Do you run a real time Antivirus?

Discussion in 'polls' started by Page42, Jan 17, 2014.

?

Do you run a real time Antivirus?

  1. Yes

    68.5%
  2. No

    31.5%
  1. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    Thanks for posting. I am really surprised at this...
    ... and quite relieved that my intermediate-at-best computer skill level is what it is! :cool:
     
  2. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,784
    Sorry could only think of 9 off the top of my head. :D

    Limited choices for security on Android, if DefenceWall or the like comes out for the Smartphone I'll drop Eset like a hot potato.
    (also using Gray shirts NoRoot Firewall at the moment)

    That's the easiest solution for her. (believe me)
     
  3. Krysis

    Krysis Registered Member

    Joined:
    Dec 28, 2012
    Posts:
    371
    Location:
    DownUnder
    Nope! I'm confident of my security setup – besides, I've come to realize that my main safeguards are my browsing habits and the way I interact with the net.

    I've used a few AVs over the years and got sick of misbehavin AV drivers – and\or programs that caused more issues than the viruses they were supposed to be protecting you from!
    Plus, I got sick of continually updating the damn things. (I do use MBAM Pro – and have to update the defs - but as I use the program only to scan downloaded files - I update prior to scanning)
     
  4. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    Really, not even online ones like VirusTotal? I'd like to know what alternatives you have for checking downloads if so.
     
  5. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,491
    Yes, all in my sig! :D
     
  6. chris1341

    chris1341 Guest

    I feel tempted to go back occasionally to real time scanning but I always get depressed by the lack of efficacy for the system resources used.

    I'll give you an example. I used a highly rated (recent award winning) product, although it holds true for them all, for a month or so at the tail end of 2013. I got an e-mail with a zip attachment saying it was my credit card statement from a company I don't use. Virus written all over it for those who know what we're looking for. It was not detected by the real-time AV. VT scan gave 37 vendors detecting it but not mine. Start run restrictions in SBIE and AppGuard blocked execution.

    Some would say your other layers did their job, I just say if they do their job why the hell do I need resource hungry (in comparison to SBIE and AG) AV if the other layers are sufficient.

    Cheers
     
  7. guest

    guest Guest

    Nope. If I do that it means I will need to whitelist VT and Google in HTTPSB. And my upload speed is slow. Too long. Plus, it has file size limit.

    I do not. If I wanted to find new software or just trying out, first things first I'll look up on reliable websites such as Gizmo's TSA, dotTech, etc. Then when I have names, I'll lurk on forums to get more info about those software and their reputation. If all good, I'll see if those names are listed on Softpedia. The names which are not listed will be discarded. And if a software doesn't offer an offline installer, it will be rejected too. Lastly, the download links must not be blocked by any means.

    Thus, I don't need to check them anymore because the risk has been reduced considerably. Then you might ask: "How do I check PDFs or JPEGs or other downloads which seem to be non-executables?". The answer is simple, just open them. AFAIK they also will be blocked with execution control if it turned out that they were malware undercover. Although a proper sandbox is theoretically better.
     
    Last edited by a moderator: Jan 18, 2014
  8. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    :ouch:
     
  9. Osaban

    Osaban Registered Member

    Joined:
    Apr 11, 2005
    Posts:
    5,616
    Location:
    Milan and Seoul
    Yes, one would expect the opposite as an end result, on the other hand reading how the test machines were set up with only an AV (Trend Micro), it's not surprising that the higher number of websites would generate a higher probability of infection. White listing anti-exe, virtualization, sandboxing are absolutely necessary to avoid new infections.
     
  10. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    574
    Location:
    The Outer Limits
    Yes but I feel I dont really need it with Sandboxie out front, OP hips in the middle and MBAM/HMP covering the rear, as it were.
     
  11. RollingThunder

    RollingThunder Registered Member

    Joined:
    Nov 21, 2013
    Posts:
    224
    Location:
    USA
    You know Freddy, you have a real good point there. In my opinion it is just plain arrogant when a vendor who has a presence on a forum such as Wilders to stifle commentary by using their position to close down a thread they don't like. I have never liked bullies. I commented on the thread in question substantially. I couldn't explain part of my negative reaction to the prose being submitted. You clarified the outstanding problem I had. Thank you.

     
  12. Compu KTed

    Compu KTed Registered Member

    Joined:
    Dec 18, 2013
    Posts:
    1,412
    Well it looks like so far I'm one of those in the minority category of No.
    Why? Between online scanners, (file downloads) on-demand scanners, bootable cd
    scanners and a tight security setup in place I feel no need to run a real time AV.
     
  13. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
    So you download from reputable sources. But they aren't perfect, so what happens when you execute something? Is it allowed to run freely?
     
  14. pegr

    pegr Registered Member

    Joined:
    Apr 8, 2008
    Posts:
    2,280
    Location:
    UK
    Yes, but only because I have to when working remotely from home. My work VPN refuses the connection unless it finds an up-to-date AV running on the PC. For primary real-time protection, I prefer to rely on a combination of policy restriction and virtualization.
     
  15. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    574
    Location:
    The Outer Limits
    If one was running FPROT av would the answer still be no ?
     
