360 Total Security - English

Discussion in 'other anti-virus software' started by ifacedown, Apr 23, 2014.

  1. Iangh

    Iangh Registered Member

    Joined:
    Jul 13, 2005
    Posts:
    849
    Location:
    Melbourne, Australia
    How do I tell it to install without prompting me to block/allow?
     
  2. LunarWolf

    LunarWolf Registered Member

    Joined:
    Jan 4, 2011
    Posts:
    203
    Location:
    Malaysia
    Right click, enter silent mode?
     
  3. Morro

    Morro Registered Member

    Joined:
    Jul 11, 2009
    Posts:
    355
    Location:
    Netherlands
    My pleasure. :)

    Not having to do that makes it faster and easier for us users. :)
     
  4. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    Posting this for the future generation, forgive but never forget :)
    https://youtu.be/Vdpl5_-xrxY
     
  5. Morro

    Morro Registered Member

    Joined:
    Jul 11, 2009
    Posts:
    355
    Location:
    Netherlands
    LoL Now that is wishful thinking on Qihoo side. :)
     
  6. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    Go with the flow :p
    Besides, it's 2050, we have nothing to worry about :) Facebook interface looks cool tho.... And that robot thing, I can think of many applications for him/her/it :)
     
  7. Morro

    Morro Registered Member

    Joined:
    Jul 11, 2009
    Posts:
    355
    Location:
    Netherlands
    Good point. :)

    Yeah that is true.

    Well ... Uhmm? :confused::)
     
  8. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    Trust me, you don't wanna know ;)
    I was thinking of asking you something, guys.
    What do you think of this video:
    https://www.youtube.com/watch?v=Hya0ovc6qzY
    Do you think Qihoo should make more videos like this?
    Suggestions? :)
     
    Last edited by a moderator: Apr 8, 2016
  9. Morro

    Morro Registered Member

    Joined:
    Jul 11, 2009
    Posts:
    355
    Location:
    Netherlands
    Well if they add something totally new to the program then they should make an updated version. ( But it is safe to say they already know that. :) )

    I was at first going to mention, that they could make another one for the Essential version, but that actually would not make sense I guess. They of course want to advertise for the total package with all the functions it has, while TSE is the same at its core, just without the extra possibilities. Those like me who prefer TSE will find it any way. :)
     
  10. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    Well, truth be told, TS is the flagship, the main powerhorse and the top dog :) TSE is the little brother :)
    Nevertheless, I'll look into it and see what I can do :)
     
  11. tgell

    tgell Registered Member

    Joined:
    Nov 12, 2004
    Posts:
    1,097
    I like it. It would be interesting to see what the response would be if it ever gets on television but I doubt that would happen.
     
  12. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    As a TV advert? Where, which station? Where would it have the most impact?
     
  13. tgell

    tgell Registered Member

    Joined:
    Nov 12, 2004
    Posts:
    1,097
    Microsoft runs ads on television for Windows 10 and surface. I'm not sure where an antivirus would have the most impact, possibly on a cable show that has a lot of young viewers into tech. The same ad could be used to advertise their mobile app too.
     
  14. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    Thanks for your suggestions. I'll look into it with marketing and finances department and see what can be done :)
     
  15. Morro

    Morro Registered Member

    Joined:
    Jul 11, 2009
    Posts:
    355
    Location:
    Netherlands
    LoL It seems that everyone but me can give a easier to understand and shorter answer then me. :)
     
  16. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    This will make you feel a little bit better:
    https://www.youtube.com/watch?v=5VmfC27a4Zg
     
  17. rogervernon

    rogervernon Registered Member

    Joined:
    Jul 16, 2006
    Posts:
    289
    No firewall in TS, so what is the best route to follow?
     
