Results 1 to 10 of 28

Thread: superantispyware vs Malwarebytes

Hybrid View

  1. #1
    AMUN Guest

    Re: superantispyware vs Malwarebytes


    "Leythos" <spam999free@rrohio.com> wrote in message
    news:MPG.236eb2b6a5d69c6e98968f@us.news.astraweb.c om...
    > In article <ge2p1e$p04$1@aioe.org>, antispam@sparmmstop.net says...
    >> "Safer" maybe, but if a rootkit has your name on it, it's only a matter
    >> of
    >> time before it gets you.
    >>

    >
    > In my 30 years of using computers I've never personally had a virus or
    > "root-kit" on any of them. In all my years of designing secure networks
    > I've never had a compromised system on any managed network.
    >
    > It's all about knowing the vectors and how to control exposure.
    >



    I truly am happy for all those posting they NEVER have had infections.
    But at the same time, you probably lock yourself out of the majority of the
    internet to do so, or have simply been lucky.

    With idiots writing new code daily, the odds are you are going to be
    infected with "something " eventually.
    Even if you take every measure possible today, you don't know what tomorrow
    will bring.
    Especially if you run Windoze.

    I do try to keep on top of things, but you can't always have every
    application up to date, and even windows security updates are only issued
    AFTER a new virus/trojan surfaces.

    However while I can't say I've never been infected, I usually catch things
    that are not supposed to be there quickly and before they can do much
    damage.
    However, nothing will ever replace regular backup's as the best anti-malware
    step you can take.




  2. #2
    Beauregard T. Shagnasty Guest

    Re: superantispyware vs Malwarebytes

    AMUN wrote:

    > I truly am happy for all those posting they NEVER have had infections.
    > But at the same time, you probably lock yourself out of the majority
    > of the internet to do so, or have simply been lucky.


    Thank you for being happy for me. <g>

    And no, I have not locked myself out of anything.

    --
    -bts
    -Friends don't let friends drive Windows

  3. #3
    Dustin Cook Guest

    Re: superantispyware vs Malwarebytes

    "AMUN" <antispam@sparmmstop.net> wrote in news:ge39i2$gi4$1@aioe.org:

    > "Leythos" <spam999free@rrohio.com> wrote in message
    > news:MPG.236eb2b6a5d69c6e98968f@us.news.astraweb.c om...
    >> In article <ge2p1e$p04$1@aioe.org>, antispam@sparmmstop.net says...
    >>> "Safer" maybe, but if a rootkit has your name on it, it's only a
    >>> matter of
    >>> time before it gets you.
    >>>

    >>
    >> In my 30 years of using computers I've never personally had a virus
    >> or "root-kit" on any of them. In all my years of designing secure
    >> networks I've never had a compromised system on any managed network.
    >>
    >> It's all about knowing the vectors and how to control exposure.
    >>

    >
    >
    > I truly am happy for all those posting they NEVER have had infections.
    > But at the same time, you probably lock yourself out of the majority
    > of the internet to do so, or have simply been lucky.


    Strange, I'm not locked out of anything, routinely use Administrator
    accounts (hehehe), and I've never been infected by anything from the
    web... except during testing and analysis, and that's quiet deliberate on
    my part.

    > However while I can't say I've never been infected, I usually catch
    > things that are not supposed to be there quickly and before they can
    > do much damage.


    I don't know what it is you do, or what applications you use, nor do I
    know how many others have access to your computer, so I can't say what's
    actually the problem. I can pretty much say tho, somebody who has access
    isn't practicing safe hex.

    > However, nothing will ever replace regular backup's as the best
    > anti-malware step you can take.


    Backups aren't for malware, alone. Hardware failure can take your data
    too. You have a higher chance of a hard disk failure than you do of
    catching a virus if and only if you practice safe hex. One you can
    prevent, the other isn't much upto you.


