Verification
Post reply
Top