  18. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    Technically, there is in Toolbox. But experiment.
    Choose what you like.
    Here's a small list of firewalls and their last update date.
    Agnitum Outpost Firewall Pro 9.3.4934.708.2079
    01-12-2015 16:09 GMT
    Comodo Internet Security 8.2.0.5005
    1 day 1 hour ago
    Look 'n' Stop Firewall 2.07
    14-04-2012 08:48 GMT
    Privatefirewall 7.0.30.3
    20-12-2013 07:03 GMT
    TinyWall 2.1.8
    11-03-2016 00:44 GMT
    Windows Firewall Control 4.7.0.0
    30-03-2016 01:48 GMT
    ZoneAlarm Free 14.1.057.000
    3 days 22 hours ago

    Personally, I use windows firewall with tweaking.com program that adds context menu
    http://www.tweaking.com/content/pag...k)_allowblock_or_remove_windows_firewall.html

    People like to merge it with Comodo Firewall, or Private Firewall, take your pick.....
     
  19. Morro

    Morro Registered Member

    Joined:
    Jul 11, 2009
    Posts:
    355
    Location:
    Netherlands
    That was a good movie, when he was stil famous. :)

    @rogervernon

    I use TSE combined with Comodo Firewall, and I really like that combo. ( It should not be different with TS I guess. )
     
  20. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    Did you mutually exclude those two programs from eachother?
    And what is active in Comodo, HIPS and/or BB?
     
  21. liba

    liba Registered Member

    Joined:
    Jan 21, 2016
    Posts:
    344
    360 Total Security = antivirus or Spy Program ?

    yeah, its a spy, not antivirus


    PERSONAL USER INFORMATION
    In order to provide our services described in the Software License and Service Agreement, we may collect the following "Personal User Information":

    • Contact Information (including name, address, email address, business address, telephone and fax number)
    • Personal Details (including birth date, race, gender, sexual orientation, ID card number and social security number)
    • Internet Access and Use Information (including social network account user names, contacts, chat logs, email messages, search history and web browsing history)
    • Payment Information (including payment card bank account numbers or passwords, credit card statements, or transaction histories)
    • Transaction Information (including your purchase history and data relating to use of Services and Software provided by 360)
    • Correspondence (including any information you provided or were provided through 360 related communication channels, including technical support and customer service)
    • Photograph (if you share a photograph with us)
    We collect the following information in two ways:

    • Information you give us. You may give us information in a variety of ways, including when you request technical support or customer service, register a product, or give us reviews or feedback. As an example, many of our Services and Software require you to sign up for a 360 Account. When you do, we will ask you to submit certain Personal User Information, like your name, email address, and other contact information. If you want to take advantage of the communication tools we offer, the foregoing information may be publicly visible, including your name and photograph.
    • Information we get from your use of our Services and Software. We may collect information about the Services and Software that you use and how you use them. This information may include, for instance, information about your device, details about your usage patterns, limited details about your Internet usage stored temporarily to provide our Services and Software, computer files and risks such as malware, and information that may be included in a virus or malware sample that we collect from your computer for review.
      • Device information. We may collect device-specific information, including your operating system version, system language, and IMEI number. In order to view the following system information of managed computers for 360 Connect for Android/iOS: operating system, CPU, memory, hard disk, computer name, 360 Total Security will upload the following information to 360 Security Center: CPU model, memory, hard disk, operating system, computer name.
      • Log information. When you use our Services and Software, we may automatically collect and store certain information on our servers related to your use of our website or Services and Software to help us improve the quality of our products and service. This may include:
        • The manner in which you use our website or Services and Software, including how frequently you install, use or uninstall our Software and its features.
        • IP address.
    • Information collected relating to installed programs scanned by Software features. The information uploaded onto our 360 cloud security center ("360 Cloud Security Center") servers for virus scanning and Instant Setup function include: file paths and MD5 checksums of the executable files, installed software names, package names, software signature certificates, and software URLs in conjunction with our filtering feature, which we apply to suspicious URLs when you use 360 Internet Protection (this information is processed with encryption and temporarily stored solely to provide our Services).
      • URL information. URLs of websites that you visit will be uploaded to 360 Cloud Security Center servers for phishing and online fraud analysis. Any Personal User Information will be removed from the URLs before they are uploaded. The information is processed with encryption before the upload. In order to receive the critical system event (including system startup, malware activity, risky website visiting, low system disk space ) from managed computers for 360 Connect for Android/iOS, 360 Total Security will upload the following information to 360 Security Center: malware activity, risky website visiting, system startup, disk usage.
      • Information relating to upgrades and updates to Software, including the time of the upgrade and the version of the upgrade.
      • Unique Serial numbers. When you use certain services, they might have a unique 360 serial number. This serial number and certain information about your installation (for example, the type of operating system on your device) may be sent to 360 when you install or uninstall Software or when Software periodically contacts our servers, such as in a check for automatic updates.
      • Local storage. We may collect and store information (including personal information) locally on your device using mechanisms such as browser web storage (including HTML 5) and application data caches. Such information includes: user settings, file whitelist and blacklist used to accelerate file scanning. In order to activate the computer check up for 360 Connect for Android/iOS to remove malware, optimize system performance and clean up system junks, 360 Total Security will upload the following information to 360 Security Center: startup items, system junks and malware detection.
      • Error Log Uploading: Software will generate an error log and a DUMP file automatically when an unexpected error occurs or an application crashes. Software will upload the error log and the DUMP file to 360 Cloud Security Center as required to find out the reason that the error occurred or Software crashed and improve the quality of the product. Before uploading the error log and the DUMP file, Software will prompt you to agree to the upload. If you agree, Software will upload the error log and the DUMP file to 360 Cloud Security Center; and if you do not agree, Software will not upload the log. The error log is a record of Software errors and/or crashes. DUMP files are generated by the operating systems (e.g. Windows, Android, and iOS) when a program crashes, and contain the program execution status of the crash, including the time of crash and system information. They do not contain Personal User Information.
    http://www.360totalsecurity.com/en/privacy/
     
