5
509322
It's not blind respect. He was given solid advice by someone in the security industry lol.
See post above.
It's not blind respect. He was given solid advice by someone in the security industry lol.
do you know how many people talk out of their asses? you would be surprised. Being a Dev means nothing, he could be a UI Dev for all i know (most ridiculous thing i could think of).Your question was silly. Like I say it's the same as asking why you can't run 3 real time AV's all at once, you should know the answer it's child's play. I'm sorry if I came across rude but you're not just not believing anyone you're questioning a security software Dev on a matter that's so simple to understand.
I agree we should never just take peoples word, we should always do our own research, But asking for proof why you can't run different software that do the exact same job without potential issues is silly.
you didn't annoy me.It's alright. Everybody calm down. If I annoyed you @mekelek that was not my intent.
Let's not devolve into some kind of rabble debate.
I'm not blowing anything out of proportion I'm just pointing out what I see. Be sure to post your replies when you contact the companies you said you were going to if you don't mind, thank you.
+1It's alright. Everybody calm down. If I annoyed you @mekelek that was not my intent.
Let's not devolve into some kind of rabble debate.
I must admit that until now, I didn't know about the issue involved with running two anti-exploits together.
Long ago, when I was a new member of MT, I was advised by someone that KIS+HMPA is a good combo, and he convinced me that my worries of conflicts were not justified....
@mekelek , it is good you asked what you asked. Don't take anything for granted, and don't give blind respect to authority. Ask.
I'm not getting into or starting an argument there is already way too much of that on here recently.do you know how many people talk out of their asses? you would be surprised. Being a Dev means nothing, he could be a UI Dev for all i know (most ridiculous thing i could think of).
if one day someone tells you that jumping out of the window is good for your spine, and he/she has a Developer title, you will believe him and do it?
i don't want to spam/hijack this thread anymore with this nonsense, once again, there was no harm intended in my question towards @Lockdown
I was making the exact opposite point with that sentence, contacting company support is the most useless thing you can do in this situation.I'm not blowing anything out of proportion I'm just pointing out what I see. Be sure to post your replies when you contact the companies you said you were going to if you don't mind, thank you.
I disagree, but I'm leaving this here.I was making the exact opposite point with that sentence, contacting company support is the most useless thing you can do in this situation.
A: they usually have zero knowledge about the product other than what their guide has written down
B: they will never tell me to continue using a direct competitors product.,
Guys, everything is cool. We are all on the same page here. Let's move on.
At least I learned something, so the discussion was worth it just for that.
This topic has caused "scuffaws" before. Maybe it is just an accursed topic or a particularly sanguine one.
On another note EMET being built into the net Windows 10 version should take this conversation to a whole new level lol. We shall wait and see how that unfolds. If Kaspersky wasn't happy before I wouldn't mind betting they're fuming now lol.
Doesn't almost every AV have some kind of behavior blocking, or exploit mitigation, or whatever they want to call it? So any time you combo HMPA with an AV that is worth its salt, you are taking a calculated risk...you can never truly know if two softs are 100 % compatible without testing. Testing anti-exploit soft conflicts is beyond the typical user. So, the conservative decision is to use just one instead of making a combo of two products that both have mitigations.
Doesn't almost every AV have some kind of behavior blocking, or exploit mitigation, or whatever they want to call it? So any time you combo HMPA with an AV that is worth its salt, you are taking a calculated risk...
one thing that worries me is that what about fields that aren't covered by your AV but covered by HMPA?Doesn't almost every AV have some kind of behavior blocking, or exploit mitigation, or whatever they want to call it? So any time you combo HMPA with an AV that is worth its salt, you are taking a calculated risk...
The AV companies don't want to tell us a lot of details. They are not going to reveal their secret recipes. But some AVs make it easier to disable those components. Bitdefender lets you do that.one thing that worries me is that what about fields that aren't covered by your AV but covered by HMPA?
and how are you going to figure out what exactly is your AV covering as anti-exploit, that maybe you could disable it in HMPA? I can't find anything for example for KIS, and no option to disable it either.
KIS has a lot of options to enable/disable certain parts of modules, but i can't, for the love of god, find anything about anti-exploits.The AV companies don't want to tell us a lot of details. They are not going to reveal their secret recipes. But some AVs make it easier to disable those components. Bitdefender lets you do that.
Avast 2017 has the behavior blocker in a completely separate module, you can choose to install it or not. That is very convenient, actually.