Results 1 to 10 of 91

Thread: Which virus/spyware scanners?

Hybrid View

  1. #1
    Poky Guest

    Re: Which virus/spyware scanners?

    On Fri, 09 May 2008 04:30:45 GMT, Straight Talk <b__nice@hotmail.com>
    wrote:


    >Better to avoid installing malware in the first place (it's actually
    >not that hard).


    So how do you post here since you unplugged your PC from the internet?

  2. #2
    Kayman Guest

    Re: Which virus/spyware scanners?

    On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:

    > On Fri, 09 May 2008 04:30:45 GMT, Straight Talk <b__nice@hotmail.com>
    > wrote:
    >
    >>Better to avoid installing malware in the first place (it's actually
    >>not that hard).

    >
    > So how do you post here since you unplugged your PC from the internet?


    It's not to difficult to do, Poky
    Security software manufacturers tend to overstate their product description
    to instill fear and uncertainty; After all it's all about the $ almighty.
    Please step back and try to remove the advertisement hype from your mind.

    In WinXP the most dependable defenses are:
    1. Do not work as 'Administrator'; For day-to-day work routinely use a
    Limited User Account (LUA).
    2. Secure (Harden) your operating system (OS).
    3. Keep your OS and all software on it updated/patched.
    4. Reconsider the usage of MSIE and MSOE.
    5. Review your installed 3rd party software applications/utilities;
    Remove clutter.
    6. Don't expose services to public networks.
    7. Activate the in-build firewall and configure Windows not to use
    TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
    TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
    networking weak point) closed.
    7a. If on high-speed internet use a router as well.
    8. Routinely practice safe-hex.
    9. Regularly back-up data/files.
    10. Familiarize yourself with crash recovery tools and re-installing
    your OS.
    11. Utilize a real-time anti-virus (AV) application and vital system
    monitoring utilities/applications.
    12. Keep abreast of latest developments - Sh!t happens...you know.
    The least preferred defenses are:
    Myriads of popular anti-whatever things and staying ignorant.
    Educational Reading:
    Security @ home
    http://home20.inet.tele.dk/b_nice/index.htm

    Good luck


  3. #3
    Poky Guest

    Re: Which virus/spyware scanners?

    On Sat, 10 May 2008 08:00:48 +0700, Kayman
    <kaymanDeleteThis@operamail.com> wrote:


    >Good luck


    Yea, you'll need luck everytime you connect your computer to the
    internet. No one is ever 100% secure as soon as you connect to the
    internet, and I mean no one, no matter how much you "harden" your PC.

  4. #4
    Poky Guest

    Re: Which virus/spyware scanners?

    On Sat, 10 May 2008 08:00:48 +0700, Kayman
    <kaymanDeleteThis@operamail.com> wrote:


    >7. Activate the in-build firewall and configure Windows not to use
    > TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
    > TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
    > networking weak point) closed.


    I use a router so ports are only opened as needed. I do disable
    netbios but if you don't it is no big deal if you have a router.

  5. #5
    louise Guest

    Re: Which virus/spyware scanners?

    Kayman wrote:
    > On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
    >
    >> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk <b__nice@hotmail.com>
    >> wrote:
    >>
    >>> Better to avoid installing malware in the first place (it's actually
    >>> not that hard).

    >> So how do you post here since you unplugged your PC from the internet?

