Hi CN232, It is very easy to criticize. Some people make careers out of it. I am advocating that: 1) An AV/AT scanner is the first line...
Re: RegRun Entries Hi guys, It looks like there are lots of good things happening. It would be nice if it could be organized and documented in...
My experiences are entirely the opposite. That is why PG has a free trial so that people can decide for themselves. There was at least one...
Not at all. Different companies and products have different levels of knowledge and expertise. Often they will overlap (like a ven diagram), but...
Hi bibbe, You definitely should not have had any kind of messages concerning driver error during the install. I am at lost on how to help you...
That is why layered protection is best. There are all kinds of ways to "beat the security system". The idea is to make it as difficult as possible...
"So the question is if these problems can be countered by these steps, how much additional protection does exe monitoring give on top of that?"...
Hi, I concur with jbarr. It seems like some registry entries were messed up during the initial install. It would be helpful to completely clean...
HI Starrob, I agree. A memory scanner is an insurance policy. Why take a chance as long as it does not negatively impact by computer usage. I...
Hi P2000, Yes, this is very true. Recently, while cleaning a friend's computer, several instances of malware, which were packed in ADS files,...
Hi all, When I was using Norton, I remember Ewido saving me many times. But ever since I have been using Kasperky's AV, nothing seems to get by...
Hi, I too would be happy to pay a yearly fee to support future upgrades to the product. I would much rather see Diamondcs have the money and...
Here is an interesting comment from Jotti: "Approximately 2 malicious programs pass this scanner, without any AV product noticing anything,...
Hi, To be fair to all of the ATs, KAV's coverage is so good that there is practically no chance that any of them will ever find anything in...
HI eyes-open, WinPatrol may be a bit overwhelming for you Mom. I would recommend using NOD32, if this is one of your choices. It is relatively...
Hi Peter and bigc, There are many security vulnerabilities introduced by ADS, which have been discussed on other thread, that appear to be...
Meltdown, The idea is that when you Google an item and it doesn't show up on Google, then you probably have a piece of malware. My friend, who...
Hi Meltdown, "If an executable gets through all my scanners, even Jotti if I'm exceptionally cautious, why would I want to block it?"...
Hi Notok et al, For me (and my friends who are using PG), the most important aspect of PG is execution protection. This feature provides me...
Hi Jag, Since I am most focused on stopping any unauthorized program running, before they it can exploit a buffer overflow vulnerability, I...
Hi Stevio, It is sometimes called the "Law of Unintended Consequences". The same "capabilities" (or holes) that were designed by Microsoft and...
Hi CN232, If all you are saying is that users should have a good scanner, then who has said otherwise? What scanners and security protection do...
Thanks for the additional tips Paranoid. I did set up SMH on my prior version of PG, but I never got around to doing it again. It would be nice if...
Hi eyes-open, I have all of these products and have no problems running them with each other on my XP XP2 512K, 2.5 GHz machine. I think the...
Hi Rmus, Lots of interesting points. 1) First, I agree with your decision. It is better to get the two products from the same company in...
Separate names with a comma.