IF You chose a very limited, sleek, but effective security solution. What would it be?

Discussion in 'other anti-malware software' started by rodneym, Mar 23, 2016.

  1. rodneym

    rodneym Registered Member

    Joined:
    Oct 30, 2008
    Posts:
    271
    Lets say you're very knowledgable about PC sucurity for end users, and you decide to choose something that will keep the PC fast, and effectivly protected. Maybe you don't choose to even use a AV...

    What limited software choices would you make.
     
  2. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,240
    Location:
    Among the gum trees
    VoodooShield and HitmanPro.Alert.
     
  3. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    This thread is going to prove totally useless, as everyone have their own different views. In the end you have use what works for you.
     
  4. Amanda

    Amanda Registered Member

    Joined:
    Aug 8, 2013
    Posts:
    2,115
    Location:
    Brasil
    UAC + some HIPS, probably. And Avira Free.
     
  5. jadinolf

    jadinolf Registered Member

    Joined:
    Sep 2, 2006
    Posts:
    1,047
    Location:
    Southern California
    I agree. My advice has always been " take a few programs for a practice ride and THEN make the decision yourself".:)
     
  6. pcalvert

    pcalvert Registered Member

    Joined:
    May 21, 2005
    Posts:
    237
  7. guest

    guest Guest

    Rollback RX (snapshot software) + Shadow Defender (System-Wide Virtualization) with Shadow Mode set on boot + Sandboxie (Isolation) , this my actual baseline.

    With this no need any AVs, Anti-exe, etc...not saying the resources usage is very low.
    If something manage to bypass Sandboxie, i just reboot to cancel all change made during Shadow Mode or reload a clean RX's snapshot in a minute.

    i have added other softs to this baseline but they are more for playing/testing purposes than real needs.
     
  8. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,347
    Location:
    Europe, UE citizen
  9. khanyash

    khanyash Registered Member

    Joined:
    Apr 4, 2011
    Posts:
    2,429
    Voodoo Shield + AX64
     
  10. Brandonn2010

    Brandonn2010 Registered Member

    Joined:
    Jan 10, 2011
    Posts:
    1,854
    I second this. Near 100% protection when used properly, without database updates, constant scanning, etc.
     
  11. XhenEd

    XhenEd Registered Member

    Joined:
    Mar 31, 2014
    Posts:
    536
    Location:
    Philippines
    AppGuard and HMP.A

    @guest Is Rollback RX safe enough if I strictly follow the unOffishul guide? Will it not cause any problems other than the problems identified in that guide?
     
  12. guest

    guest Guest

    yep, also on MT i made a guide collecting facts from this guide + a procedure to use RX the first time.
     
  13. Martin_C

    Martin_C Registered Member

    Joined:
    Dec 4, 2014
    Posts:
    525
    I agree. This thread will be something to watch from a (far) distance. With popcorns :)
     
  14. Solarlynx

    Solarlynx Registered Member

    Joined:
    Jun 25, 2011
    Posts:
    2,015
    I like virtualization setups. Though in the case of pure virtualization setup the key point is how to determine that something get managed to bypass one of its layers or even just some nastie is inside one of this virtualization layers. Then you just reset - here no problems. But how to determine that you got some nastie?
     
  15. pandorax

    pandorax Registered Member

    Joined:
    Feb 14, 2011
    Posts:
    386
    Debian + firejail.
     
  16. trott3r

    trott3r Registered Member

    Joined:
    Jan 21, 2010
    Posts:
    1,283
    Location:
    UK
    Firewall with hips Outpost or kerio, hitmanpro.alert
     
  17. guest

    guest Guest

    With Win8/10 , you have already Windows Defender, Smartscreen and UAC to help figured it out. Add an On-Demand scanner like HMP or EEK , and you are quite covered.
    Also, if you are aware and caring of your system behavior (resources usages, access time of files, bandwidth usage, etc...) , you can pinpoint the abnormal behavior created by malwares. Then if you are accustomed to some monitoring tools (Process Explorer, etc...) , you can really differentiate if some processes aren't supposed to be there or do things they didn't used to before.

    However , with tools like RX or SD , the simplest thing i do is just to reset every time i boot; previously saving my work in the cloud or external devices after each sessions.
     
  18. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,919
    Microsoft (if Windows)
     
  19. ellison64

    ellison64 Registered Member

    Joined:
    Oct 5, 2003
    Posts:
    2,587
    Depends what OS is used..whether its 32bit or 64 bit ,....what processor ...amount of ram installed etc etc.
     
  20. ExtremeGamerBR

    ExtremeGamerBR Registered Member

    Joined:
    Aug 3, 2010
    Posts:
    1,351
    Sandboxie + Shadow Defender + Windows 10 with UAC max + Windows Defender.

    Weekly scans with HitmanPro.
     
  21. G1111

    G1111 Registered Member

    Joined:
    May 11, 2005
    Posts:
    2,294
    Location:
    USA
    If I wanted sleeker I would drop EIS, but feel much more secure with it and what's in my signature.
     
  22. Baldrick

    Baldrick Registered Member

    Joined:
    May 11, 2002
    Posts:
    2,675
    Location:
    South Wales, UK
    I am with on that one, Peter.
     
  23. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
    Ubuntu? ;)
     
  24. ance

    ance formerly: fmon

    Joined:
    May 5, 2013
    Posts:
    1,360
    Windows Defender and Brain.exe :)
     
  25. SIR****TMG

    SIR****TMG Registered Member

    Joined:
    May 31, 2004
    Posts:
    833
    WinAntiRansom and AppGuard
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.