Discussion in 'other anti-virus software' started by ifacedown, Apr 23, 2014.
How do I tell it to install without prompting me to block/allow?
Right click, enter silent mode?
Not having to do that makes it faster and easier for us users.
Posting this for the future generation, forgive but never forget
LoL Now that is wishful thinking on Qihoo side.
Go with the flow
Besides, it's 2050, we have nothing to worry about Facebook interface looks cool tho.... And that robot thing, I can think of many applications for him/her/it
Yeah that is true.
Well ... Uhmm?
Trust me, you don't wanna know
I was thinking of asking you something, guys.
What do you think of this video:
Do you think Qihoo should make more videos like this?
Well if they add something totally new to the program then they should make an updated version. ( But it is safe to say they already know that. )
I was at first going to mention, that they could make another one for the Essential version, but that actually would not make sense I guess. They of course want to advertise for the total package with all the functions it has, while TSE is the same at its core, just without the extra possibilities. Those like me who prefer TSE will find it any way.
Well, truth be told, TS is the flagship, the main powerhorse and the top dog TSE is the little brother
Nevertheless, I'll look into it and see what I can do
I like it. It would be interesting to see what the response would be if it ever gets on television but I doubt that would happen.
As a TV advert? Where, which station? Where would it have the most impact?
Microsoft runs ads on television for Windows 10 and surface. I'm not sure where an antivirus would have the most impact, possibly on a cable show that has a lot of young viewers into tech. The same ad could be used to advertise their mobile app too.
Thanks for your suggestions. I'll look into it with marketing and finances department and see what can be done
LoL It seems that everyone but me can give a easier to understand and shorter answer then me.
This will make you feel a little bit better:
No firewall in TS, so what is the best route to follow?
Technically, there is in Toolbox. But experiment.
Choose what you like.
Here's a small list of firewalls and their last update date.
Agnitum Outpost Firewall Pro 9.3.4934.708.2079
01-12-2015 16:09 GMT
Comodo Internet Security 188.8.131.5205
1 day 1 hour ago
Look 'n' Stop Firewall 2.07
14-04-2012 08:48 GMT
20-12-2013 07:03 GMT
11-03-2016 00:44 GMT
Windows Firewall Control 184.108.40.206
30-03-2016 01:48 GMT
ZoneAlarm Free 14.1.057.000
3 days 22 hours ago
Personally, I use windows firewall with tweaking.com program that adds context menu
People like to merge it with Comodo Firewall, or Private Firewall, take your pick.....
That was a good movie, when he was stil famous.
I use TSE combined with Comodo Firewall, and I really like that combo. ( It should not be different with TS I guess. )
Did you mutually exclude those two programs from eachother?
And what is active in Comodo, HIPS and/or BB?
360 Total Security = antivirus or Spy Program ?
yeah, its a spy, not antivirus
PERSONAL USER INFORMATION
In order to provide our services described in the Software License and Service Agreement, we may collect the following "Personal User Information":
Contact Information (including name, address, email address, business address, telephone and fax number)
Personal Details (including birth date, race, gender, sexual orientation, ID card number and social security number)
Internet Access and Use Information (including social network account user names, contacts, chat logs, email messages, search history and web browsing history)
Payment Information (including payment card bank account numbers or passwords, credit card statements, or transaction histories)
Transaction Information (including your purchase history and data relating to use of Services and Software provided by 360)
Correspondence (including any information you provided or were provided through 360 related communication channels, including technical support and customer service)
Photograph (if you share a photograph with us)
We collect the following information in two ways:
Information you give us. You may give us information in a variety of ways, including when you request technical support or customer service, register a product, or give us reviews or feedback. As an example, many of our Services and Software require you to sign up for a 360 Account. When you do, we will ask you to submit certain Personal User Information, like your name, email address, and other contact information. If you want to take advantage of the communication tools we offer, the foregoing information may be publicly visible, including your name and photograph.
Information we get from your use of our Services and Software. We may collect information about the Services and Software that you use and how you use them. This information may include, for instance, information about your device, details about your usage patterns, limited details about your Internet usage stored temporarily to provide our Services and Software, computer files and risks such as malware, and information that may be included in a virus or malware sample that we collect from your computer for review.
Device information. We may collect device-specific information, including your operating system version, system language, and IMEI number. In order to view the following system information of managed computers for 360 Connect for Android/iOS: operating system, CPU, memory, hard disk, computer name, 360 Total Security will upload the following information to 360 Security Center: CPU model, memory, hard disk, operating system, computer name.
