Advanced Plus Security TRS-80's Current 2019 Security Configuration

Last updated
Nov 28, 2019
Windows Edition
Home
Log-in security
Security updates
Allow security updates and latest features
User Access Control
Always notify
Real-time security
  • I rotate my A/V between ESET Smart Security Premium and Kaspersky Total.(One at a time installed.)
  • I generally run Malwarebytes Premium(Currently Ver. 4.04) Antimalware, tweaked.
  • I keep Zemana Anti-Malware(Ver. 3.1.495) for Second Opinion(Realtime Disabled.)
  • HitmanPro Commercial License for Cleaning(portable) and Extra Opinion.
  • UnChecky to prevent unwanted install boxes being checked.
  • Steven Black's Unified Hosts - Updated daily.
  • Panda USB Vaccine.
  • VoodooShield has "Overwatch."
  • Tweaks to Win Security(Standard.)
Firewall security
Periodic malware scanners
  • This is used to maintain my system and others.
  • Farbar's Recovery Scan Tool(x64 + x32.) - Updated as required, generally 3-5 days or when run.
  • RKill.
  • Security Check.
  • Farbar Service Scanner.
  • MiniToolBox.
  • AdwCleaner
  • ESET SysRescue.
  • ESET Online Scanner.
  • Malwarebytes Anti-Rootkit.
  • AswMBR - Anti-Rootkit/Virus.
  • GMER - Anti-Rootkit.
  • Sophos Virus Removal Tool.
  • Kaspersky TDSSKiller.
  • Emsisoft Emergency Kit - Installer.
  • Kaspersky Virus Removal Tool(s.)
  • Avira System Rescue ISO.
  • Kaspersky Rescue Disk ISO.
  • Bitdefender Rescue ISO.
  • Dr Web Rescue ISO.
  • SuperAntiSpyware Pro.
  • Panda USB Vaccine.
  • RemVBSWorm.
  • Rogue Killer Portable.
  • VirusTotal Uploader.
  • Multiple VPNs.
  • Probably more.
Malware sample testing
Browser(s) and extensions
  • MS Edge
  • LastPass
Maintenance tools
  • Mainly Custom Batch Files to run Windows Functions.
  • CCleaner - Now and then for a trash sweep + diagnostics.
File and Photo backup
  • Acronis.
  • Windows 7 Backup/Restore capability in Windows 10.
  • All Backups to external devices - Secured.
System recovery
  • Windows Inbuilt (Win 7 style.)
  • Acronis True Image.
Risk factors
    • Browsing to popular websites
    • Downloading software and files from reputable sites
    • Downloading malware samples
    • Browsing to unknown / untrusted / shady sites
    • Working from home
    • Streaming audio/video content from trusted sites or paid subscriptions
Computer specs
  • MSI PE60-6QE - Upgraded.
  • Processor: Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz - Patched.
  • NVIDIA GeForce GTX 960M.
  • 2 banks of 8GB=16GB Samsung DDR4 RAM @ 2133 MHz.
  • Samsung SSD 960 EVO 250GB.
  • WDC WD10JPVX-22JC3T0 HDD 931.5GB(~1TB.)
  • Enhanced Cooling.
Notes by Staff Team
  1. This setup may cause performance issues, system instability or conflicts between programs, and can hinder the effectiveness of the installed antivirus products.

harlan4096

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Apr 28, 2015
8,657
Please use VMWare, VirtualBox or Shadow Defender (in Shadow Mode) to download/test malware, never in main host system.

Apart from that the config is very complete, maybe a bit overkill (VoodooShield and MWBytes premiun also running in real-time protection with ESET/KIS :unsure: :unsure:?)

Thanks for sharing :giggle:
 

TRS-80

Level 1
Thread author
Aug 16, 2019
46
No @ebocious I most certainly don't have a Petabyte Drive. I'm not sure if they're available publicly yet. I haven't seen any, but I haven't been looking. It's a bit less than a Terrabyte. You're(so far) the only person who's even discussed Petabytes so kudos to you! Well done. If you hear of any going cheap let me know please.:unsure:

What you're seeing there is the model number. I can see how you arrived at your conclusion.


Cheers,

@TRS-80
 

Burrito

Level 24
Verified
Top Poster
Well-known
May 16, 2018
1,363
>>SuperAntiSpyware Pro.

That ruins the whole thing. :)

If one threw malware softballs at SuckyAntiSpyware all day, it would not notice.

It's one of the few things worse than Webroot.

Anyway, super extensive well-thought-out fortress.

While overkill for many, I like my security on the heavy and layered side too.

If your computer has enough horse-power to handle it, and you don't have software conflicts... go to town.

That's really a pretty good list of tools for new MTers to investigate too.

(y)
 

TRS-80

Level 1
Thread author
Aug 16, 2019
46
>>SuperAntiSpyware Pro.

That ruins the whole thing. :)

If one threw malware softballs at SuckyAntiSpyware all day, it would not notice.

It's one of the few things worse than Webroot.

G'day @Burrito ,


Don't panic Mate!

I haven't 'lost the plot' with 'SuckyAntiSpyware.' That one generally reserved for the Infected who simply insist on its use. I might run it on my own machine to clean out a few cookies, with a chuckle, when I'm bored. Its amazing how many people still put excessive trust in it. How long is it since the engines were last updated? It was a long time when I last checked.

I totally agree with your appraisal of SAS. I love the thought of it flailing about madly trying to fend off "Malware Softballs." Great sense of humour!! I concur that it wouldn't notice 99.9/100 "Softballs." I reckon the remaining 0.1 "balls" are hit foul.

I like to run layered with individual software rotation as randomly as possible. I haven't encountered any serious conflicts so far. Only one real time A/V and A/M are run concurrently. Whatever isn't being used real time is used solely as On Demand extra opinions.

I'd rather run a little more slowly due to Security being slightly over-prioritized than be constantly cleaning off the unwanted interlopers. The hardware copes okay too.

I didn't bother listing all tools for the sake of brevity.

Thanks for the good laugh.

Stay well, safe and happy!

Best,


@TRS-80
(Mike)
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top