- Jan 27, 2012
- 384
One of my machines is running Avast free, hardened mode with VoodooShield Pro. This is very lite and seems to work quite well.
Apologies for going off topic but I'd be interested to see what your results are, and if the problems we both encountered a while back have been fixed. Could you post back in the Panda section? I've got premium licenses but I'm still reluctant to go back to it after my experiences first time round.Yup, premium Panda has all sorts of goodness in it.
We're set to re-test Panda in the work lab this week, and I will mirror some of the tests at home. I am hoping they addressed the bugs I reported back then. I had a lot of fun tweaking it to offer a level of protection most people didn't expect Panda capable of.![]()
Without garbage collector there would be memory problems because of absence of memory release of variables...
When for example you declare an integer or string:
Code:public void test() { string t = "MT"; int r = 4; }
Then you need something that cleans memory allocations and space used.
LOL, I re-read now your post and I edited my reply. Go to read itLOL. I didn't say remove garbage collector. I said something else.
Discuss - Default Deny VS traditional AVsLOL. I didn't say remove garbage collector. I said something else.
.NET framework is necessary to running several software that can be really useful and important for a lot of users.
Default-deny > AV
AV for beginners, default-deny for people who understand Windows processes.
.
Signature engines are obsolete. They still exist because Average Joe dont know and cant handle better.
I'm aware of what vulnerable processes are and as for the encryption, its functionality in cipher.exe and using cmd.exe to use the functionality isn't mandatory.Vulnerable processes include cmd.exe, wscript.exe, cscript.exe, cipher.exe (CMD command that can be used to perform encryption), etc.
The .NET Framework is filled with tons of security holes and worst of all, a lot of software engineers decide to use older versions for compatibility reasons (e.g. default versions pre-installed on Windows 7 or other versions of Windows) which leaves them even more vulnerable for using an outdated version. 99% of the .NET community isn't going to understand security... and the .NET Framework was never designed to be secure in the first place as far as I am concerned (and if it was, that's even more embarrassing).If Microsoft would just remove the garbage, then there wouldn't be the ongoing security issues. Like .NET Framework. A cesspool of security threats way worse than Adobe Flash.
OSArmor is used for something (talking about those vulnerable processes and scripts), and some default-deny Software has those in mind as well.I'm aware of what vulnerable processes are and as for the encryption, its functionality in cipher.exe and using cmd.exe to use the functionality isn't mandatory.
I wasn't referring to vulnerable processes earlier on. It doesn't matter as to what I was referring to, it'll just introduce paranoia discussions and cause tons of misunderstanding. Forget about anything I said outside of my post edit.
We get it, you hate Microsoft and want everyone to change to a Chromebook (that is data-mined by Google), will never happen.Nope. Not really. Not for home users. It is the piled-in garbage that Microsoft ships with general OS that is Windows. It benefits a tiny fraction of all users and places all other users at-risk. Not any kind of common sense security model.
And apps that use it perform terribly on Windows, in general. It's garbage.
Chrome OS\Chromium OS does just fine without it. And most of the paranoid people here that are so bent out of shape about security should move to Chromebook... never to return to Windows.
OSArmor is really decent and covers a lot of areas. It's a perfect companion for people who understand how to work the configuration and how the configuration can affect their environment (e.g. in-case something will be blocked which needs to be used, etc.) in most cases. The chances of conflict with another security solution is not very high based on how it filters.OSArmor is used for something (talking about those vulnerable processes and scripts), and some default-deny Software has those in mind as well.
All three solutions can be good if the user knows the weak points of adopted security and does not expose them via vulnerable activities.
For example, the user on the well updated Windows 10 can be very secure with AV, if he:
The above is not a rocket science, so most MalwareTips readers can learn/adopt it quickly.
- uses apps in App Container for vulnerable activities (web browsing, viewing/editing documents, etc.);
- installs only applications accepted by SmartScreen (EXE, MSI installers) downloaded via the web browser to the NTFS hard disk;
- does not open files with vulnerable/unknown extensions;
- avoids spam and think twice before opening e-mail attachments;
- uses safe DNS service;
- uses 'Public network' profile;
- uses the separate account for shopping.
Personally, I would like to vote for AV with fast signatures + smart default-deny. The word 'smart' means that executing the new files is disabled by default (except for some whitelisted locations) and application installers which are forced to be always checked by the good application reputation service (like SmartScreen).
We get it, you hate Microsoft and want everyone to change to a Chromebook (that is data-mined by Google), will never happen.
Chromebook is a web box with little to no functionality Offline, not to mention it can't run anything outside the Google Store.One should never use Windows unless they require it for Windows-Specific gaming. Otherwise, it's best to just toss it out. I successfully converted everyone in the household from Windows Notebooks to ChromeBooks and it's been a resounding success. Most importantly, I have not a care in the world regarding those devices. Zero concern, ever, for security or stability with them.
You can take them to security levels where Windows cannot even hope to achieve. Check out my thread on this;
Tutorial - Configure your Chromebook for Ultimate Security
I've got a mission with family and friends.. To convert them to Chromebooks as time comes for laptop/notebook upgrades. Windows, regardless of tweaks/software, is just not safe enough for them. Security/Antivirus firms know the proliferation of ChromeOS devices spells the beginning of the end of their industry. By 2020 a full 90% of EDU environments will be ChromeOS by industry estimates, that's billions in lost revenue for security theater firms. Microsoft themselves know this is coming and are attempting to convince EDU purchasers that 'Windows is safe too now!' in a futile marketing campaign destined to fail. G Suite is way too popular now, and free - it's spreading like wildfire. Blackhats are losing entire swaths of vulnerable sheep to exploit.
Chromebook is a web box with little to no functionality Offline, not to mention it can't run anything outside the Google Store.
As for security, I'm sure everyone knows the number of attacks doesn't equal to how much secure it is or not (common mistake that makes people believe OSX and/or Linux are safer than Windows, when they're not).
I can make a keylogger for Linux in 5 min. with no systems in place to stop me (believe me, I've done it for research sake), while on Windows the same can't be said.
Chromebook can take malware like any other OS, the Google Store is no stranger to malware.
So no I don't fall for all this advertising of Chromebook being invulnerable to Malware and being the safest ever, for me it's like any other and you guys are over-hyping it.
Wanna be secure practice safe habits, there's no miracle Software nor OS that will keep you safe from stupid.
We get it, you hate Microsoft and want everyone to change to a Chromebook (that is data-mined by Google), will never happen.
Would love to sit and chat about how wrong you are in some aspects, and how your emotions are getting in the way of your judgment regarding Windows.
But it would derail this topic.