    >
    > It's not to difficult to do, Poky
    > Security software manufacturers tend to overstate their product description
    > to instill fear and uncertainty; After all it's all about the $ almighty.
    > Please step back and try to remove the advertisement hype from your mind.
    >
    > In WinXP the most dependable defenses are:
    > 1. Do not work as 'Administrator'; For day-to-day work routinely use a
    > Limited User Account (LUA).
    > 2. Secure (Harden) your operating system (OS).
    > 3. Keep your OS and all software on it updated/patched.
    > 4. Reconsider the usage of MSIE and MSOE.
    > 5. Review your installed 3rd party software applications/utilities;
    > Remove clutter.
    > 6. Don't expose services to public networks.
    > 7. Activate the in-build firewall and configure Windows not to use
    > TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
    > TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
    > networking weak point) closed.
    > 7a. If on high-speed internet use a router as well.
    > 8. Routinely practice safe-hex.
    > 9. Regularly back-up data/files.
    > 10. Familiarize yourself with crash recovery tools and re-installing
    > your OS.
    > 11. Utilize a real-time anti-virus (AV) application and vital system
    > monitoring utilities/applications.
    > 12. Keep abreast of latest developments - Sh!t happens...you know.
    > The least preferred defenses are:
    > Myriads of popular anti-whatever things and staying ignorant.
    > Educational Reading:
    > Security @ home
    > http://home20.inet.tele.dk/b_nice/index.htm
    >
    > Good luck
    >


    I'm running XP SP2, using cable internet access with a router.

    Could you explain how to do: "configure Windows not to use
    TCP/IP as transport protocol for NetBIOS, SMB and RPC,
    thus leaving
    TCP/UDP ports 135,137-139 and 445 (the most exploited
    Windows
    networking weak point) closed. "

    I don't know how to go about making the above happen.

    Thanks

    Louise

  6. #6
    jen Guest

    Re: Which virus/spyware scanners?

    "louise" <louise@invalid.invalid> wrote in message
    news:68pt0bF2tnktkU1@mid.individual.net...
    > Kayman wrote:
    >> On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
    >>> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk
    >>> <b__nice@hotmail.com>
    >>> wrote:
    >>>> Better to avoid installing malware in the first place (it's
    >>>> actually
    >>>> not that hard).
    >>> So how do you post here since you unplugged your PC from the
    >>> internet?

    >> It's not to difficult to do, Poky
    >> Security software manufacturers tend to overstate their product
    >> description
    >> to instill fear and uncertainty; After all it's all about the $
    >> almighty.
    >> Please step back and try to remove the advertisement hype from your
    >> mind.
    >> In WinXP the most dependable defenses are:
    >> 1. Do not work as 'Administrator'; For day-to-day work routinely use
    >> a
    >> Limited User Account (LUA).
    >> 2. Secure (Harden) your operating system (OS).
    >> 3. Keep your OS and all software on it updated/patched.
    >> 4. Reconsider the usage of MSIE and MSOE.
    >> 5. Review your installed 3rd party software applications/utilities;
    >> Remove clutter.
    >> 6. Don't expose services to public networks.
    >> 7. Activate the in-build firewall and configure Windows not to use
    >> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus
    >> leaving TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
    >> networking weak point) closed. 7a. If on high-speed internet use a
    >> router as well.
    >> 8. Routinely practice safe-hex.
    >> 9. Regularly back-up data/files.
    >> 10. Familiarize yourself with crash recovery tools and re-installing
    >> your OS.
    >> 11. Utilize a real-time anti-virus (AV) application and vital system
    >> monitoring utilities/applications.
    >> 12. Keep abreast of latest developments - Sh!t happens...you know.
    >> The least preferred defenses are:
    >> Myriads of popular anti-whatever things and staying ignorant.
    >> Educational Reading: Security @ home
    >> http://home20.inet.tele.dk/b_nice/index.htm

    > I'm running XP SP2, using cable internet access with a router.
    > Could you explain how to do: "configure Windows not to use
    > TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
    > TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
    > networking weak point) closed. "
    > I don't know how to go about making the above happen.


    Seconfig XP:
    * A free tool to close (not just shield) most exploited Windows security
    holes.
    * Can close ports 135, 137-139, 445, 1025 (used by file and printer
    sharing, Windows domains, other Microsoft Networks access and widely
    exploited by worms, hackers etc.), 1900, 5000 (used by UPnP) and
    other...
    * Can disable most dangerous Windows services.
    * Can protect Windows side against most ARP spoofing/poisoning attacks.
    * Can configure many other hidden security related Windows TCP/IP
    settings.
    * Works only with registry (no files, services, drivers etc.).
    * Includes three easy to use presets for average home (standalone)
    computers, Microsoft Networks members and standalone computers with VPN
    client access to Microsoft Networks.
    * Certified to be malware free by Softpedia.
    http://seconfig.sytes.net/

