What security setup do you prefer ?

Discussion in 'polls' started by alex_s, Jun 25, 2008.

?

What security setup do you prefer ?

  1. A set of different specialized products

    137 vote(s)
    80.6%
  2. A singe multifuctional product

    33 vote(s)
    19.4%
  1. alex_s

    alex_s Registered Member

    Joined:
    Aug 13, 2007
    Posts:
    1,251
    What security setup do you prefer ?
     
  2. emperordarius

    emperordarius Registered Member

    Joined:
    Apr 27, 2008
    Posts:
    1,218
    Location:
    Who cares
    Actually a mix of two. As you can see in my sig, I have a security suite + anti spywares + anti rootkits.
     
  3. HURST

    HURST Registered Member

    Joined:
    Jul 20, 2007
    Posts:
    1,419
    Layering!
    Not only on computer security, but in many aspects of my life, I prefer different tools that are superb in achieving their function over an "all-in-one" tool.
    (Only exception is my swiss army knife :D)
     
  4. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    I am a firm believer In seperates. If one breaks you dont lose everything so to speak.
     
  5. Osaban

    Osaban Registered Member

    Joined:
    Apr 11, 2005
    Posts:
    5,621
    Location:
    Milan and Seoul
    My current defense is more and more based on a combination of virtual/sandbox/Imaging security: I rely basically on DeepFreeze activated within FD-ISR Rescue, and both backedup by ShadowProtect Desktop. With this kind of umbrella, the Vista default security is more than adequate.
     
  6. LoneWolf

    LoneWolf Registered Member

    Joined:
    Jan 2, 2006
    Posts:
    3,788
    Without a doubt, A set of different specialized products. :D
     
  7. cortez

    cortez Registered Member

    Joined:
    Nov 19, 2006
    Posts:
    450
    Location:
    Chicago
    Since ancient times a worrior's Armour has been "layered" for good reason: it provided attack from different types of sneaky weapons .

    The same principle applies to "microchip warriors".

    Sandboxie and Returnil plus the regular compliment of anti malware applications makes for near foolproof protection.
     
  8. blacknight

    blacknight Registered Member

    Joined:
    Sep 25, 2007
    Posts:
    3,363
    Location:
    Europe, UE citizen
    A set and not a single suite: av+fw possibly from the same House, an HIPS, and Returnil. ( And something more else ;) ).
     
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,897
    Location:
    The Netherlands
    I prefer "A set of different specialized products", mostly because I haven't seen any security suite that lived up to my standards, and also, if such a suite gets shutdown (or has a serious flaw) all your protection is gone. Of course the problem with separate security tools is that they might start to conflict with each other, but there are some tools out there that can work together just fine.
     
  10. cet

    cet Registered Member

    Joined:
    Sep 3, 2006
    Posts:
    876
    Location:
    Turkey/İzmir
    I always use applications from different vendors.I think layered approach is better.
     
  11. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,392
    Location:
    U.S.A. (South)
    My set up exactly!
     
  12. ErikAlbert

    ErikAlbert Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    9,455
    A combination of recovery and security, except security based on blacklists.
     
  13. OSPA

    OSPA Registered Member

    Joined:
    Jul 22, 2008
    Posts:
    5
    Location:
    Barstow, CA
    I have to admit, I've been using endpoint for a bit, but I always like to have as many layers as possible- starting at the modem :)
     
  14. YeOldeStonecat

    YeOldeStonecat Registered Member

    Joined:
    Apr 25, 2005
    Posts:
    2,345
    Location:
    Along the Shorelines somewhere in New England
    Layering....although on a different scale that most.

    First...navigation of the internet. I use OpenDNS DNS servers for myself..and for my clients. Many known malware sites are blocked via OpenDNS.

    Always have all PCs behind a NAT router

    Maintain Microsoft Updates

    Quality antivirus program

    Don't leave Administrator account password blank

    I'm moving more and more clients behind UTM firewalls..instead of plain NAT routers. Untangle to be precise. Does scanning of traffic for viruses/spam/ad/spyware/malware....before it hits the PCs.

