Malware Defender configuration

Piteko21

Level 18
Verified
Top Poster
Well-known
Sep 13, 2014
874
Hi @Malware Defender, can you be more specific, list more programs tahat you have in your computer, say if Kaspersky is Internet Security or Total Security or simple KAV.
you can share if you use virtual machine or shadow defender...
You have UAC enable?, its extremely importante taht you enable UAC, can protect your system.

would be very pleased if you detail more your setup;)
 

Exterminator

Level 85
Verified
Top Poster
Well-known
Oct 23, 2012
12,527

JM Safe

Level 39
Verified
Top Poster
Apr 12, 2015
2,882
Hi, I suggest you to install Privazer, and you can install a software for backup solution, such as Iperius Backup Free.
Then you can install a second browser, and I suggest you to install also Collusion extension for your browser, which allows you to know which websites are tracking you and this is very important.
Thanks for sharing it ;)
 
  • Like
Reactions: frogboy and LabZero
L

LabZero

Hello.
If you are using a light virtualization
systems like Shadow Defender is important to know that creates a virtual copy of the same OS with the same files, so it is very important to disconnect internet if you test the malware to prevent leakage of sensitive data.
The best thing is to configure a virtual machine like VirtualBox or Vmware without sharing between Guest and Host.
Once installed the system, Guest additions and extensions (drivers ) care must be taken not to create links (network drives or otherwise) between the Host system andvirtualized (Guest)
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top