    --
    Regards,
    Dustin Cook, Author of BugHunter
    BugHunter - http://bughunter.it-mate.co.uk
    MalwareBytes - http://www.malwarebytes.org



  4. #4
    AMUN Guest

    Re: superantispyware vs Malwarebytes


    "Dustin Cook" <bughunter.dustin@gmail.com> wrote in message
    news:Xns9B43EB2F13D5DHHI2948AJD832@69.16.185.250.. .
    > "AMUN" <antispam@sparmmstop.net> wrote in news:ge39i2$gi4$1@aioe.org:
    >
    >> "Leythos" <spam999free@rrohio.com> wrote in message
    >> news:MPG.236eb2b6a5d69c6e98968f@us.news.astraweb.c om...
    >>> In article <ge2p1e$p04$1@aioe.org>, antispam@sparmmstop.net says...
    >>>> "Safer" maybe, but if a rootkit has your name on it, it's only a
    >>>> matter of
    >>>> time before it gets you.
    >>>>
    >>>
    >>> In my 30 years of using computers I've never personally had a virus
    >>> or "root-kit" on any of them. In all my years of designing secure
    >>> networks I've never had a compromised system on any managed network.
    >>>
    >>> It's all about knowing the vectors and how to control exposure.
    >>>

    >>
    >>
    >> I truly am happy for all those posting they NEVER have had infections.
    >> But at the same time, you probably lock yourself out of the majority
    >> of the internet to do so, or have simply been lucky.

    >
    > Strange, I'm not locked out of anything, routinely use Administrator
    > accounts (hehehe), and I've never been infected by anything from the
    > web... except during testing and analysis, and that's quiet deliberate on
    > my part.
    >
    >> However while I can't say I've never been infected, I usually catch
    >> things that are not supposed to be there quickly and before they can
    >> do much damage.

    >
    > I don't know what it is you do, or what applications you use, nor do I
    > know how many others have access to your computer, so I can't say what's
    > actually the problem. I can pretty much say tho, somebody who has access
    > isn't practicing safe hex.



    Welllllll, with 5 people in the house, (3 kids), and several systems
    networked, there is no way to keep everything out.
    The kids aren't supposed to use my system (they have their own), but as it's
    in my office, they often do for homework, and I won't stop them from doing
    that.
    But they have been taught what to normally avoid, and if they think a system
    might be infected, it's immediately shut down until I can check it.

    But I'm sure many others in my position, have systems so loaded with garbage
    they won't even run, so I think I'm doing a fairly good job.<g>


    >
    >> However, nothing will ever replace regular backup's as the best
    >> anti-malware step you can take.

    >
    > Backups aren't for malware, alone. Hardware failure can take your data
    > too. You have a higher chance of a hard disk failure than you do of
    > catching a virus if and only if you practice safe hex. One you can
    > prevent, the other isn't much upto you.



    Absolutely agree.
    The backup was a habit I got into years ago, (when drives were far less
    reliable) and often serves little use.
    But when its needed......if a drive starts acting up, or somebody erases the
    wrong files, or a terminal virus brings all the systems down.
    It sure is nice to have, and lets me sleep well every night knowing it's
    there.



  5. #5
    Dustin Cook Guest

    Re: superantispyware vs Malwarebytes

    "AMUN" <antispam@sparmmstop.net> wrote in news:ge3net$pl7$1@aioe.org:

    > "Dustin Cook" <bughunter.dustin@gmail.com> wrote in message
    > news:Xns9B43EB2F13D5DHHI2948AJD832@69.16.185.250.. .


    >> I don't know what it is you do, or what applications you use, nor do
    >> I know how many others have access to your computer, so I can't say
    >> what's actually the problem. I can pretty much say tho, somebody who
    >> has access isn't practicing safe hex.

    >
    >
    > Welllllll, with 5 people in the house, (3 kids), and several systems
    > networked, there is no way to keep everything out.
    > The kids aren't supposed to use my system (they have their own), but
    > as it's in my office, they often do for homework, and I won't stop
    > them from doing that.
    > But they have been taught what to normally avoid, and if they think a
    > system might be infected, it's immediately shut down until I can check
    > it.