    I more often surf with Firefox

    And I cap it all off with "smarts"...I use my head, not my first day on a comptuer or out on the internet. These simple things have worked for me...no need to install 88 programs on my PC out of fear..or spend 23.5 hours of the day scanning my computer with 23 different programs from 1/2 hour of use.
     
  15. The Hammer

    The Hammer Registered Member

    Joined:
    May 12, 2005
    Posts:
    5,753
    Location:
    Toronto Canada
    I'm not familiar with the term UTM?
     
  16. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,392
    Location:
    U.S.A. (South)
    A set of different specialized products

    IMO, a mix and match strategy makes for an unpredictable shot in the dark for potential malware, old or new, and individual set up approaches/defenses are is good as razor wire in comparison.

    EASTER
     
  17. boonie

    boonie Registered Member

    Joined:
    Aug 5, 2007
    Posts:
    238
    Definitely layered, but not everything and the kitchen sink. I try to keep it simple, and rely primarily on good sense.
     
  18. Dave2609

    Dave2609 Registered Member

    Joined:
    Jul 15, 2008
    Posts:
    33
    Location:
    China
    singe multifunction product, backed up with online scanning from other products.
     
  19. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,277
    Hello,
    Whatever meets my demands.
    So far, it's a single product - firewall. It's multifunctional too - inbound and outbound.
    Mrk
     
  20. RAD

    RAD Registered Member

    Joined:
    Apr 2, 2007
    Posts:
    332
    Just a test
     

    Attached Files:

  21. icr

    icr Registered Member

    Joined:
    Sep 6, 2008
    Posts:
    1,589
    Location:
    UK
    I use BDTS for almost every thing to protect my pc:thumb:
     
  22. nightfox

    nightfox Registered Member

    Joined:
    Sep 26, 2008
    Posts:
    33
    Location:
    South Sweden
    I would say "a set of different specialized products" simply because i don`t believe there is a "single multifunction product" that gives you a total security coverage out there today. For AV + Firewall i think the "internet security" packs works just fine (i`m running one myself) but when you want to focuse on bad things like rootkits, keyloggers, etc. i do believe that there are better options available with software dedicated for these special purposes IMO.

    And of course combine this with some online-scanning from time to time;)
     
  23. Huwge

    Huwge Registered Member

    Joined:
    Oct 21, 2004
    Posts:
    424
    Location:
    UK
    Seperates for me
     
  24. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    I use separate, rule based apps. Except for a couple of test images I load in occasionally, each Windows OS (all versions) contains the following:
    1. Internet firewall: Kerio 2.1.5
    2. Application firewall, aka HIPS: System Safety Monitor.
    3. Web content filtering: Proxomitron.
    4. Full system backups of each: Acronis CD.

    Depending on which image/OS I'm using, they may include one or all of the following:
    1. Integrity checking of system files and applications: Filechecker, NIS Filecheck, DOS batch files, others.
    2. Folder contents monitoring: MoniDir2000, FileMap/Bootalert, others.
    3. Registry protection: SSM, RegProt, DOS batch files.
    4. Encryption of file system, apps, e-mail. Multiple apps.
    5. Numerous other privacy tools.
    6. Removal and modification of vulnerable built-ins and files: IEradicator, 98Lite, various file modification tools.
    7. Script protection: Script Sentry, others.
    8. Virtualization: Just for the fun of it. Waiting to get better hardware to make full use of it.
     
  25. Meriadoc

    Meriadoc Registered Member

    Joined:
    Mar 28, 2006
    Posts:
    2,642
    Location:
    Cymru
    Pretty much the same as YeOldeStonecat with...

    OpenDNS
    UTM firewall (with antimalware/antispam(can be changed,) exploit scan and web filter) scanning traffic and reporting.
    Firefox with NoScript, IE with zones hardened or server ie.

    ...then any separate I fancy, the ones I like I give them their own snap-shot, finishing off with imaging.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.