Which Type Of Program You Trust To Protect Your Systems?

Discussion in 'other anti-malware software' started by jmonge, May 22, 2011.

Thread Status:
Not open for further replies.
  1. Triple Helix

    Triple Helix Specialist

    Joined:
    Nov 20, 2004
    Posts:
    13,275
    Location:
    Ontario, Canada
    For realtime Prevx with SafeOnline, Look'n'Stop Firewall with Phant0m``s Look 'n' Stop Ruleset Deluxe v1 Build: 008.2, WinPatrol Plus also behind a Firewall Router! Why? The most minimal impact on system plain and simple for novices if need be! For On-Demand if necessary Hitman Pro Licensed, MBAM Lifetime Licensed, SAS Lifetime Licensed, Trojan Hunter Licensed, Trojan Remover lifetime Licensed, Emsisoft Anti-Malware Free, VMware Workstation 7 licensed to try new programs and test some malware and also have VIPRE AV licensed on my 3 VM's and Acronis True Image 2010 for weekly system backups! I also have Shadow Defender lifetime Licensed on my other system as I don't know if it will work properly on my new system with SSD drives.

    TH

    EDIT: Sorry #1 thing to have is some common sense!
     
    Last edited: May 22, 2011
  2. Yanick

    Yanick Registered Member

    Joined:
    May 3, 2011
    Posts:
    274
    Sry Blasev, had to copy your line :D
    Sanboxie+AV+BB+HIPS+FW, plus... Mild system hardening (UAC and EMET)

    LUA+SRP(via parental controls)

    Windows 7 Firewall Control (binisoft one)
    Microsoft Security Essentials
    Prevx SOL
    MBAM Pro
    ClearCloud
    SpyShelter Premium
    WinPatrol Plus
    Secunia PSI

    Finally found my setup, after long search.

    Bunch of on-demand scanners in equation.
     
    Last edited: May 23, 2011
  3. 1000db

    1000db Registered Member

    Joined:
    Jan 9, 2009
    Posts:
    718
    Location:
    Missouri
    I've become a believer in anti-executable type HIPS.
     
  4. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    me too my friend;) you feel secure ;)
     
  5. LethalBoy

    LethalBoy Registered Member

    Joined:
    Aug 10, 2008
    Posts:
    119
    HIPS ftw~:D :thumb:
     
  6. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
  7. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,491
    For me it's: HIPS + AV/FW + BB + Tweaks or "Hardening" + SRP :D
     
  8. Zorak

    Zorak Registered Member

    Joined:
    Jan 2, 2010
    Posts:
    182
    Location:
    Australian Capital Territory
    I agree with moontan - use everything the OS provides first. I feel very safe in a Standard User Account along with a default deny Software Restriction Policy.

    See my sig. for other settings/programs I feel add useful layers to a balanced security setup. It has so far withstood the "attacks" of 2 teenagers and a computer noob partner (hope she's not reading this! :ninja:). Now that's an example of real-world protection :cool:
     
  9. Kernelwars

    Kernelwars Registered Member

    Joined:
    Aug 12, 2010
    Posts:
    2,155
    Location:
    TX
    yea HIPS for me too:thumb:
     
  10. Cutting_Edgetech

    Cutting_Edgetech Registered Member

    Joined:
    Mar 30, 2006
    Posts:
    5,694
    Location:
    USA
    Light virtualization like Shadow Defender, and a Good AE like Appguard. Extremely secure, and very light on memory & resources.
     
  11. pegr

    pegr Registered Member

    Joined:
    Apr 8, 2008
    Posts:
    2,280
    Location:
    UK
    Prevx anti-malware, Comodo Firewall with Defense+, Shadow Defender, Sandboxie, Trusteer Rapport, Acronis True Image.
     
  12. Francis93

    Francis93 Registered Member

    Joined:
    Feb 1, 2011
    Posts:
    311
    All malware are placed here ----> 1st -- Primary Protection (Sandbox, HIPS, Virtualization, Common Sense)

    If malware bypasses primary protection ----> 2nd -- Secondary Protection (Antivirus, Firewall)

    If malware bypasses secondary protection which is quite impossible ----> 3rd -- Ternary Protection (On-demand scanners, system tweaks, etc.)

    :thumb:
     
    Last edited: May 23, 2011
  13. sg09

    sg09 Registered Member

    Joined:
    Jul 11, 2009
    Posts:
    2,811
    Location:
    Kolkata, India
    Presently I am tired of using HIPS. So, I prefer to use a non-HIPS firewall along with a decent or light antivirus with good web filtering. I don't prefer antiviruses that rely on browser addons to block pages. Although I don't prefer HIPS but I do prefer to use something that will alert me of new startup/ IE addons like Winpatrol or Anvir Taskmanager. Although I prefer safe browsing, but I use a good DNS server that will block malicious pages for me. I also prefer to use WOT that will alert me about page ratings. Overall I will go for overprotection duing browsing. Sometimes I use Sandboxie to perform jobs that can affect my system. To perform dengerous jobs I use virtual machines like VMWare. I avoid malware attack from USB drives I use No Autorun and also Panda USB Vaccine for automatic USb vaccination.
    This is my layered security approach. I use administrator account without UAC. I take occasional system images.
     
  14. Boyfriend

    Boyfriend Registered Member

    Joined:
    Jun 7, 2010
    Posts:
    1,070
    Location:
    Pakistan
    1. KIS (Anti-Virus, Firewall, HIPS)
    2. Sandboxie (Google Chrome (+ security/privacy extensions) sandboxed + few other sandboxes like multimedia, game, general, and IE)
    3. Deep Freeze (System drive only)
    4. Software Restriction Policy (very few exception only)
    5. On-Demand Scanner (Emsisoft Command-line Scanner)
    6. Process Explorer + CleanMem Mini Monitor + Drive Speedometer bar to keep an eye on all resources (processes, CPU, memory, HDD R/W)
    7. Common Sense (Beta2)
     
  15. Konata Izumi

    Konata Izumi Registered Member

    Joined:
    Nov 23, 2008
    Posts:
    1,557
    Hardcore system hardening! (it does not require additional resources and also provides foolproof security)
    System Virtualization ie. Returnil 2011 FREE
    Antikeylogger: undecided. probably the next version of Spyshelter.


    For blacklist:
    • DNS w/ malware blocking ie. Clearcloud
    • IP Blacklist/Filtering software ie. Peerblock
    • Local Proxy w/ advanced Filtering / adblocking ie. Privoxy
     
  16. m00nbl00d

    m00nbl00d Registered Member

    Joined:
    Jan 4, 2009
    Posts:
    6,623
    I'm trying to figure out something. If hardcore system hardening provides foolproof security, why would you need antikeylogger and a blacklist approach?

    It doesn't make any sense. :p
     
  17. sweater

    sweater Registered Member

    Joined:
    Jun 24, 2005
    Posts:
    1,678
    Location:
    Philippines, the Political Dynasty Capital of the
    Any protection armament that was made in Europe, especially if it's made by a Russian. Coz I felt am carrying an AK-47 of which is the no.1 assault weapon in the world...proven & tested in any battle zones. Whatever...hehe..:D

    That's why I prefer to have NOD32 and DefenseWall Personal Firewall running all the time. :cool:
     
  18. cm1971

    cm1971 Registered Member

    Joined:
    Oct 22, 2010
    Posts:
    727
    I am using DefenseWall and Returnil on my main computer and am happy with both. :cool:
     
  19. justenough

    justenough Registered Member

    Joined:
    May 13, 2010
    Posts:
    1,549
    Virtualization = Sandboxie
    Anti-Malware = Malwarebytes
    Behavior Blocker = Mamutu
    Scanner = Hitman Pro
    System Image = Macrium Reflect

    Puppy Linux with a USB flash drive when I want to go to a red WOT site.
     
  20. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    :thumb: :thumb: keep posting we are getting here very good ideas and advises:thumb:
     
  21. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,784
    Light Virtualization with Sandbox, Anti-Executable and or HIPS.
    Scanners are only for checking downloads.
    Image backup,IMO, is a must.
     
  22. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    Not Carnivore etc anyway :D
     
  23. G1111

    G1111 Registered Member

    Joined:
    May 11, 2005
    Posts:
    2,294
    Location:
    USA
    DefenseWall (policy based sandbox), Emsisoft Anti-Malware (behavior blocker enabled) and LooknStop firewall. I run some other small things (EMET, occasional UAC, etc.), but with the first three running feel secure.
     
  24. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    HitMan pro is very important here to confirm system is clean:thumb:
     
  25. Konata Izumi

    Konata Izumi Registered Member

    Joined:
    Nov 23, 2008
    Posts:
    1,557
    Blame it on my paranoia :)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.