    -jen



  7. #7
    louise Guest

    Re: Which virus/spyware scanners?

    jen wrote:
    > "louise" <louise@invalid.invalid> wrote in message
    > news:68pt0bF2tnktkU1@mid.individual.net...
    >> Kayman wrote:
    >>> On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
    >>>> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk
    >>>> <b__nice@hotmail.com>
    >>>> wrote:
    >>>>> Better to avoid installing malware in the first place (it's
    >>>>> actually
    >>>>> not that hard).
    >>>> So how do you post here since you unplugged your PC from the
    >>>> internet?
    >>> It's not to difficult to do, Poky
    >>> Security software manufacturers tend to overstate their product
    >>> description
    >>> to instill fear and uncertainty; After all it's all about the $
    >>> almighty.
    >>> Please step back and try to remove the advertisement hype from your
    >>> mind.
    >>> In WinXP the most dependable defenses are:
    >>> 1. Do not work as 'Administrator'; For day-to-day work routinely use
    >>> a
    >>> Limited User Account (LUA).
    >>> 2. Secure (Harden) your operating system (OS).
    >>> 3. Keep your OS and all software on it updated/patched.
    >>> 4. Reconsider the usage of MSIE and MSOE.
    >>> 5. Review your installed 3rd party software applications/utilities;
    >>> Remove clutter.
    >>> 6. Don't expose services to public networks.
    >>> 7. Activate the in-build firewall and configure Windows not to use
    >>> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus
    >>> leaving TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
    >>> networking weak point) closed. 7a. If on high-speed internet use a
    >>> router as well.
    >>> 8. Routinely practice safe-hex.
    >>> 9. Regularly back-up data/files.
    >>> 10. Familiarize yourself with crash recovery tools and re-installing
    >>> your OS.
    >>> 11. Utilize a real-time anti-virus (AV) application and vital system
    >>> monitoring utilities/applications.
    >>> 12. Keep abreast of latest developments - Sh!t happens...you know.
    >>> The least preferred defenses are:
    >>> Myriads of popular anti-whatever things and staying ignorant.
    >>> Educational Reading: Security @ home
    >>> http://home20.inet.tele.dk/b_nice/index.htm

    >> I'm running XP SP2, using cable internet access with a router.
    >> Could you explain how to do: "configure Windows not to use
    >> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
    >> TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
    >> networking weak point) closed. "
    >> I don't know how to go about making the above happen.

    >
    > Seconfig XP:
    > * A free tool to close (not just shield) most exploited Windows security
    > holes.
    > * Can close ports 135, 137-139, 445, 1025 (used by file and printer
    > sharing, Windows domains, other Microsoft Networks access and widely
    > exploited by worms, hackers etc.), 1900, 5000 (used by UPnP) and
    > other...
    > * Can disable most dangerous Windows services.
    > * Can protect Windows side against most ARP spoofing/poisoning attacks.
    > * Can configure many other hidden security related Windows TCP/IP
    > settings.
    > * Works only with registry (no files, services, drivers etc.).
    > * Includes three easy to use presets for average home (standalone)
    > computers, Microsoft Networks members and standalone computers with VPN
    > client access to Microsoft Networks.
    > * Certified to be malware free by Softpedia.
    > http://seconfig.sytes.net/
    >
    > -jen
    >
    >

    Thanks - I'm looking at it right now.

