Realtime protection against Adaware/Wrappers

Discussion in 'other anti-malware software' started by mattdocs12345, May 25, 2013.

Thread Status:
Not open for further replies.
  1. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    Okay so given I had this issue:
    https://www.wilderssecurity.com/showthread.php?p=2233722#post2233722
    Both NIS2013 and MBAM Pro realtime and on demand protection failed to detect anything wrong with my download. For those who don't follow. I have downloaded Virtual Router Plus from www.virtualrouterplus.com which was full of toolbars that I was unable to uninstall completely and that crapped all over my FF.

    There is another thread that explores options for removal of adware...
    https://www.wilderssecurity.com/showthread.php?t=347519
    But I am looking for something that would be real time protection.

    I am looking for any kind of software that would do at least 1 of the following:
    1) block download of adware
    2) block installation of adware


    Oh yeah, I don't do well with HIPS....
     
    Last edited: May 25, 2013
  2. guest

    guest Guest

    You mean adware, right? AdAware is Lavasoft's product. :p

    My suggestions:

    - HIPS, set it to high sensitivity. It should monitor every single actions of program installations, including hijacks.

    - WinPatrol Plus, yes Plus. The free version only patrols on a certain interval (1 minute at most I believe) while the paid version has a real-time protection capability. Pretty much like HIPS but less annoying. And Scotty is cute too. *puppy*

    - Test it in a virtualization software (like Shadow Defender) or a sandbox (like Sandboxie), then see if there's anything wrong before installing it in your real system.

    Too bad, HIPS is the most effective way for this job.

    P.S. : I see you're trying ESET right now, it has a HIPS. Set it to interactive mode when installing programs and you should be fine, just read them carefully. ;)
     
    Last edited by a moderator: May 25, 2013
  3. SweX

    SweX Registered Member

    Joined:
    Apr 21, 2007
    Posts:
    6,429
    If one have PUA and PUP enabled in ESET then most of this stuff get's caught from my experience :)
     
    Last edited: May 26, 2013
  4. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    Okay thanks. Yeah i have PUA and PUP enabled in ESET.
     
  5. SweX

    SweX Registered Member

    Joined:
    Apr 21, 2007
    Posts:
    6,429
    Good, unfortunately sometimes customers come to the ESET forum and says that ESET detected blah...Potentially Unwanted, while I was installing or downloading this or that, and believe it's an FP, when obviously it's not, but a classic PUA/PUP detection. :)

    BTW....
    http://virusradar.com/en/glossary/pua
     
  6. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,931
    i guess you have used the "quick" installation, your fault. better chose custom or "advanced" - sorry, no mercy if this option is displayed such visible :rolleyes: same for "addlyrics".

    delta is classified als trojan malware...

    be clever - next time try it in sandboxie and crawl the results
    and grab "VirtualRouterPlusSetup.msi" from box
     
  7. mattdocs12345

    mattdocs12345 Registered Member

    Joined:
    Mar 23, 2013
    Posts:
    1,892
    Location:
    US
    Nope. I did not. I chose custom installation. NIS2013 said it was green, there was nothing I was afraid of. But this is off topic. This post is about real time protection from PUPs.
     
  8. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,931
    then sorry - i didnt had any toolbars with custom setup in a box. strange.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.