H
hjlbx
Thread author
Hello All,
During typical use are you a Low, Medium or High risk user?
Please select the category that best matches your computer management style...
Low Risk - Very rarely install new apps, use mostly digitally signed apps from trustworthy publishers, surf only to sites with good reputation. Rarely change system configuration. Upload files to Virus Total prior to install. Use no more than one of the most exploited apps: Microsoft Office Suite - Word, Excel, etc, Windows Media Player, Oracle Java or Java Runtime Environment, Adobe Acrobat or Reader, Adobe Flash Player, etc. Always keep Windows and installed apps updated.
Medium Risk - Occasionally install new apps including those not digitally signed and\or from a trustworthy publisher, surf regularly to social and other media sites. Occasionally change system configuration. Sometimes upload files to Virus Total prior to install. Use a couple exploitable apps. For the most part keep Windows and installed apps updated.
High Risk - Very often install new apps with no regard to digital signature nor publisher reputation, "Click-Happy" web exploration without restriction. Change system configuration often. Never upload files to Virus Total prior to install. Use most of the exploited apps. Do not pay attention to Windows and app updates.
NOTE:
I am not including malware testing and malicious URL discovery as these are obviously High risk activities and not typical use - no matter how careful you think you are and despite your impenetrable Enemy-of-the-State anti-NSA system configuration.
So what are your computing behaviors when you are not the Malware Destroyer ?
During typical use are you a Low, Medium or High risk user?
Please select the category that best matches your computer management style...
Low Risk - Very rarely install new apps, use mostly digitally signed apps from trustworthy publishers, surf only to sites with good reputation. Rarely change system configuration. Upload files to Virus Total prior to install. Use no more than one of the most exploited apps: Microsoft Office Suite - Word, Excel, etc, Windows Media Player, Oracle Java or Java Runtime Environment, Adobe Acrobat or Reader, Adobe Flash Player, etc. Always keep Windows and installed apps updated.
Medium Risk - Occasionally install new apps including those not digitally signed and\or from a trustworthy publisher, surf regularly to social and other media sites. Occasionally change system configuration. Sometimes upload files to Virus Total prior to install. Use a couple exploitable apps. For the most part keep Windows and installed apps updated.
High Risk - Very often install new apps with no regard to digital signature nor publisher reputation, "Click-Happy" web exploration without restriction. Change system configuration often. Never upload files to Virus Total prior to install. Use most of the exploited apps. Do not pay attention to Windows and app updates.
NOTE:
I am not including malware testing and malicious URL discovery as these are obviously High risk activities and not typical use - no matter how careful you think you are and despite your impenetrable Enemy-of-the-State anti-NSA system configuration.
So what are your computing behaviors when you are not the Malware Destroyer ?
Last edited by a moderator: