Which Type Of Program You Trust To Protect Your Systems?

Discussion in 'other anti-malware software' started by jmonge, May 22, 2011.

Thread Status:
Not open for further replies.
  1. Kees1958

    Kees1958 Registered Member

    Joined:
    Jul 8, 2006
    Posts:
    5,857
    Have a HIPS past when on XP, since Vista using Pro or Ultimate versions, so for me it is what comes with the OS and

    . . . occasonal free lisence to evaluate improvements or participation in closed beta's :D
     
  2. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    The security apps chosen are only as good as the security policy they're enforcing. I use default-deny exclusively, enforced by HIPS (SSM), a rule based firewall (Kerio 2.1.5), and web content filtering (Proxomitron). My PCs are stripped of unnecessary components, including IE on all but one OS, and all unneeded services are disabled or removed (98lite and XPlite). This minimizes the attack surface and leaves no open ports. Attack surface applications are isolated by configuration and SSM rules and are as un-integrated from each other as possible.
     
  3. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    :thumb: :thumb: my friend good aproach:thumb: :thumb:
     
  4. cheater87

    cheater87 Registered Member

    Joined:
    Apr 22, 2005
    Posts:
    3,244
    Location:
    Pennsylvania.
    I use Comodo Internet Security, WOT and Spyware Blaster.
     
    Last edited: May 23, 2011
  5. EternalFunction

    EternalFunction Registered Member

    Joined:
    Feb 3, 2011
    Posts:
    40
    too much "complicated" security scares my family members :p

    mostly I use these setup on my family computers
    - avast free (comes with webshield/network shield, so..it's a catch), some computers uses Norton IS 2011
    - WOT
    - keyscrambler
    - clearcloud/nortondns (on router level, automatically blocks malicious sites, since they use social networking sites a lot)
    - up-to-date genuine windows 7
    - spybot immune
    - sandboxie/virtualbox on my own laptop for "testing purpose,

    Actively protecting my family members in background ;)
     
  6. guest

    guest Guest

    AVG Antivirus Boot Disk for on demand scans only

    Mamutu

    True Image Recovery Disk "only" so all images and restores are
    done outside of Windows

    I do not worry about anything else except that I must have
    a CLEAN IMAGE

    Never seen anything get by this, do not even attempt to clean
    if i find anything, just a reimage
     
  7. luciddream

    luciddream Registered Member

    Joined:
    Mar 22, 2007
    Posts:
    2,545
    I, like many, use a combination of most of the above: OS/Browser hardening, Sandboxing, Outbound firewall/HIPS, Imaging/Backup, AV.

    But if I were forced to just pick 1 that I feel is the most important, I'd say Imaging/Backup. In the event that something does happen you're a reboot away from resolving it. Sandboxing/virtualization comes in a close 2'nd.
     
  8. noone_particular

    noone_particular Registered Member

    Joined:
    Aug 8, 2008
    Posts:
    3,798
    That depends on how you set up your package. With a default-deny setup for example, other users have no security decisions to make. The firewall and SSM are set not to prompt when in user mode. No decisions equals no wrong choices. It takes some time and a detailed examination of their usage needs in order to make certain that they're allowed to do all they need to, but not all they would do if it was their PC. If they need an app that's not already installed, I'll check it, then install it if it's ok. It's a bit of an extra hassle for me at times, but it's made up for by not having to clean out infections or remove unwanted apps. For them, they can browse where they want without issues .The system has repelled everything its encountered in the last 6 or 7 years. The only way a user will alter the system is to open the case and start with changing the BIOS settings, just to make a bootdisk or live CD work, hard to do unnoticed.
     
  9. PJC

    PJC Very Frequent Poster

    Joined:
    Feb 17, 2010
    Posts:
    2,959
    Location:
    Internet
    -Virtualization: Sandboxie/Shadow Defender.

    -Instant System Recovery: Rollback Rx.

    -Only On-Demand Scanners: MBAM, HMP, EEK, GMER etc.
     
  10. blasev

    blasev Registered Member

    Joined:
    Oct 25, 2010
    Posts:
    763
    Changing a little, since no hips needed in my set up..
    I can't trust my self that much :argh:

    So for non expert like me, its best to contain almost all entry point with sandbox
    And let the rest handled by av/bb(with comunity rating)/fw(using expert made rules).
     
    Last edited: May 24, 2011
  11. Osaban

    Osaban Registered Member

    Joined:
    Apr 11, 2005
    Posts:
    5,363
    Location:
    Milan and Seoul
    1) Sandboxie + Restrictions (Internet access, Start/Run Access, Drop Rights)+Look'n'Stop firewall (mainly for outbound connections).
    2) Shadow Defender when plugging in third party USB thumb drives at work.
    3) Two scanners (most of the time on demand) to check downloads and USB thumb drives from collaborators (in my experience the most infected devices statistically speaking).