  16. moontan

    moontan Registered Member

    Joined:
    Sep 11, 2010
    Posts:
    3,931
    Location:
    Québec
    i voted no.

    i bought my computer to enjoy software, not waste CPU cycles to run real-time security stuff.

    if i check my downloads with an on-demand scanner i don't see why i should run of those.
    i don't open suspicious email attachments either.
     
    Last edited: Jan 19, 2014
  17. Securon

    Securon Registered Member

    Joined:
    Jan 11, 2009
    Posts:
    1,960
    Location:
    London On
    Good Morning! Use WSA...as a Complimentary App. Sincerely...Securon
     
  18. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    Just to be clear, unless I'm completely misunderstanding, the reason that thread was closed was not because they didn't "like" it, but because an official company reaction was sought, and the forum is, primarily, for support issues, Joe being in development, and Daniel helping with support.
    Neither is either qualified, or presumably authorised, to go making official company statements etc.
    Please see: https://www.wilderssecurity.com/showpost.php?p=2328912&postcount=57
    https://www.wilderssecurity.com/showpost.php?p=2329540&postcount=61

    IMO you won't see anyone from BD or others generously providing such support as has always been evident over on the Prevx forum.

    Oh, and yes I use WSA :thumb:
     
  19. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,432
    Location:
    Slovakia
    No realtime nor ondemand AV, a firewall or any other security software for that matter. I find a chance of getting infected impossible (like 0,0...01%), so I do not bother.
    I have actually tried it at first because of the heavy impact of AV on the system performance, then I have slowly realized, that since Vista with UAC it was no longer needed.
    Please do not mistaken getting infected with getting hacked. A real person can not be stopped, no matter what, even security agencies can not prevent it with elite hackers.
     
  20. wolfrun

    wolfrun Registered Member

    Joined:
    Jul 26, 2009
    Posts:
    702
    Location:
    North America

    An update, no longer using any AV including MBAM pro in real time. MBAM and HitmanPro on demand only.
     
  21. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    That about covers it. The only time I've ever been infected is when I relied on an AV. The top link on a Google search led me to a site that crashed the AV. Since it was a security suite, the rest of the suite also crashed. Some time ago, an AV update caused several clients PCs to Blue Screen. The update added an anti-rootkit component which conflicted with another app. Many years back, I experimented with multiple AVs, 1 resident and several manual scanners. It wasn't bad until the manual scanners all started requiring resident processes and services, up to 8 separate processes on some of them. Maintaining compatibility became a nightmare, especially when they updated the apps with more bloat and fewer ways to shut off certain features. Even with all these, I was getting a collection of malware that evaded all of them when I first found it. Thanks to SSM intercepting the malware's attempt to execute, I was able to capture them.

    The update frequency got ridiculous on some of the AVs. I was satisfied with once per day. The AV initially wanted every 2 hours. Later, an update made that interval much shorter. I'd change the interval back to every 24 hours. The updates changed it back. I had to disable the built in updater and run it through a 3rd party scheduler tomake the interval stay where I wanted it.

    Every AV I've tried wanted to delete or quarantine several batch files I used. Hallf the time, the ignore options didn't work. Talking to the vendor didn't help as they considered them malicious if used on someone elses equipment.

    Between these problems and the general sluggishness each caused in my system, I was quite disgusted with AVs. After beta testing SSM and learning more about implementing a default-deny policy, I stopped using AVs and haven't looked back. Since that time, I've expanded my use of default-deny to include inter-process activity, internet access, web content, and connections to additional sites/servers contained in visited pages. The browser is faster. Pages load faster. Apps run faster. There's less demand on RAM and processor time and less heat coming out of the tower, much to my cats disapproval.
     
    Last edited: Jan 19, 2014
  22. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    Great post, man. Enjoyed your explanation. Too bad about the kitty, though.
    I'd love to see you post back one day and say you installed an AV... because the cat made you do it. :cool:
     
  23. safeguy

    safeguy Registered Member

    Joined:
    Jun 14, 2010
    Posts:
    1,797
    This reminded me of this:
    Addictive Update Model
     
  24. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    Now they've pushed this to its limit, constant, continuous updating, aka cloud AVs. In the mean time, they're buying out and absorbing other technologies (sandboxing, HIPS components, etc.) in order to keep themselves relevant, and bundling them with their update dependent cash cows in order to keep users paying.
     
  25. guest

    guest Guest

    Source. I only download software from Softpedia. It can be roughly considered as my download repo. And I always use the secure download links whenever possible.

    Very true. So are AVs. The only problem is if Softpedia was being hacked. I think the HOSTSs offered by HTTPSB and Comodo's Secure DNS should be enough.

    My logic says if the file already wrote on my HDD, it's been too late to prevent it if it contains malicious payloads. Now if I have executed it, trying to watch over it is like trying to fire a cannon while your ship is sinking. What matters to me is how to protect those allowed processes from being hijacked for any malicious purposes, which is supposed to be the job for EMET, AppGuard, EXE Radar, etc.
     
    Last edited by a moderator: Jan 19, 2014
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.