- Nov 27, 2014
- 11
yes, it would be interesting to see Shadowra test VS with no av. I concur with all you say above. Good info!I currently run VS WITH an Antivirus (AV). However, at times I have gone into a "NO AV" mode. I have seen forum posts whereby I know that others have done this, and some are still doing this.
In my case, the real-time security I used consisted of VS & Spyshelter (SS). Also, I imaged my system 3-4 times weekly, using an external drive for storage of the images. Also, I did weekly on-demand scans with Kaspersky's KVRT app. During nearly 2 years in NO AV mode, I had to block several alerts popped up by either VS or SS or both. KVRT always reported my computer as clean so I never had to restore an image because of an infection.
I added K7, a patrolling AV, to my real-time security several months ago. Why? Because my computer's RAM & CPU barely noticed the difference with K7 aboard, so ---- why not?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IMO, most folks (me included) who tell a forum that they are in NO AV mode are doing so in order to report that they haven't had an infection in X number of years. These anecdotal posts are true, I'm sure, but they could be the result of EITHER (a) good luck, OR (b) a knowledgeable user who knows how to keep out of trouble.
It would be altogether lovely if @Shadowra or some other testing guru would test a NO AV mode, inclusive (of course) of VS, hardening, user control, etc.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
NOTE: I'm sure that Dan, in wording the announcement of this offer, did not intend it to flatly recommend against using an AV+VS combination. IMO, AV+VS is a near-bulletproof security combo whereas NO AV mode could be a somewhat risky set-up for average home computer users.
==>Running in NO AV mode is something I might do myself but I would NEVER recommend it to family or friends.
Yes because static analysis made by AV's signatures. Your antivirus scans file on execution, on creation and on modification, therefore accesses the file prior to VoodooShield, an anti-executable that will not make a static scan of the file on creation, but will on execution, since it checks the hash with several AV engines, if it still works the way I remember.I have seen my av catch malware before any notification from VS, fwiw.
yes, it would be interesting to see Shadowra test VS with no av. I concur with all you say above. Good info!
Edit I vaguely recall cruelsister tested VS, with a good recommendation, but don't recall when or where she posted it.
Old or not, I would like to view it. Link please.I already did it but the test is a bit old
I might do one again of course
Yes yes yessssss!!!I might do one again of course
FYI: VS no longer uses multi-AV engines, but rather Dans' WhitelistCloud file lookup, but otherwise you're correct, my friend. Good to see you again, BTW!VoodooShield, an anti-executable that will not make a static scan of the file on creation, but will on execution, since it checks the hash with several AV engines, if it still works the way I remember
Then please also test for FP on VS and make sure what's counted as a block. Because legit software that is labeled as "suspicious" is more like a FP than a block of malware (at least in my mind).I already did it but the test is a bit old
I might do one again of course
accurateAn anti-exe can definitely replace your standard antivirus solution, if you're an experienced user. Nevertheless I would suggest new users or people without the correct technical knowledge to do this, since they will probably just end up allowing all files to run upon request by VS and end up infected.