    So basically Sandboxie for the Internet and Shadow Defender when I need the whole system protected.
     
  12. AlexC

    AlexC Registered Member

    Joined:
    Apr 4, 2009
    Posts:
    1,288
    PrexSOL or Trusteer+Restore a clean image before going to sleep:D

    Not my approach (see my sig.)...
    but why not such a security strategy?lol ;)

    Very interesting thread btw, i learn a lot by readind this forum.
     
  13. ExtremeGamerBR

    ExtremeGamerBR Registered Member

    Joined:
    Aug 3, 2010
    Posts:
    1,351
    I trust:

    Virtualization: Shadow Defender + Sandboxie

    HIPS/BB: Emsisoft Mamutu

    Backup and imaging: Keriver 1-Click + Restore Microsoft SyncToy

    On-Demand: Hitman Pro
     
  14. Eru

    Eru Registered Member

    Joined:
    Mar 23, 2010
    Posts:
    107
    Location:
    Poland - Sosnowiec
    I trust:

    HIPS/HIDS: Defensewall, WinPatrol
    Anti-logger: SpyShelter
    Backupc& ISR: Rollback Rx, Norton Ghost
    Password Manager: S10 Password Vault
     
  15. bellgamin

    bellgamin Very Frequent Poster

    Joined:
    Aug 1, 2002
    Posts:
    7,365
    Location:
    Hawaii
    Type of program that is my *main* system protector = Imager

    Specific Imager = Keriver 1-Click Restore Pro
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    PLUS (in those rare instances when I do keylogger-susceptible biz) >>Prevx/SOL
     
  16. raven211

    raven211 Registered Member

    Joined:
    May 4, 2005
    Posts:
    2,567
    I trust Norton. It doesn't impact my system, it's got many technologies to protect me wherever I am, and on top of that it looks very appealing to me. I love the product and I'm not ashamed to say that. If I need to go for a free solution I choose PCAV which works light on my system and is both automatic and effective. Me like. :thumb:
     
  17. 3TAMMUZ

    3TAMMUZ Registered Member

    Joined:
    Jan 30, 2009
    Posts:
    38
    I do prefer and like to rely on the anti-virus and anti-malware programs since my Windows platform is 64-bit.

    The cyberspace policy or A.K.A. Cyber Security Policy is about to be engaged by the US governmental deity soon, and thus I presume I may follow its decision to let 'em protect my security system now on. Thus, I am anticipating in a new program.

    But one thign I can say certainly is that as other major security corporations do, I don't rely on the software about the virtualization as some minor companies do although I use, now, the programs such as the Appguard, the Sandboxie, and so forth.
     
    Last edited: May 27, 2011
  18. BenMar522

    BenMar522 Registered Member

    Joined:
    Mar 12, 2010
    Posts:
    67
    I enjoy using the old fashion antivirus/antimalware programs, along with using common sense, and a fresh system image should be all you need. :thumb:
     
  19. The Seeker

    The Seeker Registered Member

    Joined:
    Oct 24, 2005
    Posts:
    1,317
    Location:
    Adelaide
    Check sig. I'm sorted.
     
  20. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    the good thing about the program i am using at this very moment is that i have an antivirus and hips which i love dearly;) :thumb: i think i will stick with Nod32 Antivirus and ditch the rest;) :thumb: did i do a good choice?yes:thumb:
     
  21. Kernelwars

    Kernelwars Registered Member

    Joined:
    Aug 12, 2010
    Posts:
    2,155
    Location:
    TX
    rofl J.. what happened to spyshelter? :rolleyes:
     
  22. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    this is a similar choice but with antivirus and Nod is very good at blocking malware:thumb:
     
  23. Kernelwars

    Kernelwars Registered Member

    Joined:
    Aug 12, 2010
    Posts:
    2,155
    Location:
    TX
    is that so.. hopefully u will change back very soon..:argh: :argh:
     
  24. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,708
    Location:
    USA
    Probably the same thing that happened to Online Armor. :p
     
  25. alex_s

    alex_s Registered Member

    Joined:
    Aug 13, 2007
    Posts:
    1,251
    The only "program" I trust to protect me is my experience. And the sad thing is if you start to trust something coded by somebody else, your security is in a great danger. At most you can HOPE that a program coded by somebody else can protect you. Without understanding of the core processes and of what your security program can and cannot do you are unsafe by definition (sorry to upset you).

    ===
    the guy who coded one of the first viruses for DOS in the old USSR area, the guy who defeated a lot of Windows malware for the last 5 years, the guy who went to be independent security expert by now :)
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.