Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Battlefield
Software Comparison
Planned: Real-world Test of Trend Micro, ZoneAlarm, Eset and Webroot
Message
<blockquote data-quote="Shadowra" data-source="post: 1098883" data-attributes="member: 92939"><p>I'd like to say a few words.</p><p>I have read most of the messages, which are very pertinent.</p><p></p><p>But when I see AV-Comparative and others, I have to intervene.</p><p>Please know that I have no animosity towards these test companies, nor towards my fellow testers. But when I don't like it, I tend to say things.</p><p></p><p>Personally, I give no credit to Av-Comparative, Av-Tests etc...</p><p>Not because they're bad, but I very rarely see their test protocols, which for me should be mentioned...</p><p>These test editors very rarely execute, contenting themselves with contextual analysis which, frankly, doesn't make a test.</p><p></p><p><u><strong>=> Using ONLY EXE files is not enough to make a test.</strong></u></p><p>There are different systems for infecting a machine.</p><p>The classic e-mail trap with a PDF/ONE/JS or VBS file that downloads and launches a payload.</p><p>There are also exploit sites called Drive-by Download, which will target all vulnerabilities at the same time until the malware is installed.</p><p>And don't forget bloated or re-packed files, which can contain malicious code.</p><p></p><p><u><strong>=> Relying ONLY on an analysis is TOTALLY insufficient for a test.</strong></u></p><p>Antivirus software doesn't just have an antimalware engine!</p><p>There are several shields to counter a threat.</p><p>Whether it's basic protection, HIPS/IDS or anti-attack shields, these protections are not often highlighted in these tests.</p><p></p><p>If one day you'd like to see my test protocol, I'd be delighted to show it to you!</p><p></p><p>The only one I'll give credit to is [USER=71496]@Adrian Ścibor[/USER] , because it totally covers what I've mentioned.</p><p></p><p>Enjoy <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite109" alt=":)" title="Smile :)" loading="lazy" data-shortname=":)" /></p></blockquote><p></p>
[QUOTE="Shadowra, post: 1098883, member: 92939"] I'd like to say a few words. I have read most of the messages, which are very pertinent. But when I see AV-Comparative and others, I have to intervene. Please know that I have no animosity towards these test companies, nor towards my fellow testers. But when I don't like it, I tend to say things. Personally, I give no credit to Av-Comparative, Av-Tests etc... Not because they're bad, but I very rarely see their test protocols, which for me should be mentioned... These test editors very rarely execute, contenting themselves with contextual analysis which, frankly, doesn't make a test. [U][B]=> Using ONLY EXE files is not enough to make a test.[/B][/U] There are different systems for infecting a machine. The classic e-mail trap with a PDF/ONE/JS or VBS file that downloads and launches a payload. There are also exploit sites called Drive-by Download, which will target all vulnerabilities at the same time until the malware is installed. And don't forget bloated or re-packed files, which can contain malicious code. [U][B]=> Relying ONLY on an analysis is TOTALLY insufficient for a test.[/B][/U] Antivirus software doesn't just have an antimalware engine! There are several shields to counter a threat. Whether it's basic protection, HIPS/IDS or anti-attack shields, these protections are not often highlighted in these tests. If one day you'd like to see my test protocol, I'd be delighted to show it to you! The only one I'll give credit to is [USER=71496]@Adrian Ścibor[/USER] , because it totally covers what I've mentioned. Enjoy :) [/QUOTE]
Insert quotes…
Verification
Post reply
Top