More Than 1 AntiVirus?

Discussion in 'other anti-virus software' started by stephentony, Dec 1, 2004.

Thread Status:
Not open for further replies.
  1. kloshar

    kloshar Registered Member

    Joined:
    Oct 12, 2003
    Posts:
    279
    Location:
    Europe, Slovenia, Bre?ice
    NOD32 and F-prot work together with no problems. The real-time scan is turned on.
     
  2. timnicebutdim

    timnicebutdim Registered Member

    Joined:
    Jan 24, 2005
    Posts:
    66
    I don't suppose you could give me some instructions as to how to have both NOD and KAV running at the same time? I would also like to try having KAV as my real time monitor with NOD as a back up but i am not sure how to do this.
    I did try installing KAV with NOD already installed but it crashed my system before i could find out a way to turn off real time protection for one of them... i had to go into safe mode and uninstall NOD.. now i have KAV running as my real time but would like to add NOD as a backup.
     
  3. Diver

    Diver Registered Member

    Joined:
    Feb 6, 2005
    Posts:
    1,444
    Location:
    Deep Underwater
    Not to rain on your parade, or anything, but what do you expect to gain by running KAV real time and NOD32 on demand.

    Firefighter has done a bunch of tests where various AV's are combined. Either 2 AV's or an AV and Ewido, a trojan scanner. When it comes to KAV, there was hardly any improvement by adding Ewido. Furthermore, I would have to say that FF's test methodology while not unfair, was heavily weighted with trojans which would tend to cause Ewido to have a greater incremental improvement.

    NOD32, is a good AV, but if it has a weak point it is in detecting trojans. So, if KAV missed something, NOD32 is not that likely to catch it. The sole exception might be a zero hour virus that the advanced hueristics snags. It might happen to you once every 15 years.

    Perhaps running NOD32 real time and KAV as a backup might have a benefit. NOD32 has less of an effect on system performance. KAV can be saved to use only on questionable stuff. This one is easy to do because KAV 4.5 has a selective installer that can leave out the real time components, if I remember correctly.
     
  4. Stan999

    Stan999 Registered Member

    Joined:
    Sep 27, 2002
    Posts:
    566
    Location:
    Fort Worth, TX USA
    I have NOD on one game machine and a KAV AV on two machines. Actually NOD's AH caught 4 zero-day infections prior to KAV over the last 12 months on my end, YMMV.

    One example I did post:

    https://www.wilderssecurity.com/showthread.php?t=42010

    Also:

    https://www.wilderssecurity.com/showthread.php?t=58482
     
  5. Diver

    Diver Registered Member

    Joined:
    Feb 6, 2005
    Posts:
    1,444
    Location:
    Deep Underwater
    Stan, you must be a lucky guy. Where do you find all these zero day thingies? By the way, there is simple way to deal with email attachments. Just do not run them ever. My ISP scans the mail, so I have not seen an infected email in years.

    More software will not make you as safe as more awareness.
     
  6. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,883
    Location:
    Texas
  7. Stan999

    Stan999 Registered Member

    Joined:
    Sep 27, 2002
    Posts:
    566
    Location:
    Fort Worth, TX USA
    Hi Diver,

    Actually on a game machine that is primarily used by a bunch of teens
    who don't tend to practice safe hex.:) Also have BOClean running on that box but so far NOD has stopped all. Using the combination of NOD and BOClean on that game machine due to their low CPU impact.
     
  8. JimIT

    JimIT Registered Member

    Joined:
    Jan 22, 2003
    Posts:
    1,035
    Location:
    Denton, Texas
    Very simple, but unfortunately, not always realistic. :D

    Stan's not a "lucky guy"--he sees the same thing a lot of users see on a day-to-day basis: zero-day malware that no av can catch relying solely on signatures. ;)

    And regardless of how much "awareness" you pass along, there will always be the user who MUST click some attachments, because their jobs require it for communication. Excellent heuristic detection is paramount in this scenario. :D
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.