mrc109's Config

mrc109

New Member
Thread author
Jun 29, 2015
1
I am clueless about how my system really operates. If I could just turn my computer on and use it without any "protections" I would do it if I could just reload everything I needed the next time I boot the system up. Why does it have to be so difficult for imbeciles like me who just want to use a computer to look stuff up on, pay a few bills with, visit a few porn sites and have email access? Is this too much to ask for?

Why can't a system be configured to be bulletproof? Hardened such that only outgoing requests for information are allowed. No incoming changes are allowed unless specifically authorized by me? How is it that changes can be allowed by computer system when these changes have hidden codes that change the system away from its stable configuration? Why does this cat and mouse game ever take place in the first place? If a change is detected in what was working before, any change whatsoever, why can't these unauthorized changes be "filtered out" as extraneous "bits" of non-conforming "software"? It's like having a pattern recognition buffer in place between my system and the rest of the WWW. Anything that comes into my computer that would alter the existing pattern stored for my OS, would be skimmed off, only allowing the original pattern to be recognized as operable software. No iffs ands or butts. My access to the internet would become completely "passive" in that no outside changes could ever take place, changes originating from outside of, and potentially altering my systems OS, without first attempting to alter my systems distinctive, one of a kind, self-test pattern recognition information software. This would be a "real-time" screening process, where all incoming data is pre-filtered through the lens of "does this incoming data alter or change the "fit" or the pattern "layout" for the systems current OS configuration? If yes, then in real time, before any such change is allowed to cross the pre-screen boundary, a red flag is thrown into the User Interface requesting permission to alter the previous software configuration, away from its former stable configuration, into an unknown state of configuration. Yes? or NO?. Yes is Ok, make these requested configurations possible. Whereas No, means No. No alteration of previous stable configuration is authorized by the user. These requested changes to the systems OS are screened out as "foreign antibodies" clinging onto either what is now a 100% fit to the pattern recognition software, or if the foreign antibodies presence cannot be liberated from the newly proposed changes to system software, then the entire infiltration of spuriously contaminated software changes is rejected in its entirety, completely and unequivocally spit back out of the system as rejected information, with appropriate warnings of "bad tasting software alterations encountered", and simultaneously redirecting and removing the system from any further contact with the source of such "tainted" intrusions.

This is the kind of "intelligent" and "smart" antivirus and anti-social software recognition program I want to have installed on my computer. Why cant this be done? I don't have the brains to do it myself, I can barely count backwards from 100 in groups of three's, and in groups of sevens, forget it, anything past 93 and I'm through.
 
  • Like
Reactions: Piteko21

Ink

Administrator
Verified
Jan 8, 2011
22,490
Don't use Windows. It's popularity makes it a high target to cyber-criminals. Their success is based on the majority of Windows' users.

Other OS choices: Mac OS X, Linux (of sort), Chrome OS (Google only)
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
There is no perfect formula, but you can handle Windows by many ways.

1) Use your common sense and study about its compter security threats that can infect you.

2) As much as possible upgrade to 7 or 8/8.1 of Windows and make your habits to update those patches.

3) Backup, that's your main resort solution; even though you have an outdated OS you can retrieve your files anytime at any situations.

4) Declare your habits because sometimes you don't need a lot of security products.
 

Exterminator

Level 85
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
You could consider a MAC OS as @Huracan suggested or upgrade your XP to Windows 7 or 8 as @jamescv7 suggested.
You could browse using Sandboxie and just delete everything when your done.Very easy to use
It actually can be pretty simple if all you do is those described activities with just a free AV & a sandbox you should be OK
 

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,356
Real-Time Protection:
Condoms and Avast Free.
rofl.gif
rofl.gif
rofl.gif
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top