  22. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    @liba This has been discussed in debate few pages back. Please refer to those previous posts. If need more clarification, please let me know, thanks. :)
     
  23. Solarlynx

    Solarlynx Registered Member

    Joined:
    Jun 25, 2011
    Posts:
    2,015
    Sorry, I didn't find this debate few pages back. This clause in the Privacy Policy embarrasses me most:

    Do they really need bank account numbers and passwords?
     
  24. GakunGak

    GakunGak Registered Member

    Joined:
    Mar 24, 2009
    Posts:
    953
    This is gray area.
    There are many paid services Q360 provides which are China only for chinese only, and are not applicable for outside usage. To simplify things, like internet shops, they store/keep buyers info to speed up things.

    Qihoo 360, as a security company, is not in the business of misusing user data in any other way, except the following:
    - to track program usage for statistics, like scans, cleanup, speedup and most common accessed features
    - to track threats trend [in what parts of the world is which threat encountered
    - what system is Q360 protecting, pc or mobile

    Q360 does not, and will not, knowingly, share or abuse ANY private user information it may receive [prior to which it is encrypted], whatsoever.

    In order for ANY company [be it Kaspersky, Symantec, Bitdefender, GDATA, whatever] know how many users there are enjoying their product, it has to call home, send statistics of it's usage
    to research and engineering team, to help improve the product, or even diagnose and fix potential problems it might have, also have things simplified and make things go faster and more smooth.
    That's why some companies want to send unknown exe's present in the system behind your back for analysis. Others, like Comodo and Qihoo, ask after the scan, to submit unknown exe, dll or script
    to analyse and, if found malicious, to act before the damage is done. And it's a good thing alltogether.

    This has been discussed a lot before, so I am taking the exception now to address it again.

    If anyone wants to have an in-depth analysis of what happens beind the scenes while Q360 is running on your system, let me know and will do my best to provide it next week.

    And I hope, that this will be put to rest. These guys contribute to Windows security by sending info about vulnerabilities. Look it up. Also to Google about Google Chrome. Look it up.

    Thank you for understanding :)

    EDIT: For next time, everyone, please read privacy policy entirely, there is what, why, when and how. :)
     
  25. tgell

    tgell Registered Member

    Joined:
    Nov 12, 2004
    Posts:
    1,097
    All AVs call home. For instance, take a look at avast's privacy policy. And yes, Qihoo does not check your credit card numbers everytime you purchase something on the internet. What they do collect is your credit card info when purchasing something through Qihoo as GakunGak clearly explained.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.