Which setup do you like better.....

Discussion in 'other anti-malware software' started by daddymo3, Mar 28, 2007.

Thread Status:
Not open for further replies.
  1. daddymo3

    daddymo3 Registered Member

    Joined:
    Dec 15, 2004
    Posts:
    56
    Location:
    Vancouver,BC,Canada
    Hey everyone.....
    Right now I have running......NOD,Comodo and Winpatrol Plus.
    I'm trying to decide between these two options,
    Spysweeper with all shield running.
    Or a combination of Spyware Terminator and SuperAntiSpyware with
    RealTime protection disabled.
    What is your opinion on these two setups.
     
  2. Seer

    Seer Registered Member

    Joined:
    Feb 12, 2007
    Posts:
    1,596
    Location:
    Singidunum
    Hello.

    You don't need AS shields, you have NOD. SAS free will do. Also, use FF or Opera, not IE.

    ;)
     
  3. daddymo3

    daddymo3 Registered Member

    Joined:
    Dec 15, 2004
    Posts:
    56
    Location:
    Vancouver,BC,Canada
    NOD let me down the other day,whereas Spysweeper did help me out.
     
  4. Tarq57

    Tarq57 Registered Member

    Joined:
    Oct 7, 2006
    Posts:
    966
    Location:
    Wellington NZ
    With what malware did NOD let you down, out of interest?
     
  5. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    8,699
    Hello,
    You mean you let yourself down??
    Mrk
     
  6. daddymo3

    daddymo3 Registered Member

    Joined:
    Dec 15, 2004
    Posts:
    56
    Location:
    Vancouver,BC,Canada
    Yes DAD....I'm sorry,I did let myself down.
    Please tell me Mrk,what was the purpose of your post?

    I believe what I got hit with was called Vungo(I think)
     
  7. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    8,699
    Hello,
    The purpose is: things don't happen on their own.
    You did not get hit by Vungo - you did a set of actions that resulted in unwanted code being run on your machine. Programs are not living things. They do not happen. They get executed when people instruct them to do so.
    You should ask yourself what is the set of actions you did that result in a Vungo infection and avoid doing it again - rather than blame a piece of code for it.
    Mrk
     
  8. Metal425

    Metal425 Registered Member

    Joined:
    Mar 20, 2007
    Posts:
    188
    Location:
    Southern California
    Yeah, mark...I'm sorry to say, but a lot of your posts are starting to sound very rude.
    Don't put them down, help them.
     
  9. Metal425

    Metal425 Registered Member

    Joined:
    Mar 20, 2007
    Posts:
    188
    Location:
    Southern California
    There's a 3% chance the virus got through NOD32.
     
  10. lodore

    lodore Registered Member

    Joined:
    Jun 22, 2006
    Posts:
    9,006
    ye and like a 80 percent chance of user error.
    im sure you can get that malware removed and be more careful next time
    happy surfing
    lodore
     
  11. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    8,699
    Hello,

    So in the context of my rudeness, if I deleted a few files in the system folder, rebooted and killed the OS, does that mean that Windows let me down?

    Regarding my rudeness of lately:
    1. I'm seeing a therapist.
    2. Moderators can edit / delete my posts any moment...

    Mrk
     
  12. EASTER.2010

    EASTER.2010 Guest

    My suggestion would be this combo quoted. Try it, both have free versions, see how things progress and check your system resources, i think you'll find them worthy of consideration.

    :)
     
  13. twl845

    twl845 Registered Member

    Joined:
    Apr 12, 2005
    Posts:
    4,186
    Location:
    USA
    Daddymo3, To answer your question, I would stay with Comodo and NOD32, and deviate a little by including SUPERantispyware and AVG.7.5. Run either one in real time. Then for kicks, install SpywareBlaster for blocking. :D
     
  14. daddymo3

    daddymo3 Registered Member

    Joined:
    Dec 15, 2004
    Posts:
    56
    Location:
    Vancouver,BC,Canada
    Thanx all for your responses.....

    Mrk...Next time,please read the title of the post and maybe the original post itself. If you are not in the mood to respond accordingly,the words that you type may be considered offensive.
    I was asking for an opinion,not a lecture.
     
  15. the Tester

    the Tester Registered Member

    Joined:
    Jul 28, 2002
    Posts:
    2,854
    Location:
    The Gateway to the Blue Hills,WI.
    Keep WinPatrol Plus and use SAS as a scanner.
    I agree with The Seer-use Firefox or Opera as a browser.
    Spyware Blaster would be another useful addition.
     
  16. Metal425

    Metal425 Registered Member

    Joined:
    Mar 20, 2007
    Posts:
    188
    Location:
    Southern California
    The Mod's don't care,but I do. You don't have to say he did it, there's a more percent chance he did, but you can go easy on him.
     
  17. Tarq57

    Tarq57 Registered Member

    Joined:
    Oct 7, 2006
    Posts:
    966
    Location:
    Wellington NZ
    To the OP,
    Could it be the vundo trojan?
    SAS should be able to take that on. Also plenty of manual removal techniques posted, often involving running of the Smitrem.exe application.

    I do think the feedback should suit the indicated knowledge of the poster.
     
  18. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    8,699
    Hello,

    I had nothing to say until the NOD32 comment about letting you down. It was not meant to be the lecture you see - rather advice / help - which you refuse to accept. But that's fine.

    Regarding security:
    YOU are responsible for everything that happens on your machine.
    YOU make the decisions that make your machine usable / effective / clean.
    Using setup X or Y or F does NOT matter at all.
    Security is not about a mix of software - it is about the user.

    I have also given you the best advice I could, namely that you examine your steps and avoid repeating the same mistake in the future, but this must have fallen on deaf ears. If you do not retrospect on what you do and analyze each step - and then weight it against the outcome - you are bound to do many such similar mistakes in the future, regardless of the setup that you run.

    Mrk
     
  19. eyes-open

    eyes-open Registered Member

    Joined:
    May 13, 2005
    Posts:
    721
    There is a difference between malicious code being cached (recognised or not) & malicious code having access to permissions.

    There is a difference between downloading an executable program that contains malicious code & enabling that code to gain permissions.

    Many of us with AV never hear a peep from them, they are almost relegated to the status of legacy. Seems fair when suggesting an (any) AV is the point of failure, that the possibility that there may be another, more fundamental issue that remains still to be considered:-

    At what point was the malicious code enabled ?

    I think that's all Mrk was saying, it wasn't 'tude - just a valid viewpoint & worthy of due consideration.
     
Loading...
Thread Status:
Not open for further replies.