Effective virus protection without anti-virus software

Ink

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
Read More : Effective virus protection without anti-virus software, identifies idcloak

Following this week’s spate of fake Amazon emails containing dangerous spyware, idcloak technologies recommends an alternative form of antivirus protection: by using a Live USB for internet access, users are immune to web-transmitted malware.

[...]

The proposed solution is for users to access the internet through a Live USB device: an operating system loaded onto a flashdrive that creates a virtual computing environment separate from the machine's hard drives. At the end of an internet session, a user unplugs the Live USB and the computer is returned to the exact state it was in before the session began. “When running a Live USB or SD, users nullify all chance of web-born malware infection. They could download the most insidious virus while browsing, but the moment they complete their internet session, that download is undone. It’s the closest to perfect AV protection there is.”

Welles nonetheless recognizes that this method, though free, does require a small investment in terms of time, but an investment he insists is well justified. “Perspectives need to shift: we still see the web as basically benign when it’s not. Most modern viruses are delivered as part of a criminal procedural attack for the purpose of fraud; the Mal/BredoZp-B virus found in the Amazon phish was no exception. And yet still the majority of users are happy to hand over their safety to a standard Microsoft internet security package.”

Live USB systems are available without cost when running Linux environments. Windows-to-Go is the only official Live USB product available from Microsoft and is included in Windows 8 Enterprise.

What do you think?
 

Prorootect

Level 69
Verified
Nov 5, 2011
5,855
About the Author:
'Gill-Chris Welles writes. A lot. Published in fields as dispersed as music, sports, poetry and technology, and more lately as writer of a web TV series, it's always been his job to speak simply and lightly on subjects far from simple or light. He has never had his head very far from computing, either – but since joining idcloak it has become firmly wedged there. Other than the neck-cramps, however, he really has little to complain about. Our colonization of the internet is so infernally interesting that he will likely remain the happy director of marketing at idcloak Technologies Inc. for who knows how long.'

another quote:
'Free online anonymous proxy - How to choose a new one
I just did a search with the terms 'free online anonymous proxy' and ploughed through as many of the 55 million results as I could bear. At page 14 I stopped – every single entry up to that point was a link to some kind of free proxy ip address list. Sure, they weren't all proxy sites – some were advertising 'anonymous proxy server software' and a few were for an 'IP proxy server list'.'

So you see many many keywords ..
.. and never the names .. except: IDCLOAK VPN ..;)
 

Littlebits

Retired Staff
May 3, 2011
3,893
Geni said:
Isn't is easier to sandbox browser, or even explorer?

Yes it is but even more easier to just use a "Limited User Account" when using the web. Only use Admin account to install Windows Updates and install trusted programs.

Thanks.:D
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Geni said:
Isn't is easier to sandbox browser, or even explorer?

Its easy when all steps on performing sandbox is followed, especially novice users could hard to understand.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top