And a malware scanner can tell you if a software is trustworthy? Really? How does it do that? And how do you trust the malware scanner, if it itself does mistrustworthy things?fpelletier wrote:I think that some of you are continuing to miss the issue with viruses. You that think you understand the basic principles of trust and computing...never trust anything unless you are buying a machine and never loading any software...period.
No matter how you twist it, you cannot get rid of the need of a competent user making decisions about whom he trusts. And not only that, why is it that even though i do scan my DLs and do make full hd scans once per month, i haven't had a single infection in the last 5 years? Hint: You may figure it out, if you think about the process of how malware typically gets onto the computer: By a user doing something.
If you ever did something in security, that didn't involve trust, you didn't do security work. And if you think that trust is an attribute of things - something that can be sold, bought, given, taken - then you don't understand trust.
All of which requires a modification of the system behind the user's back.Malware (the term used to describe spyware, viruses, etc.) use an incredible array of devices to make it onto your machine...
Most don't anymore. There is no need to, when there is a user who can be tricked into just saying "yes"....propogate itself...
Strange, i always thought that malicious intents are driven by the desire to "exploit" someone, which in our society comes down to gaining a certain monetary value. Look at the current major spreaders of malware: Spammers (What? Spam from Commodo?), Fraud, Fakes on filesharing networks (oh, did i see a Norton Internet Security fake there?). What do all those have in common? A commercial agent that has an interest in spreading disease.You (edit by lyx: he means "I") want as comprehensive a solution as money can buy. I'm all about freeware, shareware, etc. but the problem is, you need an entity that is vigilantly geared for keeping up with malware as it continues to morph.
That doesn't exclude the possivility, that someone could make money simply for delivering a service, honestly and fairly. Unfortunatelly, the majority of commercial anti-malware vendors act differently: They write applications in a way that damages the users system, they engage in fear-mongering tactics, they play corporate wargames on the customers machine, they try to artificially bump up detections and warnings, they often aren't cleanly uninstallable, etc. etc. Your all too well-meaning commercial big brothers are guilty of the same crap as the crap which they're supposed to prevent. And at the end of the day, they cannot do as good a job as a competent user (actually, they not only NOT educate the user, they dumb him down), cannot offer disaster recovery (only backups can), and they for moral reasons cannot efficiently decide about grey areas (i.e. software that just damages the system as a sideffect, yet supposedly not intentional (just horribly and recklessly programmed)).
So, what DO they offer actually? Basically:
- For an incompetent user, slightly better security than would be the case by doing nothing.
- System slowdown
- Less money in your pocket
- Peace of mind
- Peace of mind
- Peace of mind
- You could adapt it into a really inefficient on-demand scanner
Do you by any chance work in marketing?Unfortunately, volunteer efforts will never keep up with the pace the legion of professionals who are paid to spend all day everyday sorting out issues and programming against them. You (edit by lyx: he means *I*) need to buy a best-of-breed, comprehensive product, as rated by competent industry recognized security labs. Fortunately, these products are not expensive.
Wow, that sounds amazing. How can it detect something that isn't on my machine?Occasional scans are not okay (a passive scanning method). You (edit by lyx: he means *I*) want active protection to keep malignant software from even getting onto your machine.
Unless of course, your system is virtualized or you do have backups. Then its trivial and actually easier and much more reliable than an anti-malware application.Much like cancer, there is a threshold at which point, removing some malware becomes next to impossible
Oh, and you think by avoiding malware, a windows machine will be resistant to damage? I no longer need backups? Not? Okay, but if i do have backups, wouldn't it be faster and more reliable to just copy that back, instead of hoping that a malware scanner will be able to unhook everything from the launch phase, without.... uh, breaking the boot phase, as has so often happend by letting a malware scanner do its work?you (edit by lyx: he means *I*) can't afford to allow that to happen, unless you enjoy rebuilding your machine.
Why ever move anything out of the sandbox?Virtual machines are a wonderful device to contain potential threats. Use them as sandboxes to scan newly acquired software before moving them out of the sandbox.
Ah, so that i need THAT.As I have said, you (edit by lyx: he means *I*) need to buy a best of breed security suite...
Why ever move anything out of the sandbox? Why allow an application at all to mess with the system? So that i need someone to play watchdog?...however, much like contriceptives, your chances of success go up if you stack them--run as many scanners as you can (there are lots of free ones) against a new application before allowing it out of the sandbox.
For which they..... as all malware.... need to modify the system. If you are so much for prevention and the whole "not letting stuff get hold of the system", then why do you propose to LET A PERMANT INFECTION HAPPEN AND THEN REPAIR AFTER THE FACT?Don't think you'll know when you have contracted malware. There is a class of malware called rootkits who's main job is to hide themselves from the O/S and security software.
Unless of course, you simply do not let software modify the system.... this is becoming repetitive.Look, unless you are an experienced expert of your O/S and quite skilled, you are likely not to even know that the malware is there until it avails itself to you in a way that you don't like.
I cannot backup something that isn't there.You are likely to unknowingly back them up in your archives too.
Blahblah.... "You the user are impotent against the bad black men out there. We are potent and have guns. You need us! We master, you slave."Do not under-estimate the brilliance of malware writers. On the planet, there are several Einsteins out there who are unfortunately geared for doing damage.
Sorry for the ridicule, but your fear-mongering rethorics are LOL.
Too stupid of you to not have backups. Even more stupid to trust people who send you unsolicited spam mail and at the same time dress themselves as your protectors.It is humbling when you fancy yourself to be an expert and then get infected by a rootkit that you are ill equiped to remove. I once identified a rootkit on my system and spent 6 hours collaborating with renowned Comodo experts only to find that none of us could remove it--I painfully rebuilt the computer.
DOH, of course not, because a firewall is not a virusscanner. Of course, you do know that if you took your virusscanner as an example, you would had to admit slowness, but thats not the impression which you wanted to give, so you instead addressed the slowness aspect by replying with something unrelated.Incidentally, I run fairly recent hardware and use ZoneAlarm's Extreme Security Suite on Windows 7. I have noticed no degredation in performance or stability, and knock-on-wood, I haven't had any issues for quite a while.
Or: Get a brain and do something about security and trust, instead of following orders of people, who are only in the market to keep you dependend and impotent.However, if you wish to increase the likelihood that you will continue to compute trouble-free, be a student of your O/S, be a student of the best-of-breed security suites and buy one that you are comfortable with. Be paranoid. Use a virtual sandbox as a scanning lock. Today, buy a best-of-breed security suite that actively scans all entry points onto your machine, and always, always, always keep your definitions up to date!
Doh, there is no need to slow EVERY system down with EVERY malware-signature that was ever devised. If we continue that road down, we at some day dont even need an infection to slow a system to a halt - we just need a malware scanner with a database so large, that everything will run at 10% speed. OR: We could be a bit smarter, by giving signatures of all remotely popular malware to every user, PLUS a random selection of old signatures..... and when then reports about infections from old malware come in, we just upload that sig to all machines. But well.... that would be smart, sane and efficient, and wouldn't look that "absolute" in adverts and tests.... so we cannot allow that to happen.Oh yeah, to lyx...regarding the detection of 8 year old malware...those who forget the past are doomed to repeat it...good luck.