gombi lazane security configuration

Status
Not open for further replies.

gombi lazane

Level 1
Thread author
Jan 7, 2017
12
Hello,
maybe you can add one or two others on demand scanners (like emsisoft Emergency kit or Hitman.pro) and add malwarebytes anti-exploit :)
You need a backup plan too.
Thanks for sharing your config :)
emsisoft Emergency kit or Hitman.pro
but, I do not hold any key to activate these programs :rolleyes:.

I suggest you ditch WOT, due to its current controversies. :)
But, I used it a lot years ago I did not find any problems with him.
 
Last edited by a moderator:
F

ForgottenSeer 55474

Hello,Nice Configuration but get rid of unhackme,i also purchased it when it was released,had nothing but troubles with it;)
 
  • Like
Reactions: gombi lazane

Exterminator

Level 85
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
Some type of system & data backup is an integral part of ones security config.
With a recent malware issue I would suggest adding one to your config!
Macrium Reflect and AOMEI Backupper offer good free solutions.
Your real time protection is not the same as on demand scanners.
I would consider adding one or two additional on demand scanners such as Emsisoft Emergency Kit and or HitmanPro.
You really do not need Malwarebytes Antimalware running in real time with ESET Smart Security installed.
You could also consider running Malwarebytes as an on demand scanner.
Consider removing WOT all together and replacing Fair Adblocker with uBlock Origin.
Thanks for sharing your config :)
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top