Discussion in 'other anti-malware software' started by SafetyFirst, Jan 7, 2011.
OutpostFW + Sandboxie (w/ 64bit Experimental Protection)
After a few days on the computer, I'm liking the combination of Webroot SecureAnywhere Essentials and Sandboxie.
what rootkit scanners do you use for x64
Gmer,sanity check , TDSSkiller , ComboFIx
are there other than those ?
I use the antirootkit built into AVG 2012 64bit.
changed up Norton for WSE and tightened up the settings. have mbam for on demand. plus a sardu disk just in case.
Using WSA Essentials on ASUS Eee B121 Slate Windows Tablet W/ MBAM as Secondary scanner. on PC using KIS W/ Zemana, and Hitman Pro , MBAM as Secondary scanners. On Laptop using KIS W/ Hitman Pro and MBAM as Secondary scanners. all going through tricked out firmware in router and using OpenDNS.
Sandboxie ( no experimental mode because its just a matter of time before MS torpedo's it, and im not sure its really needed anyhoo )
Private firewall on default settings
Malwarebytes on demand
Hitman pro on demand
What are Microsoft going to do that causes experimental mode not to function for Sandboxie?
I assume MS meant Microsoft.
X64 Protection is very stupid these days
According to Tzuk at Sandboxie, a kernel patch from MS may cause sandboxie to BSOD.
I dont understand why this is true. Why do you think so?
I've been using Sandboxie Experimental since it was released, seems like more than 6 months ago. Glad to have the extra protection on my 7 x64 machine. If a Windows update interferes with it, I'll uncheck Experimental, or whatever other fix is required.
Me too, it was actually part of 3.56 released in June 11 and I was using the first betas which started in early April 11 so full year now with no issues for me.
IMO it is far from stupid to have had extra protection for that time. If MS patch the 'fix' Tzuk has implemented then boot into safe mode disable EP - job done. Lets hope its never required though
See my sig.
x64 Security Setup update
I'll have to reformat both my laptop and desktop and then put EAM + OA on both.
CIS and Keyscrambler + UAC and MBAM on demand. In future I want get EAM and some other firewall there but I'm too lazy to do it.
Just upgraded my security setup.
Webroot SecureAnywhere Complete
Malwarebytes Anti-Malware Pro
Standard User Account / uac:max
EMET (Enhanced Mitigation Experience Toolkit)
Binisoft Windows Firewall Control
Firefox 12.0 with the following add-ons:
Removed threat vectors:
-Win7 embedded "StickyKeys" backdoor (thanks M$)
All the security measures I take, can be undertaken on an x86 machine.
- User Account
- Comodo Firewall with Defense+
- Avast! Anti-Virus
- Malwarebytes Pro
- Sandboxie (all internet-facing programs except firewall and AV running in sandbox)
- Whatever browser strikes my fancy at the moment + Adblock + the equivalent script protection
It's not all that resource intensive. All together, I think it's like 50MB or less of RAM (excluding the browser)
Comodo Firewall & Defense+
Panda Cloud AV + OA + MBA (on demand)
FF12 sandboxed, only with flash plugin, with the following addons:
HTTP Everywhere+HTTP Finder
NoScript personalized + Request Policy
I'm not familiar with Cookie Monster?