I have used DRDOS5-6, Os/2 2.1-Warp, FreeBsd, various Linux Distributions, etc. So, to those with reasonable experience in Non-MS OSes... Is the...
Massive? Hehe. For some, it may be massive. For this entity?
Yes, we do have a legal system in my country. It's the same country that allowed a monopolist to control the market with an OS that has a very...
The manufacturer of my car is based in my country, and so too the producers of my food, and I know the University from which my doctor graduated....
Hello Herbalist! Some months ago I followed the link on your sig and created a Win98SE VM, to remember the good ol' days. Well, the good ol'...
One advantage that the separate hardware strategy has over multi-layered which appeals to me: I can SEE with my EYES and confirm there can be no...
Don't say another word.
Now that you have discovered the Perfect Security strategy, what else is left? Isn't it a little boring, with no where left to go?
Hello I've only seen one in the last eight years(from my personal activities). This was about 9 months ago, found while still in a RAR file....
Given my current skill level and work habits, I would feel safer with HIPS if forced to choose only one. AVs are just dumb database clients.
Well, a chain is only as strong as its weakest link, isn't it? What is the point of having the best lock on your door if you are going to leave...
Corporations have dedicated IT support staff that will re-image your drive at a moment's notice. They also don't care if your data gets erased in...
Well, Winroute requires at least two network interfaces, which I think means that it works closer to the hardware level. As it is oriented to the...
I think this is significant. Many threads start with someone listing several security software and then asking if they are enough, or if one or...
How about the law getting tough on billionaires running corporations that sell insecure OS to unsuspecting consumers? Oy, if I tell me...
Excellent point, which emphasizes the need for light virtualization apps. If Kaspersky has 500,000 signatures now, what will happen if five years...
Any site which does not use HTTPS, or which is not from a company you can take to court. You have contrasted the advantages of a security...
The second machine is supposed to be for risky Internet use only; what is the point if you are going to also use it for other tasks? The first...
Well, I would do an on-demand scan before executing the file. Personally, I am not questioning the usefulness of AV softs; I'm questioning the...
Using the money saved from not buying 4 security soft licenses, you could buy a tiny used Micro ATX machine. Why would you need a sandbox or...
Instead of having a single all-purpose machine which requires all these layers of protection, wouldn't it just be easier to get another machine...
Highly technical but interesting analysis of this rootkit here from GMER: http://www2.gmer.net/mbr/
I don't understand why a regular user would be eager to see a thread deleted.:wacko: Shouldn't the concern come solely from a moderator?
:thumb: Long View, the more posts I read here the more I am convinced that ditching realtime AV was the best decision I have made since I...
Aha, this Returnil looks very interesting. I see they are even suggesting vulnerabilities exist in using VMWare as part of a security policy. I...
Separate names with a comma.