Log information. When you use our Services and Software, we may automatically collect and store certain information on our servers related to your use of our website or Services and Software to help us improve the quality of our products and service. This may include:
The manner in which you use our website or Services and Software, including how frequently you install, use or uninstall our Software and its features.
Information collected relating to installed programs scanned by Software features. The information uploaded onto our 360 cloud security center ("360 Cloud Security Center") servers for virus scanning and Instant Setup function include: file paths and MD5 checksums of the executable files, installed software names, package names, software signature certificates, and software URLs in conjunction with our filtering feature, which we apply to suspicious URLs when you use 360 Internet Protection (this information is processed with encryption and temporarily stored solely to provide our Services).
URL information. URLs of websites that you visit will be uploaded to 360 Cloud Security Center servers for phishing and online fraud analysis. Any Personal User Information will be removed from the URLs before they are uploaded. The information is processed with encryption before the upload. In order to receive the critical system event (including system startup, malware activity, risky website visiting, low system disk space ) from managed computers for 360 Connect for Android/iOS, 360 Total Security will upload the following information to 360 Security Center: malware activity, risky website visiting, system startup, disk usage.
Information relating to upgrades and updates to Software, including the time of the upgrade and the version of the upgrade.
Unique Serial numbers. When you use certain services, they might have a unique 360 serial number. This serial number and certain information about your installation (for example, the type of operating system on your device) may be sent to 360 when you install or uninstall Software or when Software periodically contacts our servers, such as in a check for automatic updates.
Local storage. We may collect and store information (including personal information) locally on your device using mechanisms such as browser web storage (including HTML 5) and application data caches. Such information includes: user settings, file whitelist and blacklist used to accelerate file scanning. In order to activate the computer check up for 360 Connect for Android/iOS to remove malware, optimize system performance and clean up system junks, 360 Total Security will upload the following information to 360 Security Center: startup items, system junks and malware detection.
Error Log Uploading: Software will generate an error log and a DUMP file automatically when an unexpected error occurs or an application crashes. Software will upload the error log and the DUMP file to 360 Cloud Security Center as required to find out the reason that the error occurred or Software crashed and improve the quality of the product. Before uploading the error log and the DUMP file, Software will prompt you to agree to the upload. If you agree, Software will upload the error log and the DUMP file to 360 Cloud Security Center; and if you do not agree, Software will not upload the log. The error log is a record of Software errors and/or crashes. DUMP files are generated by the operating systems (e.g. Windows, Android, and iOS) when a program crashes, and contain the program execution status of the crash, including the time of crash and system information. They do not contain Personal User Information.
@liba This has been discussed in debate few pages back. Please refer to those previous posts. If need more clarification, please let me know, thanks.
Do they really need bank account numbers and passwords?
This is gray area.
There are many paid services Q360 provides which are China only for chinese only, and are not applicable for outside usage. To simplify things, like internet shops, they store/keep buyers info to speed up things.
Qihoo 360, as a security company, is not in the business of misusing user data in any other way, except the following:
- to track program usage for statistics, like scans, cleanup, speedup and most common accessed features
- to track threats trend [in what parts of the world is which threat encountered
- what system is Q360 protecting, pc or mobile
Q360 does not, and will not, knowingly, share or abuse ANY private user information it may receive [prior to which it is encrypted], whatsoever.
In order for ANY company [be it Kaspersky, Symantec, Bitdefender, GDATA, whatever] know how many users there are enjoying their product, it has to call home, send statistics of it's usage
to research and engineering team, to help improve the product, or even diagnose and fix potential problems it might have, also have things simplified and make things go faster and more smooth.
That's why some companies want to send unknown exe's present in the system behind your back for analysis. Others, like Comodo and Qihoo, ask after the scan, to submit unknown exe, dll or script
to analyse and, if found malicious, to act before the damage is done. And it's a good thing alltogether.
This has been discussed a lot before, so I am taking the exception now to address it again.
If anyone wants to have an in-depth analysis of what happens beind the scenes while Q360 is running on your system, let me know and will do my best to provide it next week.
And I hope, that this will be put to rest. These guys contribute to Windows security by sending info about vulnerabilities. Look it up. Also to Google about Google Chrome. Look it up.
Thank you for understanding
Separate names with a comma.