    Louise

  8. #8
    louise Guest

    Re: Which virus/spyware scanners?

    jen wrote:
    > "louise" <louise@invalid.invalid> wrote in message
    > news:68pt0bF2tnktkU1@mid.individual.net...
    >> Kayman wrote:
    >>> On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
    >>>> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk
    >>>> <b__nice@hotmail.com>
    >>>> wrote:
    >>>>> Better to avoid installing malware in the first place (it's
    >>>>> actually
    >>>>> not that hard).
    >>>> So how do you post here since you unplugged your PC from the
    >>>> internet?
    >>> It's not to difficult to do, Poky
    >>> Security software manufacturers tend to overstate their product
    >>> description
    >>> to instill fear and uncertainty; After all it's all about the $
    >>> almighty.
    >>> Please step back and try to remove the advertisement hype from your
    >>> mind.
    >>> In WinXP the most dependable defenses are:
    >>> 1. Do not work as 'Administrator'; For day-to-day work routinely use
    >>> a
    >>> Limited User Account (LUA).
    >>> 2. Secure (Harden) your operating system (OS).
    >>> 3. Keep your OS and all software on it updated/patched.
    >>> 4. Reconsider the usage of MSIE and MSOE.
    >>> 5. Review your installed 3rd party software applications/utilities;
    >>> Remove clutter.
    >>> 6. Don't expose services to public networks.
    >>> 7. Activate the in-build firewall and configure Windows not to use
    >>> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus
    >>> leaving TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
    >>> networking weak point) closed. 7a. If on high-speed internet use a
    >>> router as well.
    >>> 8. Routinely practice safe-hex.
    >>> 9. Regularly back-up data/files.
    >>> 10. Familiarize yourself with crash recovery tools and re-installing
    >>> your OS.
    >>> 11. Utilize a real-time anti-virus (AV) application and vital system
    >>> monitoring utilities/applications.
    >>> 12. Keep abreast of latest developments - Sh!t happens...you know.
    >>> The least preferred defenses are:
    >>> Myriads of popular anti-whatever things and staying ignorant.
    >>> Educational Reading: Security @ home
    >>> http://home20.inet.tele.dk/b_nice/index.htm

    >> I'm running XP SP2, using cable internet access with a router.
    >> Could you explain how to do: "configure Windows not to use
    >> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
    >> TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
    >> networking weak point) closed. "
    >> I don't know how to go about making the above happen.

    >
    > Seconfig XP:
    > * A free tool to close (not just shield) most exploited Windows security
    > holes.
    > * Can close ports 135, 137-139, 445, 1025 (used by file and printer
    > sharing, Windows domains, other Microsoft Networks access and widely
    > exploited by worms, hackers etc.), 1900, 5000 (used by UPnP) and
    > other...
    > * Can disable most dangerous Windows services.
    > * Can protect Windows side against most ARP spoofing/poisoning attacks.
    > * Can configure many other hidden security related Windows TCP/IP
    > settings.
    > * Works only with registry (no files, services, drivers etc.).
    > * Includes three easy to use presets for average home (standalone)
    > computers, Microsoft Networks members and standalone computers with VPN
    > client access to Microsoft Networks.
    > * Certified to be malware free by Softpedia.
    > http://seconfig.sytes.net/
    >
    > -jen
    >
    >

    Looking at the program. I use gotomypc.com which
    essentially allows me to access my pc from any computer
    anywhere in the world as long as it is turned on.

    Do you know whether one or more of the settings in seconfig
    would affect this?

    Thanks again.

    Louise

  9. #9
    Gumby Guest

    Re: Which virus/spyware scanners?

    louise <louise@invalid.invalid> wrote in
    news:69105gF2pmui8U2@mid.individual.net:

    > Looking at the program. I use gotomypc.com which
    > essentially allows me to access my pc from any computer
    > anywhere in the world as long as it is turned on.
    >
    > Do you know whether one or more of the settings in seconfig
    > would affect this?
    >
    > Thanks again.
    >
    > Louise
    >


    Probably. Do you have a router? If you do then you don't need to go go
    closing ports etc. Ports are closed on the router and opened as needed.
    Doing all that stuff listed is for the paranoid and not rational human
    beings.

  10. #10
    ChuckWagon Guest

    Re: Which virus/spyware scanners?

    > Do you know whether one or more of the settings in seconfig would affect
    > this?
    >

    No it won't. Just follow instructions.
    BTW, in relation to surfing the internet, being paranoid is good.


Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •