Thanks for the informative responses!
Can one get infected by malware if they simply open a html message with a malicious script? Would the script need to download the actual malware...
Isn't AVG Free's Identity Protection basically the behavioural blocker technology they bought from SANA? If so, with the behavioural blocker and...
That looks more than adequate. As long as you follow safe practises. See Gizmo's Guide to Securing Your PC, Safe Computing in Under an Hour, Safe...
Can you offer some proof of this? thanks
Thanks for the reply. So how does this worsen protection?
Thanks for the heads up.
How would a third party firewall worsen inbound filtering? Thanks
Thanks for the info. Regarding the behaviour shield, how does the 'sensors' work? How is it different to a typical behavioural blocker?
So the url blocker uses a different blacklist to Avast's file scanner? How so (particularly the behavioural shield)?
Does Avast's shields (web, email, P2P, etc) use the same engine as Avast file shield? If so, how does it improve protection?
I agree, I'm using this right now and it works really well. :thumb:
IMHO this has completely destroyed his credibility as an 'expert'. How could he not recognise such an obvious description of a rogue?
Wouldn't outbound firewall be at the end? Other than that nice graph. :thumb:
You could check out the free security software recommendations here.
Real-time Kerio Personal Firewall 2.15 Microsoft Security Essentials On-demand Panda USB Vaccine Sandboxie Browsing OpenDNS Firefox...
Could you elaborate?
It seems to me that apart from hype and the vendor's own tests there is really no evidence to say that Zemana is the 'best' antikeylogger.
These are all great software but IMHO Prevx is probably the best choice because it requires the least amount of user interaction.
Sad news. :'( Very sorry to hear this, and my condolences to his family.
Good decision. :thumb:
:blink: A rather dubious reply IMHO.
What do u mean with AV-test not having a good test?
I agree. If I had to choose I would definitely trust Kevin over Melih. The claim that Comodo is reverse engineering of Nod32 is very disturbing, I...
Surely it would be 2?
Separate names with a comma.