Criteria for Trojan scanner selection

Discussion in 'other anti-trojan software' started by Starrob, Dec 3, 2004.

Thread Status:
Not open for further replies.
  1. spy1

    spy1 Registered Member

    Joined:
    Dec 29, 2002
    Posts:
    3,139
    Location:
    Clover, SC
    Lots of new software gets added here on a frequent basis, nameless - in all profiles. It's quite simple to do with ShadowUser, as you can choose to "Commit" anything you like back to the actual system from the Shadow Volume (including A/V, A/T, anti-spyware updates).

    If that was an attempt at humor (or sarcasm), it simply speaks to your un-familiarity with the program involved. (But that's okay). You really should take a stab at reading some of the literature that goes with the program.


    Not really picturing you as the librarian type. <g> Pete
     
  2. Starrob

    Starrob Registered Member

    Joined:
    Apr 14, 2004
    Posts:
    493
    I think having no private info on the computer is the strongest part of your defense unfortunately most people do keep private information on their computer.

    In that case a good encryption program might help as long as a person does not decrypt their private information while also online.

    However, even that might not help for someone doing online banking and in that case you would be relying on programs such as PG to block keylogging functions and AT and/or AS programs to detect the keylogger but even this does not help against certain types of phishing attacks and some trojans. The greatest defense is one's own knowledge!!!


    Starrob



    Starrob


     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.