That's a tremendously optimistic estimate.
Thanks, Blue. You never fail to be a breath of fresh air in a stuffed cell.
As you say, EASTER. I'm sure your outstanding reputation for accurate claims speaks for itself.
No, there aren't any Laws of Nature(tm) that explicitly state this, but that's a very truthful statement nonetheless. Do you define a firewall as...
In SSM's case, you can prevent other processes from launching, manipulating, or otherwise tampering iexplore.exe, thereby ensuring that whatever...
For the obviously clean, yes. There are a lot of borderline cases where behavior blockers fail and throw an FP.
Beats me as well, but that's what someone claimed anyway, along with the assurance that he'd be more than happy to provide the evidence "when he...
Wrong. The malware code already exists on your hard drive (how else do you think it got scanned?), it just hasn't been passed to the process that...
I LOLed. ;D ~Off topic comment removed. - Ron~ but like the thread starter said, precious little supporting happens around here, and even less...
Unfortunately it's not that easy for me. Would you care to provide any further explanation or evidence for this claim? I'm still waiting for...
Why should anyone bother, when you cannot provide any rational justification for your views in the first place?
SSM is one of the more user-friendly "dumb" HIPS on the market right now. Granted, it will generate a certain level of noise, given that it IS...
In my experience, there's no need to bother and waste your time. Eset will completely ignore your submissions, over and over again. Eset has done...
Other AVs also have to employ this classic defense less often.
Restarting terminated processes is, I believe, a feature unique to SSM. EQSecure, even though it comes with ALOT of other attractive features,...
That's Threat Expert, not ThreatFire. www.threatexpert.com
If your priority is security, D+ is more secure, assuming you know how to configure and use it properly to its maximum effectiveness. Otherwise,...
Do you have a file that slipped past TF's behavioral detection? Zip it up with a password, and use the support page to send it as an attachment...
Fake codecs were merely an example, and the latest malware fad that most people might have heard of. And since you acknowledge that porn is indeed...
Spyware Terminator
Yes, we all know that your personal unsubstantiated anecdotal evidence fairly represents the entirety of the internet at large. Of course, you can...
Did you follow the recommendation of leaving Learning Mode on until after a reboot?
Limiting his audience to novices does not excuse posting misleading allegations. I do not suggest that he recommend advanced solutions to novices,...
Why not? Computer security is not a single-faceted science. There are many people who stay infection-free even without any security software....
Or it's bad from a computer security standpoint because they're most often sources of infection, and should be avoided to stay safe. The same...
Separate names with a comma.