nishadrox Laptop Config

Status
Not open for further replies.
D

Deleted member 178

Use backups for your datas and system. You won't like to lost everything.
 

Winter Soldier

Level 25
Verified
Top Poster
Well-known
Feb 13, 2017
1,486
Nice setup, if you use a backup then you are fine.
You can add a second opinion scanner such as Zemana Anti-Malware free or piad and eventually Process Hacker or Process Explorer that allow a good manual inspection of the active processes, potentially by identifying the malicious ones.

The manual approach is often underestimated because we entrust ourselves to the automation of security apps but in my opinion, often it is necessary to take control of the situation.
 

Exterminator

Community Manager
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
A system backup solution is a very important part of a security config no matter what you use it for.
Macrium reflect & AOMEI Backupper both offer good free programs.
I would consider CCleaner for a system utility solution if not already installed.
All in all you have a good config! Thanks for sharing it with us :)
 

Marko :)

Level 20
Verified
Top Poster
Well-known
Aug 12, 2015
967
Nice security config. I would recommend replacing WOT with Bitdefender TrafficLight or Avira Browser Safety.
 
  • Like
Reactions: nishaddesilva

nishaddesilva

Level 3
Thread author
Aug 26, 2012
257
Thanks for all your suggestions. BTW I use CCleaner portable :)
Is Avira Browser Safety and Trafficlight better than WOT?
 
  • Like
Reactions: Marko :)
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top