    Aha! It's alright; considering the potential amount of users your machine
    comes in contact with, the fact your rarely infected is outstanding.

    > But I'm sure many others in my position, have systems so loaded with
    > garbage they won't even run, so I think I'm doing a fairly good
    > job.<g>


    Yes, by comparison, you certainly are.

    >> Backups aren't for malware, alone. Hardware failure can take your
    >> data too. You have a higher chance of a hard disk failure than you do
    >> of catching a virus if and only if you practice safe hex. One you can
    >> prevent, the other isn't much upto you.

    >
    >
    > Absolutely agree.
    > The backup was a habit I got into years ago, (when drives were far
    > less reliable) and often serves little use.
    > But when its needed......if a drive starts acting up, or somebody
    > erases the wrong files, or a terminal virus brings all the systems
    > down. It sure is nice to have, and lets me sleep well every night
    > knowing it's there.


    Indeed! I'm overly paranoid I suppose when it comes to backups. I just
    don't want to lose anything important, so everything routinely gets
    backed up. hehehe.


    --
    Regards,
    Dustin Cook, Author of BugHunter
    BugHunter - http://bughunter.it-mate.co.uk
    MalwareBytes - http://www.malwarebytes.org



  6. #6
    Leythos Guest

    Re: superantispyware vs Malwarebytes

    In article <ge39i2$gi4$1@aioe.org>, antispam@sparmmstop.net says...
    >
    > "Leythos" <spam999free@rrohio.com> wrote in message
    > news:MPG.236eb2b6a5d69c6e98968f@us.news.astraweb.c om...
    > > In article <ge2p1e$p04$1@aioe.org>, antispam@sparmmstop.net says...
    > >> "Safer" maybe, but if a rootkit has your name on it, it's only a matter
    > >> of
    > >> time before it gets you.
    > >>

    > >
    > > In my 30 years of using computers I've never personally had a virus or
    > > "root-kit" on any of them. In all my years of designing secure networks
    > > I've never had a compromised system on any managed network.
    > >
    > > It's all about knowing the vectors and how to control exposure.
    > >

    >
    >
    > I truly am happy for all those posting they NEVER have had infections.
    > But at the same time, you probably lock yourself out of the majority of the
    > internet to do so, or have simply been lucky.


    That's not true at all. The internet is a vast place and most of it is
    worthless. There are very rich areas that many don't know about, and
    there are common areas that are rich with content that most know about.

    Look at it like a State - you're not missing much from most locations.

    > With idiots writing new code daily, the odds are you are going to be
    > infected with "something " eventually.
    > Even if you take every measure possible today, you don't know what tomorrow
    > will bring.
    > Especially if you run Windoze.


    You're wrong, you don't understand it well enough to see that it's
    fairly easy to remain safe. Once you understand the threats and how you
    get compromised you can avoid them.

    > I do try to keep on top of things, but you can't always have every
    > application up to date, and even windows security updates are only issued
    > AFTER a new virus/trojan surfaces.


    That explains that you don't understand - I ran servers on networks that
    were unpatched for years, in fact I don't normally install patches for
    weeks...

    > However while I can't say I've never been infected, I usually catch things
    > that are not supposed to be there quickly and before they can do much
    > damage.


    It's easy to understand the entry points, to protect yourself, and you
    don't have to miss the beauty of the net while doing it.

    > However, nothing will ever replace regular backup's as the best anti-malware
    > step you can take.


    Wrong, backups can be compromised before you find out that you've been
    compromised. The best method to protect yourself is to understand the
    entry methods and take measures to prevent entry.


    --
    - Igitur qui desiderat pacem, praeparet bellum.
    - Calling an illegal alien an "undocumented worker" is like calling a
    drug dealer an "unlicensed pharmacist"
    spam999free@rrohio.com (remove 999 for proper email address)

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •